WorldWideScience

Sample records for rational secret sharing

  1. Probabilistic Infinite Secret Sharing

    OpenAIRE

    Csirmaz, László

    2013-01-01

    The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes. It highlights important properties, explains why certain definitions work better than others, connects this topic to other branches of mathematics, and might yield new design paradigms. A probabilistic secret sharing scheme is a joint probability distribution of the shares and the secret together with a colle...

  2. Dynamic quantum secret sharing

    International Nuclear Information System (INIS)

    Jia, Heng-Yue; Wen, Qiao-Yan; Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo

    2012-01-01

    In this Letter we consider quantum secret sharing (QSS) between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications. -- Highlights: ► We consider quantum secret sharing between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). ► In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. ► Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. ► Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. ► Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications.

  3. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  4. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  5. Quantum strongly secure ramp secret sharing

    DEFF Research Database (Denmark)

    Zhang, Paul; Matsumoto, Rytaro Yamashita

    2015-01-01

    Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares and distributing them among several participants. If a sufficient number of shares are put together, then the secret can be fully reconstructed. If an insufficient number of shares are put together...... however, no information about the secret can be revealed. In quantum ramp secret sharing, partial information about the secret is allowed to leak to a set of participants, called an unqualified set, that cannot fully reconstruct the secret. By allowing this, the size of a share can be drastically reduced....... This paper introduces a quantum analog of classical strong security in ramp secret sharing schemes. While the ramp secret sharing scheme still leaks partial information about the secret to unqualified sets of participants, the strong security condition ensures that qudits with critical information can...

  6. On alternative approach for verifiable secret sharing

    OpenAIRE

    Kulesza, Kamil; Kotulski, Zbigniew; Pieprzyk, Joseph

    2002-01-01

    Secret sharing allows split/distributed control over the secret (e.g. master key). Verifiable secret sharing (VSS) is the secret sharing extended by verification capacity. Usually verification comes at the price. We propose "free lunch", the approach that allows to overcome this inconvenience.

  7. A linear construction of perfect secret sharing schemes

    NARCIS (Netherlands)

    Dijk, van M.; Santis, De A.

    1995-01-01

    In this paper, we generalize the vector space construction due to Brickell [5]. This generalization, introduced by Bertilsson [1], leads to perfect secret sharing schemes with rational information rates in which the secret can be computed efficiently by each qualified group. A one to one

  8. Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

    Science.gov (United States)

    Chen, Chien-Chang; Liu, Chong-An

    2013-01-01

    A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users' secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.

  9. Secret sharing via quantum entanglement

    International Nuclear Information System (INIS)

    Hillery, M.; Buzek, V.

    1999-01-01

    Secret sharing is a procedure for splitting a message into several parts so that no single part is sufficient to read the message, but the entire set is. This procedure can be implemented using either GHZ states or two-particle entangled states. In the quantum case the presence of an eavesdropper will introduce errors so that her presence can be detected. We also discuss how quantum information can be split into parts so that the message can be reconstructed from a sufficiently large subset of the parts. (Authors)

  10. Semiquantum secret sharing using entangled states

    International Nuclear Information System (INIS)

    Li Qin; Chan, W. H.; Long Dongyang

    2010-01-01

    Secret sharing is a procedure for sharing a secret among a number of participants such that only the qualified subsets of participants have the ability to reconstruct the secret. Even in the presence of eavesdropping, secret sharing can be achieved when all the members are quantum. So what happens if not all the members are quantum? In this paper, we propose two semiquantum secret sharing protocols by using maximally entangled Greenberger-Horne-Zeilinger-type states in which quantum Alice shares a secret with two classical parties, Bob and Charlie, in a way that both parties are sufficient to obtain the secret, but one of them cannot. The presented protocols are also shown to be secure against eavesdropping.

  11. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  12. Efficient multiparty quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-01-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information

  13. On Secret Sharing with Nonlinear Product Reconstruction

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego

    2015-01-01

    Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty computation and, since recently, in the area of two-party cryptography as well. In a nutshell, this notion guarantees that the product of two secrets is obtained as a linear function of the vector......-necessarily-linear “product reconstruction function.” Is the resulting notion equivalent to multiplicative linear secret sharing? We show the (perhaps somewhat counterintuitive) result that this relaxed notion is strictly more general. Concretely, fix a finite field ${\\mathbb F}_q$ as the base field over which linear secret...... sharing is considered. Then we show there exists an (exotic) linear secret sharing scheme with an unbounded number of players $n$ such that it has $t$-privacy with $t = \\Omega(n)$ and such that it does admit a product reconstruction function, yet this function is necessarily nonlinear. In addition, we...

  14. Secret Sharing Schemes and Advanced Encryption Standard

    Science.gov (United States)

    2015-09-01

    25 4.7 Computational Example . . . . . . . . . . . . . . . . . . . . . 26 5 Side-Channel Effect on Advanced Encryption Standard ( AES ) 31...improvements, and to build upon them to discuss the side-channel effects on the Advanced Encryption Standard ( AES ). The following questions are asked...secret sharing scheme? • Can the improvements to the current secret sharing scheme prove to be beneficial in strengthening/weakening AES encryption

  15. Applying secret sharing for HIS backup exchange.

    Science.gov (United States)

    Kuroda, Tomohiro; Kimura, Eizen; Matsumura, Yasushi; Yamashita, Yoshinori; Hiramatsu, Haruhiko; Kume, Naoto; Sato, Atsushi

    2013-01-01

    To secure business continuity is indispensable for hospitals to fulfill its social responsibility under disasters. Although to back up the data of the hospital information system (HIS) at multiple remote sites is a key strategy of business continuity plan (BCP), the requirements to treat privacy sensitive data jack up the cost for the backup. The secret sharing is a method to split an original secret message up so that each individual piece is meaningless, but putting sufficient number of pieces together to reveal the original message. The secret sharing method eases us to exchange HIS backups between multiple hospitals. This paper evaluated the feasibility of the commercial secret sharing solution for HIS backup through several simulations. The result shows that the commercial solution is feasible to realize reasonable HIS backup exchange platform when template of contract between participating hospitals is ready.

  16. Sagnac secret sharing over telecom fiber networks.

    Science.gov (United States)

    Bogdanski, Jan; Ahrens, Johan; Bourennane, Mohamed

    2009-01-19

    We report the first Sagnac quantum secret sharing (in three-and four-party implementations) over 1550 nm single mode fiber (SMF) networks, using a single qubit protocol with phase encoding. Our secret sharing experiment has been based on a single qubit protocol, which has opened the door to practical secret sharing implementation over fiber telecom channels and in free-space. The previous quantum secret sharing proposals were based on multiparticle entangled states, difficult in the practical implementation and not scalable. Our experimental data in the three-party implementation show stable (in regards to birefringence drift) quantum secret sharing transmissions at the total Sagnac transmission loop distances of 55-75 km with the quantum bit error rates (QBER) of 2.3-2.4% for the mean photon number micro?= 0.1 and 1.7-2.1% for micro= 0.3. In the four-party case we have achieved quantum secret sharing transmissions at the total Sagnac transmission loop distances of 45-55 km with the quantum bit error rates (QBER) of 3.0-3.7% for the mean photon number micro= 0.1 and 1.8-3.0% for micro?= 0.3. The stability of quantum transmission has been achieved thanks to our new concept for compensation of SMF birefringence effects in Sagnac, based on a polarization control system and a polarization insensitive phase modulator. The measurement results have showed feasibility of quantum secret sharing over telecom fiber networks in Sagnac configuration, using standard fiber telecom components.

  17. Meaningful Share Generation for Increased Number of Secrets in Visual Secret-Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Mustafa Ulutas

    2010-01-01

    Full Text Available This paper presents a new scheme for hiding two halftone secret images into two meaningful shares created from halftone cover images. Meaningful shares are more desirable than noise-like (meaningless shares in Visual Secret Sharing because they look natural and do not attract eavesdroppers' attention. Previous works in the field focus on either increasing number of secrets or creating meaningful shares for one secret image. The method outlined in this paper both increases the number of secrets and creates meaningful shares at the same time. While the contrast ratio of shares is equal to that of Extended Visual Cryptography, two secrets are encoded into two shares as opposed to one secret in the Extended Visual Cryptography. Any two natural-looking images can be used as cover unlike the Halftone Visual Cryptography method where one cover should be the negative of the other cover image and can only encode one secret. Effectiveness of the proposed method is verified by an experiment.

  18. Quantum secret sharing with classical Bobs

    International Nuclear Information System (INIS)

    Li Lvzhou; Qiu Daowen; Mateus, Paulo

    2013-01-01

    Boyer et al (2007 Phys. Rev. Lett. 99 140501) proposed a novel idea of semi-quantum key distribution, where a key can be securely distributed between Alice, who can perform any quantum operation, and Bob, who is classical. Extending the ‘semi-quantum’ idea to other tasks of quantum information processing is of interest and worth considering. In this paper, we consider the issue of semi-quantum secret sharing, where a quantum participant Alice can share a secret key with two classical participants, Bobs. After analyzing the existing protocol, we propose a new protocol of semi-quantum secret sharing. Our protocol is more realistic, since it utilizes product states instead of entangled states. We prove that any attempt of an adversary to obtain information necessarily induces some errors that the legitimate users could notice. (paper)

  19. Comment on "Dynamic quantum secret sharing"

    Science.gov (United States)

    Liao, Ci-Hong; Yang, Chun-Wei; Hwang, Tzonelish

    2013-10-01

    Hsu et al. (Quantum Inf Process 12:331-344,2013) proposed a dynamic quantum secret sharing (DQSS) protocol using the entanglement swapping of Bell states for an agent to easily join (or leave) the system. In 2013, Wang and Li (Quantum Inf Process 12(5):1991-1997, 2013) proposed a collusion attack on Hsu et al.'s DQSS protocol. Nevertheless, this study points out a new security issue on Hsu et al.'s DQSS protocol regarding to the honesty of a revoked agent. Without considering this issue, the DQSS protocol could be failed to provide secret sharing function.

  20. Secret Sharing of a Quantum State.

    Science.gov (United States)

    Lu, He; Zhang, Zhen; Chen, Luo-Kan; Li, Zheng-Da; Liu, Chang; Li, Li; Liu, Nai-Le; Ma, Xiongfeng; Chen, Yu-Ao; Pan, Jian-Wei

    2016-07-15

    Secret sharing of a quantum state, or quantum secret sharing, in which a dealer wants to share a certain amount of quantum information with a few players, has wide applications in quantum information. The critical criterion in a threshold secret sharing scheme is confidentiality: with less than the designated number of players, no information can be recovered. Furthermore, in a quantum scenario, one additional critical criterion exists: the capability of sharing entangled and unknown quantum information. Here, by employing a six-photon entangled state, we demonstrate a quantum threshold scheme, where the shared quantum secrecy can be efficiently reconstructed with a state fidelity as high as 93%. By observing that any one or two parties cannot recover the secrecy, we show that our scheme meets the confidentiality criterion. Meanwhile, we also demonstrate that entangled quantum information can be shared and recovered via our setting, which shows that our implemented scheme is fully quantum. Moreover, our experimental setup can be treated as a decoding circuit of the five-qubit quantum error-correcting code with two erasure errors.

  1. Some directions beyond traditional quantum secret sharing

    Energy Technology Data Exchange (ETDEWEB)

    Singh, Sudhir Kumar [Department of Electrical Engineering, University of California, Los Angeles, CA 90095 (United States); Srikanth, R [Poornaprajna Institute of Scientific Research, Devanahalli, Bangalore 562 110 (India)], E-mail: suds@ee.ucla.edu, E-mail: srik@rri.res.in

    2008-06-15

    We investigate two directions beyond the traditional quantum secret sharing (QSS). Firstly, a restriction on QSS that comes from the no-cloning theorem is that any pair of authorized sets in an access structure should overlap. From the viewpoint of application, this places an unnatural constraint on secret sharing. We present a generalization, called assisted QSS (AQSS), where access structures without pairwise overlap of authorized sets are permissible, provided some shares are withheld by the share dealer. We show that no more than {lambda}-1 withheld shares are required, where {lambda} is the minimum number of partially linked classes among the authorized sets for the QSS. Our result means that such applications of QSS need not be thwarted by the no-cloning theorem. Secondly, we point out a way of combining the features of QSS and quantum key distribution (QKD) for applications where classical information is shared by quantum means. We observe that in such case, it is often possible to reduce the security proof of QSS to that of QKD.

  2. Some directions beyond traditional quantum secret sharing

    International Nuclear Information System (INIS)

    Singh, Sudhir Kumar; Srikanth, R

    2008-01-01

    We investigate two directions beyond the traditional quantum secret sharing (QSS). Firstly, a restriction on QSS that comes from the no-cloning theorem is that any pair of authorized sets in an access structure should overlap. From the viewpoint of application, this places an unnatural constraint on secret sharing. We present a generalization, called assisted QSS (AQSS), where access structures without pairwise overlap of authorized sets are permissible, provided some shares are withheld by the share dealer. We show that no more than λ-1 withheld shares are required, where λ is the minimum number of partially linked classes among the authorized sets for the QSS. Our result means that such applications of QSS need not be thwarted by the no-cloning theorem. Secondly, we point out a way of combining the features of QSS and quantum key distribution (QKD) for applications where classical information is shared by quantum means. We observe that in such case, it is often possible to reduce the security proof of QSS to that of QKD

  3. Adaptive Secret Sharing for Color Images

    Directory of Open Access Journals (Sweden)

    Jia-Hong Li

    2011-10-01

    Full Text Available A secret sharing model can secure a secret over multiple noise-like shadows and remain recoverable despite multiple shadow failures. Even if some of the shadows are compromised, the secret will not be revealed as long as the number of the compromised shadows is smaller than a pre-determined threshold. Moreover, there are some necessary details of concerns: the malicious tampering on shadows must be detectable; the shadows must be concealed in a camouflage image with adequate quality to reduce suspicion and possible attack; color image properties must be considered. In addition to these concerns, in this paper, an adaptable mechanism is further designed to balance the hiding quantity and the quality of camouflage images depending on different applications.This is an important and interesting aspect that has never been discussed in previous research.

  4. SECURE VISUAL SECRET SHARING BASED ON DISCRETE WAVELET TRANSFORM

    Directory of Open Access Journals (Sweden)

    S. Jyothi Lekshmi

    2015-08-01

    Full Text Available Visual Cryptography Scheme (VCS is an encryption method to encode secret written materials. This method converts the secret written material into an image. Then encode this secret image into n shadow images called shares. For the recreation of the original secret, all or some selected subsets of shares are needed; individual shares are of no use on their own. The secret image can be recovered simply by selecting some subset of these n shares, makes transparencies of them and stacking on top of each other. Nowadays, the data security has an important role. The shares can be altered by an attacker. So providing security to the shares is important. This paper proposes a method of adding security to cryptographic shares. This method uses two dimensional discrete wavelet transform to hide visual secret shares. Then the hidden secrets are distributed among participants through the internet. All hidden shares are extracted to reconstruct the secret.

  5. Quantum secret sharing protocol using modulated doubly entangled photons

    International Nuclear Information System (INIS)

    Chuan, Wang; Yong, Zhang

    2009-01-01

    In this paper, we propose a quantum secret sharing protocol utilizing polarization modulated doubly entangled photon pairs. The measurement devices are constructed. By modulating the polarizations of entangled photons, the boss could encode secret information on the initial state and share the photons with different members to realize the secret sharing process. This protocol shows the security against intercept-resend attack and dishonest member cheating. The generalized quantum secret sharing protocol is also discussed. (general)

  6. Multiparty secret sharing of quantum information based on entanglement swapping

    International Nuclear Information System (INIS)

    Li Yongmin; Zhang Kuanshou; Peng Kunchi

    2004-01-01

    A protocol of multiparty secret sharing of quantum information based on entanglement swapping is analyzed. In this protocol, Bell states are needed in order to realize the quantum information secret sharing and it is convenient to realize the quantum secret sharing among the members of any subset of users

  7. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation

    NARCIS (Netherlands)

    R.J.F. Cramer (Ronald); I.B. Damgård (Ivan); Y. Ishai

    2005-01-01

    htmlabstractWe present a method for converting shares of a secret into shares of the same secret in a different secret-sharing scheme using only local computation and no communication between players. In particular, shares in a replicated scheme based on a CNF representation of the access structure

  8. Shared Secrets versus Secrets Kept Private Are Linked to Better Adolescent Adjustment

    Science.gov (United States)

    Frijns, Tom; Finkenauer, Catrin; Keijsers, Loes

    2013-01-01

    It is a household notion that secrecy is bad while sharing is good. But what about shared secrets? The present research adopts a functional analysis of sharing secrets, arguing that it should negate harmful consequences generally associated with secrecy and serves important interpersonal functions in adolescence. A survey study among 790 Dutch…

  9. Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups

    DEFF Research Database (Denmark)

    Cramer, Ronald; Fehr, Serge

    2002-01-01

    A black-box secret sharing scheme for the threshold access structure T t,n is one which works over any finite Abelian group G. Briefly, such a scheme differs from an ordinary linear secret sharing scheme (over, say, a given finite field) in that distribution matrix and reconstruction vectors...... are defined over ℤ and are designed independently of the group G from which the secret and the shares are sampled. This means that perfect completeness and perfect privacy are guaranteed regardless of which group G is chosen. We define the black-box secret sharing problem as the problem of devising......, for an arbitrary given T t,n , a scheme with minimal expansion factor, i.e., where the length of the full vector of shares divided by the number of players n is minimal. Such schemes are relevant for instance in the context of distributed cryptosystems based on groups with secret or hard to compute group order...

  10. A quantum secret-sharing protocol with fairness

    International Nuclear Information System (INIS)

    Liu, Feng; Qin, Su-Juan; Wen, Qiao-Yan

    2014-01-01

    A quantum secret-sharing (QSS) protocol consists of two main phases, called sharing and reconstruction. In the first phase, the dealer selects a secret, divides it into several shares, and sends each participant its share securely with a quantum channel. In the second phase, the participants run an interactive protocol in order to reconstruct the secret. If the participants can communicate via a broadcast channel, they can show their shares and learn the secrets simultaneously. So what happens if the channel is not simultaneous? In this paper, we propose a QSS protocol with cheaters by using partially and maximally entangled states. A secure and fair reconstruction mechanism is designed, in a way that each participant can learn or cannot learn the secret simultaneously. (papers)

  11. Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding Theory

    OpenAIRE

    Matsumoto, Ryutaroh

    2018-01-01

    We consider secret sharing schemes with a classical secret and quantum shares. One example of such schemes was recently reported whose access structure cannot be realized by any secret sharing schemes with classical shares. In this paper, we report further quantum secret sharing schemes whose access structures cannot be realized by any classical secret sharing schemes.

  12. Multi-group dynamic quantum secret sharing with single photons

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Hongwei [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Ma, Haiqiang, E-mail: hqma@bupt.edu.cn [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Wei, Kejin [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Yang, Xiuqing [School of Science, Beijing Jiaotong University, Beijing 100044 (China); Qu, Wenxiu; Dou, Tianqi; Chen, Yitian; Li, Ruixue; Zhu, Wu [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2016-07-15

    In this letter, we propose a novel scheme for the realization of single-photon dynamic quantum secret sharing between a boss and three dynamic agent groups. In our system, the boss can not only choose one of these three groups to share the secret with, but also can share two sets of independent keys with two groups without redistribution. Furthermore, the security of communication is enhanced by using a control mode. Compared with previous schemes, our scheme is more flexible and will contribute to a practical application. - Highlights: • A multi-group dynamic quantum secret sharing with single photons scheme is proposed. • Any one of the groups can be chosen to share secret through controlling the polarization of photons. • Two sets of keys can be shared simultaneously without redistribution.

  13. Secret Sharing and Secure Computing from Monotone Formulae

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Kölker, Jonas; Miltersen, Peter Bro

    2012-01-01

    We present a construction of log-depth formulae for various threshold functions based on atomic threshold gates of constant size. From this, we build a new family of linear secret sharing schemes that are multiplicative, scale well as the number of players increases and allows to raise a shared...... of our scheme for pseudorandom secret sharing as defined by Cramer, Damgård and Ishai...

  14. Threshold quantum secret sharing based on single qubit

    Science.gov (United States)

    Lu, Changbin; Miao, Fuyou; Meng, Keju; Yu, Yue

    2018-03-01

    Based on unitary phase shift operation on single qubit in association with Shamir's ( t, n) secret sharing, a ( t, n) threshold quantum secret sharing scheme (or ( t, n)-QSS) is proposed to share both classical information and quantum states. The scheme uses decoy photons to prevent eavesdropping and employs the secret in Shamir's scheme as the private value to guarantee the correctness of secret reconstruction. Analyses show it is resistant to typical intercept-and-resend attack, entangle-and-measure attack and participant attacks such as entanglement swapping attack. Moreover, it is easier to realize in physic and more practical in applications when compared with related ones. By the method in our scheme, new ( t, n)-QSS schemes can be easily constructed using other classical ( t, n) secret sharing.

  15. Threshold secret sharing scheme based on phase-shifting interferometry.

    Science.gov (United States)

    Deng, Xiaopeng; Shi, Zhengang; Wen, Wei

    2016-11-01

    We propose a new method for secret image sharing with the (3,N) threshold scheme based on phase-shifting interferometry. The secret image, which is multiplied with an encryption key in advance, is first encrypted by using Fourier transformation. Then, the encoded image is shared into N shadow images based on the recording principle of phase-shifting interferometry. Based on the reconstruction principle of phase-shifting interferometry, any three or more shadow images can retrieve the secret image, while any two or fewer shadow images cannot obtain any information of the secret image. Thus, a (3,N) threshold secret sharing scheme can be implemented. Compared with our previously reported method, the algorithm of this paper is suited for not only a binary image but also a gray-scale image. Moreover, the proposed algorithm can obtain a larger threshold value t. Simulation results are presented to demonstrate the feasibility of the proposed method.

  16. A Finite Equivalence of Verifiable Multi-secret Sharing

    Directory of Open Access Journals (Sweden)

    Hui Zhao

    2012-02-01

    Full Text Available We give an abstraction of verifiable multi-secret sharing schemes that is accessible to a fully mechanized analysis. This abstraction is formalized within the applied pi-calculus by using an equational theory which characterizes the cryptographic semantics of secret share. We also present an encoding from the equational theory into a convergent rewriting system, which is suitable for the automated protocol verifier ProVerif. Based on that, we verify the threshold certificate protocol in ProVerif.

  17. Multiparty Quantum Secret Sharing of Secure Direct Communication Using Teleportation

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojing

    2007-01-01

    We present an (n,n) threshold quantum secret sharing scheme of secure direct communication using Greenberger-Horne-Zeilinger state and teleportation. After ensuring the security of the quantum channel, the sender encodes the secret message directly on a sequence of particle states and transmits it to the receivers by teleportation. The receivers can recover the secret message by combining their measurement results with the sender's result. If a perfect quantum channel is used, our scheme is completely secure because the transmitting particle sequence does not carry the secret message. We also show our scheme is secure for noise quantum channel.

  18. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.

    Science.gov (United States)

    Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi

    2016-01-01

    After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t', n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.

  19. Multiparty Quantum Secret Sharing of Quantum States Using Entanglement States

    International Nuclear Information System (INIS)

    Ying, Guo; Da-Zu, Huang; Gui-Hua, Zeng; Ho, Lee Moon

    2008-01-01

    A multi-partite-controlled quantum secret sharing scheme using several non-orthogonal entanglement states is presented with unconditional security. In this scheme, the participants share the secret quantum state by exchanging the secret polarization angles of the disordered travel particles. The security of the secret quantum state is also guaranteed by the non-orthogonal multi-partite-controlled entanglement states, the participants' secret polarizations, and the disorder of the travelling particles. Moreover, the present scheme is secure against the particle-number splitting attack and the intercept-and-resend attack. It may be still secure even if the distributed quantum state is embedded in a not-so-weak coherent-state pulse

  20. Cooperative Secret Sharing Using QR Codes and Symmetric Keys

    Directory of Open Access Journals (Sweden)

    Yang-Wai Chow

    2018-04-01

    Full Text Available Secret sharing is an information security technique where a dealer divides a secret into a collection of shares and distributes these to members of a group. The secret will only be revealed when a predefined number of group members cooperate to recover the secret. The purpose of this study is to investigate a method of distributing shares by embedding them into cover Quick Response (QR codes in a secure manner using cryptographic keys. The advantage of this approach is that the shares can be disseminated over public channels, as anyone who scans the QR codes will only obtain public information. Only authorized individuals who are in possession of the required keys will be able to recover the shares. This also means that when group members cooperate to recover a secret, the group can determine the presence of an illegitimate participant if the person does not produce a valid share. This study proposes a protocol for accomplishing this and discusses the underlying security of the protocol.

  1. The Future Internet: A World of Secret Shares

    Directory of Open Access Journals (Sweden)

    William J. Buchanan

    2015-11-01

    Full Text Available The Public Key Infrastructure (PKI is crumbling, partially due to the lack of a strong understanding of how encryption actually works, but also due to weaknesses in its implementation. This paper outlines an Internet storage technique using secret sharing methods which could be used to overcome the problems inherent with PKI, while supporting new types of architectures incorporating such things as automated failover and break-glass data recovery. The paper outlines a novel architecture: SECRET, which supports a robust cloud-based infrastructure with in-built privacy and failover. In order to understand the performance overhead of SECRET, the paper outlines a range of experiments that investigate the overhead of this and other secret share methods.

  2. Secret Sharing over Fast-Fading MIMO Wiretap Channels

    Directory of Open Access Journals (Sweden)

    Bloch Matthieu

    2009-01-01

    Full Text Available Secret sharing over the fast-fading MIMO wiretap channel is considered. A source and a destination try to share secret information over a fast-fading MIMO channel in the presence of an eavesdropper who also makes channel observations that are different from but correlated to those made by the destination. An interactive, authenticated public channel with unlimited capacity is available to the source and destination for the secret sharing process. This situation is a special case of the "channel model with wiretapper" considered by Ahlswede and Csiszár. An extension of their result to continuous channel alphabets is employed to evaluate the key capacity of the fast-fading MIMO wiretap channel. The effects of spatial dimensionality provided by the use of multiple antennas at the source, destination, and eavesdropper are then investigated.

  3. Cryptanalysis of quantum secret sharing based on GHZ states

    International Nuclear Information System (INIS)

    Liu Xiaofen; Pan Rijing

    2011-01-01

    In a recent paper (Hwang et al 2011 Phys. Scr. 83 045004), a subtle quantum secret sharing (QSS) protocol was proposed. One major advantage of this protocol is its high efficiency; that is, it is more efficient than other QSS protocols using the Greenberger-Horne-Zeilinger states. However, we analyzed the security of this protocol and found that it is insecure for one agent who may deduce half of the information about the deal's secret directly just by his/her piece of secret. Finally, a feasible improvement of this QSS protocol is put forward.

  4. Cryptanalysis of quantum secret sharing based on GHZ states

    Energy Technology Data Exchange (ETDEWEB)

    Liu Xiaofen; Pan Rijing, E-mail: liuxiaofen23@fjnu.edu.cn [School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007 (China); Key Laboratory of Network Security and Cryptography, Fujian Normal University, Fuzhou 350007 (China)

    2011-10-15

    In a recent paper (Hwang et al 2011 Phys. Scr. 83 045004), a subtle quantum secret sharing (QSS) protocol was proposed. One major advantage of this protocol is its high efficiency; that is, it is more efficient than other QSS protocols using the Greenberger-Horne-Zeilinger states. However, we analyzed the security of this protocol and found that it is insecure for one agent who may deduce half of the information about the deal's secret directly just by his/her piece of secret. Finally, a feasible improvement of this QSS protocol is put forward.

  5. Quantum secret sharing via local operations and classical communication.

    Science.gov (United States)

    Yang, Ying-Hui; Gao, Fei; Wu, Xia; Qin, Su-Juan; Zuo, Hui-Juan; Wen, Qiao-Yan

    2015-11-20

    We investigate the distinguishability of orthogonal multipartite entangled states in d-qudit system by restricted local operations and classical communication. According to these properties, we propose a standard (2, n)-threshold quantum secret sharing scheme (called LOCC-QSS scheme), which solves the open question in [Rahaman et al., Phys. Rev. A, 91, 022330 (2015)]. On the other hand, we find that all the existing (k, n)-threshold LOCC-QSS schemes are imperfect (or "ramp"), i.e., unauthorized groups can obtain some information about the shared secret. Furthermore, we present a (3, 4)-threshold LOCC-QSS scheme which is close to perfect.

  6. Equal status in Ultimatum Games promotes rational sharing.

    Science.gov (United States)

    Han, Xiao; Cao, Shinan; Bao, Jian-Zhang; Wang, Wen-Xu; Zhang, Boyu; Gao, Zi-You; Sánchez, Angel

    2018-01-19

    Experiments on the Ultimatum Game (UG) repeatedly show that people's behaviour is far from rational. In UG experiments, a subject proposes how to divide a pot and the other can accept or reject the proposal, in which case both lose everything. While rational people would offer and accept the minimum possible amount, in experiments low offers are often rejected and offers are typically larger than the minimum, and even fair. Several theoretical works have proposed that these results may arise evolutionarily when subjects act in both roles and there is a fixed interaction structure in the population specifying who plays with whom. We report the first experiments on structured UG with subjects playing simultaneously both roles. We observe that acceptance levels of responders approach rationality and proposers accommodate their offers to their environment. More precisely, subjects keep low acceptance levels all the time, but as proposers they follow a best-response-like approach to choose their offers. We thus find that status equality promotes rational sharing while the influence of structure leads to fairer offers compared to well-mixed populations. Our results are far from what is observed in single-role UG experiments and largely different from available predictions based on evolutionary game theory.

  7. How to Split a Shared Secret into Shared Bits in Constant-Round

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Fitzi, Matthias; Nielsen, Jesper Buus

    $ such that $l = \\lceil \\log_2(p) \\rceil$, $a_0, \\ldots, a_{l-1} \\in \\{0,1\\}$ and $a = \\sum_{i=0}^{l-1} a_i 2^i$. Our protocol is secure against active adversaries and works for any linear secret sharing scheme with a multiplication protocol. This result immediately implies solutions to other long-standing open...... problems, such as constant-round and unconditionally secure protocols for comparing shared numbers and deciding whether a shared number is zero. The complexity of our protocol is $O(l \\log(l))$ invocations of the multiplication protocol for the underlying secret sharing scheme, carried out in $O(1)$....

  8. A novel secret image sharing scheme based on chaotic system

    Science.gov (United States)

    Li, Li; Abd El-Latif, Ahmed A.; Wang, Chuanjun; Li, Qiong; Niu, Xiamu

    2012-04-01

    In this paper, we propose a new secret image sharing scheme based on chaotic system and Shamir's method. The new scheme protects the shadow images with confidentiality and loss-tolerance simultaneously. In the new scheme, we generate the key sequence based on chaotic system and then encrypt the original image during the sharing phase. Experimental results and analysis of the proposed scheme demonstrate a better performance than other schemes and confirm a high probability to resist brute force attack.

  9. Quantum secret sharing based on quantum error-correcting codes

    International Nuclear Information System (INIS)

    Zhang Zu-Rong; Liu Wei-Tao; Li Cheng-Zu

    2011-01-01

    Quantum secret sharing(QSS) is a procedure of sharing classical information or quantum information by using quantum states. This paper presents how to use a [2k − 1, 1, k] quantum error-correcting code (QECC) to implement a quantum (k, 2k − 1) threshold scheme. It also takes advantage of classical enhancement of the [2k − 1, 1, k] QECC to establish a QSS scheme which can share classical information and quantum information simultaneously. Because information is encoded into QECC, these schemes can prevent intercept-resend attacks and be implemented on some noisy channels. (general)

  10. Security of Linear Secret-Sharing Schemes Against Mass Surveillance

    DEFF Research Database (Denmark)

    Giacomelli, Irene; Olimid, Ruxandra; Ranellucci, Samuel

    2015-01-01

    by a proprietary code that the provider (“big brother”) could manipulate to covertly violate the privacy of the users (by implementing Algorithm-Substitution Attacks or ASAs). First, we formalize the security notion that expresses the goal of big brother and prove that for any linear secret-sharing scheme...... there exists an undetectable subversion of it that efficiently allows surveillance. Second, we formalize the security notion that assures that a sharing scheme is secure against ASAs and construct the first sharing scheme that meets this notion....

  11. Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing.

    Science.gov (United States)

    Bao, Long; Yi, Shuang; Zhou, Yicong

    2017-12-01

    This paper first introduces a (k,n) -sharing matrix S (k, n) and its generation algorithm. Mathematical analysis is provided to show its potential for secret image sharing. Combining sharing matrix with image encryption, we further propose a lossless (k,n) -secret image sharing scheme (SMIE-SIS). Only with no less than k shares, all the ciphertext information and security key can be reconstructed, which results in a lossless recovery of original information. This can be proved by the correctness and security analysis. Performance evaluation and security analysis demonstrate that the proposed SMIE-SIS with arbitrary settings of k and n has at least five advantages: 1) it is able to fully recover the original image without any distortion; 2) it has much lower pixel expansion than many existing methods; 3) its computation cost is much lower than the polynomial-based secret image sharing methods; 4) it is able to verify and detect a fake share; and 5) even using the same original image with the same initial settings of parameters, every execution of SMIE-SIS is able to generate completely different secret shares that are unpredictable and non-repetitive. This property offers SMIE-SIS a high level of security to withstand many different attacks.

  12. Type VI Secretion System Toxins Horizontally Shared between Marine Bacteria.

    Directory of Open Access Journals (Sweden)

    Dor Salomon

    2015-08-01

    Full Text Available The type VI secretion system (T6SS is a widespread protein secretion apparatus used by Gram-negative bacteria to deliver toxic effector proteins into adjacent bacterial or host cells. Here, we uncovered a role in interbacterial competition for the two T6SSs encoded by the marine pathogen Vibrio alginolyticus. Using comparative proteomics and genetics, we identified their effector repertoires. In addition to the previously described effector V12G01_02265, we identified three new effectors secreted by T6SS1, indicating that the T6SS1 secretes at least four antibacterial effectors, of which three are members of the MIX-effector class. We also showed that the T6SS2 secretes at least three antibacterial effectors. Our findings revealed that many MIX-effectors belonging to clan V are "orphan" effectors that neighbor mobile elements and are shared between marine bacteria via horizontal gene transfer. We demonstrated that a MIX V-effector from V. alginolyticus is a functional T6SS effector when ectopically expressed in another Vibrio species. We propose that mobile MIX V-effectors serve as an environmental reservoir of T6SS effectors that are shared and used to diversify antibacterial toxin repertoires in marine bacteria, resulting in enhanced competitive fitness.

  13. (t, n) Threshold d-Level Quantum Secret Sharing.

    Science.gov (United States)

    Song, Xiu-Li; Liu, Yan-Bing; Deng, Hong-Yao; Xiao, Yong-Gang

    2017-07-25

    Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants' shares, even the trusted reconstructor Bob 1 is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n - 1.

  14. Experimental quantum secret sharing and third-man quantum cryptography.

    Science.gov (United States)

    Chen, Yu-Ao; Zhang, An-Ning; Zhao, Zhi; Zhou, Xiao-Qi; Lu, Chao-Yang; Peng, Cheng-Zhi; Yang, Tao; Pan, Jian-Wei

    2005-11-11

    Quantum secret sharing (QSS) and third-man quantum cryptography (TQC) are essential for advanced quantum communication; however, the low intensity and fragility of the multiphoton entanglement source in previous experiments have made their realization an extreme experimental challenge. Here, we develop and exploit an ultrastable high intensity source of four-photon entanglement to report an experimental realization of QSS and TQC. The technology developed in our experiment will be important for future multiparty quantum communication.

  15. Multiparty quantum secret sharing based on GHZ states

    Energy Technology Data Exchange (ETDEWEB)

    Hwang, Tzonelih; Hwang, Cheng-Chieh [Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan, 701 Taiwan (China); Li, Chuan-Ming, E-mail: hwangtl@ismail.csie.ncku.edu.tw [Department of Information Management, Shu-Zen College of Medicine and Management, Kaohsiung, 821 Taiwan (China)

    2011-04-15

    Gao (2009 Commun. Theor. Phys. 52 421-4) has proposed an efficient multiparty quantum secret sharing (MQSS) with two-photon three-dimensional Einstein-Podolsky-Rosen (EPR) pairs. This work shows that a similar idea can also be used to construct an MQSS using the Greenberger-Horne-Zeilinger (GHZ) states. Compared to other MQSSs using GHZ-related states, the newly proposed protocol is more efficient in the aspect of qubit utilization.

  16. Security of a kind of quantum secret sharing with entangled states.

    Science.gov (United States)

    Wang, Tian-Yin; Liu, Ying-Zhao; Wei, Chun-Yan; Cai, Xiao-Qiu; Ma, Jian-Feng

    2017-05-30

    We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others' cooperation. Furthermore, we establish a general model for this kind of quantum secret sharing schemes and then give some necessary conditions to design a secure quantum secret sharing scheme under this model.

  17. Simulating cloud environment for HIS backup using secret sharing.

    Science.gov (United States)

    Kuroda, Tomohiro; Kimura, Eizen; Matsumura, Yasushi; Yamashita, Yoshinori; Hiramatsu, Haruhiko; Kume, Naoto

    2013-01-01

    In the face of a disaster hospitals are expected to be able to continue providing efficient and high-quality care to patients. It is therefore crucial for hospitals to develop business continuity plans (BCPs) that identify their vulnerabilities, and prepare procedures to overcome them. A key aspect of most hospitals' BCPs is creating the backup of the hospital information system (HIS) data at multiple remote sites. However, the need to keep the data confidential dramatically increases the costs of making such backups. Secret sharing is a method to split an original secret message so that individual pieces are meaningless, but putting sufficient number of pieces together reveals the original message. It allows creation of pseudo-redundant arrays of independent disks for privacy-sensitive data over the Internet. We developed a secret sharing environment for StarBED, a large-scale network experiment environment, and evaluated its potential and performance during disaster recovery. Simulation results showed that the entire main HIS database of Kyoto University Hospital could be retrieved within three days even if one of the distributed storage systems crashed during a disaster.

  18. Two-party secret key distribution via a modified quantum secret sharing protocol.

    Science.gov (United States)

    Grice, W P; Evans, P G; Lawrie, B; Legré, M; Lougovski, P; Ray, W; Williams, B P; Qi, B; Smith, A M

    2015-03-23

    We present and demonstrate a novel protocol for distributing secret keys between two and only two parties based on N-party single-qubit Quantum Secret Sharing (QSS). We demonstrate our new protocol with N = 3 parties using phase-encoded photons. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N - 2 parties. Our implementation allows for an accessible transition between N-party QSS and arbitrary two party QKD without modification of hardware. In addition, our approach significantly reduces the number of resources such as single photon detectors, lasers and dark fiber connections needed to implement QKD.

  19. Quantum secret sharing using orthogonal multiqudit entangled states

    Science.gov (United States)

    Bai, Chen-Ming; Li, Zhi-Hui; Liu, Cheng-Ji; Li, Yong-Ming

    2017-12-01

    In this work, we investigate the distinguishability of orthogonal multiqudit entangled states under restricted local operations and classical communication. According to these properties, we propose a quantum secret sharing scheme to realize three types of access structures, i.e., the ( n, n)-threshold, the restricted (3, n)-threshold and restricted (4, n)-threshold schemes (called LOCC-QSS scheme). All cooperating players in the restricted threshold schemes are from two disjoint groups. In the proposed protocol, the participants use the computational basis measurement and classical communication to distinguish between those orthogonal states and reconstruct the original secret. Furthermore, we also analyze the security of our scheme in four primary quantum attacks and give a simple encoding method in order to better prevent the participant conspiracy attack.

  20. Detector-device-independent quantum secret sharing with source flaws.

    Science.gov (United States)

    Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Liu, Hongwei; Yin, Zhenqiang; Cao, Zhu; Wu, Lingan

    2018-04-10

    Measurement-device-independent entanglement witness (MDI-EW) plays an important role for detecting entanglement with untrusted measurement device. We present a double blinding-attack on a quantum secret sharing (QSS) protocol based on GHZ state. Using the MDI-EW method, we propose a QSS protocol against all detector side-channels. We allow source flaws in practical QSS system, so that Charlie can securely distribute a key between the two agents Alice and Bob over long distances. Our protocol provides condition on the extracted key rate for the secret against both external eavesdropper and arbitrary dishonest participants. A tight bound for collective attacks can provide good bounds on the practical QSS with source flaws. Then we show through numerical simulations that using single-photon source a secure QSS over 136 km can be achieved.

  1. Quantum secret sharing based on Smolin states alone

    International Nuclear Information System (INIS)

    He Guangping; Wang, Z D; Bai, Yankui

    2008-01-01

    It was indicated (Yu 2007 Phys. Rev. A 75 066301) that a previously proposed quantum secret sharing (QSS) protocol based on Smolin states (Augusiak 2006 Phys. Rev. A 73 012318) is insecure against an internal cheater. Here we build a different QSS protocol with Smolin states alone, and prove it to be secure against known cheating strategies. Thus we open a promising venue for building secure QSS using merely Smolin states, which is a typical kind of bound entangled states. We also propose a feasible scheme to implement the protocol experimentally

  2. Jones index, secret sharing and total quantum dimension

    Science.gov (United States)

    Fiedler, Leander; Naaijkens, Pieter; Osborne, Tobias J.

    2017-02-01

    We study the total quantum dimension in the thermodynamic limit of topologically ordered systems. In particular, using the anyons (or superselection sectors) of such models, we define a secret sharing scheme, storing information invisible to a malicious party, and argue that the total quantum dimension quantifies how well we can perform this task. We then argue that this can be made mathematically rigorous using the index theory of subfactors, originally due to Jones and later extended by Kosaki and Longo. This theory provides us with a ‘relative entropy’ of two von Neumann algebras and a quantum channel, and we argue how these can be used to quantify how much classical information two parties can hide form an adversary. We also review the total quantum dimension in finite systems, in particular how it relates to topological entanglement entropy. It is known that the latter also has an interpretation in terms of secret sharing schemes, although this is shown by completely different methods from ours. Our work provides a different and independent take on this, which at the same time is completely mathematically rigorous. This complementary point of view might be beneficial, for example, when studying the stability of the total quantum dimension when the system is perturbed.

  3. Multilayer quantum secret sharing based on GHZ state and generalized Bell basis measurement in multiparty agents

    Science.gov (United States)

    Wang, Xiao-Jun; An, Long-Xi; Yu, Xu-Tao; Zhang, Zai-Chen

    2017-10-01

    A multilayer quantum secret sharing protocol based on GHZ state is proposed. Alice has the secret carried by quantum state and wants to distribute this secret to multiple agent nodes in the network. In this protocol, the secret is transmitted and shared layer by layer from root Alice to layered agents. The number of agents in each layer is a geometric sequence with a specific common ratio. By sharing GHZ maximally entangled states and making generalized Bell basis measurement, one qubit state can be distributed to multiparty agents and the secret is shared. Only when all agents at the last layer cooperate together, the secret can be recovered. Compared with other protocols based on the entangled state, this protocol adopts layered construction so that secret can be distributed to more agents with fewer particles GHZ state. This quantum secret sharing protocol can be used in wireless network to ensure the security of information delivery.

  4. Sequential Quantum Secret Sharing Using a Single Qudit

    Science.gov (United States)

    Bai, Chen-Ming; Li, Zhi-Hui; Li, Yong-Ming

    2018-05-01

    In this paper we propose a novel and efficient quantum secret sharing protocol using d-level single particle, which it can realize a general access structure via the thought of concatenation. In addition, Our scheme includes all advantages of Tavakoli’s scheme [Phys. Rev. A 92 (2015) 030302(R)]. In contrast to Tavakoli’s scheme, the efficiency of our scheme is 1 for the same situation, and the access structure is more general and has advantages in practical significance. Furthermore, we also analyze the security of our scheme in the primary quantum attacks. Sponsored by the National Natural Science Foundation of China under Grant Nos. 61373150 and 61602291, and Industrial Research and Development Project of Science and Technology of Shaanxi Province under Grant No. 2013k0611

  5. Multiparty quantum secret sharing of secure direct communication

    International Nuclear Information System (INIS)

    Zhang Zhanjun

    2005-01-01

    Based on the two-step protocol [F.G. Deng, G.L. Long, X.S. Liu, Phys. Rev. A 68 (2003) 042317], we propose a (n,n)-threshold multiparty quantum secret sharing protocol of secure direct communication. In our protocol, the sender's secure direct communication message can be extracted only if all the sharers collaborate. We show a variant version of this protocol based on the variant two-step protocol. This variant version can considerably reduce the realization difficulty in experiment. In contrast to the use of multi-particle GHZ states in the case that the sharer number is larger than 3, the use and identification of Bell states are enough in our two protocols disregarding completely the sharer number, hence, our protocols are more feasible in technique

  6. Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

    Science.gov (United States)

    Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.

    2016-11-01

    The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.

  7. Unified criterion for security of secret sharing in terms of violation of Bell inequalities

    International Nuclear Information System (INIS)

    Sen, Aditi; Sen, Ujjwal; Zukowski, Marek

    2003-01-01

    In secret sharing protocols, a secret is to be distributed among several partners such that leaving out any number of them, the rest do not have the complete information. Strong multiqubit correlations in the state by which secret sharing is carried out had been proposed as a criterion for security of such protocols against individual attacks by an eavesdropper. However we show that states with weak multiqubit correlations can also be used for secure secret sharing. That our state has weak multiqubit correlations is shown from the perspective of violation of local realism, and also by showing that its higher-order correlations are described by lower ones. We then present a unified criterion for security of secret sharing in terms of violation of local realism, which works when the secret sharing state is the Greenberger-Horne-Zeilinger state (with strong multiqubit correlations), as well as states of a different class (with weak multiqubit correlations)

  8. Proof of the insecurity of quantum secret sharing based on the Smolin bound entangled states

    International Nuclear Information System (INIS)

    Ya-Fei, Yu; Zhi-Ming, Zhang

    2009-01-01

    This paper reconsiders carefully the possibility of using the Smolin bound entangled states as the carrier for sharing quantum secret. It finds that the process of quantum secret sharing based on Smolin states has insecurity though the Smolin state was reported to violate maximally the two-setting Bell-inequality. The general proof is given. (general)

  9. Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding.

    Science.gov (United States)

    Lai, Hong; Zhang, Jun; Luo, Ming-Xing; Pan, Lei; Pieprzyk, Josef; Xiao, Fuyuan; Orgun, Mehmet A

    2016-08-12

    With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m-bonacci sequences to detect eavesdropping. Meanwhile, we encode m-bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in comparison with existing quantum secret sharing schemes, it still works when there are dynamic changes, such as the unavailability of some quantum channel, the arrival of new participants and the departure of participants. Finally, we provide security analysis of the new hybrid quantum secret sharing scheme and discuss its useful features for modern applications.

  10. Comment on 'Quantum secret sharing between multiparty and multiparty without entanglement'

    International Nuclear Information System (INIS)

    Li, C.-M.; Hwang, T.; Chang, C.-C.

    2006-01-01

    Recently, Yan and Gao [Phys. Rev. A 72, 012304 (2005)] presented a quantum secret sharing protocol which allows a secret message to be shared between two groups of parties (m parties in group 1 and n parties in group 2). Their protocol is claimed to be secure that, except with the cooperation of the entire group 1 or group 2, no subgroup of either group 1 or group 2 can extract the secret message. However, this study points out that the mth party (the last party to process the quantum state) of group 1 can maliciously replace the secret message with an arbitrary message without the detection of the other parties

  11. Secret Sharing Schemes with a large number of players from Toric Varieties

    DEFF Research Database (Denmark)

    Hansen, Johan P.

    A general theory for constructing linear secret sharing schemes over a finite field $\\Fq$ from toric varieties is introduced. The number of players can be as large as $(q-1)^r-1$ for $r\\geq 1$. We present general methods for obtaining the reconstruction and privacy thresholds as well as conditions...... for multiplication on the associated secret sharing schemes. In particular we apply the method on certain toric surfaces. The main results are ideal linear secret sharing schemes where the number of players can be as large as $(q-1)^2-1$. We determine bounds for the reconstruction and privacy thresholds...

  12. A new (k,n verifiable secret image sharing scheme (VSISS

    Directory of Open Access Journals (Sweden)

    Amitava Nag

    2014-11-01

    Full Text Available In this paper, a new (k,n verifiable secret image sharing scheme (VSISS is proposed in which third order LFSR (linear-feedback shift register-based public key cryptosystem is applied for the cheating prevention and preview before decryption. In the proposed scheme the secret image is first partitioned into several non-overlapping blocks of k pixels. Every k pixel is then used to form m=⌈k/4⌉+1 pixels of one encrypted share. The original secret image can be reconstructed by gathering any k or more encrypted shared images. The experimental results show that the proposed VSISS is an efficient and safe method.

  13. Optical threshold secret sharing scheme based on basic vector operations and coherence superposition

    Science.gov (United States)

    Deng, Xiaopeng; Wen, Wei; Mi, Xianwu; Long, Xuewen

    2015-04-01

    We propose, to our knowledge for the first time, a simple optical algorithm for secret image sharing with the (2,n) threshold scheme based on basic vector operations and coherence superposition. The secret image to be shared is firstly divided into n shadow images by use of basic vector operations. In the reconstruction stage, the secret image can be retrieved by recording the intensity of the coherence superposition of any two shadow images. Compared with the published encryption techniques which focus narrowly on information encryption, the proposed method can realize information encryption as well as secret sharing, which further ensures the safety and integrality of the secret information and prevents power from being kept centralized and abused. The feasibility and effectiveness of the proposed method are demonstrated by numerical results.

  14. A note on Wang et al's attack on Zhang et al's multiparty quantum secret sharing

    International Nuclear Information System (INIS)

    Gao Gan

    2012-01-01

    Recently, Wang et al (2008 Phys. Lett. A 373 65) proposed an attack on Zhang et al's (2007 Opt. Commun. 269 418) multiparty quantum secret sharing scheme, in which the first and the last agent are reported to be able to cooperatively eavesdrop on all the secret messages without being detected. In this paper, we show that in Wang et al's attack, on average no more than half the secret messages can be eavesdropped. (paper)

  15. Comment on ‘Authenticated quantum secret sharing with quantum dialogue based on Bell states’

    Science.gov (United States)

    Gao, Gan; Wang, Yue; Wang, Dong; Ye, Liu

    2018-02-01

    In the paper (2016 Phys. Scr. 91 085101), Abulkasim et al proposed a authenticated quantum secret sharing scheme. We study the security of the multiparty case in the proposed scheme and find that it is not secure.

  16. Key Recovery Using Noised Secret Sharing with Discounts over Large Clouds

    OpenAIRE

    JAJODIA , Sushil; Litwin , Witold; Schwarz , Thomas

    2013-01-01

    Encryption key loss problem is the Achilles's heel of cryptography. Key escrow helps, but favors disclosures. Schemes for recoverable encryption keys through noised secret sharing alleviate the dilemma. Key owner escrows a specifically encrypted backup. The recovery needs a large cloud. Cloud cost, money trail should rarefy illegal attempts. We now propose noised secret sharing schemes supporting discounts. The recovery request with discount code lowers the recovery complexity, easily by orde...

  17. Cryptanalysis of a semi-quantum secret sharing scheme based on Bell states

    Science.gov (United States)

    Gao, Gan; Wang, Yue; Wang, Dong

    2018-03-01

    In the paper [Mod. Phys. Lett. B 31 (2017) 1750150], Yin et al. proposed a semi-quantum secret sharing scheme by using Bell states. We find that the proposed scheme cannot finish the quantum secret sharing task. In addition, we also find that the proposed scheme has a security loophole, that is, it will not be detected that the dishonest participant, Charlie attacks on the quantum channel.

  18. Improving the security of a quantum secret sharing protocol between multiparty and multiparty without entanglement

    International Nuclear Information System (INIS)

    Han Lianfang; Liu Yimin; Shi Shouhua; Zhang Zhanjun

    2007-01-01

    Recently Yan and Gao [F.L. Yan, T. Gao, Phys. Rev. A 72 (2005) 012304] have proposed a quantum secret sharing protocol which allows a secret message to be shared between one group of m parties and another group of n parties. The protocol is claimed to be secure. In this Letter, first we show that any subgroup consisting of evil cooperative parties (or one and only one evil party) can successfully cheat other parties to obtain the secret message without being detected. Then we improve the original Yan-Gao protocol such that the insider's cheats are prevented

  19. Cryptanalysis of Multiparty Quantum Secret Sharing of Quantum State Using Entangled States

    International Nuclear Information System (INIS)

    Su-Juan, Qin; Qiao-Yan, Wen; Fu-Chen, Zhu

    2008-01-01

    Security of a quantum secret sharing of quantum state protocol proposed by Guo et al. [Chin. Phys. Lett. 25 (2008) 16] is reexamined. It is shown that an eavesdropper can obtain some of the transmitted secret information by monitoring the classical channel or the entire secret by intercepting the quantum states, and moreover, the eavesdropper can even maliciously replace the secret message with an arbitrary message without being detected. Finally, the deep reasons why an eavesdropper can attack this protocol are discussed and the modified protocol is presented to amend the security loopholes

  20. Cryptanalysis on the improved multiparty quantum secret sharing protocol based on the GHZ state

    International Nuclear Information System (INIS)

    Chen Xiubo; Yang Shuai; Su Yuan; Yang Yixian

    2012-01-01

    Recently, Liu et al (2011 Phys. Scr. 84045015) pointed out that the multiparty quantum secret sharing (MQSS) protocol based on the GHZ state (Hwang et al 2011 Phys. Scr. 83045004) is insecure. They found that an inside participant can deduce half of the sender's secret information directly just by his piece of the secret. In order to resist this attack, an improvement was put forward. However, in this paper, we find that Liu et al's improved protocol is still insecure. We give details of three attack strategies to steal the secret information. It is shown that the eavesdropper can steal half or all of the secret information. Furthermore, a simple and ingenious MQSS protocol is proposed. We perform explicit cryptanalysis to prove that our improved protocol can resist the attacks from both the outside attackers and the inside participants, even the collusion attack.

  1. Multiparty Quantum Direct Secret Sharing of Classical Information with Bell States and Bell Measurements

    Science.gov (United States)

    Song, Yun; Li, Yongming; Wang, Wenhua

    2018-02-01

    This paper proposed a new and efficient multiparty quantum direct secret sharing (QDSS) by using swapping quantum entanglement of Bell states. In the proposed scheme, the quantum correlation between the possible measurement results of the members (except dealer) and the original local unitary operation encoded by the dealer was presented. All agents only need to perform Bell measurements to share dealer's secret by recovering dealer's operation without performing any unitary operation. Our scheme has several advantages. The dealer is not required to retain any photons, and can further share a predetermined key instead of a random key to the agents. It has high capacity as two bits of secret messages can be transmitted by an EPR pair and the intrinsic efficiency approaches 100%, because no classical bit needs to be transmitted except those for detection. Without inserting any checking sets for detecting the eavesdropping, the scheme can resist not only the existing attacks, but also the cheating attack from the dishonest agent.

  2. Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State

    International Nuclear Information System (INIS)

    Xia Yan; Song Jie; Song Heshan; Huang Xiaoli

    2008-01-01

    We propose a new multiparty quantum secret sharing protocol via introducing auxiliary particles using a non-maximally entangled (pure) two-particle state without a Bell measurement. The communication parties utilize decoy particles to check eavesdropping. After ensuring the security of the quantum channel, the sender encodes the secret message and transmits it to the receiver by using controlled-NOT operation and von Neumann measurement. If and only if all the agents agree to collaborate, they can read out the secret message

  3. Authenticated quantum secret sharing with quantum dialogue based on Bell states

    International Nuclear Information System (INIS)

    Abulkasim, Hussein; Hamad, Safwat; El Bahnasy, Khalid; Rida, Saad Z

    2016-01-01

    This work proposes a scheme that combines the advantages of a quantum secret sharing procedure and quantum dialogue. The proposed scheme enables the participants to simultaneously make mutual identity authentications, in a simulated scenario where the boss, Alice, shares a secret with her two agents Bob and Charlie. The secret is protected by checking photons to keep untrustworthy agents and outer attacks from getting useful information. Before the two agents cooperate to recover Alice’s secret, they must authenticate their identity using parts of a pre-shared key. In addition, the whole pre-shared key is reused as part of recovering the secret data to avoid any leaks of information. In comparison with previous schemes, the proposed method can efficiently detect eavesdropping and it is free from information leaks. Furthermore, the proposed scheme proved to be secure against man-in-the-middle attacks, impersonation attacks, entangled-and-measure attacks, participant attacks, modification attacks and Trojan-horse attacks. (paper)

  4. Dynamic (2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication

    International Nuclear Information System (INIS)

    Lai Hong; Xiao Jing-Hua; Mehmet, Orgun A.; Josef, Pieprzyk; Xue Li-Yin

    2015-01-01

    In this paper, we show that a (2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely. (paper)

  5. Toric Varieties and Codes, Error-correcting Codes, Quantum Codes, Secret Sharing and Decoding

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    We present toric varieties and associated toric codes and their decoding. Toric codes are applied to construct Linear Secret Sharing Schemes (LSSS) with strong multiplication by the Massey construction. Asymmetric Quantum Codes are obtained from toric codes by the A.R. Calderbank P.W. Shor and A.......M. Steane construction of stabilizer codes (CSS) from linear codes containing their dual codes....

  6. Quantum information theoretical analysis of various constructions for quantum secret sharing

    NARCIS (Netherlands)

    Rietjens, K.P.T.; Schoenmakers, B.; Tuyls, P.T.

    2005-01-01

    Recently, an information theoretical model for quantum secret sharing (QSS) schemes was introduced. By using this model, we prove that pure state quantum threshold schemes (QTS) can be constructed from quantum MDS codes and vice versa. In particular, we consider stabilizer codes and give a

  7. SECRET SHARING SCHEMES WITH STRONG MULTIPLICATION AND A LARGE NUMBER OF PLAYERS FROM TORIC VARIETIES

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    2017-01-01

    This article consider Massey's construction for constructing linear secret sharing schemes from toric varieties over a finite field $\\Fq$ with $q$ elements. The number of players can be as large as $(q-1)^r-1$ for $r\\geq 1$. The schemes have strong multiplication, such schemes can be utilized in ...

  8. Improved Multipartite Quantum Secret Sharing Protocol Using Preshared Greenberger-Horne-Zeilinger States

    International Nuclear Information System (INIS)

    Xie Deng; Ye Mingyong; Li Xinghua

    2011-01-01

    Inspired by the protocol presented by Bagherinezhad and Karimipour [Phys. Rev. A 67 (2003) 044302], which will be shown to be insecure, we present a multipartite quantum secret sharing protocol using reusable Greenberger-Horne-Zeilinger (GHZ) states. This protocol is robust against eavesdropping and could be used for the circumstance of many parties. (general)

  9. Comment on 'Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers'

    International Nuclear Information System (INIS)

    Gao Fei; Guo Fenzhuo; Wen Qiaoyan; Zhu Fuchen

    2005-01-01

    In a recent paper [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)], a quantum secret sharing protocol based on reusable Greenberger-Horne-Zeilinger states was proposed. However, in this Comment, it is shown that this protocol is insecure if Eve employs a special strategy to attack

  10. Multiparty quantum secret sharing of classical messages based on entanglement swapping

    International Nuclear Information System (INIS)

    Zhang Zhanjun; Man Zhongxiao

    2005-01-01

    A multiparty quantum secret sharing (QSS) protocol of classical messages (i.e., classical bits) is proposed by using swapping quantum entanglement of Bell states. The secret messages are imposed on Bell states by local unitary operations. The secret messages are split into several parts, and each part is distributed to a separate party so that no action of a subset of all the parties without the cooperation of the entire group is able to read out the secret messages. In addition, dense coding is used in this protocol to achieve a high efficiency. The security of the present multiparty QSS against eavesdropping has been analyzed and confirmed even in a noisy quantum channel

  11. Large-Capacity Three-Party Quantum Digital Secret Sharing Using Three Particular Matrices Coding

    International Nuclear Information System (INIS)

    Lai Hong; Tao Li; Liu Zhi-Ming; Luo Ming-Xing; Pieprzyk, Josef; Orgun, Mehmet A.

    2016-01-01

    In this paper, we develop a large-capacity quantum digital secret sharing (QDSS) scheme, combined the Fibonacci- and Lucas-valued orbital angular momentum (OAM) entanglement with the recursive Fibonacci and Lucas matrices. To be exact, Alice prepares pairs of photons in the Fibonacci- and Lucas-valued OAM entangled states, and then allocates them to two participants, say, Bob and Charlie, to establish the secret key. Moreover, the available Fibonacci and Lucas values from the matching entangled states are used as the seed for generating the Fibonacci and Lucas matrices. This is achieved because the entries of the Fibonacci and Lucas matrices are recursive. The secret key can only be obtained jointly by Bob and Charlie, who can further recover the secret. Its security is based on the facts that nonorthogonal states are indistinguishable, and Bob or Charlie detects a Fibonacci number, there is still a twofold uncertainty for Charlie' (Bob') detected value. (paper)

  12. Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks

    DEFF Research Database (Denmark)

    Fehr, Serge; Maurer, Ueli M.

    2002-01-01

    . VSS and DC are main building blocks for unconditional secure multi-party computation protocols. This general approach covers all known linear VSS and DC schemes. The main theorem states that the security of a scheme is equivalent to a pure linear-algebra condition on the linear mappings (e.......g. described as matrices and vectors) describing the scheme. The security of all known schemes follows as corollaries whose proofs are pure linear-algebra arguments, in contrast to some hybrid arguments used in the literature. Our approach is demonstrated for the CDM DC scheme, which we generalize to be secure......We present a general treatment of all non-cryptographic (i.e., information-theoretically secure) linear veriable-secret-sharing (VSS) and distributed-commitment (DC) schemes, based on an underlying secret sharing scheme, pairwise checks between players, complaints, and accusations of the dealer...

  13. Improving the multiparty quantum secret sharing over two collective-noise channels against insider attack

    Science.gov (United States)

    Sun, Ying; Wen, Qiao-yan; Zhu, Fu-chen

    2010-01-01

    The security of the multiparty quantum secret sharing protocol presented by Zhang [Z.J. Zhang, Physica A, 361 (2006) 233] is analyzed. It is shown that this protocol is vulnerable to the insider attack since eavesdropping detection is performed only when all states arrive at the last agent. We propose an attack strategy and give an improved version of the original protocol. The improved protocol is robust and has the same traits with the original one.

  14. Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow.

    Science.gov (United States)

    Pang, Liaojun; Miao, Deyu; Li, Huixian; Wang, Qiong

    2015-01-01

    Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.

  15. Quantum-Secret-Sharing Scheme Based on Local Distinguishability of Orthogonal Seven-Qudit Entangled States

    Science.gov (United States)

    Liu, Cheng-Ji; Li, Zhi-Hui; Bai, Chen-Ming; Si, Meng-Meng

    2018-02-01

    The concept of judgment space was proposed by Wang et al. (Phys. Rev. A 95, 022320, 2017), which was used to study some important properties of quantum entangled states based on local distinguishability. In this study, we construct 15 kinds of seven-qudit quantum entangled states in the sense of permutation, calculate their judgment space and propose a distinguishability rule to make the judgment space more clearly. Based on this rule, we study the local distinguishability of the 15 kinds of seven-qudit quantum entangled states and then propose a ( k, n) threshold quantum secret sharing scheme. Finally, we analyze the security of the scheme.

  16. Efficient quantum secret sharing scheme with two-particle entangled states

    International Nuclear Information System (INIS)

    Zhu Zhen-Chao; Fu An-Min; Zhang Yu-Qing

    2011-01-01

    This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time. (general)

  17. Algebra for applications cryptography, secret sharing, error-correcting, fingerprinting, compression

    CERN Document Server

    Slinko, Arkadii

    2015-01-01

    This book examines the relationship between mathematics and data in the modern world. Indeed, modern societies are awash with data which must be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from an unauthorised access and transmitted over unreliable channels. All of these operations can be understood only by a person with knowledge of basics in algebra and number theory. This book provides the necessary background in arithmetic, polynomials, groups, fields and elliptic curves that is sufficient to understand such real-life applications as cryptography, secret sharing, error-correcting, fingerprinting and compression of information. It is the first to cover many recent developments in these topics. Based on a lecture course given to third-year undergraduates, it is self-contained with numerous worked examples and exercises provided to test understanding. It can additionally be used for self-study.

  18. Shamir secret sharing scheme with dynamic access structure (SSSDAS). Case study on nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V. [Indira Gandhi Centre for Atomic Research (IGCAR), Kalpakkam (India). Computer Div.; Aghila, G. [National Institute of Technology, Karaikal (India). Dept. of Computer Science and Engineering

    2015-05-15

    In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.

  19. Shamir secret sharing scheme with dynamic access structure (SSSDAS). Case study on nuclear power plant

    International Nuclear Information System (INIS)

    Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V.; Aghila, G.

    2015-01-01

    In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.

  20. A secure data outsourcing scheme based on Asmuth-Bloom secret sharing

    Science.gov (United States)

    Idris Muhammad, Yusuf; Kaiiali, Mustafa; Habbal, Adib; Wazan, A. S.; Sani Ilyasu, Auwal

    2016-11-01

    Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.

  1. Improving the security of multiparty quantum secret sharing against Trojan horse attack

    International Nuclear Information System (INIS)

    Deng Fuguo; Li Xihan; Zhou Hongyu; Zhang Zhanjun

    2005-01-01

    We analyzed the security of the multiparty quantum secret sharing (MQSS) protocol recently proposed by Zhang, Li, and Man [Phys. Rev. A 71, 044301 (2005)] and found that this protocol is secure for any other eavesdropper except for the agent Bob who prepares the quantum signals as he can attack the quantum communication with a Trojan horse. That is, Bob replaces the single-photon signal with a multiphoton one and the other agent Charlie cannot find this cheating as she does not measure the photons before they run back from the boss Alice, which reveals that this MQSS protocol is not secure for Bob. Finally, we present a possible improvement of the MQSS protocol security with two single-photon measurements and four unitary operations

  2. Fault-Tolerate Three-Party Quantum Secret Sharing over a Collective-Noise Channel

    International Nuclear Information System (INIS)

    Li Chun-Yan; Li Yan-Song

    2011-01-01

    We present a fault-tolerate three-party quantum secret sharing (QSS) scheme over a collective-noise channel. Decoherence-free subspaces are used to tolerate two noise modes, a collective-dephasing channel and a collective-rotating channel, respectively. In this scheme, the boss uses two physical qubits to construct a logical qubit which acts as a quantum channel to transmit one bit information to her two agents. The agents can get the information of the private key established by the boss only if they collaborate. The boss Alice encodes information with two unitary operations. Only single-photon measurements are required to rebuilt Alice's information and detect the security by the agents Bob and Charlie, not Bell-state measurements. Moreover, Almost all of the photons are used to distribute information, and its success efficiency approaches 100% in theory. (general)

  3. A novel lost packets recovery scheme based on visual secret sharing

    Science.gov (United States)

    Lu, Kun; Shan, Hong; Li, Zhi; Niu, Zhao

    2017-08-01

    In this paper, a novel lost packets recovery scheme which encrypts the effective parts of an original packet into two shadow packets based on (2, 2)-threshold XOR-based visual Secret Sharing (VSS) is proposed. The two shadow packets used as watermarks would be embedded into two normal data packets with digital watermarking embedding technology and then sent from one sensor node to another. Each shadow packet would reveal no information of the original packet, which can improve the security of original packet delivery greatly. The two shadow packets which can be extracted from the received two normal data packets delivered from a sensor node can recover the original packet lossless based on XOR-based VSS. The Performance analysis present that the proposed scheme provides essential services as long as possible in the presence of selective forwarding attack. The proposed scheme would not increase the amount of additional traffic, namely, lower energy consumption, which is suitable for Wireless Sensor Network (WSN).

  4. Shared secrets: Web 2.0 and research in Social Sciences

    Directory of Open Access Journals (Sweden)

    Sandra MARTORELL

    2013-12-01

    Full Text Available Web 2.0 represents a revolution in terms of the possibilities it offers for facilitating communication and collaboration between users – something that has become increasingly common in the world of research. A mere few years ago, the information produced by scientists and scholars remained in the hands of a very limited circle of institutions and publishers, as if it were a guarded secret. Today that secret is being shouted from the rooftops and shared with the rest of the scientific community in order to make it more accessible and to allow new advances. A clear example of this can be found in the social sciences, where there is a constant increase in the production of articles and materials that in turn serve for the pursuit of further research, thereby promoting the continuous development of scientific knowledge. This new situation is being fostered by the proliferation of tools and applications that make it possible, but also by a change in mentality towards a philosophy of exchange and open access. In this article, we will examine this phenomenon using a methodological system based on the analysis of platforms for the exchange of scientific knowledge, and especially social networks (both general and specialising in the social sciences, in order to demonstrate their potential in a society that is becoming increasingly aware of the need to overcome physical or institutional boundaries and move forward together.

  5. Quantum secret sharing based on modulated high-dimensional time-bin entanglement

    International Nuclear Information System (INIS)

    Takesue, Hiroki; Inoue, Kyo

    2006-01-01

    We propose a scheme for quantum secret sharing (QSS) that uses a modulated high-dimensional time-bin entanglement. By modulating the relative phase randomly by {0,π}, a sender with the entanglement source can randomly change the sign of the correlation of the measurement outcomes obtained by two distant recipients. The two recipients must cooperate if they are to obtain the sign of the correlation, which is used as a secret key. We show that our scheme is secure against intercept-and-resend (IR) and beam splitting attacks by an outside eavesdropper thanks to the nonorthogonality of high-dimensional time-bin entangled states. We also show that a cheating attempt based on an IR attack by one of the recipients can be detected by changing the dimension of the time-bin entanglement randomly and inserting two 'vacant' slots between the packets. Then, cheating attempts can be detected by monitoring the count rate in the vacant slots. The proposed scheme has better experimental feasibility than previously proposed entanglement-based QSS schemes

  6. Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing

    Science.gov (United States)

    Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta

    2017-08-01

    This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.

  7. Navajo Code Talker Joe Morris, Sr. shared insights from his time as a secret World War Two messenger

    Science.gov (United States)

    2002-01-01

    Navajo Code Talker Joe Morris, Sr. shared insights from his time as a secret World War Two messenger with his audience at NASA's Dryden Flight Research Center on Nov. 26, 2002. NASA Dryden is located on Edwards Air Force Base in California's Mojave Desert.

  8. Spacetime Replication of Quantum Information Using (2 , 3) Quantum Secret Sharing and Teleportation

    Science.gov (United States)

    Wu, Yadong; Khalid, Abdullah; Davijani, Masoud; Sanders, Barry

    The aim of this work is to construct a protocol to replicate quantum information in any valid configuration of causal diamonds and assess resources required to physically realize spacetime replication. We present a set of codes to replicate quantum information along with a scheme to realize these codes using continuous-variable quantum optics. We use our proposed experimental realizations to determine upper bounds on the quantum and classical resources required to simulate spacetime replication. For four causal diamonds, our implementation scheme is more efficient than the one proposed previously. Our codes are designed using a decomposition algorithm for complete directed graphs, (2 , 3) quantum secret sharing, quantum teleportation and entanglement swapping. These results show the simulation of spacetime replication of quantum information is feasible with existing experimental methods. Alberta Innovates, NSERC, China's 1000 Talent Plan and the Institute for Quantum Information and Matter, which is an NSF Physics Frontiers Center (NSF Grant PHY-1125565) with support of the Gordon and Betty Moore Foundation (GBMF-2644).

  9. Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop

    Directory of Open Access Journals (Sweden)

    Su-Hyun Kim

    2014-07-01

    Full Text Available In a cloud computing environment, user data is encrypted and stored using a large number of distributed servers. Global Internet service companies such as Google and Yahoo have recognized the importance of Internet service platforms and conducted their own research and development to utilize large cluster-based cloud computing platform technologies based on low-cost commercial off-the-shelf nodes. Accordingly, as various data services are now allowed over a distributed computing environment, distributed management of big data has become a major issue. On the other hand, security vulnerability and privacy infringement due to malicious attackers or internal users can occur by means of various usage types of big data. In particular, various security vulnerabilities can occur in the block access token, which is used for the permission control of data blocks in Hadoop. To solve this problem, we have proposed a weight-applied XOR-based efficient distribution storage and recovery scheme in this paper. In particular, various security vulnerabilities can occur in the block access token, which is used for the permission control of data blocks in Hadoop. In this paper, a secret sharing-based block access token management scheme is proposed to overcome such security vulnerabilities.

  10. Reply to 'Comment II on 'Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers''

    International Nuclear Information System (INIS)

    Karimipour, V.

    2006-01-01

    In the preceding Comment [Jian-Zhong Du, Su-Juan Qin, Qiao-Yan Wen, and Fu-Chen Zhu, Phys. Rev. A 74, 016301 (2006)], it has been shown that in a quantum secret sharing protocol proposed in [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)], one of the receivers can cheat by splitting the entanglement of the carrier and intercepting the secret, without being detected. In this reply we show that a simple modification of the protocol prevents the receivers from this kind of cheating

  11. Three-party quantum secret sharing of secure direct communication based on χ-type entangled states

    International Nuclear Information System (INIS)

    Yu-Guang, Yang; Wei-Feng, Cao; Qiao-Yan, Wen

    2010-01-01

    Based on χ-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on χ-type entangled states |χ 00 ) 3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed. (general)

  12. Robust Multiparty Quantum Secret Key Sharing Over Two Collective-Noise Channels via Three-Photon Mixed States

    International Nuclear Information System (INIS)

    Wang Zhangyin; Yuan Hao; Gao Gan; Shi Shouhua

    2006-01-01

    We present a robust (n,n)-threshold scheme for multiparty quantum secret sharing of key over two collective-noise channels (i.e., the collective dephasing channel and the collective rotating channel) via three-photon mixed states. In our scheme, only if all the sharers collaborate together can they establish a joint key with the message sender and extract the secret message from the sender's encrypted message. This scheme can be implemented using only a Bell singlet, a one-qubit state and polarization identification of single photon, so it is completely feasible according to the present-day technique.

  13. A Novel Multiparty Quantum Secret Sharing Scheme of Secure Direct Communication Based on Bell States and Bell Measurements

    International Nuclear Information System (INIS)

    Shi Run-Hua; Huang Liu-Sheng; Yang Wei; Zhong Hong

    2011-01-01

    We present a novel quantum secret sharing scheme of secure direct communication and analyze its security. This scheme takes Einstein—Podolsky—Rosen (EPR) pairs in Bell states as quantum resources. In order to obtain the direct communication message, all agents only need to perform Bell measurements, not to perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is unnecessary except for the eavesdropping checks. (general)

  14. Information Sharing and Credit Rationing : Evidence from the Introduction of a Public Credit Registry

    NARCIS (Netherlands)

    Cheng, X.; Degryse, H.A.

    2010-01-01

    We provide the first evidence on how the introduction of information sharing via a public credit registry affects banks’ lending decisions. We employ a unique dataset containing detailed information on credit card applications and decisions from one of the leading banks in China. While we do not

  15. Beyond the knowledge level : descriptions of rational behavior for sharing and reuse

    OpenAIRE

    Schmalhofer, Franz; Aitken, J. Stuart; Bourne, Lyle E.

    1994-01-01

    The currently dominant approach to the sharing and reuse of knowledge strives to develop ontologies, with clearly constrained interpretations. The idea of ontological commitments is based on the knowledge level perspective. Several shortcomings of the knowledge level have been identified (Clancey, 1991). Pursuing Clancey's argument, if KBS are to be situated in ever changing environments, their purposes and significance will change over time and they have to be redescribed accordingly. The be...

  16. Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate

    International Nuclear Information System (INIS)

    Chau, H.F.

    2002-01-01

    A secret key shared through quantum key distribution between two cooperative players is secure against any eavesdropping attack allowed by the laws of physics. Yet, such a key can be established only when the quantum channel error rate due to eavesdropping or imperfect apparatus is low. Here, a practical quantum key distribution scheme by making use of an adaptive privacy amplification procedure with two-way classical communication is reported. Then, it is proven that the scheme generates a secret key whenever the bit error rate of the quantum channel is less than 0.5-0.1√(5)≅27.6%, thereby making it the most error resistant scheme known to date

  17. Secret and research

    Directory of Open Access Journals (Sweden)

    André PETITAT

    2013-12-01

    Full Text Available The postures of secrecy and revelation maintain our common relational dynamics between sharing and not sharing. Science, which has become the dominant form of knowledge, is a rational and empirical knowledge sharing. For this purpose, the knowledge articulates languages, if possible unambiguous, spaces of rational deliberation, technical devices and resources of the imagination. This activity meets other logics called power, prestige, status, profit, customer, blind adherence and revealed truth, in which the postures of secret invite themselves massively. The codes of ethics attempt to regulate this mix of contradictory logics by setting standards of scientific exchanges, recalling the person rights and particularly the subjects observed rights, protecting the working conditions of the researcher, preserving its autonomy from funders and policy makers, and ensuring the dissemination of its results.

  18. Novel Quantum Secret Sharing and Controlled Communication Schemes Based on Einstein–Podolsky–Rosen Correlations

    International Nuclear Information System (INIS)

    Yuan, Li; Gui-Hua, Zeng

    2009-01-01

    Employing quantum registers, we first proposed a novel (2, 3) quantum threshold scheme based on Einstein–Podolsky–Rosen (EPR) correlations in this letter. Motivated by the present threshold scheme, we also propose a controlled communication scheme to transmit the secret message with a controller. In the communication protocol, the encoded quantum message carried by particles sequence, is transmitted by legitimate communicators

  19. Shared Secrets: Motherhood and Male Homosexuality in Doppelgänger Narratives

    DEFF Research Database (Denmark)

    Sencindiver, Susan Yi

    2011-01-01

    narratives. Enlisting Joseph Conrad’s short story, “The Secret Sharer,” among others, as both a paradigmatic yet self-conscious example, I examine the intersecting hotbed of these two strange bedfellows, motherhood and homosexuality, as well as the significance of gender in the male doppelgänger imaginary....

  20. Deterministic MDI QKD with two secret bits per shared entangled pair

    Science.gov (United States)

    Zebboudj, Sofia; Omar, Mawloud

    2018-03-01

    Although quantum key distribution schemes have been proven theoretically secure, they are based on assumptions about the devices that are not yet satisfied with today's technology. The measurement-device-independent scheme has been proposed to shorten the gap between theory and practice by removing all detector side-channel attacks. On the other hand, two-way quantum key distribution schemes have been proposed to raise the secret key generation rate. In this paper, we propose a new quantum key distribution scheme able to achieve a relatively high secret key generation rate based on two-way quantum key distribution that also inherits the robustness of the measurement-device-independent scheme against detector side-channel attacks.

  1. Secret-Sharing over Multiple-Antenna Channels with Transmit Correlation

    KAUST Repository

    Zorgui, Marwen

    2015-01-07

    We consider secret-key agreement with public discussion over Rayleigh fastfading channels with transmit correlation. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the transmit correlation matrix. First, We derive the expression of the key capacity under the considered setup. Then, we show that the optimal transmit strategy achieving the key capacity consists in transmitting Gaussian signals along the eingenvectors of the channel covariance matrix. The powers allocated to each channel mode are determined as the solution of a numerical optimization problem that we derive. We also provide a waterfilling interpretation of the optimal power allocation. Finally, we develop a necessary and sufficient condition for beamforming to be optimal, i.e., transmitting along the strongest channel mode only is key capacity-achieving.

  2. Secret-Sharing over Multiple-Antenna Channels with Transmit Correlation

    KAUST Repository

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Alouini, Mohamed-Slim

    2015-01-01

    We consider secret-key agreement with public discussion over Rayleigh fastfading channels with transmit correlation. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the transmit correlation matrix. First, We derive the expression of the key capacity under the considered setup. Then, we show that the optimal transmit strategy achieving the key capacity consists in transmitting Gaussian signals along the eingenvectors of the channel covariance matrix. The powers allocated to each channel mode are determined as the solution of a numerical optimization problem that we derive. We also provide a waterfilling interpretation of the optimal power allocation. Finally, we develop a necessary and sufficient condition for beamforming to be optimal, i.e., transmitting along the strongest channel mode only is key capacity-achieving.

  3. Embodying rationality

    OpenAIRE

    Mastrogiorgio, Antonio; Petracca, Enrico

    2016-01-01

    The current notions of bounded rationality in economics share distinctive features with Simon’s original notion, which still influences the theoretical and experimental research in the fields of choice, judgment, decision making, problem solving, and social cognition. All these notions of bounded rationality are in fact equally rooted in the information-processing approach to human cognition, expressing the view that reasoning is disembodied and that it can be reduced to the processing of abs...

  4. Shared Genetic Control of Brain Activity During Sleep and Insulin Secretion: A Laboratory-Based Family Study.

    Science.gov (United States)

    Morselli, Lisa L; Gamazon, Eric R; Tasali, Esra; Cox, Nancy J; Van Cauter, Eve; Davis, Lea K

    2018-01-01

    Over the past 20 years, a large body of experimental and epidemiologic evidence has linked sleep duration and quality to glucose homeostasis, although the mechanistic pathways remain unclear. The aim of the current study was to determine whether genetic variation influencing both sleep and glucose regulation could underlie their functional relationship. We hypothesized that the genetic regulation of electroencephalographic (EEG) activity during non-rapid eye movement sleep, a highly heritable trait with fingerprint reproducibility, is correlated with the genetic control of metabolic traits including insulin sensitivity and β-cell function. We tested our hypotheses through univariate and bivariate heritability analyses in a three-generation pedigree with in-depth phenotyping of both sleep EEG and metabolic traits in 48 family members. Our analyses accounted for age, sex, adiposity, and the use of psychoactive medications. In univariate analyses, we found significant heritability for measures of fasting insulin sensitivity and β-cell function, for time spent in slow-wave sleep, and for EEG spectral power in the delta, theta, and sigma ranges. Bivariate heritability analyses provided the first evidence for a shared genetic control of brain activity during deep sleep and fasting insulin secretion rate. © 2017 by the American Diabetes Association.

  5. A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability.

    Science.gov (United States)

    Lee, Che-Wei; Tsai, Wen-Hsiang

    2012-01-01

    A new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images via the use of the Portable Network Graphics (PNG) image is proposed. An authentication signal is generated for each block of a grayscale document image, which, together with the binarized block content, is transformed into several shares using the Shamir secret sharing scheme. The involved parameters are carefully chosen so that as many shares as possible are generated and embedded into an alpha channel plane. The alpha channel plane is then combined with the original grayscale image to form a PNG image. During the embedding process, the computed share values are mapped into a range of alpha channel values near their maximum value of 255 to yield a transparent stego-image with a disguise effect. In the process of image authentication, an image block is marked as tampered if the authentication signal computed from the current block content does not match that extracted from the shares embedded in the alpha channel plane. Data repairing is then applied to each tampered block by a reverse Shamir scheme after collecting two shares from unmarked blocks. Measures for protecting the security of the data hidden in the alpha channel are also proposed. Good experimental results prove the effectiveness of the proposed method for real applications.

  6. A Shared Secret

    Science.gov (United States)

    Lyngstad, Idar

    2014-01-01

    This article is based on an interview with a Norwegian physical education (PE) teacher on the social contact she had with pupils when teaching them PE. The article examines a two-dimensional aspect of a teaching situation relating to swimming instruction in PE, especially focusing on pupils' positive experiences of learning to swim and the…

  7. Quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared secret Bell state

    International Nuclear Information System (INIS)

    Ye, Tian-Yu; Jiang, Li-Zhen

    2014-01-01

    In order to avoid the risk of information leakage during the information mutual transmission between two authorized participants, i.e. Alice and Bob, a quantum dialogue protocol based on the entanglement swapping between any two Bell states and the shared secret Bell state is proposed. The proposed protocol integrates the ideas of block transmission, two-step transmission and unitary operation encoding together using the Bell states as the information carriers. Besides the entanglement swapping between any two Bell states, a shared secret Bell state is also used to overcome the information leakage problem, which not only makes Bob aware of the prepared initial state but also is used for Bob's encoding and entanglement swapping. Security analysis shows that the proposed protocol can resist the general active attacks from an outside eavesdropper Eve. Moreover, the relation between the maximal amount of information Eve can gain and the detection probability is derived. (paper)

  8. Structural Characterization and Oligomerization of the TssL Protein, a Component Shared by Bacterial Type VI and Type IVb Secretion Systems*

    Science.gov (United States)

    Durand, Eric; Zoued, Abdelrahim; Spinelli, Silvia; Watson, Paul J. H.; Aschtgen, Marie-Stéphanie; Journet, Laure; Cambillau, Christian; Cascales, Eric

    2012-01-01

    The Type VI secretion system (T6SS) is a macromolecular system distributed in Gram-negative bacteria, responsible for the secretion of effector proteins into target cells. The T6SS has a broad versatility as it can target both eukaryotic and prokaryotic cells. It is therefore involved in host pathogenesis or killing neighboring bacterial cells to colonize a new niche. At the architecture level, the T6SS core apparatus is composed of 13 proteins, which assemble in two subcomplexes. One of these subcomplexes, composed of subunits that share structural similarities with bacteriophage tail and baseplate components, is anchored to the cell envelope by the membrane subcomplex. This latter is constituted of at least three proteins, TssL, TssM, and TssJ. The crystal structure of the TssJ outer membrane lipoprotein and its interaction with the inner membrane TssM protein have been recently reported. TssL and TssM share sequence homology and characteristics with two components of the Type IVb secretion system (T4bSS), IcmH/DotU and IcmF, respectively. In this study, we report the crystal structure of the cytoplasmic domain of the TssL inner membrane protein from the enteroaggregative Escherichia coli Sci-1 T6SS. It folds as a hook-like structure composed of two three-helix bundles. Two TssL molecules associate to form a functional complex. Although the TssL trans-membrane segment is the main determinant of self-interaction, contacts between the cytoplasmic domains are required for TssL function. Based on sequence homology and secondary structure prediction, we propose that the TssL structure is the prototype for the members of the TssL and IcmH/DotU families. PMID:22371492

  9. Sharing "Sex Secrets" on Facebook: A Content Analysis of Youth Peer Communication and Advice Exchange on Social Media about Sexual Health and Intimate Relations.

    Science.gov (United States)

    Yeo, Tien Ee Dominic; Chu, Tsz Hang

    2017-09-01

    Social media present opportunities and challenges for sexual health communication among young people. This study is one of the first to examine the actual use of Facebook for peer communication of sexual health and intimate relations. Content analysis of 2186 anonymous posts in a "sex secrets" Facebook page unofficially affiliated with a Hong Kong University shows gender balance among posters, inclusiveness of sexual minorities, and frequent sharing of personal experiences in storytelling or advice seeking. The findings illuminate young people's health concerns regarding condom use, avoiding pain, birth control, sexually transmitted infections, and body appearance. Relational concerns found entailed sexual practices, expectations, and needs-predominantly within dating relationships and include not wanting to have sex. Supportive communication among users was prevalent. A majority of posts involved advice solicitation in the form of request for opinion or information (30.38%), request for advice (13.68%), situation comparison (5.40%), or problem disclosure (9.97%). Comments to the advice-seeking posts were mostly supportive (69.49%); nonsupportive responses (unsolicited messages and gratuitous humor) were concentrated with ambiguous advice solicitations. These findings hold implications for understanding self-disclosure of intimate concerns within social networks, and attuning sexual health intervention on social media to young people's actual needs and advice preferences.

  10. Nonlinear Secret Image Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Sang-Ho Shin

    2014-01-01

    efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB and 1.74tlog2⁡m bit-per-pixel (bpp, respectively.

  11. Rational kinematics

    CERN Document Server

    Angeles, Jorge

    1988-01-01

    A rational study of kinematics is a treatment of the subject based on invariants, i.e., quantities that remain essentially unchanged under a change of observer. An observer is understood to be a reference frame supplied with a clock (Truesdell 1966). This study will therefore include an introduction to invariants. The language of these is tensor analysis and multilinear algebra, both of which share many isomorphic relations, These subjects are treated in full detail in Ericksen (1960) and Bowen and Wang (1976), and hence will not be included here. Only a short account of notation and definitions will be presented. Moreover, definitions and basic concepts pertaining to the kinematics of rigid bodies will be also included. Although the kinematics of rigid bodies can be regarded as a particular case of the kinematics of continua, the former deserves attention on its own merits for several reasons. One of these is that it describes locally the motions undergone by continua. Another reason is that a whole area of ...

  12. Pragmatics & rationality.

    OpenAIRE

    Allott, N. E.

    2007-01-01

    This thesis is about the reconciliation of realistic views of rationality with inferential-intentional theories of communication. Grice (1957 1975) argued that working out what a speaker meant by an utterance is a matter of inferring the speaker's intentions on the presumption that she is acting rationally. This is abductive inference: inference to the best explanation for the utterance. Thus an utterance both rationalises and causes the interpretation the hearer constructs. Human rationality...

  13. A Rational Threshold Signature Model and Protocol Based on Different Permissions

    Directory of Open Access Journals (Sweden)

    Bojun Wang

    2014-01-01

    Full Text Available This paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together. We apply the secret sharing scheme based on difference equation to the private key distribution phase and secret reconstruction phrase of our threshold signature scheme. In addition, our scheme can achieve the signature success because of the punishment strategy of the repeated rational secret sharing. Besides, the bit commitment and verification method used to detect players’ cheating behavior acts as a contributing factor to prevent the internal fraud. Using bit commitments, verifiable parameters, and time sequences, this paper constructs a dynamic game model, which has the features of threshold signature management with different permissions, cheat proof, and forward security.

  14. Baseline rationing

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Moreno-Ternero, Juan D.; Østerdal, Lars Peter Raahave

    The standard problem of adjudicating conflicting claims describes a situation in which a given amount of a divisible good has to be allocated among agents who hold claims against it exceeding the available amount. This paper considers more general rationing problems in which, in addition to claims...... to international protocols for the reduction of greenhouse emissions, or water distribution in drought periods. We define a family of allocation methods for such general rationing problems - called baseline rationing rules - and provide an axiomatic characterization for it. Any baseline rationing rule within...... the family is associated with a standard rule and we show that if the latter obeys some properties reflecting principles of impartiality, priority and solidarity, the former obeys them too....

  15. Adolescent rationality.

    Science.gov (United States)

    Moshman, David

    2013-01-01

    Adolescents are commonly seen as irrational, a position supported to varying degrees by many developmentalists, who often appeal to recent research on adolescent brains. Careful review of relevant evidence, however, shows that (1) adults are less rational than is generally assumed, (2) adolescents (and adults) are categorically different from children with respect to the attainment of advanced levels of rationality and psychological functioning, and (3) adolescents and adults do not differ categorically from each other with respect to any rational competencies, irrational tendencies, brain structures, or neurological functioning. Development often continues in adolescence and beyond but categorical claims about adolescents as distinct from adults cannot be justified. A review of U.S. Supreme Court decisions concerning intellectual freedom, reproductive freedom, and criminal responsibility shows ongoing ambivalence and confusion about the rationality of adolescents. Developmental theory and research suggest that adolescents should be conceptualized as young adults, not immature brains, with important implications for their roles, rights, and responsibilities.

  16. Open Secrets

    OpenAIRE

    Madison, Michael

    2017-01-01

    The law of trade secrets is often conceptualized in bilateral terms, as creating and enforcing rights between trade secret owners, on the one hand, and misappropriators on the other hand. This paper, a chapter in a forthcoming collection on the law of trade secrets, argues that trade secrets and the law that guards them can serve structural and insitutional roles as well. Somewhat surprisingly, given the law’s focus on secrecy, among the institutional products of trade secrets law are commons...

  17. Membrane fusion proteins of type I secretion system and tripartite efflux pumps share a binding motif for TolC in gram-negative bacteria.

    Directory of Open Access Journals (Sweden)

    Minho Lee

    Full Text Available The Hly translocator complex of Escherichia coli catalyzes type I secretion of the toxin hemolysin A (HlyA. In this complex, HlyB is an inner membrane ABC (ATP Binding Cassette-type transporter, TolC is an outer membrane channel protein, and HlyD is a periplasmic adaptor anchored in the inner membrane that bridges HlyB to TolC. This tripartite organization is reminiscent of that of drug efflux systems such as AcrA-AcrB-TolC and MacA-MacB-TolC of E. coli. We have previously shown the crucial role of conserved residues located at the hairpin tip region of AcrA and MacA adaptors during assembly of their cognate systems. In this study, we investigated the role of the putative tip region of HlyD using HlyD mutants with single amino acid substitutions at the conserved positions. In vivo and in vitro data show that all mutations abolished HlyD binding to TolC and resulted in the absence of HlyA secretion. Together, our results suggest that, similarly to AcrA and MacA, HlyD interacts with TolC in a tip-to-tip manner. A general model in which these conserved interactions induce opening of TolC during drug efflux and type I secretion is discussed.

  18. Rational BRDF.

    Science.gov (United States)

    Pacanowski, Romain; Salazar Celis, Oliver; Schlick, Christophe; Granier, Xavier; Poulin, Pierre; Cuyt, Annie

    2012-11-01

    Over the last two decades, much effort has been devoted to accurately measuring Bidirectional Reflectance Distribution Functions (BRDFs) of real-world materials and to use efficiently the resulting data for rendering. Because of their large size, it is difficult to use directly measured BRDFs for real-time applications, and fitting the most sophisticated analytical BRDF models is still a complex task. In this paper, we introduce Rational BRDF, a general-purpose and efficient representation for arbitrary BRDFs, based on Rational Functions (RFs). Using an adapted parametrization, we demonstrate how Rational BRDFs offer 1) a more compact and efficient representation using low-degree RFs, 2) an accurate fitting of measured materials with guaranteed control of the residual error, and 3) efficient importance sampling by applying the same fitting process to determine the inverse of the Cumulative Distribution Function (CDF) generated from the BRDF for use in Monte-Carlo rendering.

  19. Rational emotions.

    Science.gov (United States)

    Meshulam, Meir; Winter, Eyal; Ben-Shakhar, Gershon; Aharon, Itzhak

    2012-01-01

    We present here the concept of rational emotions: Emotions may be directly controlled and utilized in a conscious, analytic fashion, enabling an individual to size up a situation, to determine that a certain "mental state" is strategically advantageous and adjust accordingly. Building on the growing body of literature recognizing the vital role of emotions in determining decisions, we explore the complementary role of rational choice in choosing emotional states. Participants played the role of "recipient" in the dictator game, in which an anonymous "dictator" decides how to split an amount of money between himself and the recipient. A subset of recipients was given a monetary incentive to be angry at low-split offers. That subset demonstrated increased physiological arousal at low offers relative to high offers as well as more anger than other participants. These results provide a fresh outlook on human decision-making and contribute to the continuing effort to build more complete models of rational behavior.

  20. Confucian Rationalism

    Science.gov (United States)

    Lam, Chi-Ming

    2014-01-01

    Nowadays, there is still a widely held view that the Chinese and Western modes of thought are quite distinct from each other. In particular, the Chinese mode of thought derived from Confucianism is considered as comparatively less rational than the Western one. In this article, I first argue that although the analogical mode of argumentation,…

  1. Rational valuations

    Directory of Open Access Journals (Sweden)

    Georg Spielthenner

    2007-01-01

    Full Text Available Valuations are ubiquitous. We may be for or against genetically modified food; we find some politicians irresponsible; we prefer Beethoven to rock ‘n’ roll or vice versa; some enjoy bird-watching while others find it boring; and we may think that we have to tighten up on green-house gas emissions. Valuing is pervasive and often we are not even aware that we are valuing. However, many of ourvaluations are ill grounded and rationally defective. They are frequently based on misinformation, sloppy thinking, prejudice, and are biased in many ways as psychological research shows. For this reason there is widespread agreement among phi-losophers that we need an account of substantive valuational rationality, both for the theory of practical reasoning and for ethics as well. My main objectin this paper is to outline such an account and to present a principle that allows a non-technical rational criticism of valuations

  2. Rational decisions

    CERN Document Server

    Binmore, Ken

    2008-01-01

    It is widely held that Bayesian decision theory is the final word on how a rational person should make decisions. However, Leonard Savage--the inventor of Bayesian decision theory--argued that it would be ridiculous to use his theory outside the kind of small world in which it is always possible to ""look before you leap."" If taken seriously, this view makes Bayesian decision theory inappropriate for the large worlds of scientific discovery and macroeconomic enterprise. When is it correct to use Bayesian decision theory--and when does it need to be modified? Using a minimum of mathematics,

  3. Rationalization: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    Rationalization was studied by Sigmund Freud and was specifically labeled by Ernest Jones. Rationalization ought to be differentiated from rational, rationality, logical analysis, etc. On the one hand, rationalization is considered a defense mechanism, on the other hand, rationality is not. Haan has done much work with self-report inventories and…

  4. Rational inattention or rational overreaction?

    DEFF Research Database (Denmark)

    Browning, Martin; Hansen, Lars Gårn; Smed, Sinne

    We investigate differences in how consumers of fish react to health information in the mass media. We specify a dynamic empirical model that allows for heterogeneity in all basic parameters of consumer behavior as well as in how consumers react to information. We estimate the model using a unique...... houshold panel tracking consumption, prices, news stories and media habits over 24 quarters. We fi nd that the consumers most likely to be ’rationally ignorant’ of health effects react more dramatically to health news than the consumers who most likely are well informed....

  5. Rationality of limited rationality : some aggregate implications

    OpenAIRE

    Uri M. Possen; Mikko Puhakka

    1994-01-01

    In this paper we let economic agents choose whether to become fully rational or stay boundedly rational. Boundedly rational agents are less sophisticated in their information processing abilities. It is costly to acquire information needed to become fully rational, and thus not all agents are willing to incur those costs. We then explore the aggregate effects of endogenizing the decision whether the agent should or should not become fully rational in handling information. Since fully and boun...

  6. Verifiable Secret Redistribution for Threshold Sharing Schemes

    National Research Council Canada - National Science Library

    Wong, Theodore M; Wang, Chenxi; Wing, Jeannette M

    2002-01-01

    .... Our protocol guards against dynamic adversaries. We observe that existing protocols either cannot be readily extended to allow redistribution between different threshold schemes, or have vulnerabilities that allow faulty old shareholders...

  7. Rationality in Society

    NARCIS (Netherlands)

    Flache, Andreas; Dijkstra, Jacob; Wright, James D.

    2015-01-01

    Contemporary theories of rational behavior in human society augment the orthodox model of rationality both by adding various forms of bounded rationality and relaxing the assumptions of self-interest and materialistic preferences. This entry discusses how these extensions of the theory of rational

  8. Secret Places.

    Science.gov (United States)

    Ridolfi, Kerry

    1997-01-01

    Argues that children are as deep as the ocean, with secret places inside of them waiting to be opened. Notes that it is powerful for students to learn they can make sense of the world through words, and describes inviting them into poetry as they read poetry, create poetry packets, and write and revise poems. (SR)

  9. On rationally supported surfaces

    DEFF Research Database (Denmark)

    Gravesen, Jens; Juttler, B.; Sir, Z.

    2008-01-01

    We analyze the class of surfaces which are equipped with rational support functions. Any rational support function can be decomposed into a symmetric (even) and an antisymmetric (odd) part. We analyze certain geometric properties of surfaces with odd and even rational support functions....... In particular it is shown that odd rational support functions correspond to those rational surfaces which can be equipped with a linear field of normal vectors, which were discussed by Sampoli et al. (Sampoli, M.L., Peternell, M., Juttler, B., 2006. Rational surfaces with linear normals and their convolutions...... with rational surfaces. Comput. Aided Geom. Design 23, 179-192). As shown recently, this class of surfaces includes non-developable quadratic triangular Bezier surface patches (Lavicka, M., Bastl, B., 2007. Rational hypersurfaces with rational convolutions. Comput. Aided Geom. Design 24, 410426; Peternell, M...

  10. A Rational Approach to Rational Suicide.

    Science.gov (United States)

    Richman, Joseph

    1992-01-01

    Describes suicide as reaction to internal and external sources of stress and the impact of life events. Notes that, in the elderly, these situations are prevalent in many who are not suicidal. Contends that much more is written about rational suicide than its alternative (rational nonsuicide). Reviews reasons for this and suggests rational…

  11. Secret rate - Privacy leakage in biometric systems

    NARCIS (Netherlands)

    Ignatenko, T.; Willems, F.M.J.

    2009-01-01

    Ahlswede and Csiszár [1993] introduced the concept of secret sharing. In their source model two terminals observe two correlated sequences. It is the objective of the terminals to form a common secret by interchanging a public message (helper data) in such a way that the secrecy leakage is

  12. Rationing medical education.

    African Journals Online (AJOL)

    This paper discussed the pros and cons of the application of rationing to medical education and the different ... Different types of rationing exist in healthcare professional education. ... state-of-the-art resources, technology and tutors con-.

  13. Rationing with baselines

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Moreno-Ternero, Juan D.; Østerdal, Lars Peter Raahave

    2013-01-01

    We introduce a new operator for general rationing problems in which, besides conflicting claims, individual baselines play an important role in the rationing process. The operator builds onto ideas of composition, which are not only frequent in rationing, but also in related problems...... such as bargaining, choice, and queuing. We characterize the operator and show how it preserves some standard axioms in the literature on rationing. We also relate it to recent contributions in such literature....

  14. CONTRIBUTIONS TO RATIONAL APPROXIMATION,

    Science.gov (United States)

    Some of the key results of linear Chebyshev approximation theory are extended to generalized rational functions. Prominent among these is Haar’s...linear theorem which yields necessary and sufficient conditions for uniqueness. Some new results in the classic field of rational function Chebyshev...Furthermore a Weierstrass type theorem is proven for rational Chebyshev approximation. A characterization theorem for rational trigonometric Chebyshev approximation in terms of sign alternation is developed. (Author)

  15. Bounded Rationality and Budgeting

    OpenAIRE

    Ibrahim, Mukdad

    2016-01-01

    This article discusses the theory of bounded rationality which had been introduced by Herbert Simon in the 1950s. Simon introduced the notion of bounded rationality stating that while decision-makers strive for rationality, they are limited by the effect of the environment, their information process capacity and by the constraints on their information storage and retrieval capabilities. Moreover, this article tries to specifically blend this notion into budgeting, using the foundations of inc...

  16. Rational Multiparty Computation

    OpenAIRE

    Wallrabenstein, John Ross

    2014-01-01

    The field of rational cryptography considers the design of cryptographic protocols in the presence of rational agents seeking to maximize local utility functions. This departs from the standard secure multiparty computation setting, where players are assumed to be either honest or malicious. ^ We detail the construction of both a two-party and a multiparty game theoretic framework for constructing rational cryptographic protocols. Our framework specifies the utility function assumptions neces...

  17. Determinants of Actor Rationality

    DEFF Research Database (Denmark)

    Ellegaard, Chris

    Industrial companies must exercise influence on their suppliers (or supplier actors). Actor rationality is a central theme connected to this management task. In this article, relevant literature is studied with the purpose of shedding light on determinants of actor rationality. Two buyer-supplier...... relations are investigated in a multiple case study, leading to the proposal of various additional factors that determine and shape actor rationality. Moreover a conceptual model of rationality determinants in the buyer-supplier relation is proposed, a model that may help supply managers analyse...

  18. Standby Gasoline Rationing Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-06-01

    The final rules adopted by the President for a Standby Gasoline Rationing Plan are presented. The plan provides that eligibility for ration allotments will be determined primarily on the basis of motor vehicle registrations, taking into account historical differences in the use of gasoline among states. The regulations also provide authority for supplemental allotments to firms so that their allotment will equal a specified percentage of gasoline use during a base period. Priority classifications, i.e., agriculture, defense, etc., are established to assure adequate gasoline supplies for designated essential services. Ration rights must be provided by end-users to their suppliers for each gallon sold. DOE will regulate the distribution of gasoline at the wholesale level according to the transfer by suppliers of redeemed ration rights and the gasoline allocation regulations. Ration rights are transferable. A ration banking system is created to facilitate transfers of ration rights. Each state will be provided with a reserve of ration rights to provide for hardship needs and to alleviate inequities. (DC)

  19. Two Concepts of Rationality

    Directory of Open Access Journals (Sweden)

    Danny Frederick

    2010-02-01

    Full Text Available The dominant tradition in Western philosophy sees rationality as dictating. Thus rationality may require that we believe the best explanation and simple conceptual truths and that we infer in accordance with evident rules of inference. I argue that, given what we know about the growth of knowledge, this authoritarian concept of rationality leads to absurdities and should be abandoned. I then outline a libertarian concept of rationality, derived from Popper, which eschews the dictates and which sees a rational agent as one who questions, criticises, conjectures and experiments. I argue that, while the libertarian approach escapes the absurdities of the authoritarian, it requires two significant developments and an important clarification to be made fully consistent with itself.

  20. Exploring rationality in schizophrenia

    DEFF Research Database (Denmark)

    Revsbech, Rasmus; Mortensen, Erik Lykke; Owen, Gareth

    2015-01-01

    Background Empirical studies of rationality (syllogisms) in patients with schizophrenia have obtained different results. One study found that patients reason more logically if the syllogism is presented through an unusual content. Aims To explore syllogism-based rationality in schizophrenia. Meth...... differences became non-significant. Conclusions When taking intelligence and neuropsychological performance into account, patients with schizophrenia and controls perform similarly on syllogism tests of rationality.......Background Empirical studies of rationality (syllogisms) in patients with schizophrenia have obtained different results. One study found that patients reason more logically if the syllogism is presented through an unusual content. Aims To explore syllogism-based rationality in schizophrenia. Method...... Thirty-eight first-admitted patients with schizophrenia and 38 healthy controls solved 29 syllogisms that varied in presentation content (ordinary v. unusual) and validity (valid v. invalid). Statistical tests were made of unadjusted and adjusted group differences in models adjusting for intelligence...

  1. Irrational Rationality of Terrorism

    Directory of Open Access Journals (Sweden)

    Robert Nalbandov

    2013-12-01

    Full Text Available The present article deals with the ontological problem of applying the rational choice frameworks to the study of terrorism. It testing the application of the rational choice to the “old” (before the end of the Cold War and the “new” (after the end of the Cold War terrorisms. It starts with analyzing the fundamentals of rationality and applies it at two levels: the individual (actors and group (collective via two outlooks: tactical (short-term and strategic (long-term. The main argument of the article is that while the “old” terrorism can be explained by the rational choice theory its “new” version represents a substantial departure from rationality.

  2. Respect for rational autonomy.

    Science.gov (United States)

    Walker, Rebecca L

    2009-12-01

    The standard notion of autonomy in medical ethics does not require that autonomous choices not be irrational. The paper gives three examples of seemingly irrational patient choices and discusses how a rational autonomy analysis differs from the standard view. It then considers whether a switch to the rational autonomy view would lead to overriding more patient decisions but concludes that this should not be the case. Rather, a determination of whether individual patient decisions are autonomous is much less relevant than usually considered in determining whether health care providers must abide by these decisions. Furthermore, respect for rational autonomy entails strong positive requirements of respect for the autonomy of the person as a rational decision maker. The rationality view of autonomy is conceptually stronger than the standard view, allows for a more nuanced understanding of the practical moral calculus involved in respecting patient autonomy, and promotes positive respect for patient autonomy.

  3. Behavior of temperature dependent SRAM-PUFs, and consequences for secret-key capacity

    NARCIS (Netherlands)

    Kusters, C.J.; Ignatenko, T.; Willems, F.M.J.

    2017-01-01

    Physical Unclonable Functions (PUFs) are a resource for generating and sharing secret keys. The mutual information between two respective observations of the same PUF gives an upper bound for the achievable secret-key rate of a secret-sharing scheme that relies on this PUF. This mutual information

  4. 77 FR 66577 - Fisheries Off West Coast States; Pacific Coast Groundfish Fishery; Trawl Rationalization Program...

    Science.gov (United States)

    2012-11-06

    ...-XC165 Fisheries Off West Coast States; Pacific Coast Groundfish Fishery; Trawl Rationalization Program... implemented as part of the trawl rationalization program. FOR FURTHER INFORMATION CONTACT: Jamie Goen, phone..., NMFS implemented a trawl rationalization program, a catch share program, for the Pacific coast...

  5. 50 CFR 660.337 - Trawl rationalization program - data collection requirements.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Trawl rationalization program - data... COAST STATES West Coast Groundfish Fisheries § 660.337 Trawl rationalization program - data collection... guarantee that they will qualify for quota share under a future trawl rationalization program. The following...

  6. History of Economic Rationalities

    DEFF Research Database (Denmark)

    This book concentrates upon how economic rationalities have been embedded into particular historical practices, cultures, and moral systems. Through multiple case-studies, situated in different historical contexts of the modern West, the book shows that the development of economic rationalities...... takes place in the meeting with other regimes of thought, values, and moral discourses. The book offers new and refreshing insights, ranging from the development of early economic thinking to economic aspects and concepts in the works of classical thinkers such as Thomas Hobbes, John Locke and Karl Marx......, to the role of economic reasoning in contemporary policies of art and health care. With economic rationalities as the read thread, the reader is offered a unique chance of historical self-awareness and recollection of how economic rationality became the powerful ideological and moral force that it is today....

  7. Rationing medical education.

    African Journals Online (AJOL)

    This paper discussed the pros and cons of the application of rationing to medical education and the different ... Even though some stakeholders in medical education might be taken aback at .... Walsh K. Online educational tools to improve the.

  8. Crab Rationalization Permit Program

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Crab Rationalization Program (Program) allocates BSAI crab resources among harvesters, processors, and coastal communities. The North Pacific Fishery Management...

  9. THE HICKSIAN RATIONAL CONSUMER

    OpenAIRE

    Manuel FERNÁNDEZ-GRELA

    2005-01-01

    The aim of this paper is to trace the evolution of the concept of ''rational consumer'' in Hicks's writings. After being one of the pioneers in the introduction of rationality assumptions about consumer behaviour in economic models, Hicks gradually developed a sceptical view about some of the uses to which those assumptions were put into. The focus of the paper is on continuity in Hicksian views, providing a picture of gradual changes in the long series of Hicks's works

  10. Shared pledge shared vision

    International Nuclear Information System (INIS)

    Boussaha, Ali; Diatta, Christian Sina

    2005-01-01

    The New Partnership for Africa's Development (NEPAD) is a pledge by African leaders to eradicate poverty and to promote sustainable growth and development. NEPAD is a 'new framework of interaction with the rest of the world, including the industrialised countries and multilateral organizations.' The agenda is based on regional priorities and development plans and its implementation relies on African ownership and management. As a UN system organisation, the IAEA strongly supports the priorities identified in the Millennium Declaration and the New Partnership for Africa's Development. As a technical agency, the IAEA shares its recognized core competencies and technical expertise in support of NEPAD goals. Efforts aim at strengthening institutional capacity building in nuclear sciences and technology and promoting the sustainable application of nuclear techniques for social and economic development. The IAEA has a membership of 34 African countries. The Agency supports them under its technical cooperation programme through provision of expertise, training opportunities and equipment in priority areas identified by the countries themselves. For many African Member States, meeting basic human needs through the implementation of poverty alleviation strategies remains the top priority on the agenda for national development plans and international cooperation programmes. In the context of sustainable development, special attention is being paid to enlarging the contribution of isotopes and nuclear techniques in major areas of economic and social significance and to promoting regional cooperation in nuclear science and technology related fields. As a partner in development, the Agency has promoted and undertaken programmes to support African countries' efforts to address priority development issues particularly in the areas of health care, food and agriculture and water resources development. The IAEA technical cooperation mechanism includes support to the African Regional

  11. Standby Gasoline Rationing Plan. Contingency gasoline rationing regulations

    Energy Technology Data Exchange (ETDEWEB)

    1979-02-01

    The Economic Regulatory Administration issues final rules with respect to standby gasoline rationing. The plan is designed for and would be used only in the event of a severe gasoline shortage. The plan provides that eligibility for ration allotments will be primarily on the basis of motor vehicle registrations. DOE will mail government ration checks to the parties named in a national vehicle registration file to be maintained by DOE. Ration recipients may cash these checks for ration coupons at various designated coupon issuance points. Retail outlets and other suppliers will be required to redeem the ration coupons received in exchange for gasoline sold. Supplemental gas will be given to high-priority activities. A ration banking system will be established with two separate and distinct of ration accounts: retail outlets and other suppliers will open redemption accounts for the deposit of redeemed ration rights; and individuals or firms may open ration rights accounts, which will operate in much the same manner as monetary checking accounts. A white market will be permitted for the sale of transfer of ration rights. A percentage of the total ration rights to be issued will be reserved for distribution to the states as a State Ration Reserve, to be used by the states primarily for the relief of hardship. A National Ration Reserave will also be established. All sections of the Standby Gasoline Rationing Regulations are analyzed. (MCW)

  12. To share and be shared

    DEFF Research Database (Denmark)

    Winther, Ida Wentzel

    2018-01-01

    to another. To a certain degree, they share their everyday lives, things, places, memories, and past/future, but as the ones who move back and forth, they belong a little less in each place. This article is about children who are shared between their parent, households and siblings. They are shared...

  13. Immunoglobins in mammary secretions

    DEFF Research Database (Denmark)

    Hurley, W L; Theil, Peter Kappel

    2013-01-01

    Immunoglobulins secreted in colostrum and milk by the lactating mammal are major factors providing immune protection to the newborn. Immunoglobulins in mammary secretions represent the cumulative immune response of the lactating animal to exposure to antigenic stimulation that occurs through...... the immunoglobulins found in mammary secretions in the context of their diversity of structure, origin, mechanisms of transfer, and function....

  14. CERTIFICATE REVOCATION SCHEME BASED ON WEIGHTED VOTING GAME AND RATIONAL SECURE MULTIPARTY COMPUTING

    Directory of Open Access Journals (Sweden)

    N Aravinthan

    2017-03-01

    Full Text Available The Mobile Adhoc Network consists of deployed mobile nodes which lead to the frequent changes in network topology. Due to topology changes, required infrastructure is unavailable for communication. Moreover, malicious nodes present in MANET make use of this modification and can easily launch highly vulnerable attacks on the routing path of the network. Hence, Security issue such as removing misbehaving nodes is the primary issue in MANET. Effective certificate revocation scheme was introduced to identify and eliminate the node with malicious activities in the network based on the weighted voting game (ECR-WVG approach. In this approach, weights and quota were two factors, determined for an effective revocation of malicious nodes certificates. However, security during multiparty transmission was not taken into account in ECR-WVG. In Effective Certificate Revocation Scheme based on Weighted Voting Game and Rational Secure Multi-Party Computing (ECR-WVG-RSMPC method, rational secret sharing scheme is introduced along with ECR-WVG approach for securing multiparty transmission. Performance evaluation can be done between ECR-WVG and ECR-WVG-RSMPC in terms of false revocation, malicious node revocation, normalized time for revocation and revocation accuracy ratio.

  15. Pituitary-hormone secretion by thyrotropinomas.

    Science.gov (United States)

    Roelfsema, Ferdinand; Kok, Simon; Kok, Petra; Pereira, Alberto M; Biermasz, Nienke R; Smit, Jan W; Frolich, Marijke; Keenan, Daniel M; Veldhuis, Johannes D; Romijn, Johannes A

    2009-01-01

    Hormone secretion by somatotropinomas, corticotropinomas and prolactinomas exhibits increased pulse frequency, basal and pulsatile secretion, accompanied by greater disorderliness. Increased concentrations of growth hormone (GH) or prolactin (PRL) are observed in about 30% of thyrotropinomas leading to acromegaly or disturbed sexual functions beyond thyrotropin (TSH)-induced hyperthyroidism. Regulation of non-TSH pituitary hormones in this context is not well understood. We there therefore evaluated TSH, GH and PRL secretion in 6 patients with up-to-date analytical and mathematical tools by 24-h blood sampling at 10-min intervals in a clinical research laboratory. The profiles were analyzed with a new deconvolution method, approximate entropy, cross-approximate entropy, cross-correlation and cosinor regression. TSH burst frequency and basal and pulsatile secretion were increased in patients compared with controls. TSH secretion patterns in patients were more irregular, but the diurnal rhythm was preserved at a higher mean with a 2.5 h phase delay. Although only one patient had clinical acromegaly, GH secretion and IGF-I levels were increased in two other patients and all three had a significant cross-correlation between the GH and TSH. PRL secretion was increased in one patient, but all patients had a significant cross-correlation with TSH and showed decreased PRL regularity. Cross-ApEn synchrony between TSH and GH did not differ between patients and controls, but TSH and PRL synchrony was reduced in patients. We conclude that TSH secretion by thyrotropinomas shares many characteristics of other pituitary hormone-secreting adenomas. In addition, abnormalities in GH and PRL secretion exist ranging from decreased (joint) regularity to overt hypersecretion, although not always clinically obvious, suggesting tumoral transformation of thyrotrope lineage cells.

  16. Sharing City

    DEFF Research Database (Denmark)

    This magazine offers an insight into the growing commercial innovation, civic movements, and political narratives surrounding sharing economy services, solutions and organisational types. It presents a cross-section of the manifold sharing economy services and solutions that can be found in Denmark....... Moreover, 15 thought leading experts - professionals and academic - have been invited to give their perspective on sharing economy for cities. This magazine touches upon aspects of the sharing economy as mobility, communities, sustainability, business development, mobility, and urban-rural relation....

  17. Serial interpolation for secure membership testing and matching in a secret-split archive

    Energy Technology Data Exchange (ETDEWEB)

    Kroeger, Thomas M.; Benson, Thomas R.

    2016-12-06

    The various technologies presented herein relate to analyzing a plurality of shares stored at a plurality of repositories to determine whether a secret from which the shares were formed matches a term in a query. A threshold number of shares are formed with a generating polynomial operating on the secret. A process of serially interpolating the threshold number of shares can be conducted whereby a contribution of a first share is determined, a contribution of a second share is determined while seeded with the contribution of the first share, etc. A value of a final share in the threshold number of shares can be determined and compared with the search term. In the event of the value of the final share and the search term matching, the search term matches the secret in the file from which the shares are formed.

  18. Consumer rationality in choice

    NARCIS (Netherlands)

    Conlon, B.J.

    2001-01-01

    The dissertation concentrates on consumer choice and the ability of current modelling approaches to capture the underlying behaviour of the individual decision-makers. The standard assumption of a rational utility maximising individual and its implications for observed behaviour are examined and

  19. Universal and Relative Rationality

    Directory of Open Access Journals (Sweden)

    Nathaniel Goldberg

    2009-01-01

    Full Text Available In this paper I illustrate how a basic kind of universal rationality can be profitably combined with undeniable instances of relativism. I do so by engaging Michael Friedman’s recent response to a challenge from Thomas Kuhn.

  20. The rational complementarity problem

    NARCIS (Netherlands)

    Heemels, W.P.M.H.; Schumacher, J.M.; Weiland, S.

    1999-01-01

    An extension of the linear complementarity problem (LCP) of mathematical programming is the so-called rational complementarity problem (RCP). This problem occurs if complementarity conditions are imposed on input and output variables of linear dynamical input/state/output systems. The resulting

  1. Rational equity bubbles

    OpenAIRE

    Zhou, Ge

    2012-01-01

    This paper discusses the existence of a bubble in the pricing of an asset that pays positive dividends. I show that rational bubbles can exist in a growing economy. The existence of bubbles depends on the relative magnitudes of risk aversion to consumption and to wealth. Furthermore, I examine how an exogenous shock in technology might trigger bubbles.

  2. Ideal Theory, Real Rationality

    DEFF Research Database (Denmark)

    Flyvbjerg, Bent

    Understanding rationality and power are key to understanding actual political and administrative behavior. Political and administrative theory that ignores this fact stand in danger of being at best irrelevant or, at worst part of the problem it whishes to solve. The paper presents Jürgen Habermas...

  3. Diagnosis, Dogmatism, and Rationality.

    Science.gov (United States)

    Rabinowitz, Jonathan; Efron, Noah J.

    1997-01-01

    Presents findings suggesting that misdiagnoses frequently stem from flaws in human information processing, particularly in collecting and using information. Claims that improved diagnostic tools will not remedy the problem. Drawing on the work of Karl Popper and Robin Collingwood, proposes operational principles to ensure a rational diagnostic…

  4. Rational Emotive Education

    Science.gov (United States)

    Knaus, William

    1977-01-01

    Rational Emotive Education--an outgrowth of theories developed by Albert Ellis--is a teaching design of mental health concepts and problem-solving activities designed to help students to approach and cope with their problems through experiential learning, via a structured, thematic sequence of emotive education lessons. (MJB)

  5. Hegel's phenomenology of rationality

    DEFF Research Database (Denmark)

    Huggler, Jørgen

    2009-01-01

    The aim of this chapter is to elucidate Hegel's conception of rationality in the Phänomenologie des Geistes (1807), and to defend the thesis that he is an author engaged in discussion with a wide variety of sources. He uses sceptical reasoning to form a line of argument with a necessary progression...

  6. File sharing

    NARCIS (Netherlands)

    van Eijk, N.

    2011-01-01

    ‘File sharing’ has become generally accepted on the Internet. Users share files for downloading music, films, games, software etc. In this note, we have a closer look at the definition of file sharing, the legal and policy-based context as well as enforcement issues. The economic and cultural

  7. Digging Up "The Secret Garden": Noble Innocents or Little Savages?

    Science.gov (United States)

    Wilkie, Christine

    1997-01-01

    Offers a rereading of Frances Hodgson Burnett's "The Secret Garden," finding in it the triumph of Apollonian male rationalism over the Dionysian female cult of nature. Examines images of primitivism and wildness in the book, connecting them to polarities in conceptions of primitivism. (SR)

  8. Shared leadership

    DEFF Research Database (Denmark)

    Ulhøi, John Parm; Müller, Sabine

    2012-01-01

    The aim of this paper is twofold. First, this paper comprehensively will review the conceptual and empirical literature to identify such critical underlying mechanisms which enable shared or collective leadership. Second, this article identifies the antecedents and outcomes of shared leadership...... according to the literature review to develop a re-conceptualised and synthesized framework for managing the organizational issues associated with shared leadership on various organizational levels. The paper rectifies this by identifying the critical factors and mechanisms which enable shared leadership...... and its antecedents and outcomes, and to develop a re-conceptualized and synthesized framework of shared leadership. The paper closes with a brief discussion of avenues for future research and implications for managers....

  9. Capital Requirements and Credit Rationing

    OpenAIRE

    Itai Agur

    2010-01-01

    This paper analyzes the trade-off between financial stability and credit rationing that arises when increasing capital requirements. It extends the Stiglitz-Weiss model of credit rationing to allow for bank default. Bank capital structure then matters for lending incentives. With default and rationing endogenous, optimal capital requirements can be analyzed. Introducing bank financiers, the paper also shows that uninsured funding raises the sensitivity of rationing to capital requirements. In...

  10. Rationality and ritual

    International Nuclear Information System (INIS)

    Wynne, B.

    1982-01-01

    The book concerns the Windscale Public Inquiry, held to investigate the application by British Nuclear Fuels to build a 1200 tonne per year thermal oxide reprocessing plant (THORP) for spent nuclear fuels from Britain and overseas. The subject is discussed under the headings: introduction (international dimensions; the Windscale Inquiry; conflict resolution and social drama; public debate and the sociology of knowledge); the decision-making legacy; oxide reprocessing - the background; the public inquiry tradition - a comparative perspective; the emergence of THORP from a private to a public issue (local and national planning politics); the process and impact of the Inquiry (opposition groups); judicial rationality, expert conflict, and political authority); the rationality and politics of analysis (proliferation; radiation risks; relative risks; the Ravenglass issue; discharge targets; general radiation protection arrangements); conclusion. (U.K.)

  11. Rational management of epilepsy.

    Science.gov (United States)

    Viswanathan, Venkataraman

    2014-09-01

    Management of epilepsies in children has improved considerably over the last decade, all over the world due to the advances seen in the understanding of the patho-physiology of epileptogenesis, availability of both structural and functional imaging studies along with better quality EEG/video-EEG recordings and the availability of a plethora of newer anti-epileptic drugs which are tailormade to act on specific pathways. In spite of this, there is still a long way to go before one is able to be absolutely rational about which drug to use for which type of epilepsy. There have been a lot of advances in the area of epilepsy surgery and is certainly gaining ground for specific cases. Better understanding of the genetic basis of epilepsies will hopefully lead to a more rational treatment plan in the future. Also, a lot of work needs to be done to dispel various misunderstandings and myths about epilepsy which still exists in our country.

  12. Multivariate rational data fitting

    Science.gov (United States)

    Cuyt, Annie; Verdonk, Brigitte

    1992-12-01

    Sections 1 and 2 discuss the advantages of an object-oriented implementation combined with higher floating-point arithmetic, of the algorithms available for multivariate data fitting using rational functions. Section 1 will in particular explain what we mean by "higher arithmetic". Section 2 will concentrate on the concepts of "object orientation". In sections 3 and 4 we shall describe the generality of the data structure that can be dealt with: due to some new results virtually every data set is acceptable right now, with possible coalescence of coordinates or points. In order to solve the multivariate rational interpolation problem the data sets are fed to different algorithms depending on the structure of the interpolation points in then-variate space.

  13. Knowledge Sharing

    DEFF Research Database (Denmark)

    Holdt Christensen, Peter

    The concept of knowledge management has, indeed, become a buzzword that every single organization is expected to practice and live by. Knowledge management is about managing the organization's knowledge for the common good of the organization -but practicing knowledge management is not as simple...... as that. This article focuses on knowledge sharing as the process seeking to reduce the resources spent on reinventing the wheel.The article introduces the concept of time sensitiveness; i.e. that knowledge is either urgently needed, or not that urgently needed. Furthermore, knowledge sharing...... is considered as either a push or pull system. Four strategies for sharing knowledge - help, post-it, manuals and meeting, and advice are introduced. Each strategy requires different channels for sharing knowledge. An empirical analysis in a production facility highlights how the strategies can be practiced....

  14. Authentication Without Secrets

    Energy Technology Data Exchange (ETDEWEB)

    Pierson, Lyndon G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Robertson, Perry J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  15. Models for Rational Number Bases

    Science.gov (United States)

    Pedersen, Jean J.; Armbruster, Frank O.

    1975-01-01

    This article extends number bases to negative integers, then to positive rationals and finally to negative rationals. Methods and rules for operations in positive and negative rational bases greater than one or less than negative one are summarized in tables. Sample problems are explained and illustrated. (KM)

  16. Rational Unified Process

    OpenAIRE

    Kopal, Nils

    2016-01-01

    In this German seminar paper, which was written in the year 2011 at the University of Duisburg for a Bachelor Colloquium in Applied computer science, we show a brief overview of the Rational Unified Process (RUP). Thus, interested students or generally interested people in software development gain a first impression of RUP. The paper includes a survey and overview of the underlying process structure, the phases of the process, its workflows, and describes the always by the RUP developers pos...

  17. Maps of Bounded Rationality

    OpenAIRE

    Kahneman, Daniel

    2002-01-01

    The work cited by the Nobel committee was done jointly with the late Amos Tversky (1937-1996) during a long and unusually close collaboration. Together, we explored the psychology of intuitive beliefs and choices and examined their bounded rationality. This essay presents a current perspective on the three major topics of our joint work: heuristics of judgment, risky choice, and framing effects. In all three domains we studied intuitions - thoughts and preferences that come to mind quickly an...

  18. Emotional Theory of Rationality

    OpenAIRE

    Garcés, Mario; Finkel, Lucila

    2011-01-01

    In recent decades, it has been definitely established the existence of a close relationship between the emotional phenomena and rational processes, but we still do not have a unified definition, or effective models to describe any of them well. To advance our understanding of the mechanisms governing the behavior of living beings we must integrate multiple theories, experiments and models from both fields. In this paper we propose a new theoretical framework that allows integrating and unders...

  19. On hereditarily rational functions

    OpenAIRE

    Nowak, Krzysztof Jan

    2012-01-01

    In this paper, we give a short proof of a theorem by Koll\\'{a}r on hereditarily rational functions. This is an answer to his appeal to find an elementary proof which does not rely so much on resolution of singularities. Our approach does not make use of desingularization techniques. Instead, we apply a stronger version of the \\L{}ojasiewicz inequality. Moreover, this allows us to sharpen Koll\\'{a}r's theorem.

  20. Probability and rational choice

    Directory of Open Access Journals (Sweden)

    David Botting

    2014-05-01

    Full Text Available http://dx.doi.org/10.5007/1808-1711.2014v18n1p1 In this paper I will discuss the rationality of reasoning about the future. There are two things that we might like to know about the future: which hypotheses are true and what will happen next. To put it in philosophical language, I aim to show that there are methods by which inferring to a generalization (selecting a hypothesis and inferring to the next instance (singular predictive inference can be shown to be normative and the method itself shown to be rational, where this is due in part to being based on evidence (although not in the same way and in part on a prior rational choice. I will also argue that these two inferences have been confused, being distinct not only conceptually (as nobody disputes but also in their results (the value given to the probability of the hypothesis being not in general that given to the next instance and that methods that are adequate for one are not by themselves adequate for the other. A number of debates over method founder on this confusion and do not show what the debaters think they show.

  1. Are security analysts rational? a literature review

    OpenAIRE

    Peixinho, Rúben; Coelho, Luís; Taffler, Richard J.

    2005-01-01

    Rational choice theory and bounded rationality constitute the basis for the discussion in several areas regarding human rationality. In finance, this discussion has been made between traditional finance and behavioural finance approach, which have different perspectives concerning market agents’ rationality. This paper reviews several studies addressing rationality among security analysts. The analysis shows that analysts’systematic optimism seems to be inconsistent with rationality....

  2. Melioration as Rational Choice: Sequential Decision Making in Uncertain Environments

    Science.gov (United States)

    Sims, Chris R.; Neth, Hansjorg; Jacobs, Robert A.; Gray, Wayne D.

    2013-01-01

    Melioration--defined as choosing a lesser, local gain over a greater longer term gain--is a behavioral tendency that people and pigeons share. As such, the empirical occurrence of meliorating behavior has frequently been interpreted as evidence that the mechanisms of human choice violate the norms of economic rationality. In some environments, the…

  3. Incretin secretion: direct mechanisms

    DEFF Research Database (Denmark)

    Balk-Møller, Emilie; Holst, Jens Juul; Kuhre, Rune Ehrenreich

    2014-01-01

    The incretin hormones glucose-dependent insulinotropic polypeptide (GIP) and glucagon-like peptide 1 (GLP-1) are secreted from gastro-intestinal K- and L-cells, respectively, and play an important role in post-prandial blood glucose regulation. They do this by direct stimulation of the pancreatic β...... enzyme responsible for incretin degradation (dipeptidyl peptidase-4) is inhibited (drugs are already on the market) while the secretion of endogenous GLP-1 secretion is stimulated at the same time may prove particularly rewarding. In this section we review current knowledge on the mechanisms for direct...

  4. Sharing a common resource with concave benefits

    OpenAIRE

    Ambec, S.

    2006-01-01

    A group of agents enjoy concave and single-peak benefit functions from consuming a shared resource. They also value money (transfers). The resource is scarce in the sense that not everybody can consume its peak. The paper characterizes the unique (resource and money) allocation that is efficient, incentive compatible and equal-sharing individual rational. It can be implemented (i) by selling the resource or taxing extraction and redistributing the money collected equally, or (ii) by assigning...

  5. Secret quality of love.

    Science.gov (United States)

    Strachan-Hall, Elaine

    2016-09-01

    Many of us can recite three Donabedian dimensions of the quality of care of structure, process and outcome. Recently, I was introduced to another of Avedis Donabedian's quotes about the 'secret quality of love'.

  6. Six secrets of champagne

    Science.gov (United States)

    Liger-Belair, Gérard

    2015-12-01

    Popping open a bottle of champagne is one of life's great delights, but how much do you really know about the science behind this greatest of wines? Gérard Liger-Belair reveals his six favourite champagne secrets.

  7. Rational Approximations to Rational Models: Alternative Algorithms for Category Learning

    Science.gov (United States)

    Sanborn, Adam N.; Griffiths, Thomas L.; Navarro, Daniel J.

    2010-01-01

    Rational models of cognition typically consider the abstract computational problems posed by the environment, assuming that people are capable of optimally solving those problems. This differs from more traditional formal models of cognition, which focus on the psychological processes responsible for behavior. A basic challenge for rational models…

  8. Realization theory for rational systems: Minimal rational realizations

    NARCIS (Netherlands)

    J. Nemcová (Jana); J.H. van Schuppen (Jan)

    2010-01-01

    htmlabstractThe study of realizations of response maps is a topic of control and system theory. Realization theory is used in system identification and control synthesis. A minimal rational realization of a given response map p is a rational realization of p such that the dimension of its state

  9. Liberal rationalism and medical decision-making.

    Science.gov (United States)

    Savulescu, Julian

    1997-04-01

    I contrast Robert Veatch's recent liberal vision of medical decision-making with a more rationalist liberal model. According to Veatch, physicians are biased in their determination of what is in their patient's overall interests in favour of their medical interests. Because of the extent of this bias, we should abandon the practice of physicians offering what they guess to be the best treatment option. Patients should buddy up with physicians who share the same values -- 'deep value pairing'. The goal of choice is maximal promotion of patient values. I argue that if subjectivism about value and valuing is true, this move is plausible. However, if objectivism about value is true -- that there really are states which are good for people regardless of whether they desire to be in them -- then we should accept a more rationalist liberal alternative. According to this alternative, what is required to decide which course is best is rational dialogue between physicians and patients, both about the patient's circumstances and her values, and not the seeking out of people, physicians or others, who share the same values. Rational discussion requires that physicians be reasonable and empathic. I describe one possible account of a reasonable physician.

  10. Rational customs clearance technology choice

    OpenAIRE

    Shramenko, N.; Andriets, V.

    2008-01-01

    Issues concerning cargo delivery efficiencyincrease by choice of rational customs clearance technology have been considered. Three possible variants of customs clearance andmethods which allow to define the most rational version of cargo delivery in international road communication based on main efficiency criteria for definite distance have been presented.

  11. Differential Rationality and Personal Development.

    Science.gov (United States)

    Fincher, Cameron

    This publication discusses differential rationality; it asserts that the development of institutions, professions, and individuals involves the differentiation of forms and styles of thinking and knowing that are, in various ways, idiosyncratic. Based on this understanding, differential rationality can be seen as a developmental construct that…

  12. Rationality problem for algebraic tori

    CERN Document Server

    Hoshi, Akinari

    2017-01-01

    The authors give the complete stably rational classification of algebraic tori of dimensions 4 and 5 over a field k. In particular, the stably rational classification of norm one tori whose Chevalley modules are of rank 4 and 5 is given. The authors show that there exist exactly 487 (resp. 7, resp. 216) stably rational (resp. not stably but retract rational, resp. not retract rational) algebraic tori of dimension 4, and there exist exactly 3051 (resp. 25, resp. 3003) stably rational (resp. not stably but retract rational, resp. not retract rational) algebraic tori of dimension 5. The authors make a procedure to compute a flabby resolution of a G-lattice effectively by using the computer algebra system GAP. Some algorithms may determine whether the flabby class of a G-lattice is invertible (resp. zero) or not. Using the algorithms, the suthors determine all the flabby and coflabby G-lattices of rank up to 6 and verify that they are stably permutation. The authors also show that the Krull-Schmidt theorem for G-...

  13. Product differentiation under bounded rationality

    NARCIS (Netherlands)

    Vermeulen, B.; Poutré, La J.A.; Kok, de A.G.; Pyka, A.; Handa, H.; Ishibuchi, H.; Ong, Y.-S.; Tan, K.-C.

    2015-01-01

    We study product differentiation equilibria and dynamics on the Salop circle under bounded rationality. Due to bounded rationality, firms tend to agglomerate in pairs. Upon adding a second tier of component suppliers, downstream assemblers may escape pairwise horizontal agglomeration. Moreover, we

  14. The concept of rational suicide.

    Science.gov (United States)

    Mayo, D J

    1986-05-01

    Suicide has been condemned in our culture in one way or another since Augustine offered theological arguments against it in the sixth century. More recently, theological condemnation has given way to the view that suicidal behavior must always be symptomatic of emotional disturbance and mental illness. However, suicide has not always been viewed so negatively. In other times and cultures, it has been held that circumstances might befall a person in which suicide would be a perfectly rational course of action, in the same sense that any other course of action could be rational: that it could be sensible, i.e., defensible by good reasons, or that it could be in keeping with the agent's fundamental interests. Indiscriminate use of modern life-sustaining technologies has renewed interest in the possibility of rational suicide. Today proponents of rational suicide tend to equate the rationality of suicide with the competence of the decision to commit suicide.

  15. Limited rationality and strategic interaction

    DEFF Research Database (Denmark)

    Fehr, Ernst; Tyran, Jean-Robert

    2008-01-01

    Much evidence suggests that people are heterogeneous with regard to their abilities to make rational, forward-looking decisions. This raises the question as to when the rational types are decisive for aggregate outcomes and when the boundedly rational types shape aggregate results. We examine...... this question in the context of a long-standing and important economic problem: the adjustment of nominal prices after an anticipated monetary shock. Our experiments suggest that two types of bounded rationality-money illusion and anchoring-are important behavioral forces behind nominal inertia. However......, depending on the strategic environment, bounded rationality has vastly different effects on aggregate price adjustment. If agents' actions are strategic substitutes, adjustment to the new equilibrium is extremely quick, whereas under strategic complementarity, adjustment is both very slow and associated...

  16. [Rational use of medicines].

    Science.gov (United States)

    Helali, A

    2006-12-01

    Every body speaks about inappropriate use of medicines and each one gives his own explanation. Politicians are telling about the waste of medicines and the money of their national budget. Citizens are saying that the physicians prescribe more than necessary for treatment and blame them as one part of the financial burden weighting on their family budget. Physicians give different explanation and think that the rational use of medicines is a sort of pressure to limit their freedom to prescribe what it seems to them necessary and better for their patients. Pharmacists dispensing medicines consider the prescription as a physician's prerogative and prefer to stay neutral in this debate. Within this large range of opinions, it is difficult to find general consensus, so that every body take care to not declare his proper opinion about the subject, the causes and the adequate solutions. Finally no changes take place in this issue. However, neither the government as responsible for the citizen's health, nor the health professionals and international organisations, are facing their complete obligations toward the populations by ensuring to them that the medicines are administered according to the health need of the patients, efficacious and safe , in doses that meet their own individual requirements, for an adequate period of time, and at the lower cost, and be secured against misuse by the pharmacist before the delivery to the patients. This is a worthwhile programme, but unfortunately without designate takers or promoters until now.

  17. Rational points on varieties

    CERN Document Server

    Poonen, Bjorn

    2017-01-01

    This book is motivated by the problem of determining the set of rational points on a variety, but its true goal is to equip readers with a broad range of tools essential for current research in algebraic geometry and number theory. The book is unconventional in that it provides concise accounts of many topics instead of a comprehensive account of just one-this is intentionally designed to bring readers up to speed rapidly. Among the topics included are Brauer groups, faithfully flat descent, algebraic groups, torsors, étale and fppf cohomology, the Weil conjectures, and the Brauer-Manin and descent obstructions. A final chapter applies all these to study the arithmetic of surfaces. The down-to-earth explanations and the over 100 exercises make the book suitable for use as a graduate-level textbook, but even experts will appreciate having a single source covering many aspects of geometry over an unrestricted ground field and containing some material that cannot be found elsewhere. The origins of arithmetic (o...

  18. Plural rationalities and risk

    International Nuclear Information System (INIS)

    James, P.; Thompson, M.

    1989-01-01

    Like many social scientists, we attribute public unwillingness to accept certain low probability risks not to 'irrationality' but rather to the everyday application of qualitative as well as quantitative criteria. Just as most people buying a video or hi-fi do not base their decision solely on price or performance data but also consider such intangibles as design and the reputation of the manufacturer, individuals faced with a given risk take into account not merely the probability of harm but also the credibility and trustworthiness of whoever generates the information and manages the safety and other precautions which ensure its accuracy. To analyse these qualitative dimensions we utilise the grid/-group methodology developed by the cultural anthropologist Mary Douglas, and her co-workers. Douglas identifies four basic forms of society and four associated 'thought worlds' which serve to legitimise and reproduce them. Differences in concepts of human cognition, time and many other variables between the different thought worlds are so profound that they can be regarded as different kinds of rationality. The acceptability of risks is partially determined by the extent to which they support or threaten the existence of the different societies. (author)

  19. Sharing knowledge

    Energy Technology Data Exchange (ETDEWEB)

    2009-07-01

    The workshop on Climate Change Impacts and Adaptation Strategies for Arctic Indigenous Communities is one stage in developing positions and providing input from the perspectives of Arctic Peoples in preparation for the Indigenous Peoples' Global Summit on Climate Change that will take place in April, 2009, in Anchorage, Alaska. The Summit, organized by the Inuit Circumpolar Council with oversight of an International Steering Committee, will bring together hundreds of indigenous Peoples around the world. This Workshop intended to bring together Arctic Indigenous Peoples to deliver and to share information, academic research, case studies based on traditional knowledge and researchers knowledgeable in traditional knowledge and/or policy issues drawn from traditional knowledge. The following themes were discussed: 1) Traditional knowledge research and education; 2) Laws and lawmaking; 3) Food and health; 4) Organisation; 5) Communications and advocacy. (ln)

  20. Discrete Choice and Rational Inattention

    DEFF Research Database (Denmark)

    Fosgerau, Mogens; Melo, Emerson; de Palma, André

    2017-01-01

    This paper establishes a general equivalence between discrete choice and rational inattention models. Matejka and McKay (2015, AER) showed that when information costs are modelled using the Shannon entropy, the result- ing choice probabilities in the rational inattention model take the multinomial...... logit form. We show that when information costs are modelled using a class of generalized entropies, then the choice probabilities in any rational inattention model are observationally equivalent to some additive random utility discrete choice model and vice versa. This equivalence arises from convex...

  1. Testing bounded rationality against full rationality in job changing behavior

    OpenAIRE

    Contini, Bruno; Morini, Matteo

    2007-01-01

    In this paper we question the hypothesis of full rationality in the context of job changing behaviour, via simple econometric explorations on microdata drawn from WHIP (Worker Histories Italian Panel). Workers' performance is compared at the end of a three-year time window that starts when choices are expressed, under the accepted notion that the main driving forces of job change are future real wages and expected job quality. Bounded rationality suggests that individuals will search for new ...

  2. Testing Bounded Rationality Against Full Rationality in Job Changing Behavior

    OpenAIRE

    Bruno Contini

    2008-01-01

    In this paper I question the hypothesis of full rationality in the context of job changing behaviour, via simple econometric explorations on microdata drawn from WHIP (Worker Histories Italian Panel). Workers’ performance is compared at the end of a three-year time window that starts when choices are expressed, under the accepted notion that the main driving forces of job change are future real wages and expected job quality. Bounded rationality suggests that individuals will search for new o...

  3. Shared decision making, paternalism and patient choice.

    Science.gov (United States)

    Sandman, Lars; Munthe, Christian

    2010-03-01

    In patient centred care, shared decision making is a central feature and widely referred to as a norm for patient centred medical consultation. However, it is far from clear how to distinguish SDM from standard models and ideals for medical decision making, such as paternalism and patient choice, and e.g., whether paternalism and patient choice can involve a greater degree of the sort of sharing involved in SDM and still retain their essential features. In the article, different versions of SDM are explored, versions compatible with paternalism and patient choice as well as versions that go beyond these traditional decision making models. Whenever SDM is discussed or introduced it is of importance to be clear over which of these different versions are being pursued, since they connect to basic values and ideals of health care in different ways. It is further argued that we have reason to pursue versions of SDM involving, what is called, a high level dynamics in medical decision-making. This leaves four alternative models to choose between depending on how we balance between the values of patient best interest, patient autonomy, and an effective decision in terms of patient compliance or adherence: Shared Rational Deliberative Patient Choice, Shared Rational Deliberative Paternalism, Shared Rational Deliberative Joint Decision, and Professionally Driven Best Interest Compromise. In relation to these models it is argued that we ideally should use the Shared Rational Deliberative Joint Decision model. However, when the patient and professional fail to reach consensus we will have reason to pursue the Professionally Driven Best Interest Compromise model since this will best harmonise between the different values at stake: patient best interest, patient autonomy, patient adherence and a continued care relationship.

  4. Type VI secretion system.

    Science.gov (United States)

    Salomon, Dor; Orth, Kim

    2015-03-30

    Bacteria employ a variety of tools to survive in a competitive environment. Salomon and Orth describe one such tool-the Type 6 Secretion Systems used by bacteria to deliver a variety of toxins into competing cells. Copyright © 2015 Elsevier Ltd. All rights reserved.

  5. Salivary Gland Secretion.

    Science.gov (United States)

    Dorman, H. L.; And Others

    1981-01-01

    Describes materials and procedures for an experiment utilizing a live dog to demonstrate: (1) physiology of the salivary gland; (2) parasympathetic control of the salivary gland; (3) influence of varying salivary flow rates on sodium and potassium ions, osmolarity and pH; and (4) salivary secretion as an active process. (DS)

  6. 'Secret' Shuttle payloads revealed

    Science.gov (United States)

    Powell, Joel W.

    1993-05-01

    A secret military payload carried by the orbiter Discovery launched on January 24 1985 is discussed. Secondary payloads on the military Shuttle flights are briefly reviewed. Most of the military middeck experiments were sponsored by the Space Test Program established at the Pentagon to oversee all Defense Department space research projects.

  7. Inappropriate Antidiuretic Hormone Secretion

    African Journals Online (AJOL)

    1974-06-08

    Jun 8, 1974 ... with Addison's disease, diarrhoea or salt-losing nephritis. (asymptomatic hyponatraemia).~ Schwartz et al.3 stud;ed two patients with anaplastic bronchus carcinoma and hyponatraemia in 1957, and they suggested that there was an inappropriate secretion of antidiuretic hormone (ADH). It is now well ...

  8. Physiology of bile secretion.

    Science.gov (United States)

    Esteller, Alejandro

    2008-10-07

    The formation of bile depends on the structural and functional integrity of the bile-secretory apparatus and its impairment, in different situations, results in the syndrome of cholestasis. The structural bases that permit bile secretion as well as various aspects related with its composition and flow rate in physiological conditions will first be reviewed. Canalicular bile is produced by polarized hepatocytes that hold transporters in their basolateral (sinusoidal) and apical (canalicular) plasma membrane. This review summarizes recent data on the molecular determinants of this primary bile formation. The major function of the biliary tree is modification of canalicular bile by secretory and reabsorptive processes in bile-duct epithelial cells (cholangiocytes) as bile passes through bile ducts. The mechanisms of fluid and solute transport in cholangiocytes will also be discussed. In contrast to hepatocytes where secretion is constant and poorly controlled, cholangiocyte secretion is regulated by hormones and nerves. A short section dedicated to these regulatory mechanisms of bile secretion has been included. The aim of this revision was to set the bases for other reviews in this series that will be devoted to specific issues related with biliary physiology and pathology.

  9. A Public Secret

    DEFF Research Database (Denmark)

    Bregnbæk, Susanne

    2011-01-01

    This article is based on anthropological fieldwork undertaken at two elite universities in Beijing. It addresses the paradoxical situation of the many instances of suicide among Chinese elite university students in Beijing, which constitute a public secret. The pressure of education weighs heavily...

  10. MONA Implementation Secrets

    DEFF Research Database (Denmark)

    Klarlund, Nils; Møller, Anders; Schwartzbach, Michael Ignatieff

    2002-01-01

    a period of six years. Compared to the first naive version, the present tool is faster by several orders of magnitude. This speedup is obtained from many different contributions working on all levels of the compilation and execution of formulas. We present a selection of implementation "secrets" that have...

  11. Rational reconstructions of modern physics

    CERN Document Server

    Mittelstaedt, Peter

    2013-01-01

    Newton’s classical physics and its underlying ontology are loaded with several metaphysical hypotheses that cannot be justified by rational reasoning nor by experimental evidence. Furthermore, it is well known that some of these hypotheses are not contained in the great theories of Modern Physics, such as the theory of Special Relativity and Quantum Mechanics. This book shows that, on the basis of Newton’s classical physics and by rational reconstruction, the theory of Special Relativity as well as Quantum Mechanics can be obtained by partly eliminating or attenuating the metaphysical hypotheses. Moreover, it is shown that these reconstructions do not require additional hypotheses or new experimental results. In the second edition the rational reconstructions are completed with respect to General Relativity and Cosmology. In addition, the statistics of quantum objects is elaborated in more detail with respect to the rational reconstruction of quantum mechanics. The new material completes the approach of t...

  12. Rational-Emotive Staff Development.

    Science.gov (United States)

    Forman, Susan G.; Forman, Bruce D.

    1980-01-01

    The application of Rational-Emotive Therapy principles and techniques in in-service education for school personnel is discussed. Teacher and counselor participation in a staff development program is described. (Author)

  13. Management between Rationality and Irrationality

    OpenAIRE

    Cene Bavec

    2012-01-01

    In the paper, we discuss theoretical and practical aspects of management and its rational and irrational behavior in the light of traditional management theories and contemporary social theories and theories of complexity. We exposed differences between middle and top management, where rationality is ascribed mainly to middle management, while top management often acts on seemingly irrational way. For the part of this irrationality, we cannot blame management because it originates from the na...

  14. Choice, internal consistency, and rationality

    OpenAIRE

    Aditi Bhattacharyya; Prasanta K. Pattanaik; Yongsheng Xu

    2010-01-01

    The classical theory of rational choice is built on several important internal consistency conditions. In recent years, the reasonableness of those internal consistency conditions has been questioned and criticized, and several responses to accommodate such criticisms have been proposed in the literature. This paper develops a general framework to accommodate the issues raised by the criticisms of classical rational choice theory, and examines the broad impact of these criticisms from both no...

  15. Interpolation of rational matrix functions

    CERN Document Server

    Ball, Joseph A; Rodman, Leiba

    1990-01-01

    This book aims to present the theory of interpolation for rational matrix functions as a recently matured independent mathematical subject with its own problems, methods and applications. The authors decided to start working on this book during the regional CBMS conference in Lincoln, Nebraska organized by F. Gilfeather and D. Larson. The principal lecturer, J. William Helton, presented ten lectures on operator and systems theory and the interplay between them. The conference was very stimulating and helped us to decide that the time was ripe for a book on interpolation for matrix valued functions (both rational and non-rational). When the work started and the first partial draft of the book was ready it became clear that the topic is vast and that the rational case by itself with its applications is already enough material for an interesting book. In the process of writing the book, methods for the rational case were developed and refined. As a result we are now able to present the rational case as an indepe...

  16. Wrapped up in Covers: Preschoolers' Secrets and Secret Hiding Places

    Science.gov (United States)

    Corson, Kimberly; Colwell, Malinda J.; Bell, Nancy J.; Trejos-Castillo, Elizabeth

    2014-01-01

    In this qualitative study, interviews about children's secret hiding places were conducted with 3-5-year-olds (n?=?17) in a university sponsored preschool programme using art narratives. Since prior studies indicate that children understand the concept of a secret as early as five and that they associate secrets with hiding places, the purpose of…

  17. MASY: Management of secret keys in federated wireless sensor networks

    OpenAIRE

    Maerien, Jef; Michiels, Sam; Huygens, Christophe; Joosen, Wouter

    2010-01-01

    Wireless Sensor Networks are becoming federated and mobile environments. These new capabilities pose a lot of new possibilities and challenges. One of these challenges is to create a secure environment to allow multiple trusted companies to share and merge their sensor network infrastructure. The most basic need for a secure environment is the deployment of key material. However, most current day research assumes pre-shared secrets between the sensor nodes of most, if not all, companies in a ...

  18. Love and rationality: on some possible rational effects of love

    Directory of Open Access Journals (Sweden)

    Gustavo Ortiz-Millán

    Full Text Available In this paper I defend the idea that rather than disrupting rationality, as the common-sense conception has done it, love may actually help us to develop rational ways of thinking and acting. I make the case for romantic or erotic love, since this is the kind of love that is more frequently associated with irrationality in acting and thinking. I argue that this kind of love may make us develop epistemic and practical forms of rationality. Based on an analysis of its characteristic action tendencies, I argue that love may help us to develop an instrumental form of rationality in determining the best means to achieve the object of love. It may also narrow down the number of practical considerations that may help us to achieve our goals. Finally, love may generate rational ways of belief-formation by framing the parameters taken into account in perception and attention, and by bringing into light only a small portion of the epistemic information available. Love may make us perceive reality more acutely.

  19. Extracellular secretion of recombinant proteins

    Science.gov (United States)

    Linger, Jeffrey G.; Darzins, Aldis

    2014-07-22

    Nucleic acids encoding secretion signals, expression vectors containing the nucleic acids, and host cells containing the expression vectors are disclosed. Also disclosed are polypeptides that contain the secretion signals and methods of producing polypeptides, including methods of directing the extracellular secretion of the polypeptides. Exemplary embodiments include cellulase proteins fused to secretion signals, methods to produce and isolate these polypeptides, and methods to degrade lignocellulosic biomass.

  20. Rational Decision Making as Performative Praxis: Explaining Rationality's Éternel Retour

    OpenAIRE

    Cabantous, L.; Gond, J-P.

    2011-01-01

    Organizational theorists built their knowledge of decision making through a progressive critique of rational choice theory. Their positioning towards rationality, however, is at odds with the observation of rationality persistence in organizational life. This paper addresses this paradox. It proposes a new perspective on rationality that allows the theorizing of the production of rational decisions by organizations. To account for rationality's éternel retour, we approach rational decision ma...

  1. Performance Analysis of Chaotic Encryption Using a Shared Image ...

    African Journals Online (AJOL)

    Most of the secret key encryption algorithms in use today are designed based on either the feistel structure or the substitution-permutation structure. This paper focuses on data encryption technique using multi-scroll chaotic natures and a publicly shared image as a key. A key is generated from the shared image using a full ...

  2. Pathophysiology of glucagon secretion

    International Nuclear Information System (INIS)

    Boettger, J.; Pabst, H.W.

    1980-01-01

    Pathophysiology of glucagon secretion is reviewed in brief separating hyperglucagonemic from hypoclucagonemic states. Many questions concerning the role of glucagon in diabetes mellitus and in other diseases are still unresolved. The clucagon RIA is of clinical significance in a few diseases like glucagonoma, which may present without symptoms of the 'glucagonoma syndrome', the probably very rare hyperglucagonemia and some of the spontaneous hypoglycemias. Glucagon secretion may be evaluated by the determination of fasting immunoreactive glucagon (IRG) and by appropriate function tests as stimulation with i.v. arginine and suppression with oral glucose. However, the glucagon RIA at present is not a routine method, although commercial kits are available. Many pitfalls of radioimmunological glucagon determination still exist. (orig.) [de

  3. Bucarest, Strictement Secret

    Directory of Open Access Journals (Sweden)

    Ionela Mihai

    2010-07-01

    Full Text Available L’émission Bucarest, strictement secret représente un documentaire organisésous la forme d’une série télé, qui dépeint le Bucarest à partir de deux perspectives: de l’histoire, de la conte et du lieu. La valeur d’une cité réside dans l’existence d’une mystique, d’un romantisme abscons, à part et des caractères empruntés de drames de Shakespeare, mystérieux, serrés d’angoisse et des secrets qui assombrissent leur existence. Par conséquence, le rôle du metteur en scène est de dévoiler leur vraie identité et de remettre en place, autant que possible, la vérité.

  4. Shared decision making

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/patientinstructions/000877.htm Shared decision making To use the sharing features on this page, ... treatment you both support. When to use Shared Decision Making Shared decision making is often used when you ...

  5. Bile Formation and Secretion

    Science.gov (United States)

    Boyer, James L.

    2014-01-01

    Bile is a unique and vital aqueous secretion of the liver that is formed by the hepatocyte and modified down stream by absorptive and secretory properties of the bile duct epithelium. Approximately 5% of bile consists of organic and inorganic solutes of considerable complexity. The bile-secretory unit consists of a canalicular network which is formed by the apical membrane of adjacent hepatocytes and sealed by tight junctions. The bile canaliculi (~1 μm in diameter) conduct the flow of bile countercurrent to the direction of portal blood flow and connect with the canal of Hering and bile ducts which progressively increase in diameter and complexity prior to the entry of bile into the gallbladder, common bile duct, and intestine. Canalicular bile secretion is determined by both bile salt-dependent and independent transport systems which are localized at the apical membrane of the hepatocyte and largely consist of a series of adenosine triphosphate-binding cassette transport proteins that function as export pumps for bile salts and other organic solutes. These transporters create osmotic gradients within the bile canalicular lumen that provide the driving force for movement of fluid into the lumen via aquaporins. Species vary with respect to the relative amounts of bile salt-dependent and independent canalicular flow and cholangiocyte secretion which is highly regulated by hormones, second messengers, and signal transduction pathways. Most determinants of bile secretion are now characterized at the molecular level in animal models and in man. Genetic mutations serve to illuminate many of their functions. PMID:23897680

  6. Rationing medical education | Walsh | African Health Sciences

    African Journals Online (AJOL)

    Even though some stakeholders in medical education might be taken aback at the prospect of rationing, the truth is that rationing has always occurred in one form or another in medical education and in healthcare more broadly. Different types of rationing exist in healthcare professional education. For example rationing may ...

  7. Lipids in airway secretions

    International Nuclear Information System (INIS)

    Bhaskar, K.R.; DeFeudis O'Sullivan, D.; Opaskar-Hincman, H.; Reid, L.M.

    1987-01-01

    Lipids form a significant portion of airway mucus yet they have not received the same attention that epithelial glycoproteins have. We have analysed, by thin layer chromatography, lipids present in airway mucus under 'normal' and hypersecretory (pathological) conditions.The 'normals' included (1) bronchial lavage obtained from healthy human volunteers and from dogs and (2) secretions produced ''in vitro'' by human (bronchial) and canine (tracheal) explants. Hypersecretory mucus samples included (1) lavage from dogs made bronchitic by exposure to SO 2 , (2) bronchial aspirates from acute and chronic tracheostomy patients, (3) sputum from patients with cystic fibrosis and chronic bronchitis and (4) postmortem secretions from patients who died from sudden infant death syndrome (SIDS) or from status asthmaticus. Cholesterol was found to be the predominant lipid in 'normal' mucus with lesser amounts of phospholipids. No glycolipids were detected. In the hypersecretory mucus, in addition to neutral and phospholipids, glycolipids were present in appreciable amounts, often the predominant species, suggesting that these may be useful as markers of disease. Radioactive precursors 14 C acetate and 14 C palmitate were incorporated into lipids secreted ''in vitro'' by canine tracheal explants indicating that they are synthesised by the airway. (author)

  8. Catechin secretion and phytotoxicity

    Science.gov (United States)

    Kaushik, Shail

    2010-01-01

    Research indicates that the invasiveness of Centaurea stoebe is attributed to the stronger allelopathic effects on the native North American species than on the related European species, which is one of the unquestionable aspects of the “novel weapons hypothesis (NWH).” Studies originating from controlled to field conditions have shown that C. stoebe utilizes its biochemical potential to exert its invasiveness. The roots of C. stoebe secrete a potent phytotoxin, catechin, which has a detrimental effect on the surrounding plant species. Although, studies on catechin secretion and phytotoxicity represent one of the most well studied systems describing negative plant-plant interactions, it has also sparked controversies lately due to its phytotoxicity dosages and secretion effluxes. Previous reports negate the phytotoxic and pro-oxidant nature of catechin.1–3 In our recent study we have shown that catechin is highly phytotoxic against Arabidopsis thaliana and Festuca idahoensis. We also show that (±) catechin applied to roots of A. thaliana induces reactive oxygen species (ROS) confirming the pro-oxidant nature of catechin. In addition, activation of signature cell death genes such as acd2 and cad1 post catechin treatment in A. thaliana ascertains the phytotoxic nature of catechin. PMID:21057643

  9. Insulin-like growth factor-1 is a negative modulator of glucagon secretion

    OpenAIRE

    Mancuso, Elettra; Mannino, Gaia C.; Fatta, Concetta Di; Fuoco, Anastasia; Spiga, Rosangela; Andreozzi, Francesco; Sesti, Giorgio

    2017-01-01

    Glucagon secretion involves a combination of paracrine, autocrine, hormonal, and autonomic neural mechanisms. Type 2 diabetes often presents impaired glucagon suppression by insulin and glucose. Insulin-like growth factor-I (IGF-1) has elevated homology with insulin, and regulates pancreatic ?-cells insulin secretion. Insulin and IGF-1 receptors share considerable structure homology and function. We hypothesized the existence of a mechanism linking the inhibition of ?-cells glucagon secretion...

  10. Strategy selection as rational metareasoning.

    Science.gov (United States)

    Lieder, Falk; Griffiths, Thomas L

    2017-11-01

    Many contemporary accounts of human reasoning assume that the mind is equipped with multiple heuristics that could be deployed to perform a given task. This raises the question of how the mind determines when to use which heuristic. To answer this question, we developed a rational model of strategy selection, based on the theory of rational metareasoning developed in the artificial intelligence literature. According to our model people learn to efficiently choose the strategy with the best cost-benefit tradeoff by learning a predictive model of each strategy's performance. We found that our model can provide a unifying explanation for classic findings from domains ranging from decision-making to arithmetic by capturing the variability of people's strategy choices, their dependence on task and context, and their development over time. Systematic model comparisons supported our theory, and 4 new experiments confirmed its distinctive predictions. Our findings suggest that people gradually learn to make increasingly more rational use of fallible heuristics. This perspective reconciles the 2 poles of the debate about human rationality by integrating heuristics and biases with learning and rationality. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  11. Dynamic secrets in communication security

    CERN Document Server

    Xiao, Sheng; Towsley, Donald

    2013-01-01

    Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. 'Dynamic Secrets in Communication Security' presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic

  12. DISTRIBUTED RC NETWORKS WITH RATIONAL TRANSFER FUNCTIONS,

    Science.gov (United States)

    A distributed RC circuit analogous to a continuously tapped transmission line can be made to have a rational short-circuit transfer admittance and...one rational shortcircuit driving-point admittance. A subcircuit of the same structure has a rational open circuit transfer impedance and one rational ...open circuit driving-point impedance. Hence, rational transfer functions may be obtained while considering either generator impedance or load

  13. Rational points on elliptic curves

    CERN Document Server

    Silverman, Joseph H

    2015-01-01

    The theory of elliptic curves involves a pleasing blend of algebra, geometry, analysis, and number theory. This book stresses this interplay as it develops the basic theory, thereby providing an opportunity for advanced undergraduates to appreciate the unity of modern mathematics. At the same time, every effort has been made to use only methods and results commonly included in the undergraduate curriculum. This accessibility, the informal writing style, and a wealth of exercises make Rational Points on Elliptic Curves an ideal introduction for students at all levels who are interested in learning about Diophantine equations and arithmetic geometry. Most concretely, an elliptic curve is the set of zeroes of a cubic polynomial in two variables. If the polynomial has rational coefficients, then one can ask for a description of those zeroes whose coordinates are either integers or rational numbers. It is this number theoretic question that is the main subject of this book. Topics covered include the geometry and ...

  14. Rationality in the Cryptographic Model

    DEFF Research Database (Denmark)

    Hubacek, Pavel

    This thesis presents results in the field of rational cryptography. In the first part we study the use of cryptographic protocols to avoid mediation and binding commitment when implementing game theoretic equilibrium concepts. First, we concentrate on the limits of cryptographic cheap talk...... to implement correlated equilibria of two-player strategic games in a sequentially rational way. We show that there exist two-player games for which no cryptographic protocol can implement the mediator in a sequentially rational way; that is, without introducing empty threats. In the context of computational...... with appealing economic applications. Our implementation puts forward a notion of cryptographically blinded games that exploits the power of encryption to selectively restrict the information available to players about sampled action profiles, such that these desirable equilibria can be stably achieved...

  15. From receptor balance to rational glucocorticoid therapy.

    Science.gov (United States)

    de Kloet, E Ron

    2014-08-01

    Corticosteroids secreted as end product of the hypothalamic-pituitary-adrenal axis act like a double-edged sword in the brain. The hormones coordinate appraisal processes and decision making during the initial phase of a stressful experience and promote subsequently cognitive performance underlying the management of stress adaptation. This action exerted by the steroids on the initiation and termination of the stress response is mediated by 2 related receptor systems: mineralocorticoid receptors (MRs) and glucocorticoid receptors (GRs). The receptor types are unevenly distributed but colocalized in abundance in neurons of the limbic brain to enable these complementary hormone actions. This contribution starts from a historical perspective with the observation that phasic occupancy of GR during ultradian rhythmicity is needed to maintain responsiveness to corticosteroids. Then, during stress, initially MR activation enhances excitability of limbic networks that are engaged in appraisal and emotion regulation. Next, the rising hormone concentration occupies GR, resulting in reallocation of energy to limbic-cortical circuits with a role in behavioral adaptation and memory storage. Upon MR:GR imbalance, dysregulation of the hypothalamic-pituitary-adrenal axis occurs, which can enhance an individual's vulnerability. Imbalance is characteristic for chronic stress experience and depression but also occurs during exposure to synthetic glucocorticoids. Hence, glucocorticoid psychopathology may develop in susceptible individuals because of suppression of ultradian/circadian rhythmicity and depletion of endogenous corticosterone from brain MR. This knowledge generated from testing the balance hypothesis can be translated to a rational glucocorticoid therapy.

  16. Equality versus equity bases pay systems and their effects on rational altruism motivation in teams: wicked masked altruism

    OpenAIRE

    Javier García Bernal; Marisa Ramírez Alesón

    2007-01-01

    This paper analyses the design of optimal incentives in teams both with and without rational altruism. The main contribution of the paper is to study the influence of the incentive function on the altruism parameter chosen by team members. We find that optimal incentive is independent of the presence of rational altruism. Secondly, we compare the welfare loss of equal sharing rules versus second best optimal sharing rules (based on equity). Finally, we distinguish between two sources of ratio...

  17. Rational choice in field archaelology

    Directory of Open Access Journals (Sweden)

    Cătălin Pavel

    2011-11-01

    Full Text Available In the present article I attempt to apply advances in the study of instrumental and epistemic rationality to field archaeology in order to gain insights into the ways archaeologists reason. The cognitive processes, particularly processes of decision making, that enable archaeologists to conduct the excavation in the trench have not been adequately studied so far. I take my cues from two different bodies of theory. I first inquire into the potential that rational choice theory (RCT may have in modeling archaeological behaviour, and I define subjective expected utility, which archaeologists attempt to maximize, in terms of knowledge acquisition and social gain. Following Elster’s criticism of RCT, I conclude that RCT’s standards for rational action do not correspond with those ostensibly used in field archaeology, but that instrumental rationality has a prominent role in the “archaeological experiment”. I further explore if models proposed as reaction to RCT may account for archaeological decision making. I focus on fast and frugal heuristics, and search for archaeological illustrations for some of the cognitive biases that are better documented in psychological literature. I document confirmation and congruence biases, the endowment effect, observer-expectancy bias, illusory correlation, clustering illusion, sunk cost bias, and anchoring, among others and I propose that some of these biases are used as cognitive tools by archaeologists at work and retain epistemic value. However, I find formal logic to be secondary in the development of archaeological reasoning, with default logic and defeasible logic being used instead. I emphasize scientific knowledge as an actively negotiated social product of human inquiry, and conclude that to describe rationality in field archaeology a bounded rationality model is the most promising avenue of investigation.

  18. Quantum state sharing against the controller's cheating

    Science.gov (United States)

    Shi, Run-hua; Zhong, Hong; Huang, Liu-sheng

    2013-08-01

    Most existing QSTS schemes are equivalent to the controlled teleportation, in which a designated agent (i.e., the recoverer) can recover the teleported state with the help of the controllers. However, the controller may attempt to cheat the recoverer during the phase of recovering the secret state. How can we detect this cheating? In this paper, we considered the problem of detecting the controller's cheating in Quantum State Sharing, and further proposed an effective Quantum State Sharing scheme against the controller's cheating. We cleverly use Quantum Secret Sharing, Multiple Quantum States Sharing and decoy-particle techniques. In our scheme, via a previously shared entanglement state Alice can teleport multiple arbitrary multi-qubit states to Bob with the help of Charlie. Furthermore, by the classical information shared previously, Alice and Bob can check whether there is any cheating of Charlie. In addition, our scheme only needs to perform Bell-state and single-particle measurements, and to apply C-NOT gate and other single-particle unitary operations. With the present techniques, it is feasible to implement these necessary measurements and operations.

  19. Rationalizing the Promotion of Non-Rational Behaviors in Organizations.

    Science.gov (United States)

    Smith, Peter A. C.; Sharma, Meenakshi

    2002-01-01

    Organizations must balance rational/technical efficiency and emotions. Action learning has been proven to be effective for developing emotional openness in the workplace. Facilitators of action learning should draw upon the disciplines of counseling, Gestalt, psychodynamics, and Eastern philosophies. (Contains 23 references.) (SK)

  20. Re-visions of rationality?

    Science.gov (United States)

    Newell, Ben R

    2005-01-01

    The appeal of simple algorithms that take account of both the constraints of human cognitive capacity and the structure of environments has been an enduring theme in cognitive science. A novel version of such a boundedly rational perspective views the mind as containing an 'adaptive toolbox' of specialized cognitive heuristics suited to different problems. Although intuitively appealing, when this version was proposed, empirical evidence for the use of such heuristics was scant. I argue that in the light of empirical studies carried out since then, it is time this 'vision of rationality' was revised. An alternative view based on integrative models rather than collections of heuristics is proposed.

  1. Mental health as rational autonomy.

    Science.gov (United States)

    Edwards, R B

    1981-08-01

    Rather than eliminate the terms "mental health and illness" because of the grave moral consequences of psychiatric labeling, conservative definitions are proposed and defended. Mental health is rational autonomy, and mental illness is the sustained loss of such. Key terms are explained, advantages are explored, and alternative concepts are criticized. The value and descriptive components of all such definitions are consciously acknowledged. Where rational autonomy is intact, mental hospitals and psychotherapists should not think of themselves as treating an illness. Instead, they are functioning as applied axiologists, moral educators, spiritual mentors, etc. They deal with what Szasz has called "personal, social, and ethical problems in living." But mental illness is real.

  2. Public policy, rationality and reason

    Directory of Open Access Journals (Sweden)

    Rodolfo Canto Sáenz

    2015-07-01

    Full Text Available This work suggests the incorporation of practical reason in the design, implementation and evaluation of public policies, alongside instrumental rationality. It takes two proposals that today point in this direction: Rawls distinction between reasonable (practical reason and rational (instrumental reason and what this author calls the CI Procedure (categorical imperative procedure and Habermas model of deliberative democracy. The main conclusion is that the analysis of public policies can not be limited to rather narrow limits of science, but requires the contribution of political and moral philosophy.

  3. Windows 8 secrets

    CERN Document Server

    Thurrott, Paul

    2012-01-01

    Tips, tricks, treats, and secrets revealed on Windows 8 Microsoft is introducing a major new release of its Windows operating system, Windows 8, and what better way to learn all its ins and outs than from two internationally recognized Windows experts and Microsoft insiders, authors Paul Thurrott and Rafael Rivera? They cut through the hype to get at useful information you'll not find anywhere else, including what role this new OS plays in a mobile and tablet world. Regardless of your level of knowledge, you'll discover little-known facts about how things work, what's new and different, and h

  4. Optimal public rationing and price response.

    Science.gov (United States)

    Grassi, Simona; Ma, Ching-To Albert

    2011-12-01

    We study optimal public health care rationing and private sector price responses. Consumers differ in their wealth and illness severity (defined as treatment cost). Due to a limited budget, some consumers must be rationed. Rationed consumers may purchase from a monopolistic private market. We consider two information regimes. In the first, the public supplier rations consumers according to their wealth information (means testing). In equilibrium, the public supplier must ration both rich and poor consumers. Rationing some poor consumers implements price reduction in the private market. In the second information regime, the public supplier rations consumers according to consumers' wealth and cost information. In equilibrium, consumers are allocated the good if and only if their costs are below a threshold (cost effectiveness). Rationing based on cost results in higher equilibrium consumer surplus than rationing based on wealth. Copyright © 2011 Elsevier B.V. All rights reserved.

  5. Teaching Rational Decision-Making.

    Science.gov (United States)

    Woolever, Roberts

    1978-01-01

    Presented is an outline of a college course, "Education in American Society," that focused on teaching students rational decision-making skills while examining current issues in American Education. The outline is followed by student comments, reactions, and evaluations of the course. (JMD)

  6. Rational Suicide among the Elderly.

    Science.gov (United States)

    Humphry, Derek

    1992-01-01

    Contends that old age, in and of itself, should never need to be a cause for self-destruction. Further argues that suicide and assisted suicide carried out in the face of terminal illness causing unbearable suffering should be ethically and legally acceptable. Outlines a perspective on rational suicide among the elderly. (Author/NB)

  7. On a CO2 ration

    International Nuclear Information System (INIS)

    De Wit, P.

    2003-01-01

    In 2 years all the large energy companies in the European Union will have a CO2 ration, including a system to trade a shortage or surplus of emission rights. A cost effective system to reduce emission, provided that the government does not auction the emission rights [nl

  8. On Counting the Rational Numbers

    Science.gov (United States)

    Almada, Carlos

    2010-01-01

    In this study, we show how to construct a function from the set N of natural numbers that explicitly counts the set Q[superscript +] of all positive rational numbers using a very intuitive approach. The function has the appeal of Cantor's function and it has the advantage that any high school student can understand the main idea at a glance…

  9. Personal Autonomy and Rational Suicide.

    Science.gov (United States)

    Webber, May A.; Shulman, Ernest

    That certain suicides (which can be designated as rational) ought not to be interfered with is closely tied to the notion of the "right to autonomy." Specifically it is because the individual in question has this right that interference is prohibited. A proper understanding of the right to autonomy, while essential to understanding why…

  10. Secrets of Retention

    Science.gov (United States)

    Poliniak, Susan

    2012-01-01

    Recruiting students is one thing, but keeping them in a chorus, orchestra, or band is another. Although a music director has no control over some variables, there is much that can be done to help students to stay. Several experts share their advice on retention. One expert said a teacher's own attitude and classroom strategies may be two of the…

  11. Dynamics of market structure driven by the degree of consumer’s rationality

    Science.gov (United States)

    Yanagita, Tatsuo; Onozaki, Tamotsu

    2010-03-01

    We study a simple model of market share dynamics with boundedly rational consumers and firms interacting with each other. As the number of consumers is large, we employ a statistical description to represent firms’ distribution of consumer share, which is characterized by a single parameter representing how rationally the mass of consumers pursue higher utility. As the boundedly rational firm does not know the shape of demand function it faces, it revises production and price so as to raise its profit with the aid of a simple reinforcement learning rule. Simulation results show that (1) three phases of market structure, i.e. the uniform share phase, the oligopolistic phase, and the monopolistic phase, appear depending upon how rational consumers are, and (2) in an oligopolistic phase, the market share distribution of firms follows Zipf’s law and the growth-rate distribution of firms follows Gibrat’s law, and (3) an oligopolistic phase is the best state of market in terms of consumers’ utility but brings the minimum profit to the firms because of severe competition based on the moderate rationality of consumers.

  12. RSA-Based Secret Handshakes

    OpenAIRE

    Vergnaud , Damien

    2006-01-01

    A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, Smetters, Staddon and Wong and, so far, all the schemes proposed are based on discrete log systems. This paper proposes three new secret handshake protocols secure against active impersonator and detector adversaries. Inspired by two RSA-based key agreement protocols introduced by Okamoto and Tanaka in 1989 and Gira...

  13. Salmonella-secreted Virulence Factors

    Energy Technology Data Exchange (ETDEWEB)

    Heffron, Fred; Niemann, George; Yoon, Hyunjin; Kidwai, Afshan S.; Brown, Roslyn N.; McDermott, Jason E.; Smith, Richard D.; Adkins, Joshua N.

    2011-05-01

    In this short review we discuss secreted virulence factors of Salmonella, which directly affect Salmonella interaction with its host. Salmonella secretes protein to subvert host defenses but also, as discussed, to reduce virulence thereby permitting the bacteria to persist longer and more successfully disperse. The type III secretion system (TTSS) is the best known and well studied of the mechanisms that enable secretion from the bacterial cytoplasm to the host cell cytoplasm. Other secretion systems include outer membrane vesicles, which are present in all Gram-negative bacteria examined to date, two-partner secretion, and type VI secretion will also be addressed. Excellent reviews of Salmonella secreted effectors have focused on themes such as actin rearrangements, vesicular trafficking, ubiquitination, and the activities of the virulence factors themselves. This short review is based on S. Typhimurium infection of mice because it is a model of typhoid like disease in humans. We have organized effectors in terms of events that happen during the infection cycle and how secreted effectors may be involved.

  14. Rationality, mental causation and social sciences

    Directory of Open Access Journals (Sweden)

    Mladenović Ivan

    2009-01-01

    Full Text Available The aim of this paper is to investigate the role of mental causation in the context of rational choice theory. The author defends psychological aspect of rational explanation against the challenge of contemporary reductive materialism.

  15. Rationality, mental causation and social sciences

    OpenAIRE

    Mladenović Ivan

    2009-01-01

    The aim of this paper is to investigate the role of mental causation in the context of rational choice theory. The author defends psychological aspect of rational explanation against the challenge of contemporary reductive materialism.

  16. Love and rationality: on some possible rational effects of love

    Directory of Open Access Journals (Sweden)

    Gustavo Ortiz-Millán

    2007-01-01

    Full Text Available In this paper I defend the idea that rather than disrupting rationality, as the common-sense conception has done it, love may actually help us to develop rational ways of thinking and acting. I make the case for romantic or erotic love, since this is the kind of love that is more frequently associated with irrationality in acting and thinking. I argue that this kind of love may make us develop epistemic and practical forms of rationality. Based on an analysis of its characteristic action tendencies, I argue that love may help us to develop an instrumental form of rationality in determining the best means to achieve the object of love. It may also narrow down the number of practical considerations that may help us to achieve our goals. Finally, love may generate rational ways of belief-formation by framing the parameters taken into account in perception and attention, and by bringing into light only a small portion of the epistemic information available. Love may make us perceive reality more acutely.Neste artigo defendo a idéia de que, em vez de perturbar a racionalidade, como a concepção do senso comum o faz, o amor pode, na verdade, ajudar-nos a desenvolver modos racionais de pensar e agir. Dou bons argumentos para o amor romântico ou erótico, uma vez que esse é o tipo de amor que é mais freqüentemente associado à irracionalidade no agir e no pensar. Argumento que esse tipo de amor pode fazer-nos desenvolver formas epistêmicas e práticas de racionalidade. Com base em uma análise de suas tendências características para a ação, argumento que o amor pode ajudar-nos a desenvolver uma forma instrumental de racionalidade para se determinar o melhor meio de atingir o objeto de amor. Ele também pode limitar o número de considerações práticas que podem ajudar-nos a atingir os nossos objetivos. Finalmente, o amor pode gerar modos racionais de formação de crenças ao estruturar os parâmetros considerados na percepção e na aten

  17. Psychology and the Rationality of Emotion.

    Science.gov (United States)

    Clore, Gerald L

    2011-04-01

    Questions addressed by recent psychological research on emotion include questions about how thought shapes emotion and how emotion, in turn, shapes thought. Research on emotion and cognition paints a somewhat different picture than that seen in traditional discussions of passion and reason. This article reviews several aspects of this research, concentrating specifically on three views of rationality: Rationality as Process, Rationality as Product, and Rationality as Outcome.

  18. Lessons from Learning to Have Rational Expectations

    OpenAIRE

    Lindh, Thomas

    1989-01-01

    This paper reviews a growing literature investigating how economic agents may learn rational expectations. Fully rational learning requires implausible initial information assumptions, therefore some form of bounded rationality has come into focus. Such learning models often converge to rational expectations equilibria within certain bounds. Convergence analysis has been much simplified by methods from adaptive control theory. Learning stability as a correspondence principle show some promise...

  19. Psychology and the Rationality of Emotion*

    OpenAIRE

    Clore, Gerald L.

    2011-01-01

    Questions addressed by recent psychological research on emotion include questions about how thought shapes emotion and how emotion, in turn, shapes thought. Research on emotion and cognition paints a somewhat different picture than that seen in traditional discussions of passion and reason. This article reviews several aspects of this research, concentrating specifically on three views of rationality: Rationality as Process, Rationality as Product, and Rationality as Outcome.

  20. Psychology and the Rationality of Emotion*

    Science.gov (United States)

    Clore, Gerald L.

    2014-01-01

    Questions addressed by recent psychological research on emotion include questions about how thought shapes emotion and how emotion, in turn, shapes thought. Research on emotion and cognition paints a somewhat different picture than that seen in traditional discussions of passion and reason. This article reviews several aspects of this research, concentrating specifically on three views of rationality: Rationality as Process, Rationality as Product, and Rationality as Outcome. PMID:25125770

  1. Rational use of diagnostic radiology

    International Nuclear Information System (INIS)

    Racoveanu, N.T.; Volodin, V.

    1992-01-01

    The escalating number of radiodiagnostic investigations has, as a consequence, an increase in medical irradiation of patients and of cost of radiological services. Radiologists in USA and UK have since early 1970 questioned the efficacy of various radiological investigations and produced substantial evidence that more rational approaches are necessary. WHO initiated, in 1977, a programme in this direction which has issued four technical reports which give practical recommendations on how to rationalize the use of radiological examinations. Three main directions are considered: (1) Abandonment of routine radiological examinations, as procedures with no clinical or epidemiologic significance and which represent a waste of resources and patient dose. (2) Patient selection for various radiological investigations based on clinical criteria (high, intermediate, low yield). Selected patients have an increased prevalence of the given disease and the predictive value of radiological investigation is much higher. (3) Use of diagnostic algorithms with higher cost/efficiency and risk/benefit ratios, improving the outcome of radiological examinations

  2. Electricity rationing and public response

    International Nuclear Information System (INIS)

    Souza, Leonardo Rocha; Soares, Lacir Jorge

    2007-01-01

    This paper studies the electricity load demand behavior during the 2001 rationing period, which was implemented because of the Brazilian energy crisis. The hourly data refers to a utility situated in the southeast of the country. We use the model proposed by Soares and Souza [Soares, L.J. and Souza, L.R. (2006), 'Forecasting electricity demand using generalized long memory', International Journal of Forecasting, 22, 17-28.], making use of generalized long memory to model the seasonal behavior of the load. The rationing period is shown to have imposed a structural break in the series, decreasing the load at about 20%. Even so, the forecast accuracy is decreased only marginally, and the forecasts rapidly readapt to the new situation. The structural break, as well as the forecast errors from this model, also permits verifying the public response to pieces of information released regarding the crisis. (Author)

  3. Rational maps, monopoles and skyrmions

    International Nuclear Information System (INIS)

    Houghton, C.J.; Manton, N.S.

    1998-01-01

    We discuss the similarities between BPS monopoles and skyrmions, and point to an underlying connection in terms of rational maps between Riemann spheres. This involves the introduction of a new ansatz for Skyrme fields. We use this to construct good approximations to several known skyrmions, including all the minimal energy configurations up to baryon number nine, and some new solutions such as a baryon number seventeen Skyrme field with the truncated icosahedron structure of a buckyball. The new approach is also used to understand the low-lying vibrational modes of skyrmions, which are required for quantization. Along the way we discover an interesting Morse function on the space of rational maps which may be of use in understanding the Sen forms on the monopole moduli spaces. (orig.)

  4. Bounded Rationality in Transposition Processes

    DEFF Research Database (Denmark)

    Vollaard, Hans; Martinsen, Dorte Sindbjerg

    2014-01-01

    Studies explaining the timeliness and correctness of the transposition of EU directives into national legislation have provided rather inconclusive findings. They do not offer a clear-cut prediction concerning the transposition of the patients’ rights directive, which is one of the first that con......Studies explaining the timeliness and correctness of the transposition of EU directives into national legislation have provided rather inconclusive findings. They do not offer a clear-cut prediction concerning the transposition of the patients’ rights directive, which is one of the first...... that concerns the organisation and financing of national healthcare systems. This article applies the perspective of bounded rationality to explain (irregularities in) the timely and correct transposition of EU directives. The cognitive and organisational constraints long posited by the bounded rationality...

  5. Rational approximations for tomographic reconstructions

    International Nuclear Information System (INIS)

    Reynolds, Matthew; Beylkin, Gregory; Monzón, Lucas

    2013-01-01

    We use optimal rational approximations of projection data collected in x-ray tomography to improve image resolution. Under the assumption that the object of interest is described by functions with jump discontinuities, for each projection we construct its rational approximation with a small (near optimal) number of terms for a given accuracy threshold. This allows us to augment the measured data, i.e., double the number of available samples in each projection or, equivalently, extend (double) the domain of their Fourier transform. We also develop a new, fast, polar coordinate Fourier domain algorithm which uses our nonlinear approximation of projection data in a natural way. Using augmented projections of the Shepp–Logan phantom, we provide a comparison between the new algorithm and the standard filtered back-projection algorithm. We demonstrate that the reconstructed image has improved resolution without additional artifacts near sharp transitions in the image. (paper)

  6. Guidelines for Rational Cancer Therapeutics

    Directory of Open Access Journals (Sweden)

    Byunghee Yoo

    2017-12-01

    Full Text Available Traditionally, cancer therapy has relied on surgery, radiation therapy, and chemotherapy. In recent years, these interventions have become increasingly replaced or complemented by more targeted approaches that are informed by a deeper understanding of the underlying biology. Still, the implementation of fully rational patient-specific drug design appears to be years away. Here, we present a vision of rational drug design for cancer that is defined by two major components: modularity and image guidance. We suggest that modularity can be achieved by combining a nanocarrier and an oligonucleotide component into the therapeutic. Image guidance can be incorporated into the nanocarrier component by labeling with a specific imaging reporter, such as a radionuclide or contrast agent for magnetic resonance imaging. While limited by the need for additional technological advancement in the areas of cancer biology, nanotechnology, and imaging, this vision for the future of cancer therapy can be used as a guide to future research endeavors.

  7. Rational Thinking in School-Based Practice

    Science.gov (United States)

    Clark, Mary Kristen; Flynn, Perry

    2011-01-01

    Purpose: We reflect on Alan Kamhi's (2011) prologue on balancing certainty and uncertainty as it pertains to school-based practice. Method: In schools, rational thinking depends on effective team processes, much like professional learning communities. We consider the conditions that are required for rational thinking and how rational team dialogue…

  8. Book Selection, Collection Development, and Bounded Rationality.

    Science.gov (United States)

    Schwartz, Charles A.

    1989-01-01

    Reviews previously proposed schemes of classical rationality in book selection, describes new approaches to rational choice behavior, and presents a model of book selection based on bounded rationality in a garbage can decision process. The role of tacit knowledge and symbolic content in the selection process are also discussed. (102 references)…

  9. RATGRAPH: Computer Graphing of Rational Functions.

    Science.gov (United States)

    Minch, Bradley A.

    1987-01-01

    Presents an easy-to-use Applesoft BASIC program that graphs rational functions and any asymptotes that the functions might have. Discusses the nature of rational functions, graphing them manually, employing a computer to graph rational functions, and describes how the program works. (TW)

  10. Rationality and the Logic of Good Reasons.

    Science.gov (United States)

    Fisher, Walter R.

    This paper contends that the rationality of the logic of good reasons is constituted in its use. To support this claim, the paper presents an analysis of the relationship between being reasonable and being rational. It then considers how following the logic of good reasons leads to rationality in the behavior of individuals and groups; the latter…

  11. Information Transmission and Rational Inattention

    OpenAIRE

    Antonella Tutino

    2015-01-01

    We study the problem of optimal communication strategy between a fully informed agent and a rationally inattentive agent. The fully informed agent observes a sequence of shocks and transmits a message to the limited-capacity agent who takes a set of actions in response to the message. The problem of the informed agent is to seek the optimal signaling strategy that induces a behavior consistent with minimal welfare loss, uniformly over a given class of bounded utility functions. We characteriz...

  12. Rational Asset Pricing Bubbles Revisited

    OpenAIRE

    Jan Werner

    2012-01-01

    Price bubble arises when the price of an asset exceeds the asset's fundamental value, that is, the present value of future dividend payments. The important result of Santos and Woodford (1997) says that price bubbles cannot exist in equilibrium in the standard dynamic asset pricing model with rational agents as long as assets are in strictly positive supply and the present value of total future resources is finite. This paper explores the possibility of asset price bubbles when either one of ...

  13. Kant on empiricism and rationalism

    OpenAIRE

    Vanzo, Alberto

    2013-01-01

    This paper aims to correct some widely held misconceptions concerning Kant's role in the formation of a widespread narrative of early modern philosophy. According to this narrative, which dominated the English-speaking world throughout the twentieth century, the early modern period was characterized by the development of two rival schools: René Descartes's, Baruch Spinoza's, and G. W. Leibniz's rationalism; and John Locke's, George Berkeley's, and David Hume's empiricism. Empiricists and rati...

  14. Robust Steganography Using LSB-XOR and Image Sharing

    OpenAIRE

    Adak, Chandranath

    2013-01-01

    Hiding and securing the secret digital information and data that are transmitted over the internet is of widespread and most challenging interest. This paper presents a new idea of robust steganography using bitwise-XOR operation between stego-key-image-pixel LSB (Least Significant Bit) value and secret message-character ASCII-binary value (or, secret image-pixel value). The stego-key-image is shared in dual-layer using odd-even position of each pixel to make the system robust. Due to image s...

  15. Rational approximation of vertical segments

    Science.gov (United States)

    Salazar Celis, Oliver; Cuyt, Annie; Verdonk, Brigitte

    2007-08-01

    In many applications, observations are prone to imprecise measurements. When constructing a model based on such data, an approximation rather than an interpolation approach is needed. Very often a least squares approximation is used. Here we follow a different approach. A natural way for dealing with uncertainty in the data is by means of an uncertainty interval. We assume that the uncertainty in the independent variables is negligible and that for each observation an uncertainty interval can be given which contains the (unknown) exact value. To approximate such data we look for functions which intersect all uncertainty intervals. In the past this problem has been studied for polynomials, or more generally for functions which are linear in the unknown coefficients. Here we study the problem for a particular class of functions which are nonlinear in the unknown coefficients, namely rational functions. We show how to reduce the problem to a quadratic programming problem with a strictly convex objective function, yielding a unique rational function which intersects all uncertainty intervals and satisfies some additional properties. Compared to rational least squares approximation which reduces to a nonlinear optimization problem where the objective function may have many local minima, this makes the new approach attractive.

  16. Application of homomorphism to secure image sharing

    Science.gov (United States)

    Islam, Naveed; Puech, William; Hayat, Khizar; Brouzet, Robert

    2011-09-01

    In this paper, we present a new approach for sharing images between l players by exploiting the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, i.e. RSA and Paillier. Contrary to the traditional schemes, the proposed approach employs secret sharing in a way that limits the influence of the dealer over the protocol and allows each player to participate with the help of his key-image. With the proposed approach, during the encryption step, each player encrypts his own key-image using the dealer's public key. The dealer encrypts the secret-to-be-shared image with the same public key and then, the l encrypted key-images plus the encrypted to-be shared image are multiplied homomorphically to get another encrypted image. After this step, the dealer can safely get a scrambled image which corresponds to the addition or multiplication of the l + 1 original images ( l key-images plus the secret image) because of the additive homomorphic property of the Paillier algorithm or multiplicative homomorphic property of the RSA algorithm. When the l players want to extract the secret image, they do not need to use keys and the dealer has no role. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own key-image with no specific order from the scrambled image. Thus, the proposed approach provides an opportunity to use operators like multiplication on encrypted images for the development of a secure privacy preserving protocol in the image domain. We show that it is still possible to extract a visible version of the secret image with only l-1 key-images (when one key-image is missing) or when the l key-images used for the extraction are different from the l original key-images due to a lossy compression for example. Experimental results and security analysis verify and prove that the proposed approach is secure from cryptographic viewpoint.

  17. Pheochromocytomas and secreting paragangliomas

    Directory of Open Access Journals (Sweden)

    Gimenez-Roqueplo Anne-Paule

    2006-12-01

    Full Text Available Abstract Catecholamine-producing tumors may arise in the adrenal medulla (pheochromocytomas or in extraadrenal chromaffin cells (secreting paragangliomas. Their prevalence is about 0.1% in patients with hypertension and 4% in patients with a fortuitously discovered adrenal mass. An increase in the production of catecholamines causes symptoms (mainly headaches, palpitations and excess sweating and signs (mainly hypertension, weight loss and diabetes reflecting the effects of epinephrine and norepinephrine on α- and β-adrenergic receptors. Catecholamine-producing tumors mimic paroxysmal conditions with hypertension and/or cardiac rhythm disorders, including panic attacks, in which sympathetic activation linked to anxiety reproduces the same signs and symptoms. These tumors may be sporadic or part of any of several genetic diseases: familial pheochromocytoma-paraganglioma syndromes, multiple endocrine neoplasia type 2, neurofibromatosis 1 and von Hippel-Lindau disease. Familial cases are diagnosed earlier and are more frequently bilateral and recurring than sporadic cases. The most specific and sensitive diagnostic test for the tumor is the determination of plasma or urinary metanephrines. The tumor can be located by computed tomography, magnetic resonance imaging and metaiodobenzylguanidine scintigraphy. Treatment requires resection of the tumor, generally by laparoscopic surgery. About 10% of tumors are malignant either at first operation or during follow-up, malignancy being diagnosed by the presence of lymph node, visceral or bone metastases. Recurrences and malignancy are more frequent in cases with large or extraadrenal tumors. Patients, especially those with familial or extraadrenal tumors, should be followed-up indefinitely.

  18. A Phytase-Based Reporter System for Identification of Functional Secretion Signals in Bifidobacteria.

    Directory of Open Access Journals (Sweden)

    Annika Osswald

    Full Text Available Health-promoting effects have been attributed to a number of Bifidobacterium sp. strains. These effects as well as the ability to colonise the host depend on secreted proteins. Moreover, rational design of protein secretion systems bears the potential for the generation of novel probiotic bifidobacteria with improved health-promoting or therapeutic properties. To date, there is only very limited data on secretion signals of bifidobacteria available. Using in silico analysis, we demonstrate that all bifidobacteria encode the major components of Sec-dependent secretion machineries but only B. longum strains harbour Tat protein translocation systems. A reporter plasmid for secretion signals in bifidobacteria was established by fusing the coding sequence of the signal peptide of a sialidase of Bifidobacterium bifidum S17 to the phytase gene appA of E. coli. The recombinant strain showed increased phytase activity in spent culture supernatants and reduced phytase levels in crude extracts compared to the control indicating efficient phytase secretion. The reporter plasmid was used to screen seven predicted signal peptides in B. bifidum S17 and B. longum E18. The tested signal peptides differed substantially in their efficacy to mediate protein secretion in different host strains. An efficient signal peptide was used for expression and secretion of a therapeutically relevant protein in B. bifidum S17. Expression of a secreted cytosine deaminase led to a 100-fold reduced sensitivity of B. bifidum S17 to 5-fluorocytosine compared to the non-secreted cytosine deaminase suggesting efficient conversion of 5-fluorocytosine to the cytotoxic cancer drug 5-fluorouracil by cytosine deaminase occurred outside the bacterial cell. Selection of appropriate signal peptides for defined protein secretion might improve therapeutic efficacy as well as probiotic properties of bifidobacteria.

  19. A Phytase-Based Reporter System for Identification of Functional Secretion Signals in Bifidobacteria

    Science.gov (United States)

    Osswald, Annika; Westermann, Christina; Sun, Zhongke; Riedel, Christian U.

    2015-01-01

    Health-promoting effects have been attributed to a number of Bifidobacterium sp. strains. These effects as well as the ability to colonise the host depend on secreted proteins. Moreover, rational design of protein secretion systems bears the potential for the generation of novel probiotic bifidobacteria with improved health-promoting or therapeutic properties. To date, there is only very limited data on secretion signals of bifidobacteria available. Using in silico analysis, we demonstrate that all bifidobacteria encode the major components of Sec-dependent secretion machineries but only B. longum strains harbour Tat protein translocation systems. A reporter plasmid for secretion signals in bifidobacteria was established by fusing the coding sequence of the signal peptide of a sialidase of Bifidobacterium bifidum S17 to the phytase gene appA of E. coli. The recombinant strain showed increased phytase activity in spent culture supernatants and reduced phytase levels in crude extracts compared to the control indicating efficient phytase secretion. The reporter plasmid was used to screen seven predicted signal peptides in B. bifidum S17 and B. longum E18. The tested signal peptides differed substantially in their efficacy to mediate protein secretion in different host strains. An efficient signal peptide was used for expression and secretion of a therapeutically relevant protein in B. bifidum S17. Expression of a secreted cytosine deaminase led to a 100-fold reduced sensitivity of B. bifidum S17 to 5-fluorocytosine compared to the non-secreted cytosine deaminase suggesting efficient conversion of 5-fluorocytosine to the cytotoxic cancer drug 5-fluorouracil by cytosine deaminase occurred outside the bacterial cell. Selection of appropriate signal peptides for defined protein secretion might improve therapeutic efficacy as well as probiotic properties of bifidobacteria. PMID:26086721

  20. The stand-alone test and decreasing serial cost sharing

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Thorlund-Petersen, Lars

    2000-01-01

    The rule of decreasing serial cost sharing defined in de Frutos [1] over the class of concave cost functions may violate the important stand-alone test. Sufficient conditions for the test to be satisfied are given, in terms of individual rationality as well as coalitional stability...

  1. The Secret of Future Victories

    Science.gov (United States)

    1992-02-01

    Copy S of 320 copies AD--A25 0 718 IDA PAPER P-265 3 THE SECRET OF FUTURE VICTORIES Paul F. Gormnan General, USA (Retired) DTIC 05M February 1992 NAY...TYPE AND DATES COVERED IFebruary 1992 Final--June 1991-January 1992 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS The Secret of Future Victories C -MDA...8 2N0-102 IDA PAPER P-2653 THE SECRET OF FUTURE VICTORIES Paul F. Gorman General. LUSA (Retired) February 1992 Approved for public release

  2. Coherent states and rational surfaces

    International Nuclear Information System (INIS)

    Brody, Dorje C; Graefe, Eva-Maria

    2010-01-01

    The state spaces of generalized coherent states associated with special unitary groups are shown to form rational curves and surfaces in the space of pure states. These curves and surfaces are generated by the various Veronese embeddings of the underlying state space into higher dimensional state spaces. This construction is applied to the parameterization of generalized coherent states, which is useful for practical calculations, and provides an elementary combinatorial approach to the geometry of the coherent state space. The results are extended to Hilbert spaces with indefinite inner products, leading to the introduction of a new kind of generalized coherent states.

  3. Shared decision-making and patient autonomy.

    Science.gov (United States)

    Sandman, Lars; Munthe, Christian

    2009-01-01

    In patient-centred care, shared decision-making is advocated as the preferred form of medical decision-making. Shared decision-making is supported with reference to patient autonomy without abandoning the patient or giving up the possibility of influencing how the patient is benefited. It is, however, not transparent how shared decision-making is related to autonomy and, in effect, what support autonomy can give shared decision-making. In the article, different forms of shared decision-making are analysed in relation to five different aspects of autonomy: (1) self-realisation; (2) preference satisfaction; (3) self-direction; (4) binary autonomy of the person; (5) gradual autonomy of the person. It is argued that both individually and jointly these aspects will support the models called shared rational deliberative patient choice and joint decision as the preferred versions from an autonomy perspective. Acknowledging that both of these models may fail, the professionally driven best interest compromise model is held out as a satisfactory second-best choice.

  4. Secrets of mlearning failures: confronting reality

    Directory of Open Access Journals (Sweden)

    Thomas Cochrane

    2012-08-01

    Full Text Available Having implemented and evaluated over 35 mlearning projects in a variety of contexts in higher education over the past 6 years the researcher is ready to share the untold secret: not all mlearning projects succeed! This article critiques three of the researcher's mlearning projects that can be classed as “failures” and compares them to successful projects to draw out critical implications for mlearning project design and implementation to avoid common pitfalls leading to potential project failure. This article uses the researcher's six critical success factors identified across the 35 mlearning projects to evaluate these three projects, and concludes that projects resulting in “no significant difference” in pedagogical outcomes are the result of attempts to shoehorn old pedagogies into new technologies. Lecturer professional development and sustained collaborative support are critical to fostering new pedagogies utilising the unique affordances of mobile devices.

  5. Using Bar Representations as a Model for Connecting Concepts of Rational Number.

    Science.gov (United States)

    Middleton, James A.; van den Heuvel-Panhuizen, Marja; Shew, Julia A.

    1998-01-01

    Examines bar models as graphical representations of rational numbers and presents related real life problems. Concludes that, through pairing the fraction bars with ratio tables and other ways of teaching numbers, numeric strategies become connected with visual strategies that allow students with diverse ways of thinking to share their…

  6. A Comparison of Rational Emotive Therapy and Tibetan Buddhism: Albert Ellis and the Dalai Lama

    Science.gov (United States)

    Holt, Susan A; Austad, Carol Shaw

    2013-01-01

    This article explores conceptual and methodological similarities between Rational Emotive Behavior Therapy (REBT) and Tibetan Buddhism (TB). The authors examine some of the values and concepts they share. They compare the two systems on a number of issues: philosophical underpinnings, concepts of what causes human psychopathology, techniques to…

  7. An Outreach Program in Drug Education; Teaching a Rational Approach to Drug Use

    Science.gov (United States)

    Sorensen, James L.; Joffe, Stephen J.

    1975-01-01

    Aimed at encouraging rational decision making about drug use, a peer oriented drug education program was conducted in a community youth project. Youth and leaders shared feelings and knowledge about drugs. Compared with four program dropouts, six participants exhibited more positive attitudes toward the drug group, its leaders and themselves.…

  8. Secrets and disclosure in donor conception.

    Science.gov (United States)

    Frith, Lucy; Blyth, Eric; Crawshaw, Marilyn; van den Akker, Olga

    2018-01-01

    This article considers the disclosure, sharing and exchange of information on being donor conceived within families, drawing on data from a study undertaken with donor-conceived adults registered with UK Donor Link (a voluntary DNA-linking register). This paper considers the narratives of how respondents found out they were donor-conceived and what events triggered disclosure of this information. This paper then goes on to examine the role secrecy played in their family life and uses the concept of 'display' to explore how secrecy affected their relationships with their immediate and extended family. Secrets are notoriously 'leaky' and we found complex patterns of knowing and uncertainty about whom in the family knew that the person was donor-conceived. We argue that what is kept secret and from whom provides insights into the multifaceted web of social relationships that can be created by donor-conception, and how knowledge can be managed and controlled in attempts to display and maintain family narratives of biogenetic connection. © 2017 Foundation for the Sociology of Health & Illness.

  9. Grade Expectations: Rationality and Overconfidence

    Science.gov (United States)

    Magnus, Jan R.; Peresetsky, Anatoly A.

    2018-01-01

    Confidence and overconfidence are essential aspects of human nature, but measuring (over)confidence is not easy. Our approach is to consider students' forecasts of their exam grades. Part of a student's grade expectation is based on the student's previous academic achievements; what remains can be interpreted as (over)confidence. Our results are based on a sample of about 500 second-year undergraduate students enrolled in a statistics course in Moscow. The course contains three exams and each student produces a forecast for each of the three exams. Our models allow us to estimate overconfidence quantitatively. Using these models we find that students' expectations are not rational and that most students are overconfident, in agreement with the general literature. Less obvious is that overconfidence helps: given the same academic achievement students with larger confidence obtain higher exam grades. Female students are less overconfident than male students, their forecasts are more rational, and they are also faster learners in the sense that they adjust their expectations more rapidly. PMID:29375449

  10. Reappraisal of Rational Choice Theory

    Directory of Open Access Journals (Sweden)

    Katalin Martinas

    2013-01-01

    Full Text Available The value of rational choice theory (RCT for the social sciences has long been contested. Much time has been spent by economists and critics on the pervasive but elusive concept of rationality. The critiques mainly challenge the basis of the utility theorem. Several articles on the misuse of mathematics in economics have already appeared in the literature. As N. Bouleau stated, “On several occasions, however, one feels that the criticism is that the math is being misused and should be developed in some other direction (e.g. a statistical analysis of the financial tendencies that polarize wealth and income, or a study of the positive feedback mechanisms, etc.. This leaves certain dissatisfaction – on a philosophical level.” The aim of this paper is to present a decision theory, yields intention (logos and valuation (existence. Here we present a new mathematical representation of RCT, which leads to a dynamic economic theory. We discuss the philosophical or meta-economical problems, which are needed for the successful applications of mathematics.

  11. Grade Expectations: Rationality and Overconfidence

    Directory of Open Access Journals (Sweden)

    Jan R. Magnus

    2018-01-01

    Full Text Available Confidence and overconfidence are essential aspects of human nature, but measuring (overconfidence is not easy. Our approach is to consider students' forecasts of their exam grades. Part of a student's grade expectation is based on the student's previous academic achievements; what remains can be interpreted as (overconfidence. Our results are based on a sample of about 500 second-year undergraduate students enrolled in a statistics course in Moscow. The course contains three exams and each student produces a forecast for each of the three exams. Our models allow us to estimate overconfidence quantitatively. Using these models we find that students' expectations are not rational and that most students are overconfident, in agreement with the general literature. Less obvious is that overconfidence helps: given the same academic achievement students with larger confidence obtain higher exam grades. Female students are less overconfident than male students, their forecasts are more rational, and they are also faster learners in the sense that they adjust their expectations more rapidly.

  12. Rethinking the Sharing Economy

    DEFF Research Database (Denmark)

    Kornberger, Martin; Leixnering, Stephan; Meyer, Renate

    2017-01-01

    Our paper focuses on a non-standard sharing example that harbors the potential to disrupt received wisdom on the sharing economy. While originally entering the field to analyze, broadly from a governance perspective, how the 2015 refugee crisis was handled in Vienna, Austria, we found that the no...... of sharing: economic and moral. Our paper contributes to this Special Issue of the Academy of Management Discoveries by highlighting and explaining the two-fold economic and moral nature of sharing and the organization of sharing between movement and platform....... sharing of resources (i.e., the economic dimension): the sharing of a distinct concern (i.e., the moral dimension of sharing). Our discovery exemplifies such a moral dimension that is rather different from the status quo materialistic treatments focusing on economic transactions and property rights...

  13. Job Sharing in Education.

    Science.gov (United States)

    Davidson, Wilma; Kline, Susan

    1979-01-01

    The author presents the advantages of job sharing for all school personnel, saying that education is particularly adaptable to this new form of employment. Current job sharing programs in Massachusetts, California, and New Jersey schools are briefly discussed. (SJL)

  14. Production sharing agreements

    International Nuclear Information System (INIS)

    1994-01-01

    This paper, which was presented at the Production Sharing Agreement seminar, discusses economic rent, negotiations, trends in fiscal system development, and concessionary systems. Production sharing contracts, risk service contracts, joint ventures and the global market are examined. (UK)

  15. Melioration as rational choice: sequential decision making in uncertain environments.

    Science.gov (United States)

    Sims, Chris R; Neth, Hansjörg; Jacobs, Robert A; Gray, Wayne D

    2013-01-01

    Melioration-defined as choosing a lesser, local gain over a greater longer term gain-is a behavioral tendency that people and pigeons share. As such, the empirical occurrence of meliorating behavior has frequently been interpreted as evidence that the mechanisms of human choice violate the norms of economic rationality. In some environments, the relationship between actions and outcomes is known. In this case, the rationality of choice behavior can be evaluated in terms of how successfully it maximizes utility given knowledge of the environmental contingencies. In most complex environments, however, the relationship between actions and future outcomes is uncertain and must be learned from experience. When the difficulty of this learning challenge is taken into account, it is not evident that melioration represents suboptimal choice behavior. In the present article, we examine human performance in a sequential decision-making experiment that is known to induce meliorating behavior. In keeping with previous results using this paradigm, we find that the majority of participants in the experiment fail to adopt the optimal decision strategy and instead demonstrate a significant bias toward melioration. To explore the origins of this behavior, we develop a rational analysis (Anderson, 1990) of the learning problem facing individuals in uncertain decision environments. Our analysis demonstrates that an unbiased learner would adopt melioration as the optimal response strategy for maximizing long-term gain. We suggest that many documented cases of melioration can be reinterpreted not as irrational choice but rather as globally optimal choice under uncertainty.

  16. Job Sharing in Geography.

    Science.gov (United States)

    Kay, Jeanne

    1982-01-01

    Job sharing is an employment alternative in which two qualified individuals manage the responsibilities of a single position. Discusses the barriers to and the potential, advantages, disadvantages, pitfalls, and challenges of job sharing. Focuses on job sharing in the geography profession. (Author/JN)

  17. The Sharing Economy

    OpenAIRE

    Reinhold, Stephan; Dolnicar, Sara

    2017-01-01

    Peer-to-peer accommodation networks in general, and Airbnb in specific, are frequently referred to as part of the sharing economy. This chapter provides an overview of key characteristics of the sharing economy, discusses how these characteristics relate to peer-to-peer accommodation, and positions peer-to-peer accommodation networks within the sharing economy.

  18. Satisfaction and 'comparison sharing'

    DEFF Research Database (Denmark)

    Amilon, Anna

    2009-01-01

    the probability of satisfaction. Results show that comparison sharing impacts satisfaction for women, and that those women who share more equally than their peers are more likely to be satisfied, whereas comparison sharing has no influence on satisfaction for men. Also, parents are less likely to be satisfied...

  19. Simplifications of rational matrices by using UML

    OpenAIRE

    Tasić, Milan B.; Stanimirović, Ivan P.

    2013-01-01

    The simplification process on rational matrices consists of simplifying each entry represented by a rational function. We follow the classic approach of dividing the numerator and denominator polynomials by their common GCD polynomial, and provide the activity diagram in UML for this process. A rational matrix representation as the quotient of a polynomial matrix and a polynomial is also discussed here and illustrated via activity diagrams. Also, a class diagram giving the links between the c...

  20. Freedom and Rationality : Rousseau on Citizenship

    OpenAIRE

    Salvat, Christophe

    2008-01-01

    This paper deals with Rousseau's idea of freedom in terms of rationality and deliberation. It gives support to Berlin's interpretation of the general will as a rational and objective will but dismisses the idea that Rousseau's theory necessarily leads to authoritarianism. The general will, publicly expressed by the law, may be defined as the rational and self-regarding will agents would have if put in an independent and objective state, i.e. the state of nature. The general and the particular...

  1. Geometric Rationalization for Freeform Architecture

    KAUST Repository

    Jiang, Caigui

    2016-06-20

    The emergence of freeform architecture provides interesting geometric challenges with regards to the design and manufacturing of large-scale structures. To design these architectural structures, we have to consider two types of constraints. First, aesthetic constraints are important because the buildings have to be visually impressive. Sec- ond, functional constraints are important for the performance of a building and its e cient construction. This thesis contributes to the area of architectural geometry. Specifically, we are interested in the geometric rationalization of freeform architec- ture with the goal of combining aesthetic and functional constraints and construction requirements. Aesthetic requirements typically come from designers and architects. To obtain visually pleasing structures, they favor smoothness of the building shape, but also smoothness of the visible patterns on the surface. Functional requirements typically come from the engineers involved in the construction process. For exam- ple, covering freeform structures using planar panels is much cheaper than using non-planar ones. Further, constructed buildings have to be stable and should not collapse. In this thesis, we explore the geometric rationalization of freeform archi- tecture using four specific example problems inspired by real life applications. We achieve our results by developing optimization algorithms and a theoretical study of the underlying geometrical structure of the problems. The four example problems are the following: (1) The design of shading and lighting systems which are torsion-free structures with planar beams based on quad meshes. They satisfy the functionality requirements of preventing light from going inside a building as shad- ing systems or reflecting light into a building as lighting systems. (2) The Design of freeform honeycomb structures that are constructed based on hex-dominant meshes with a planar beam mounted along each edge. The beams intersect without

  2. Rational Drug Use of Nurses

    Directory of Open Access Journals (Sweden)

    Mehtap Sahingoz

    2013-02-01

    Full Text Available ABSTRACT Objective: At this study to be aimed to assess status of the knowledge of nurses who working in public and private health institutions in Sivas province use of medication fort he treatment during their illnesses and patients and the attitudes of rational drug application. Matherials and methods: the researc planned to attend 750 nurses but it has been completed with participation of 641 nurses (Reaching rate 85,5%. This is a descriptive and cross-sectional study. in the study data were collected with a questionaire, percentages stated and chi square test was used for analysis. Results: %95,3 of nurses were females and mean age of them 29.21±4.85 years. The rate of contacting a doktor in case of illness is higher in 39.1% of nurses in the 21-30 age group and 48.6% of nurses working in primary care institutions. The level of self-treating is higher in 45.5 % of nurses working less than a year in profession .In the case of illness, 53% of nurses stated that they had left the medicine when signs of disease over. %98.8 of nurses expressed that they know effects of drugs used and 99.1% of them stated they know the side effects of drugs used. The entire group of postgraduate education status stated that they have not received the drug recommended by others. The level of suggesting a drug to someone else fort he same disease is higher in 65.8% of the group 31 years and older and group working over 40 hours per week. It were determined that used in consultation with the physician 65.2% of nurses antibiotics, 87.5% of them weiht loss drug and 82.7% of them contraceptive . 99.5% of the nurses have expressed that they inform to patients about use of their medications. Among the issues that expressed informations took place the application form of drugs (51.0 %and information of need to consult one if deemed one unexpected effect (59.6% . Also has been identified that of nurses acquired inform about drugs from drug book (vademecum (87.5 % and they

  3. Rational Choice and the Framing of Decisions.

    Science.gov (United States)

    1986-05-29

    survival in a competitive environment , and a minority of rational individuals can sometimes impose rationality on the whole market. Third, the...intuitive appeal of the axioms of rational choice makes it plausible that the theory derived from these axioms should provide an acceptable account of choice...rn-use U? RATIONAL CHOICE AMD THE FINNING OF KCISIOUS(U mi/ STANFORD UNIV CR A TYERSEY ET AL. 29 NAYN4-S4-K-S61SWICLASS IF lED FO 5/10S IL EEEEEEEE

  4. Rationality in Machiavelli and in Kant

    Directory of Open Access Journals (Sweden)

    Vadim Chaly

    2016-11-01

    Full Text Available The paper contains interpretation and comparative analysis of Machiavelli’s and Kant’s conceptions on rationality as two prime examples of “realist” and “idealist” modes of agency. Kantian model of rationality is viewed as an augmentation of the Machiavellian one, not an opposition to it. To elaborate the point, Robert Aumann’s model of act-rationality and rulerationality is applied to the two philosophical models. Kantian practical reason is interpreted as an addition to Aumann’s instrumental rationality, providing rules for rules, or “rule-rule-rationality”.

  5. Rational use of diagnostic radiology

    International Nuclear Information System (INIS)

    Racoveanu, N.T.; Volodin, V.

    1992-01-01

    Radiologists in USA and UK have since early 1970 questioned the efficacy of various radiological investigations and produced substantial evidence that more rational approaches are necessary. WHO initiated, in 1977, a programme which has issued four technical reports giving practical recommendations on how to rationalise the use of radiological examinations. Three main directions are considered: (1) Abandonment of routine radiological examinations, as procedures with no clinical or epidemiologic significance and which represent a waste of resources and patient dose. (2) Patient selection for various radiological investigations based on clinical criteria (high, intermediate, low yield). Selected patients have an increased prevalence of the given disease and the predictive value of radiological investigation is much higher. (3) Use of diagnostic algorithms with higher cost/efficiency and risk/benefit ratios, improving the outcome of radiological examinations. (author)

  6. RATIONAL PHARMACOTHERAPY IN TAKOTSUBO CARDIOMYOPATHY

    Directory of Open Access Journals (Sweden)

    S. Marchev

    2012-01-01

    Full Text Available Rational pharmacotherapy in Takotsubo cardiomyopathy is based on clinical picture and data of functional and laboratory investigations of concrete patient. In patients with hypotension and moderate-to-severe left ventricle outflow tract obstruction inotropic agents must not to be used because they can worsen the degree of obstruction. In these patients beta blockers can improve hemodynamics by causing resolution of the obstruction. If intraventricular thrombus is detected, anticoagulation for at least 3 months is recommended. The duration of anticoagulant therapy may be modified depending on the extent of cardiac function recovery and thrombus resolution. For patients without thrombus but with severe left ventricular dysfunction, anticoagulation is recommended until the akinesis or dyskinesis has resolved but not more than 3 months.

  7. Max Weber's Types of Rationality: Cornerstones for the Analysis of Rationalization Processes in History.

    Science.gov (United States)

    Kalberg, Stephen

    1980-01-01

    Explores rationality in Max Weber's works and identifies four types of rationality which play major roles in his writing--practical, theoretical, substantive, and formal. Implications for society and education are discussed. (DB)

  8. Inaugurating Rationalization: Three Field Studies Find Increased Rationalization When Anticipated Realities Become Current.

    Science.gov (United States)

    Laurin, Kristin

    2018-04-01

    People will often rationalize the status quo, reconstruing it in an exaggeratedly positive light. They will even rationalize the status quo they anticipate, emphasizing the upsides and minimizing the downsides of sociopolitical realities they expect to take effect. Drawing on recent findings on the psychological triggers of rationalization, I present results from three field studies, one of which was preregistered, testing the hypothesis that an anticipated reality becoming current triggers an observable boost in people's rationalizations. San Franciscans rationalized a ban on plastic water bottles, Ontarians rationalized a targeted smoking ban, and Americans rationalized the presidency of Donald Trump, more in the days immediately after these realities became current compared with the days immediately before. Additional findings show evidence for a mechanism underlying these behaviors and rule out alternative accounts. These findings carry implications for scholarship on rationalization, for understanding protest behavior, and for policymakers.

  9. Sharing family and household:

    DEFF Research Database (Denmark)

    Winther, Ida Wentzel

    Keynote: Family relationships are normatively assumed to be characterized by ‘sharing’, such as living together in the same home, occupying the same place, sharing stuff, blood and biology, spending special and ordinary time together, and consequently creating shared biographical experiences....... In that way, families are thrown into togetherness. At the same time, we see families in varying forms where 'sharing' is lived and contested differently. In Denmark, many children live in nuclear families, and many live in different variations of more than one household. For those who share household...... and family, 'sharing' will be a basic condition. No matter what, they should share life circumstances, more stories, more places and spaces, more households families with both kin and non-kin. This keynote addresses the particular of children’s experiences of living apart and/or living together in sharing...

  10. Global health governance as shared health governance.

    Science.gov (United States)

    Ruger, Jennifer Prah

    2012-07-01

    With the exception of key 'proven successes' in global health, the current regime of global health governance can be understood as transnational and national actors pursuing their own interests under a rational actor model of international cooperation, which fails to provide sufficient justification for an obligation to assist in meeting the health needs of others. An ethical commitment to providing all with the ability to be healthy is required. This article develops select components of an alternative model of shared health governance (SHG), which aims to provide a 'road map,' 'focal points' and 'the glue' among various global health actors to better effectuate cooperation on universal ethical principles for an alternative global health equilibrium. Key features of SHG include public moral norms as shared authoritative standards; ethical commitments, shared goals and role allocation; shared sovereignty and constitutional commitments; legitimacy and accountability; country-level attention to international health relations. A framework of social agreement based on 'overlapping consensus' is contrasted against one based on self-interested political bargaining. A global health constitution delineating duties and obligations of global health actors and a global institute of health and medicine for holding actors responsible are proposed. Indicators for empirical assessment of select SHG principles are described. Global health actors, including states, must work together to correct and avert global health injustices through a framework of SHG based on shared ethical commitments.

  11. Is It Rational to Assume that Infants Imitate Rationally? A Theoretical Analysis and Critique

    Science.gov (United States)

    Paulus, Markus

    2012-01-01

    It has been suggested that preverbal infants evaluate the efficiency of others' actions (by applying a "principle of rational action") and that they imitate others' actions rationally. The present contribution presents a conceptual analysis of the claim that preverbal infants imitate rationally. It shows that this ability rests on at least three…

  12. Rationing in health systems: A critical review.

    Science.gov (United States)

    Keliddar, Iman; Mosadeghrad, Ali Mohammad; Jafari-Sirizi, Mehdi

    2017-01-01

    Background: It is difficult to provide health care services to all those in need of such services due to limited resources and unlimited demands. Thus, priority setting and rationing have to be applied. This study aimed at critically examining the concept of rationing in health sector and identifying its purposes, influencing factors, mechanisms, and outcomes. Methods: The critical interpretive synthesis methodology was used in this study. PubMed, Cochrane, and Proquest databases were searched using the related key words to find related documents published between 1970 and 2015. In total, 161 published reports were reviewed and included in the study. Thematic content analysis was applied for data analysis. Results: Health services rationing means restricting the access of some people to useful or potentially useful health services due to budgetary limitation. The inherent features of the health market and health services, limited resources, and unlimited needs necessitate health services rationing. Rationing can be applied in 4 levels: health care policy- makers, health care managers, health care providers, and patients. Health care rationing can be accomplished through fixed budget, benefit package, payment mechanisms, queuing, copayments, and deductibles. Conclusion: This paper enriched our understanding of health services rationing and its mechanisms at various levels and contributed to the literature by broadly conceptualizing health services rationing.

  13. Fiber sources for complete calf starter rations.

    Science.gov (United States)

    Murdock, F R; Wallenius, R W

    1980-11-01

    Complete calf starter rations containing either 1) alfalfa hay, 2) cottonseed hulls, or 3) alfalfa-beet pulp as sources of fiber were fed to Holstein heifer calves at two locations on a limited milk program from 3 days to 12 wk of age. Rations were isonitrogenous and similar in content of crude fiber and acid detergent fiber. Although growth and development were normal on all rations, calves fed the cottonseed hull ration consumed more starter and gained more body weight than calves fed the other sources of fiber. The similarity of feed efficiencies, rumen pH, and molar ratios of volatile fatty acids between rations indicated no appreciable differences in rumen development or function. The growth response of calves fed the cottonseed hull ration appeared to be a result of better ration acceptability for which no reason was evident. Calves raised at Puyallup gained more body weight than calves at Pullman, and these gains were made more efficiently. These location effects may be related to seasonal differences and greater demands for production of body heat. Although the incidence of scours was less for calves fed alfalfa hay starter, the incidence and severity of bloat were higher for that ration.

  14. The Problem of Rational Moral Enlistment

    Science.gov (United States)

    Tillson, John

    2017-01-01

    How can one bring children to recognize the requirements of morality without resorting only to non-rational means of persuasion (i.e. what rational ground can be offered to children for their moral enlistment)? Michael Hand has recently defended a foundationalist approach to answering this question and John White has responded by (a) criticizing…

  15. Neurophysiology and Rationality in Political Thinking.

    Science.gov (United States)

    Peterson, Steven A.

    Research both in cognitive psychology and psychobiology suggests that political behavior is often less rational than individuals believe it to be. Information processing, memory, and decision making are interlinked processes. Studies in cognitive psychology reveal that even though decision making requires rationality, individuals often adopt…

  16. Privacy-Enhancing Auctions Using Rational Cryptography

    DEFF Research Database (Denmark)

    Miltersen, Peter Bro; Nielsen, Jesper Buus; Triandopoulos, Nikolaos

    2009-01-01

    show how to use rational cryptography to approximately implement any given ex interim individually strictly rational equilibrium of such an auction without a trusted mediator through a cryptographic protocol that uses only point-to-point authenticated channels between the players. By “ex interim...

  17. The Role of Rationality in University Budgeting.

    Science.gov (United States)

    Chaffee, Ellen Earle

    1983-01-01

    Although empirical accounts of organizational decision making often show that the process is not a rational one, a study of budgeting at Stanford University during the 1970s, while not conclusive or comprehensive, supported the claim that the institution's process was rational and provided a procedure for testing a decision-making model. (MSE)

  18. Should Teachers Be Taught to Be Rational?

    Science.gov (United States)

    Floden, Robert E.; Feiman, Sharon

    1981-01-01

    Teacher education programs have long attempted to teach students to follow a rational mode of thinking. Recent research on teacher thinking has shown that a gap exists between how teachers think and the rational model. Such research should be used to give teacher educators insight into how their students think and learn. (JN)

  19. MARSI: metabolite analogues for rational strain improvement

    DEFF Research Database (Denmark)

    Cardoso, João G. R.; Zeidan, Ahmad A; Jensen, Kristian

    2018-01-01

    reactions in an organism can be used to predict effects of MAs on cellular phenotypes. Here, we present the Metabolite Analogues for Rational Strain Improvement (MARSI) framework. MARSI provides a rational approach to strain improvement by searching for metabolites as targets instead of genes or reactions...

  20. RATIONAL APPROXIMATIONS TO GENERALIZED HYPERGEOMETRIC FUNCTIONS.

    Science.gov (United States)

    Under weak restrictions on the various free parameters, general theorems for rational representations of the generalized hypergeometric functions...and certain Meijer G-functions are developed. Upon specialization, these theorems yield a sequency of rational approximations which converge to the

  1. The rational maps Fλ(z)

    Indian Academy of Sciences (India)

    It is proved that the rational maps in the family {z → zm +λ/zd : λ ∈ C\\{0}} for integers m, d ≥ 2 ... The problem of the existence of Herman rings of a rational map has been studied by. Lyubich in [9] ..... Surveys 41(4) (1986) 35–95. [10] Milnor J ...

  2. Decision Making: Rational, Nonrational, and Irrational.

    Science.gov (United States)

    Simon, Herbert A.

    1993-01-01

    Describes the current state of knowledge about human decision-making and problem-solving processes, explaining recent developments and their implications for management and management training. Rational goal-setting is the key to effective decision making and accomplishment. Bounded rationality is a realistic orientation, because the world is too…

  3. Simple market equilibria with rationally inattentive consumers

    Czech Academy of Sciences Publication Activity Database

    Matějka, Filip; McKay, A.

    2012-01-01

    Roč. 102, č. 3 (2012), s. 24-29 ISSN 0002-8282 R&D Projects: GA ČR(CZ) GPP402/11/P236 Institutional support: RVO:67985998 Keywords : rational choice theory * bounded rationality * consumer research Subject RIV: AH - Economics Impact factor: 2.792, year: 2012

  4. The Emotional and Moral Basis of Rationality

    Science.gov (United States)

    Boostrom, Robert

    2013-01-01

    This chapter explores the basis of rationality, arguing that critical thinking tends to be taught in schools as a set of skills because of the failure to recognize that choosing to think critically depends on the prior development of stable sentiments or moral habits that nourish a rational self. Primary among these stable sentiments are the…

  5. Histaminergic regulation of prolactin secretion

    DEFF Research Database (Denmark)

    Knigge, U P

    1990-01-01

    Histamine (HA), which acts as a neurotransmitter in the central nervous system, participates in the neuroendocrine regulation of prolactin (PRL) secretion. HA has a predominant stimulatory effect which is mediated via H2-receptors following central administration and via H1-receptors following...... systemic infusion of the amine. In addition, HA seems to exert a minor inhibitory effect on PRL secretion, an effect unmasked only during blockade of the receptor mediating the stimulatory effect. Following central administration the inhibitory effect is mediated via H1-receptors, while following systemic...... administration this effect is mediated via H2-receptors. In accordance with these findings, the H2-receptor antagonist cimetidine (CIM) has an inhibitory (following central administration) or stimulatory (following systemic administration) effect on PRL secretion. However, high doses of CIM possess an additional...

  6. [Shared medical decision making in gynaecology].

    Science.gov (United States)

    This, P; Panel, P

    2010-02-01

    When two options or more can be chosen in medical care, the final decision implies two steps: facts analysis, and patient evaluation of preferences. Shared Medical Decision-Making is a rational conceptual frame that can be used in such cases. In this paper, we describe the concept, its practical modalities, and the questions raised by its use. In gynaecology, many medical situations involve "sensitive preferences choice": for example, contraceptive choice, menorrhagia treatment, and approach of menopause. Some tools from the "Shared Medical Decision Making" concept are useful to structure medical consultations, to convey information, and to reveal patients preferences. Decision aid are used in clinical research settings, but some of them may also be easily used in usual practice, and help physicians to improve both quality and traceability of the decisional process. Copyright 2009 Elsevier Masson SAS. All rights reserved.

  7. Argumentation, rationality, and psychology of reasoning

    Directory of Open Access Journals (Sweden)

    David Godden

    2015-05-01

    Full Text Available This paper explicates an account of argumentative rationality by articulating the common, basic idea of its nature, and then identifying a collection of assumptions inherent in it. Argumentative rationality is then contrasted with dual-process theories of reasoning and rationality prevalent in the psychology of reasoning. It is argued that argumentative rationality properly corresponds only with system-2 reasoning in dual-process theories. This result challenges the prescriptive force of argumentative norms derives if they derive at all from their descriptive accuracy of our cognitive capacities. In response, I propose an activity-based account of reasoning which retains the assumptions of argumentative rationality while recontextualizing the relationship between reasoning as a justificatory activity and the psychological states and processes underlying that activity.

  8. Casebook on rationalization of power use

    International Nuclear Information System (INIS)

    1986-06-01

    This book introduces the cases on rationalization of power use, which is divided into four parts. The first part refers the goal of rational use of energy and the result. The second part deals with the excellent cases on rationalization of domestic power use, which list the name of the company, hotel and factory according to the field such as building, textile and food. The third part contains the outstanding cases on rationalization of foreign power use, which were listed by the specific way to reduce electricity use each section. The fourth part is comprised of two chapters, which deals with the cases of domestic technical data and foreign technical data for rational use of energy.

  9. Generalized NLS hierarchies from rational W algebras

    International Nuclear Information System (INIS)

    Toppan, F.

    1993-11-01

    Finite rational W algebras are very natural structures appearing in coset constructions when a Kac-Moody subalgebra is factored out. The problem of relating these algebras to integrable hierarchies of equations is studied by showing how to associate to a rational W algebra its corresponding hierarchy. Two examples are worked out, the sl(2)/U(1) coset, leading to the Non-Linear Schroedinger hierarchy, and the U(1) coset of the Polyakov-Bershadsky W algebra, leading to a 3-field representation of the KP hierarchy already encountered in the literature. In such examples a rational algebra appears as algebra of constraints when reducing a KP hierarchy to a finite field representation. This fact arises the natural question whether rational algebras are always associated to such reductions and whether a classification of rational algebras can lead to a classification of the integrable hierarchies. (author). 19 refs

  10. Impaired Follistatin Secretion in Cirrhosis

    DEFF Research Database (Denmark)

    Rinnov, Anders Rasmussen; Plomgaard, Peter; Pedersen, Bente Klarlund

    2016-01-01

    compared to healthy control participants. DESIGN, SETTING, AND PARTICIPANTS: To experimentally increase the glucagon-insulin ratio (mimicking the hormonal effect of exercise), we infused glucagon/somatostatin (to inhibit insulin secretion) and compared the acute follistatin increase in eight male cirrhosis...... controls (27.6 ± 3.8 vs 34.5 ± 2.9%, respectively; P = .001). CONCLUSIONS: Patients with cirrhosis show impaired capacity to acutely secrete follistatin. The decrease in acute follistatin release may contribute to the loss of muscle mass in liver cirrhosis....

  11. Secrets and Disclosures: How Young Children Handle Secrets

    Science.gov (United States)

    Anagnostaki, Lida; Wright, Michael J.; Papathanasiou, Athanasia

    2013-01-01

    The authors examined the influence of content and verbal cues on young children's understanding of secret information and of its disclosure. Participants were 209 5- and 6-year-old children in an experiment where a puppet, named Zinc, was the protagonist. Children were asked to whom Zinc would disclose a list of pieces of information, some of…

  12. Job sharing. Part 1.

    Science.gov (United States)

    Anderson, K; Forbes, R

    1989-01-01

    This article is the first of a three part series discussing the impact of nurses job sharing at University Hospital, London, Ontario. This first article explores the advantages and disadvantages of job sharing for staff nurses and their supervising nurse manager, as discussed in the literature. The results of a survey conducted on a unit with a large number of job sharing positions, concur with literature findings. The second article will present the evaluation of a pilot project in which two nurses job share a first line managerial position in the Operating Room. The third article will relate the effects of job sharing on women's perceived general well being. Job sharing in all areas, is regarded as a positive experience by both nurse and administrators.

  13. The Sharing Economy

    DEFF Research Database (Denmark)

    Avital, Michel; Carroll, John M.; Hjalmarsson, Anders

    2015-01-01

    The sharing economy is spreading rapidly worldwide in a number of industries and markets. The disruptive nature of this phenomenon has drawn mixed responses ranging from active conflict to adoption and assimilation. Yet, in spite of the growing attention to the sharing economy, we still do not know...... much about it. With the abundant enthusiasm about the benefits that the sharing economy can unleash and the weekly reminders about its dark side, further examination is required to determine the potential of the sharing economy while mitigating its undesirable side effects. The panel will join...... the ongoing debate about the sharing economy and contribute to the discourse with insights about how digital technologies are critical in shaping this turbulent ecosystem. Furthermore, we will define an agenda for future research on the sharing economy as it becomes part of the mainstream society as well...

  14. Ethics of rationing of nursing care.

    Science.gov (United States)

    Rooddehghan, Zahra; Yekta, Zohreh Parsa; Nasrabadi, Alireza N

    2016-09-21

    Rationing of various needed services, for example, nursing care, is inevitable due to unlimited needs and limited resources. Rationing of nursing care is considered an ethical issue since it requires judgment about potential conflicts between personal and professional values. The present research sought to explore aspects of rationing nursing care in Iran. This study applied qualitative content analysis, a method to explore people's perceptions of everyday life phenomena and interpret the subjective content of text data. Data collection was performed through in-depth, unstructured, face-to-face interviews with open-ended questions. The study population included Iranian nurses of all nursing positions, from clinical nurses to nurse managers. Purposive sampling was employed to select 15 female and 3 male nurses (11 clinical nurses, 3 supervisors, 1 matron, 1 nurse, and 2 members of the Nursing Council) working in hospitals of three cities in Iran. The study protocol was approved by Tehran University of Medical Sciences (91D1302870). Written informed consent was also obtained from all participants. According to the participants, rationing of nursing care consisted of two categories, that is, causes of rationing and consequences of rationing. The first category comprised three subcategories, namely, patient needs and demands, routinism, and VIP patients. The three subcategories forming the second category were missed nursing care, patient dissatisfaction, and nurses' feeling of guilt. Levels at which healthcare practices are rationed and clarity of the rationing are important structural considerations in the development of an equal, appropriate, and ethical healthcare system. Moreover, the procedure of rationing is critical as it not only influences people's lives but also reflects the values that dominate in the society. Therefore, in order to minimize the negative consequences of rationing of nursing care, further studies on the ethical dimensions of this phenomenon

  15. BBSRC Data Sharing Policy

    OpenAIRE

    Amanda Collis; David McAllister; Michael Ball

    2011-01-01

    BBSRC recognizes the importance of contributing to the growing international efforts in data sharing. BBSRC is committed to getting the best value for the funds we invest and believes that making research data more readily available will reinforce open scientific inquiry and stimulate new investigations and analyses. BBSRC supports the view that data sharing should be led by the scientific community and driven by scientific need. It should also be cost effective and the data shared should be ...

  16. Factors Impacting Knowledge Sharing

    DEFF Research Database (Denmark)

    Schulzmann, David; Slepniov, Dmitrij

    The purpose of this paper is to examine various factors affecting knowledge sharing at the R&D center of a Western MNE in China. The paper employs qualitative methodology and is based on the action research and case study research techniques. The findings of the paper advance our understanding...... about factors that affect knowledge sharing. The main emphasis is given to the discussion on how to improve knowledge sharing in global R&D organizations....

  17. Regulating the sharing economy

    OpenAIRE

    Erickson, Kristofer; Sorensen, Inge

    2016-01-01

    In this introductory essay, we explore definitions of the ‘sharing economy’, a concept indicating both social (relational, communitarian) and economic (allocative, profit-seeking) aspects which appear to be in tension. We suggest combining the social and economic logics of the sharing economy to focus on the central features of network enabled, aggregated membership in a pool of offers and demands (for goods, services, creative expressions). This definition of the sharing economy distinguishe...

  18. Phenomenology of experiential sharing

    DEFF Research Database (Denmark)

    León, Felipe; Zahavi, Dan

    2016-01-01

    The chapter explores the topic of experiential sharing by drawing on the early contributions of the phenomenologists Alfred Schutz and Gerda Walther. It is argued that both Schutz and Walther support, from complementary perspectives, an approach to experiential sharing that has tended to be overl......The chapter explores the topic of experiential sharing by drawing on the early contributions of the phenomenologists Alfred Schutz and Gerda Walther. It is argued that both Schutz and Walther support, from complementary perspectives, an approach to experiential sharing that has tended...

  19. A Data Sharing Story

    Directory of Open Access Journals (Sweden)

    Mercè Crosas

    2012-01-01

    Full Text Available From the early days of modern science through this century of Big Data, data sharing has enabled some of the greatest advances in science. In the digital age, technology can facilitate more effective and efficient data sharing and preservation practices, and provide incentives for making data easily accessible among researchers. At the Institute for Quantitative Social Science at Harvard University, we have developed an open-source software to share, cite, preserve, discover and analyze data, named the Dataverse Network. We share here the project’s motivation, its growth and successes, and likely evolution.

  20. Share your sweets

    DEFF Research Database (Denmark)

    Byrnit, Jill; Høgh-Olesen, Henrik; Makransky, Guido

    2015-01-01

    study to examine the sharing behavior of groups of captive chimpanzees and bonobos when introducing the same type of food (branches) manipulated to be of two different degrees of desirability (with or without syrup). Results showed that, the large majority of food transfers in both species came about...... as sharing in which group members were allowed to co-feed or remove food from the stock of the food possessor, and the introduction of high-value food resulted in more sharing, not less. Food sharing behavior differed between species in that chimpanzees displayed significantly more begging behavior than...

  1. Definition of rational antiepileptic polypharmacy.

    Science.gov (United States)

    Wilder, B J; Homan, R W

    1996-01-01

    Rational polypharmacy is in its earliest stages of development and will require substantial additional development to realize its full potential. Indeed, despite the powerful appeal of the concept, clinical proof is not yet available that RP is superior to monotherapy. Important questions need to be addressed: 1. Will RP control seizures more effectively than monotherapy? 2. What data are needed to develop RP for a specific patient? 3. Will RP be cost effective? 4. Can RP be developed which will treat or prevent epilepsy while controlling seizures? Possible approaches to these questions could include: 1. The development of a data base for prospective use to monitor patients being treated at Epilepsy Centers using RP principles. 2. Use the data obtained from the above to construct more specific studies to compare identified combination therapies with monotherapy. 3. Prospectively compare in a placebo controlled, blinded study, the effect of the combination of an anti-ictal medication and a laboratory proven antiepileptic drug for prevention of the development of epilepsy in an at risk population such as head trauma or stroke.

  2. Rationality, institutions and environmental policy

    Energy Technology Data Exchange (ETDEWEB)

    Vatn, Arild [Department of Economics and Resource Management, Norwegian University of Life Sciences, Aas (Norway)

    2005-11-01

    This paper is about how institutions determine choices and the importance of this for environmental policy. The model of individual rational choice from neoclassical economics is compared with the model of socially determined behavior. While in the first case, institutions are either exempted from or understood as mere economizing constraints on behavior, the latter perspective views institutions as basic structures necessary also to enable people to act. The paper develops a way to integrate the individualistic model into the wider perspective of social constructivism by viewing it as a special form of such construction. On the basis of this synthesis three issues with relevance for environmental economics are discussed. First, the role of institutional factors in the process of preference formation is emphasized. Next, the role of institutions for the choice of desired states of the environment is analyzed. Finally, the effect of various policy instruments to motivate people to produce these states is discussed. It is concluded that the core policy issue is to determine which institutional frameworks are most reasonable to apply to which kind of problem. Issues, which from the perspective of neoclassical economics are pure technical, become serious value questions if understood from an institutional perspective.

  3. A Rational Business Startup Model

    Science.gov (United States)

    Chang, Milton

    2000-03-01

    The speaker will share his experience in starting high-tech companies using a low-risk startup model. Most technical people can use this approach to start a company that begins with a modest initial goal and grows the business over time. As the company builds infrastructure and the individuals gain experience, the ability to pursue big opportunities comes naturally. The result is more likely to be a company with a long-term vision, and with the management team retaining more of the ownership.

  4. Raspberry Pi for secret agents

    CERN Document Server

    Sjogelid, Stefan

    2015-01-01

    This book is an easy-to-follow guide with practical examples in each chapter. Suitable for the novice and expert alike, each topic provides a fast and easy way to get started with exciting applications and also guides you through setting up the Raspberry Pi as a secret agent toolbox.

  5. Unraveling the Wnt secretion pathway

    NARCIS (Netherlands)

    Harterink, M.

    2011-01-01

    The Wnt family of signaling proteins has essential functions in development and adult tissue homeostasis throughout the animal kingdom. Although signaling cascades triggered by Wnt proteins have been extensively studied, much remains to be learned about how Wnts are produced and secreted and how

  6. VIP secreting tumours in infancy

    International Nuclear Information System (INIS)

    Davies, R.P.; Slavotinek, J.P.; Dorney, S.F.A.

    1990-01-01

    Vasoactive intestinal polypeptide (VIP) secreting neural crest tumours are an uncommon but important treatable cause of intractable childhood diarrhoea. The radiological appearances of two cases are presented with a review of radiological findings in childhood VIP secreting neural crest tumours. Twenty eight cases of childhood VIP secreting neural crest tumours were reviewed. Nineteen (68%) were ganglioneuroblastomas and nine (32%) were ganglioneuromas. The majority of tumours (66%) were in a paravertebral location in the abdomen indicating that a search for such a tumour should be initiated at this site. Eighteen of the twenty eight cases reviewed discussed relevant radiological investigations. Calcification was detected in 50% of abdominal radiographs. Gut dilatation was often a prominent feature. A mass was detected in 5 of 5 cases where ultrasound findings were reported, and seven of seven cases with CT findings reported. Prior to the availability of CT and ultrasound the most useful investigation was IVU which demonstrated evidence of a mass in 5 of 9 cases. The presence of paravertebral calcification and gut dilatation on the plain radiograph of a child with intractable diarrhoea suggests the presence of a VIP secreting neural crest tumour. If an abdominal tumour is not found in the appropriate clinical setting and VIP levels are elevated, a widespread search of the paravertebral region is indicated. (orig.)

  7. Secret Key Agreement: Fundamental Limits and Practical Challenges

    KAUST Repository

    Rezki, Zouheir

    2017-02-15

    Despite the tremendous progress made toward establishing PLS as a new paradigm to guarantee security of communication systems at the physical layerthere is a common belief among researchers and industrials that there are many practical challenges that prevent PLS from flourishing at the industrial scale. Most secure message transmission constructions available to date are tied to strong assumptions on CSI, consider simple channel models and undermine eavesdropping capabilities; thus compromising their practical interest to a big extent. Perhaps arguably, the most likely reasonable way to leverage PLS potential in securing modern wireless communication systems is via secret-key agreement. In the latter setting, the legitimate parties try to agree on a key exploiting availability of a public channel with high capacity which is also accessible to the eavesdropper. Once a key is shared by the legitimate parties, they may use it in a one-time pad encryption, for instance. In this article, we investigate two performance limits of secret-key agreement communications; namely, the secret-key diversity-multiplexing trade-off and the effect of transmit correlation on the secretkey capacity. We show via examples how secretkey agreement offers more flexibility than secure message transmissions. Finally, we explore a few challenges of secret-key agreement concept and propose a few guidelines to overturn them.

  8. Millennials and the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Newlands, Gemma; Anselmi, Guido

    Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy......Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy...

  9. Mobile energy sharing futures

    DEFF Research Database (Denmark)

    Worgan, Paul; Knibbe, Jarrod; Plasencia, Diego Martinez

    2016-01-01

    We foresee a future where energy in our mobile devices can be shared and redistributed to suit our current task needs. Many of us are beginning to carry multiple mobile devices and we seek to re-evaluate the traditional view of a mobile device as only accepting energy. In our vision, we can...... sharing futures....

  10. 5G Spectrum Sharing

    OpenAIRE

    Nekovee, Maziar; Rudd, Richard

    2017-01-01

    In this paper an overview is given of the current status of 5G industry standards, spectrum allocation and use cases, followed by initial investigations of new opportunities for spectrum sharing in 5G using cognitive radio techniques, considering both licensed and unlicensed scenarios. A particular attention is given to sharing millimeter-wave frequencies, which are of prominent importance for 5G.

  11. NCSU Reactor Sharing Program

    International Nuclear Information System (INIS)

    Perez, P.B.

    1993-01-01

    The Nuclear Reactor Program at North Carolina State University provides the PULSTAR Research Reactor and associated facilities to eligible institutions with support, in part, from the Department of Energy Reactor Sharing Program. Participation in the NCSU Reactor Sharing Program continues to increase steadily with visitors ranging from advance high school physics and chemistry students to Ph.D. level research from neighboring universities

  12. 'An Arena for Sharing'

    DEFF Research Database (Denmark)

    la Cour, Karen; Ledderer, Loni; Hansen, Helle Ploug

    2015-01-01

    relatives). In-depth interviews were conducted in the participants' homes 1 month after the rehabilitation course. Data were analyzed by a constant comparative method. Results: Residential rehabilitation course was identified to serve as an "arena for sharing," underpinned by 3 dimensions of sharing...

  13. Microfluidic screening and whole-genome sequencing identifies mutations associated with improved protein secretion by yeast

    DEFF Research Database (Denmark)

    Huang, Mingtao; Bai, Yunpeng; Sjostrom, Staffan L.

    2015-01-01

    There is an increasing demand for biotech-based production of recombinant proteins for use as pharmaceuticals in the food and feed industry and in industrial applications. Yeast Saccharomyces cerevisiae is among preferred cell factories for recombinant protein production, and there is increasing...... interest in improving its protein secretion capacity. Due to the complexity of the secretory machinery in eukaryotic cells, it is difficult to apply rational engineering for construction of improved strains. Here we used high-throughput microfluidics for the screening of yeast libraries, generated by UV...... mutagenesis. Several screening and sorting rounds resulted in the selection of eight yeast clones with significantly improved secretion of recombinant a-amylase. Efficient secretion was genetically stable in the selected clones. We performed whole-genome sequencing of the eight clones and identified 330...

  14. Exploring the Sharing Economy

    DEFF Research Database (Denmark)

    Netter, Sarah

    Despite the growing interest on the part of proponents and opponents - ranging from business, civil society, media, to policy-makers alike - there is still limited knowledge about the working mechanisms of the sharing economy. The thesis is dedicated to explore this understudied phenomenon...... and to provide a more nuanced understanding of the micro- and macro-level tensions that characterize the sharing economy. This thesis consists of four research papers, each using different literature, methodology, and data sets. The first paper investigates how the sharing economy is diffused and is ‘talked......-level tensions experience by sharing platforms by looking at the case of mobile fashion reselling and swapping markets. The final paper combines the perspectives of different sharing economy stakeholders and outlines some of the micro and macro tensions arising in and influencing the organization of these multi...

  15. Sharing Rare Attitudes Attracts.

    Science.gov (United States)

    Alves, Hans

    2018-04-01

    People like others who share their attitudes. Online dating platforms as well as other social media platforms regularly rely on the social bonding power of their users' shared attitudes. However, little is known about moderating variables. In the present work, I argue that sharing rare compared with sharing common attitudes should evoke stronger interpersonal attraction among people. In five studies, I tested this prediction for the case of shared interests from different domains. I found converging evidence that people's rare compared with their common interests are especially potent to elicit interpersonal attraction. I discuss the current framework's theoretical implications for impression formation and impression management as well as its practical implications for improving online dating services.

  16. Positivity Preserving Interpolation Using Rational Bicubic Spline

    Directory of Open Access Journals (Sweden)

    Samsul Ariffin Abdul Karim

    2015-01-01

    Full Text Available This paper discusses the positivity preserving interpolation for positive surfaces data by extending the C1 rational cubic spline interpolant of Karim and Kong to the bivariate cases. The partially blended rational bicubic spline has 12 parameters in the descriptions where 8 of them are free parameters. The sufficient conditions for the positivity are derived on every four boundary curves network on the rectangular patch. Numerical comparison with existing schemes also has been done in detail. Based on Root Mean Square Error (RMSE, our partially blended rational bicubic spline is on a par with the established methods.

  17. Towards a Characterization of Rational Expectations

    OpenAIRE

    Itai Arieli

    2008-01-01

    R. J. Aumann and J. H. Drèze (2008) define a rational expectation of a player i in a game G as the expected payo of some type of i in some belief system for G in which common knowledge of rationality and common priors obtain. Our goal is to characterize the set of rational expectations in terms of the game's payoff matrix. We provide such a characterization for a specific class of strategic games, called semi-elementary, which includes Myerson's "elementary" games.

  18. Rational Verification in Iterated Electric Boolean Games

    Directory of Open Access Journals (Sweden)

    Youssouf Oualhadj

    2016-07-01

    Full Text Available Electric boolean games are compact representations of games where the players have qualitative objectives described by LTL formulae and have limited resources. We study the complexity of several decision problems related to the analysis of rationality in electric boolean games with LTL objectives. In particular, we report that the problem of deciding whether a profile is a Nash equilibrium in an iterated electric boolean game is no harder than in iterated boolean games without resource bounds. We show that it is a PSPACE-complete problem. As a corollary, we obtain that both rational elimination and rational construction of Nash equilibria by a supervising authority are PSPACE-complete problems.

  19. Positroids Induced by Rational Dyck Paths

    OpenAIRE

    Gotti, Felix

    2017-01-01

    A rational Dyck path of type $(m,d)$ is an increasing unit-step lattice path from $(0,0)$ to $(m,d) \\in \\mathbb{Z}^2$ that never goes above the diagonal line $y = (d/m)x$. On the other hand, a positroid of rank $d$ on the ground set $[d+m]$ is a special type of matroid coming from the totally nonnegative Grassmannian. In this paper we describe how to naturally assign a rank $d$ positroid on the ground set $[d+m]$, which we name rational Dyck positroid, to each rational Dyck path of type $(m,d...

  20. Many faces of rationality: Implications of the great rationality debate for clinical decision-making.

    Science.gov (United States)

    Djulbegovic, Benjamin; Elqayam, Shira

    2017-10-01

    Given that more than 30% of healthcare costs are wasted on inappropriate care, suboptimal care is increasingly connected to the quality of medical decisions. It has been argued that personal decisions are the leading cause of death, and 80% of healthcare expenditures result from physicians' decisions. Therefore, improving healthcare necessitates improving medical decisions, ie, making decisions (more) rational. Drawing on writings from The Great Rationality Debate from the fields of philosophy, economics, and psychology, we identify core ingredients of rationality commonly encountered across various theoretical models. Rationality is typically classified under umbrella of normative (addressing the question how people "should" or "ought to" make their decisions) and descriptive theories of decision-making (which portray how people actually make their decisions). Normative theories of rational thought of relevance to medicine include epistemic theories that direct practice of evidence-based medicine and expected utility theory, which provides the basis for widely used clinical decision analyses. Descriptive theories of rationality of direct relevance to medical decision-making include bounded rationality, argumentative theory of reasoning, adaptive rationality, dual processing model of rationality, regret-based rationality, pragmatic/substantive rationality, and meta-rationality. For the first time, we provide a review of wide range of theories and models of rationality. We showed that what is "rational" behaviour under one rationality theory may be irrational under the other theory. We also showed that context is of paramount importance to rationality and that no one model of rationality can possibly fit all contexts. We suggest that in context-poor situations, such as policy decision-making, normative theories based on expected utility informed by best research evidence may provide the optimal approach to medical decision-making, whereas in the context

  1. The effectiveness of rational emotive therapy on achievement ...

    African Journals Online (AJOL)

    The effectiveness of rational emotive therapy on achievement motivation of students. ... PROMOTING ACCESS TO AFRICAN RESEARCH ... the effectiveness of Rational Emotive Behaviour Therapy on Students Achievement Motivation.

  2. Popper, Rationality and the Possibility of Social Science

    Directory of Open Access Journals (Sweden)

    Danny Frederick

    2013-02-01

    Full Text Available Social science employs teleological explanations which depend upon the rationality principle, according to which people exhibit instrumental rationality. Popper points out that people also exhibit critical rationality, the tendency to stand back from, and to question or criticise, their views. I explain how our critical rationality impugns the explanatory value of the rationality principle and thereby threatens the very possibility of social science. I discuss the relationship between instrumental and critical rationality and show how we can reconcile our critical rationality with the possibility of social science if we invoke Popper’s conception of limited rationality and his indeterminism.

  3. 29 CFR 1903.9 - Trade secrets.

    Science.gov (United States)

    2010-07-01

    ... INSPECTIONS, CITATIONS AND PROPOSED PENALTIES § 1903.9 Trade secrets. (a) Section 15 of the Act provides: “All... concerns or relates to the trade secrets, processes, operations, style of work, or apparatus, or to the...

  4. Pituitary-hormone secretion by thyrotropinomas

    NARCIS (Netherlands)

    Roelfsema, Ferdinand; Kok, Simon; Kok, Petra; Pereira, Alberto M.; Biermasz, Nienke R.; Smit, Jan W.; Frolich, Marijke; Keenan, Daniel M.; Veldhuis, Johannes D.; Romijn, Johannes A.

    2009-01-01

    Hormone secretion by somatotropinomas, corticotropinomas and prolactinomas exhibits increased pulse frequency, basal and pulsatile secretion, accompanied by greater disorderliness. Increased concentrations of growth hormone (GH) or prolactin (PRL) are observed in about 30% of thyrotropinomas leading

  5. Many faces of rationality: Implications of the great rationality debate for clinical decision‐making

    Science.gov (United States)

    Elqayam, Shira

    2017-01-01

    Abstract Given that more than 30% of healthcare costs are wasted on inappropriate care, suboptimal care is increasingly connected to the quality of medical decisions. It has been argued that personal decisions are the leading cause of death, and 80% of healthcare expenditures result from physicians' decisions. Therefore, improving healthcare necessitates improving medical decisions, ie, making decisions (more) rational. Drawing on writings from The Great Rationality Debate from the fields of philosophy, economics, and psychology, we identify core ingredients of rationality commonly encountered across various theoretical models. Rationality is typically classified under umbrella of normative (addressing the question how people “should” or “ought to” make their decisions) and descriptive theories of decision‐making (which portray how people actually make their decisions). Normative theories of rational thought of relevance to medicine include epistemic theories that direct practice of evidence‐based medicine and expected utility theory, which provides the basis for widely used clinical decision analyses. Descriptive theories of rationality of direct relevance to medical decision‐making include bounded rationality, argumentative theory of reasoning, adaptive rationality, dual processing model of rationality, regret‐based rationality, pragmatic/substantive rationality, and meta‐rationality. For the first time, we provide a review of wide range of theories and models of rationality. We showed that what is “rational” behaviour under one rationality theory may be irrational under the other theory. We also showed that context is of paramount importance to rationality and that no one model of rationality can possibly fit all contexts. We suggest that in context‐poor situations, such as policy decision‐making, normative theories based on expected utility informed by best research evidence may provide the optimal approach to medical decision

  6. Chimpanzees share forbidden fruit.

    Directory of Open Access Journals (Sweden)

    Kimberley J Hockings

    2007-09-01

    Full Text Available The sharing of wild plant foods is infrequent in chimpanzees, but in chimpanzee communities that engage in hunting, meat is frequently used as a 'social tool' for nurturing alliances and social bonds. Here we report the only recorded example of regular sharing of plant foods by unrelated, non-provisioned wild chimpanzees, and the contexts in which these sharing behaviours occur. From direct observations, adult chimpanzees at Bossou (Republic of Guinea, West Africa very rarely transferred wild plant foods. In contrast, they shared cultivated plant foods much more frequently (58 out of 59 food sharing events. Sharing primarily consists of adult males allowing reproductively cycling females to take food that they possess. We propose that hypotheses focussing on 'food-for-sex and -grooming' and 'showing-off' strategies plausibly account for observed sharing behaviours. A changing human-dominated landscape presents chimpanzees with fresh challenges, and our observations suggest that crop-raiding provides adult male chimpanzees at Bossou with highly desirable food commodities that may be traded for other currencies.

  7. Smooth surfaces from rational bilinear patches

    KAUST Repository

    Shi, Ling; Wang, Jun; Pottmann, Helmut

    2014-01-01

    Smooth freeform skins from simple panels constitute a challenging topic arising in contemporary architecture. We contribute to this problem area by showing how to approximate a negatively curved surface by smoothly joined rational bilinear patches

  8. Towards a classification of rational Hopf algebras

    International Nuclear Information System (INIS)

    Fuchs, J.; Ganchev, A.; Vecsernyes, P.

    1994-02-01

    Rational Hopf algebras, i.e. certain quasitriangular weak quasi-Hopf *-algebras, are expected to describe the quantum symmetry of rational field theories. In this paper methods are developed which allow for a classification of all rational Hopf algebras that are compatible with some prescribed set of fusion rules. The algebras are parametrized by the solutions of the square, pentagon and hexagon identities. As examples, we classify all solutions for fusion rules with not more than three sectors, as well as for the level three affine A 1 (1) fusion rules. We also establish several general properties of rational Hopf algebras and present a graphical description of the coassociator in terms of labelled tetrahedra. The latter construction allows to make contact with conformal field theory fusing matrices and with invariants of three-manifolds and topological lattice field theory. (orig.)

  9. Bounded rational choice behaviour: applications in transport

    DEFF Research Database (Denmark)

    Jensen, Anders Fjendbo

    2016-01-01

    Even though the theory of rational behaviour has been challenged for almost 100 years, the dominant approach within the field of transport has been based upon the assumptions of neoclassical economics that we live in a world of rational decision makers who always have perfect knowledge and aim...... rational choice behaviour focuses on how the latter approach can be seriously taken into account within transport applications. As the editors discuss in the introduction, a true optimal choice can only be made if an individual has full and perfect information of all relevant attributes in his/her choice...... set. An individual is said to demonstrate bounded rational behaviour if he/she does not systematically consider all attributes deemed relevant for the decision problem at hand, does not consider all choice options and/or does not choose the best choice alternative. Such simplified representation...

  10. Principles of Economic Rationality in Mice.

    Science.gov (United States)

    Rivalan, Marion; Winter, York; Nachev, Vladislav

    2017-12-12

    Humans and non-human animals frequently violate principles of economic rationality, such as transitivity, independence of irrelevant alternatives, and regularity. The conditions that lead to these violations are not completely understood. Here we report a study on mice tested in automated home-cage setups using rewards of drinking water. Rewards differed in one of two dimensions, volume or probability. Our results suggest that mouse choice conforms to the principles of economic rationality for options that differ along a single reward dimension. A psychometric analysis of mouse choices further revealed that mice responded more strongly to differences in probability than to differences in volume, despite equivalence in return rates. This study also demonstrates the synergistic effect between the principles of economic rationality and psychophysics in making quantitative predictions about choices of healthy laboratory mice. This opens up new possibilities for the analyses of multi-dimensional choice and the use of mice with cognitive impairments that may violate economic rationality.

  11. Pandemic ventilator rationing and appeals processes.

    Science.gov (United States)

    Patrone, Daniel; Resnik, David

    2011-06-01

    In a severe influenza pandemic, hospitals will likely experience serious and widespread shortages of patient pulmonary ventilators and of staff qualified to operate them. Deciding who will receive access to mechanical ventilation will often determine who lives and who dies. This prospect raises an important question whether pandemic preparedness plans should include some process by which individuals affected by ventilator rationing would have the opportunity to appeal adverse decisions. However, the issue of appeals processes to ventilator rationing decisions has been largely neglected in state pandemic planning efforts. If we are to devise just and effective plans for coping with a severe influenza pandemic, more attention to the issue of appeals processes for pandemic ventilator rationing decisions is needed. Arguments for and against appeals processes are considered, and some suggestions are offered to help efforts at devising more rational pandemic preparedness plans.

  12. Rationally inattentive seller: sales and discrete pricing

    Czech Academy of Sciences Publication Activity Database

    Matějka, Filip

    2016-01-01

    Roč. 83, č. 3 (2016), s. 1125-1155 ISSN 0034-6527 Institutional support: PRVOUK-P23 Keywords : rational inattention * nominal rigidity * sticky prices Subject RIV: AH - Economics Impact factor: 4.030, year: 2016

  13. Rigid pricing and rationally inattentive consumer

    Czech Academy of Sciences Publication Activity Database

    Matějka, Filip

    158 B, July (2015), s. 656-678 ISSN 0022-0531 Institutional support: PRVOUK-P23 Keywords : rational inattention * imperfect information * nominal rigidity Subject RIV: AH - Economics Impact factor: 1.097, year: 2015

  14. Rigid pricing and rationally inattentive consumer

    Czech Academy of Sciences Publication Activity Database

    Matějka, Filip

    158 B, July (2015), s. 656-678 ISSN 0022-0531 Institutional support: RVO:67985998 Keywords : rational inattention * imperfect information * nominal rigidity Subject RIV: AH - Economics Impact factor: 1.097, year: 2015

  15. Analytic aspects of rational conformal field theories

    International Nuclear Information System (INIS)

    Kiritsis, E.B.; Lawrence Berkeley Lab., CA

    1990-01-01

    The problem of deriving linear differential equations for correlation functions of Rational Conformal Field Theories is considered. Techniques from the theory of fuchsian differential equations are used to show that knowledge of the central charge, dimensions of primary fields and fusion rules are enough to fix the differential equations for one- and two-point functions on the tours. Any other correlation function can be calculated along similar lines. The results settle the issue of 'exact solution' of rational conformal field theories. (orig.)

  16. Rational emotive behaviour therapy: distinctive features

    OpenAIRE

    Dryden, Windy

    2008-01-01

    Rational emotive behaviour therapy (REBT) encourages the client to focus on their emotional problems in order to understand, challenge and change the irrational beliefs that underpin these problems. REBT can help clients to strengthen conviction in their alternative rational beliefs by acting in ways that are consistent with them and thus encourage a healthier outlook.\\ud \\ud This accessible and direct guide introduces the reader to REBT while indicating how it is different from other approac...

  17. Heterogeneity, Bounded Rationality and Market Dysfunctionality

    OpenAIRE

    Xue-Zhong He; Lei Shi

    2008-01-01

    As the main building blocks of the modern finance theory, homogeneity and rational expectation have faced difficulty in explaining many market anomalies, stylized factors, and market inefficiency in empirical studies. As a result, heterogeneity and bounded rationality have been used as an alterative paradigm of asset price dynamics and this paradigm has been widely recognized recently in both academic and financial market practitioners. Within the framework of Chiarella, Dieci and He (2006a, ...

  18. Rationally Addicted to Drinking and Smoking?

    OpenAIRE

    Bask, Mikael; Melkersson, Maria

    2001-01-01

    When modeling demand for addictive consumption goods, the most widely used framework is the rational addiction model proposed by Becker and Murphy (1988). In the present paper, we extend the rational addiction model to include two addictive consumption goods, alcohol and cigarettes. We estimate the aggregate demand for alcohol and cigarettes in Sweden, using aggregate annual time series on sales volumes for the period 1955-1999. OLS estimates are compared to GMM estimates allowing for possibl...

  19. Changing Conspiracy Beliefs through Rationality and Ridiculing

    OpenAIRE

    Orosz, Gábor; Krekó, Péter; Paskuj, Benedek; Tóth-Király, István; Bőthe, Beáta; Roland-Lévy, Christine

    2016-01-01

    Conspiracy theory (CT) beliefs can be harmful. How is it possible to reduce them effectively? Three reduction strategies were tested in an online experiment using general and well-known CT beliefs on a comprehensive randomly assigned Hungarian sample (N = 813): exposing rational counter CT arguments, ridiculing those who hold CT beliefs, and empathizing with the targets of CT beliefs. Several relevant individual differences were measured. Rational and ridiculing arguments were effective in re...

  20. Sharing the dance -

    DEFF Research Database (Denmark)

    He, Jing; Ravn, Susanne

    2018-01-01

    In his recent works on daily face-to-face encounters, Zahavi claims that the phenomenon of sharing involves reciprocity. Following Zahavi’s line of thought, we wonder what exactly reciprocity amounts to and how the shared experience emerges from the dynamic process of interaction. By turning...... to the highly specialized field of elite sports dance, we aim at exploring the way in which reciprocity unfolds in intensive deliberate practices of movement. In our analysis, we specifically argue that the ongoing dynamics of two separate flows of movement constitute a shared experience of dancing together...

  1. Global resource sharing

    CERN Document Server

    Frederiksen, Linda; Nance, Heidi

    2011-01-01

    Written from a global perspective, this book reviews sharing of library resources on a global scale. With expanded discovery tools and massive digitization projects, the rich and extensive holdings of the world's libraries are more visible now than at any time in the past. Advanced communication and transmission technologies, along with improved international standards, present a means for the sharing of library resources around the globe. Despite these significant improvements, a number of challenges remain. Global Resource Sharing provides librarians and library managers with a comprehensive

  2. Report endorses data sharing

    Science.gov (United States)

    The potential benefits of sharing data so outweigh its costs that investigators should be required to include plans for sharing data as part of their grant proposals, according to recommendations issued recently by the Committee on National Statistics (CNSTAT) of the National Research Council (NRC).In their report Sharing Research Data, CNSTAT also recommended that “Journals should give more emphasis to reports of secondary analyses and to replications,” provided that the original collections of data receive full credit. In addition, “Journal editors should require authors to provide access to data during the peer review process.”

  3. Pancreatic bicarbonate secretion involves two proton pumps

    DEFF Research Database (Denmark)

    Novak, Ivana; Wang, Jing; Henriksen, Katrine L.

    2011-01-01

    Pancreas secretes fluid rich in digestive enzymes and bicarbonate. The alkaline secretion is important in buffering of acid chyme entering duodenum and for activation of enzymes. This secretion is formed in pancreatic ducts, and studies to date show that plasma membranes of duct epithelium expres...

  4. 5 CFR 2421.15 - Secret ballot.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Secret ballot. 2421.15 Section 2421.15... FEDERAL LABOR RELATIONS AUTHORITY MEANING OF TERMS AS USED IN THIS SUBCHAPTER § 2421.15 Secret ballot. Secret ballot means the expression by ballot, voting machine or otherwise, but in no event by proxy, of a...

  5. 29 CFR 452.97 - Secret ballot.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Secret ballot. 452.97 Section 452.97 Labor Regulations... OF 1959 Election Procedures; Rights of Members § 452.97 Secret ballot. (a) A prime requisite of elections regulated by title IV is that they be held by secret ballot among the members or in appropriate...

  6. 29 CFR 401.11 - Secret ballot.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Secret ballot. 401.11 Section 401.11 Labor Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS MEANING OF TERMS USED IN THIS SUBCHAPTER § 401.11 Secret ballot. Secret ballot means the expression by...

  7. 22 CFR 1421.15 - Secret ballot.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Secret ballot. 1421.15 Section 1421.15 Foreign Relations FOREIGN SERVICE LABOR RELATIONS BOARD; FEDERAL LABOR RELATIONS AUTHORITY; GENERAL COUNSEL OF THE... THIS SUBCHAPTER § 1421.15 Secret ballot. Secret ballot means the expression by ballot, voting machine...

  8. 29 CFR 1202.4 - Secret ballot.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Secret ballot. 1202.4 Section 1202.4 Labor Regulations Relating to Labor (Continued) NATIONAL MEDIATION BOARD RULES OF PROCEDURE § 1202.4 Secret ballot. In conducting such investigation, the Board is authorized to take a secret ballot of the employees involved, or...

  9. Some Economics of Trade Secret Law

    OpenAIRE

    David D. Friedman; William M. Landes; Richard A. Posner

    1991-01-01

    Despite the practical importance of trade secrets to the business community, the law of trade secrets is a neglected orphan in economic analysis. This paper sketches an approach to the economics of trade secret law that connects it more closely both to other areas of intellectual property and to broader issues in the positive economic theory of the common law.

  10. Intergroup conflict and rational decision making.

    Science.gov (United States)

    Martínez-Tur, Vicente; Peñarroja, Vicente; Serrano, Miguel A; Hidalgo, Vanesa; Moliner, Carolina; Salvador, Alicia; Alacreu-Crespo, Adrián; Gracia, Esther; Molina, Agustín

    2014-01-01

    The literature has been relatively silent about post-conflict processes. However, understanding the way humans deal with post-conflict situations is a challenge in our societies. With this in mind, we focus the present study on the rationality of cooperative decision making after an intergroup conflict, i.e., the extent to which groups take advantage of post-conflict situations to obtain benefits from collaborating with the other group involved in the conflict. Based on dual-process theories of thinking and affect heuristic, we propose that intergroup conflict hinders the rationality of cooperative decision making. We also hypothesize that this rationality improves when groups are involved in an in-group deliberative discussion. Results of a laboratory experiment support the idea that intergroup conflict -associated with indicators of the activation of negative feelings (negative affect state and heart rate)- has a negative effect on the aforementioned rationality over time and on both group and individual decision making. Although intergroup conflict leads to sub-optimal decision making, rationality improves when groups and individuals subjected to intergroup conflict make decisions after an in-group deliberative discussion. Additionally, the increased rationality of the group decision making after the deliberative discussion is transferred to subsequent individual decision making.

  11. Proposed standby gasoline rationing plan: public comments

    Energy Technology Data Exchange (ETDEWEB)

    1978-12-01

    Under the proposed plan, DOE would allocate ration rights (rights to purchase gasoline) to owners of registered vehicles. All vehicles in a given class would receive the same entitlement. Essential services would receive supplemental allotments of ration rights as pririty firms. Once every 3 months, ration checks would be mailed out to all vehicle registrants, allotting them a certain amount of ration rights. These checks would then be cashed at Coupon Issuance Points, where the bearer would receive ration coupons to be used at gasoline stations. Large users of gasoline could deposit their allotment checks in accounts at ration banks. Coupons or checks would be freely exchangeable in a white market. A certain percentage of the gasoline supply would be set aside in reserve for use in national emergencies. When the plan was published in the Federal Register, public comments were requested. DOE also solicited comments from private citizens, public interest groups, business and industry, state and local governments. A total of 1126 responses were reveived and these are analyzed in this paper. The second part of the report describes how the comments were classified, and gives a statistical breakdown of the major responses. The last section is a discussion and analysis of theissue raised by commenting agencies, firms, associations, and individuals. (MCW)

  12. Intergroup conflict and rational decision making.

    Directory of Open Access Journals (Sweden)

    Vicente Martínez-Tur

    Full Text Available The literature has been relatively silent about post-conflict processes. However, understanding the way humans deal with post-conflict situations is a challenge in our societies. With this in mind, we focus the present study on the rationality of cooperative decision making after an intergroup conflict, i.e., the extent to which groups take advantage of post-conflict situations to obtain benefits from collaborating with the other group involved in the conflict. Based on dual-process theories of thinking and affect heuristic, we propose that intergroup conflict hinders the rationality of cooperative decision making. We also hypothesize that this rationality improves when groups are involved in an in-group deliberative discussion. Results of a laboratory experiment support the idea that intergroup conflict -associated with indicators of the activation of negative feelings (negative affect state and heart rate- has a negative effect on the aforementioned rationality over time and on both group and individual decision making. Although intergroup conflict leads to sub-optimal decision making, rationality improves when groups and individuals subjected to intergroup conflict make decisions after an in-group deliberative discussion. Additionally, the increased rationality of the group decision making after the deliberative discussion is transferred to subsequent individual decision making.

  13. Intergroup Conflict and Rational Decision Making

    Science.gov (United States)

    Martínez-Tur, Vicente; Peñarroja, Vicente; Serrano, Miguel A.; Hidalgo, Vanesa; Moliner, Carolina; Salvador, Alicia; Alacreu-Crespo, Adrián; Gracia, Esther; Molina, Agustín

    2014-01-01

    The literature has been relatively silent about post-conflict processes. However, understanding the way humans deal with post-conflict situations is a challenge in our societies. With this in mind, we focus the present study on the rationality of cooperative decision making after an intergroup conflict, i.e., the extent to which groups take advantage of post-conflict situations to obtain benefits from collaborating with the other group involved in the conflict. Based on dual-process theories of thinking and affect heuristic, we propose that intergroup conflict hinders the rationality of cooperative decision making. We also hypothesize that this rationality improves when groups are involved in an in-group deliberative discussion. Results of a laboratory experiment support the idea that intergroup conflict –associated with indicators of the activation of negative feelings (negative affect state and heart rate)– has a negative effect on the aforementioned rationality over time and on both group and individual decision making. Although intergroup conflict leads to sub-optimal decision making, rationality improves when groups and individuals subjected to intergroup conflict make decisions after an in-group deliberative discussion. Additionally, the increased rationality of the group decision making after the deliberative discussion is transferred to subsequent individual decision making. PMID:25461384

  14. Secreted factors as synaptic organizers.

    Science.gov (United States)

    Johnson-Venkatesh, Erin M; Umemori, Hisashi

    2010-07-01

    A critical step in synaptic development is the differentiation of presynaptic and postsynaptic compartments. This complex process is regulated by a variety of secreted factors that serve as synaptic organizers. Specifically, fibroblast growth factors, Wnts, neurotrophic factors and various other intercellular signaling molecules are proposed to regulate presynaptic and/or postsynaptic differentiation. Many of these factors appear to function at both the neuromuscular junction and in the central nervous system, although the specific function of the molecules differs between the two. Here we review secreted molecules that organize the synaptic compartments and discuss how these molecules shape synaptic development, focusing on mammalian in vivo systems. Their critical role in shaping a functional neural circuit is underscored by their possible link to a wide range of neurological and psychiatric disorders both in animal models and by mutations identified in human patients. © The Authors (2010). Journal Compilation © Federation of European Neuroscience Societies and Blackwell Publishing Ltd.

  15. Weegee’s City Secrets

    OpenAIRE

    TRACHTENBERG, Alan

    2011-01-01

    En tant que photographe indépendant de meurtres, d’accidents, d’incendies, mais aussi de moments de loisirs dans la ville — de scènes de violence et de plaisir — Weegee travaillait essentiellement la nuit et utilisait un flash puissant associé à son appareil-photo de presse. Ses « secrets pour réaliser des photographies avec un flash » consistent à donner des conseils pratiques et techniques pour débutants. Mais au cœur de la rhétorique de ses « secrets » se trouvent des réflexions subtiles e...

  16. Effective Entrepreneurial Choice: The Role of Rationality and Non-Rationality in Three Entrepreneurs Success Stories

    OpenAIRE

    Chong, Anne Michele, Siang Yoon

    2007-01-01

    Good entrepreneurship is important for economic growth and productivity in any modern economy. The purpose of this dissertation is to research how good entrepreneurial decisions are made. In theory, optimal or rational decision making means choosing the best alternative in response to the problem. However, in reality, people do not act rationally because they often cannot make rational choices. The reason is that people do not have enough brain power, time or resources to process the compl...

  17. Lying for Strategic Advantage: Rational and Boundedly Rational Misrepresentation of Intentions

    OpenAIRE

    Crawford, Vincent P.

    2001-01-01

    Starting from Hendricks and McAfee's (2000) example of the Allies' decision to feint at Calais and attack at Normandy on D-Day, this paper models misrepresentation of intentions to competitors or enemies. Allowing for the possibility of bounded strategic rationality and rational players' responses to it yields a sensible account of lying via costless, noiseless messages. In many cases the model has generically unique pure-strategy sequential equilibria, in which rational players exploit bound...

  18. Rationality and institutions : an inquiry into the normative implications of rational choice theory

    OpenAIRE

    Engelen, Bart

    2007-01-01

    I aim to analyze in this dissertation what a desirable basic institutional structure looks like from the perspective of rationality. While the main topic is thus normative in nature, I start by clarifying in the first part what the notion of rationality exactly entails. I do so by focusing explicitly on the economic conception of rationality, according to which a rational individual is motivated to serve his self-interest on the basis of cost-benefit calculations. Such a Homo Economicus is ch...

  19. Transporter-mediated biofuel secretion.

    Science.gov (United States)

    Doshi, Rupak; Nguyen, Tuan; Chang, Geoffrey

    2013-05-07

    Engineering microorganisms to produce biofuels is currently among the most promising strategies in renewable energy. However, harvesting these organisms for extracting biofuels is energy- and cost-intensive, limiting the commercial feasibility of large-scale production. Here, we demonstrate the use of a class of transport proteins of pharmacological interest to circumvent the need to harvest biomass during biofuel production. We show that membrane-embedded transporters, better known to efflux lipids and drugs, can be used to mediate the secretion of intracellularly synthesized model isoprenoid biofuel compounds to the extracellular milieu. Transporter-mediated biofuel secretion sustainably maintained an approximate three- to fivefold boost in biofuel production in our Escherichia coli test system. Because the transporters used in this study belong to the ubiquitous ATP-binding cassette protein family, we propose their use as "plug-and-play" biofuel-secreting systems in a variety of bacteria, cyanobacteria, diatoms, yeast, and algae used for biofuel production. This investigation showcases the potential of expressing desired membrane transport proteins in cell factories to achieve the export or import of substances of economic, environmental, or therapeutic importance.

  20. Facilitating Knowledge Sharing

    DEFF Research Database (Denmark)

    Holdt Christensen, Peter

    knowledge sharing is to ensure that the exchange is seen as equitable for the parties involved, and by viewing the problems of knowledge sharing as motivational problems situated in different organizational settings, the paper explores how knowledge exchange can be conceptualized as going on in four...... distinct situations of exchange denominated organizational exchange yielding extrinsic rewards, organizational exchange yielding intrinsic rewards, financial exchange, and social exchange. The paper argues that each situation of exchange has distinct assumptions about individual behaviour...... and the intermediaries regulating the exchange, and facilitating knowledge sharing should therefore be viewed as a continuum of practices under the influence of opportunistic behaviour, obedience or organizational citizenship behaviour. Keywords: Knowledge sharing, motivation, organizational settings, situations...

  1. A Sharing Proposition.

    Science.gov (United States)

    Sturgeon, Julie

    2002-01-01

    Describes how the University of Vermont and St. Michael's College in Burlington, Vermont cooperated to share a single card access system. Discusses the planning, financial, and marketplace advantages of the cooperation. (EV)

  2. Pro-environmental behavior: rational choice meets moral motivation.

    Science.gov (United States)

    Turaga, Rama Mohana R; Howarth, Richard B; Borsuk, Mark E

    2010-01-01

    The determinants of individual behaviors that provide shared environmental benefits are a longstanding theme in social science research. Alternative behavioral models yield markedly different predictions and policy recommendations. This paper reviews and compares the literatures from two disciplines that appear to be moving toward a degree of convergence. In social psychology, moral theories of pro-environmental behavior have focused on the influence of personal moral norms while recognizing that external factors, such as costs and incentives, ultimately limit the strength of the norm-behavior relationship. Rational choice models, such as the theory of planned behavior in social psychology and the theories of voluntary provision of public goods in economics, have sought to incorporate the effects of personal norms and to measure their importance in explaining behaviors, such as recycling and the demand for green products. This paper explores the relationship between these approaches and their implications for the theory and practice of ecological economics.

  3. Neural basis of quasi-rational decision making.

    Science.gov (United States)

    Lee, Daeyeol

    2006-04-01

    Standard economic theories conceive homo economicus as a rational decision maker capable of maximizing utility. In reality, however, people tend to approximate optimal decision-making strategies through a collection of heuristic routines. Some of these routines are driven by emotional processes, and others are adjusted iteratively through experience. In addition, routines specialized for social decision making, such as inference about the mental states of other decision makers, might share their origins and neural mechanisms with the ability to simulate or imagine outcomes expected from alternative actions that an individual can take. A recent surge of collaborations across economics, psychology and neuroscience has provided new insights into how such multiple elements of decision making interact in the brain.

  4. Interactions in multiagent systems fairness, social optimality and individual rationality

    CERN Document Server

    Hao, Jianye

    2016-01-01

    This book mainly aims at solving the problems in both cooperative and competitive multi-agent systems (MASs), exploring aspects such as how agents can effectively learn to achieve the shared optimal solution based on their local information and how they can learn to increase their individual utility by exploiting the weakness of their opponents. The book describes fundamental and advanced techniques of how multi-agent systems can be engineered towards the goal of ensuring fairness, social optimality, and individual rationality; a wide range of further relevant topics are also covered both theoretically and experimentally. The book will be beneficial to researchers in the fields of multi-agent systems, game theory and artificial intelligence in general, as well as practitioners developing practical multi-agent systems.

  5. Pricing Shared Appreciation Mortgages

    OpenAIRE

    Zhong, Yina

    2006-01-01

    This paper develops a model for the valuation of shared appreciation mortgage (SAM) and examines the effect of reduction in interest rate on the mortgage duration and share of property appreciation lender charges. The recent rise in SAM availability, as a result of some secondary market financial support and prerequisite standardization, motivates a more careful consideration of the underlying SAM value. The primary difference between the SAM model and the model for general traditional mor...

  6. Sharing resources@CERN

    CERN Multimedia

    Maximilien Brice

    2002-01-01

    The library is launching a 'sharing resources@CERN' campaign, aiming to increase the library's utility by including the thousands of books bought by individual groups at CERN. This will improve sharing of information among CERN staff and users. Photo 01: L. to r. Eduardo Aldaz, from the PS division, Corrado Pettenati, Head Librarian, and Isabel Bejar, from the ST division, read their divisional copies of the same book.

  7. SharePoint governance

    OpenAIRE

    Ali, Mudassar

    2013-01-01

    Masteroppgave i informasjons- og kommunikasjonsteknologi IKT590 2013 – Universitetet i Agder, Grimstad SharePoint is a web-based business collaboration platform from Microsoft which is very robust and dynamic in nature. The platform has been in the market for more than a decade and has been adapted by large number of organisations in the world. The platform has become larger in scale, richer in features and is improving consistently with every new version. However, SharePoint ...

  8. Information partnerships--shared data, shared scale.

    Science.gov (United States)

    Konsynski, B R; McFarlan, F W

    1990-01-01

    How can one company gain access to another's resources or customers without merging ownership, management, or plotting a takeover? The answer is found in new information partnerships, enabling diverse companies to develop strategic coalitions through the sharing of data. The key to cooperation is a quantum improvement in the hardware and software supporting relational databases: new computer speeds, cheaper mass-storage devices, the proliferation of fiber-optic networks, and networking architectures. Information partnerships mean that companies can distribute the technological and financial exposure that comes with huge investments. For the customer's part, partnerships inevitably lead to greater simplification on the desktop and more common standards around which vendors have to compete. The most common types of partnership are: joint marketing partnerships, such as American Airline's award of frequent flyer miles to customers who use Citibank's credit card; intraindustry partnerships, such as the insurance value-added network service (which links insurance and casualty companies to independent agents); customer-supplier partnerships, such as Baxter Healthcare's electronic channel to hospitals for medical and other equipment; and IT vendor-driven partnerships, exemplified by ESAB (a European welding supplies and equipment company), whose expansion strategy was premised on a technology platform offered by an IT vendor. Partnerships that succeed have shared vision at the top, reciprocal skills in information technology, concrete plans for an early success, persistence in the development of usable information for all partners, coordination on business policy, and a new and imaginative business architecture.

  9. Regulating the sharing economy

    Directory of Open Access Journals (Sweden)

    Kristofer Erickson

    2016-06-01

    Full Text Available In this introductory essay, we explore definitions of the ‘sharing economy’, a concept indicating both social (relational, communitarian and economic (allocative, profit-seeking aspects which appear to be in tension. We suggest combining the social and economic logics of the sharing economy to focus on the central features of network enabled, aggregated membership in a pool of offers and demands (for goods, services, creative expressions. This definition of the sharing economy distinguishes it from other related peer-to-peer and collaborative forms of production. Understanding the social and economic motivations for and implications of participating in the sharing economy is important to its regulation. Each of the papers in this special issue contributes to knowledge by linking the social and economic aspects of sharing economy practices to regulatory norms and mechanisms. We conclude this essay by suggesting future research to further clarify and render intelligible the sharing economy, not as a contradiction in terms but as an empirically observable realm of socio-economic activity.

  10. A discussion of theoretical and practical rationality

    Energy Technology Data Exchange (ETDEWEB)

    Wahlstroem, B. [Technical Research Centre of Finland, Espoo (Finland). VTT Automation

    1999-12-01

    Theoretical rationality as defined in Expected Utility Theory and amended with other considerations gives a good basis for decision making. One should however always keep in mind that practical rationality often is far more complicated. People use their everyday experience when placed before new problems and this may lead to apparently irrational choices which on a closer scrutiny may be completely rational. Theories in human decision making unfortunately becomes untestable, firstly because a theory taking all considerations into account would be to complex to be practical and secondly because the data needed to test the theory cannot be collected. The benefit of EUT is that it is simple and straightforward as compared with competing theories. In the natural sciences rationality is often seen simply as a problem of optimisation. This view is practical, but it has to include also psychological and sociological considerations. The apparent controversy between natural and behavioural sciences could at least in principle be resolved by a better understanding of the complexity of human rationality. The human mind does not work in isolation, but it is adapted to a social community and a continuously changing environment. Understanding all components of human rationality is a challenge which cannot be solved on a short term basis. An important part of human rationality is connected to the intricate balance between individual and societal utility. The human mind has over thousands of years learnt to resolve that balance, but in the modern society there are decisions which may not be solvable with an intuitive approach and a strategy of trial and error. For these decisions more solid theories of rationality will be needed. EUT can in spite of its dismerits be used as the backbone for such a theory, but it has to be extended with better explanations of both individual and social rationality. If this understanding of the practical aspects of human rationality can be reached

  11. A discussion of theoretical and practical rationality

    International Nuclear Information System (INIS)

    Wahlstroem, B.

    1999-01-01

    Theoretical rationality as defined in Expected Utility Theory and amended with other considerations gives a good basis for decision making. One should however always keep in mind that practical rationality often is far more complicated. People use their everyday experience when placed before new problems and this may lead to apparently irrational choices which on a closer scrutiny may be completely rational. Theories in human decision making unfortunately becomes untestable, firstly because a theory taking all considerations into account would be to complex to be practical and secondly because the data needed to test the theory cannot be collected. The benefit of EUT is that it is simple and straightforward as compared with competing theories. In the natural sciences rationality is often seen simply as a problem of optimisation. This view is practical, but it has to include also psychological and sociological considerations. The apparent controversy between natural and behavioural sciences could at least in principle be resolved by a better understanding of the complexity of human rationality. The human mind does not work in isolation, but it is adapted to a social community and a continuously changing environment. Understanding all components of human rationality is a challenge which cannot be solved on a short term basis. An important part of human rationality is connected to the intricate balance between individual and societal utility. The human mind has over thousands of years learnt to resolve that balance, but in the modern society there are decisions which may not be solvable with an intuitive approach and a strategy of trial and error. For these decisions more solid theories of rationality will be needed. EUT can in spite of its dismerits be used as the backbone for such a theory, but it has to be extended with better explanations of both individual and social rationality. If this understanding of the practical aspects of human rationality can be reached

  12. Seeking to Expand Middle Level Success to All Students: A Not-So-Secret Recipe

    Science.gov (United States)

    White, Jesse

    2014-01-01

    The recipe for success of Strive Preparatory Charter School (formerly West Denver Preparatory Charter School) is not a secret. This summer program, turned four-campus, middle level phenomenon, is proving to satisfy the appetite of parents hungry for a change in their children's educational opportunities. The intent of this article is to share a…

  13. The invisible hand and the rational agent are behind bubbles and crashes

    International Nuclear Information System (INIS)

    Galam, Serge

    2016-01-01

    The 2000 dot-com crash and the 2008 subprime crisis have fueled the belief that the two classical paradigms of economics, the invisible hand and the rational agent, are not well appropriate to describe market dynamics and should be abandoned at the benefit of alternative new theoretical concepts. At odd with such a view, using a simple model of choice dynamics from sociophysics, the invisible hand and the rational agent paradigms are given a new legitimacy. Indeed, it is sufficient to introduce the holding of a few intermediate mini market aggregations by agents sharing their own private information, to recenter the invisible hand and the rational agent at the heart of market self regulation. An elasticity is discovered in the market efficiency mechanism due to the existence of an agent collective anticipation. This elasticity is shown to create spontaneous bubbles, which are rationally founded. At the same time, crashes occur at once when the limit of elasticity is reached. Plasticity can also be achieved through a combination of a crash with a sudden shift of the collective anticipation. Although the findings disclose a path to put an end to the bubble-crash phenomena, it is argued to be rationally not feasible. Bubbles and crashes are thus an intrinsic internal part of classical economics.

  14. LcrG secretion is not required for blocking of Yops secretion in Yersinia pestis

    Directory of Open Access Journals (Sweden)

    Matson Jyl S

    2008-02-01

    Full Text Available Abstract Background LcrG, a negative regulator of the Yersinia type III secretion apparatus has been shown to be primarily a cytoplasmic protein, but is secreted at least in Y. pestis. LcrG secretion has not been functionally analyzed and the relevance of LcrG secretion on LcrG function is unknown. Results An LcrG-GAL4AD chimera, originally constructed for two-hybrid analyses to analyze LcrG protein interactions, appeared to be not secreted but the LcrG-GAL4AD chimera retained the ability to regulate Yops secretion. This result led to further investigation to determine the significance of LcrG secretion on LcrG function. Additional analyses including deletion and substitution mutations of amino acids 2–6 in the N-terminus of LcrG were constructed to analyze LcrG secretion and LcrG's ability to control secretion. Some changes to the N-terminus of LcrG were found to not affect LcrG's secretion or LcrG's secretion-controlling activity. However, substitution of poly-isoleucine in the N-terminus of LcrG did eliminate LcrG secretion but did not affect LcrG's secretion controlling activity. Conclusion These results indicate that secretion of LcrG, while observable and T3SS mediated, is not relevant for LcrG's ability to control secretion.

  15. Using Rational-Emotive Therapy to Prevent Classroom Problems.

    Science.gov (United States)

    Webber, Jo; Coleman, Maggie

    1988-01-01

    Teachers are encouraged to utilize rational-emotive therapy to prevent and deal with classroom behavior problems. Rational-emotive therapy is defined, the ABC model of rational thinking briefly explained, types of irrational thinking identified, and suggestions for becoming a rational thinker are offered. Classroom examples are given. (DB)

  16. Mutations in ppe38 block PE_PGRS secretion and increase virulence of Mycobacterium tuberculosis

    KAUST Repository

    Ates, Louis S.

    2018-01-12

    Mycobacterium tuberculosis requires a large number of secreted and exported proteins for its virulence, immune modulation and nutrient uptake. Most of these proteins are transported by the different type VII secretion systems1,2. The most recently evolved type VII secretion system, ESX-5, secretes dozens of substrates belonging to the PE and PPE families, which are named for conserved proline and glutamic acid residues close to the amino terminus3,4. However, the role of these proteins remains largely elusive1. Here, we show that mutations of ppe38 completely block the secretion of two large subsets of ESX-5 substrates, that is, PPE-MPTR and PE_PGRS, together comprising >80 proteins. Importantly, hypervirulent clinical M. tuberculosis strains of the Beijing lineage have such a mutation and a concomitant loss of secretion5. Restoration of PPE38-dependent secretion partially reverted the hypervirulence phenotype of a Beijing strain, and deletion of ppe38 in moderately virulent M. tuberculosis increased virulence. This indicates that these ESX-5 substrates have an important role in virulence attenuation. Phylogenetic analysis revealed that deletion of ppe38 occurred at the branching point of the ‘modern’ Beijing sublineage and is shared by Beijing outbreak strains worldwide, suggesting that this deletion may have contributed to their success and global distribution6,7.

  17. Mutations in ppe38 block PE_PGRS secretion and increase virulence of Mycobacterium tuberculosis.

    Science.gov (United States)

    Ates, Louis S; Dippenaar, Anzaan; Ummels, Roy; Piersma, Sander R; van der Woude, Aniek D; van der Kuij, Kim; Le Chevalier, Fabien; Mata-Espinosa, Dulce; Barrios-Payán, Jorge; Marquina-Castillo, Brenda; Guapillo, Carolina; Jiménez, Connie R; Pain, Arnab; Houben, Edith N G; Warren, Robin M; Brosch, Roland; Hernández-Pando, Rogelio; Bitter, Wilbert

    2018-02-01

    Mycobacterium tuberculosis requires a large number of secreted and exported proteins for its virulence, immune modulation and nutrient uptake. Most of these proteins are transported by the different type VII secretion systems 1,2 . The most recently evolved type VII secretion system, ESX-5, secretes dozens of substrates belonging to the PE and PPE families, which are named for conserved proline and glutamic acid residues close to the amino terminus 3,4 . However, the role of these proteins remains largely elusive 1 . Here, we show that mutations of ppe38 completely block the secretion of two large subsets of ESX-5 substrates, that is, PPE-MPTR and PE_PGRS, together comprising >80 proteins. Importantly, hypervirulent clinical M. tuberculosis strains of the Beijing lineage have such a mutation and a concomitant loss of secretion 5 . Restoration of PPE38-dependent secretion partially reverted the hypervirulence phenotype of a Beijing strain, and deletion of ppe38 in moderately virulent M. tuberculosis increased virulence. This indicates that these ESX-5 substrates have an important role in virulence attenuation. Phylogenetic analysis revealed that deletion of ppe38 occurred at the branching point of the 'modern' Beijing sublineage and is shared by Beijing outbreak strains worldwide, suggesting that this deletion may have contributed to their success and global distribution 6,7 .

  18. Mutations in ppe38 block PE_PGRS secretion and increase virulence of Mycobacterium tuberculosis

    KAUST Repository

    Ates, Louis S.; Dippenaar, Anzaan; Ummels, Roy; Piersma, Sander R.; van der Woude, Aniek D.; van der Kuij, Kim; Le Chevalier, Fabien; Mata-Espinosa, Dulce; Barrios-Payá n, Jorge; Marquina-Castillo, Brenda; Guapillo, Carolina; Jimé nez, Connie R.; Pain, Arnab; Houben, Edith N. G.; Warren, Robin M.; Brosch, Roland; Herná ndez-Pando, Rogelio; Bitter, Wilbert

    2018-01-01

    Mycobacterium tuberculosis requires a large number of secreted and exported proteins for its virulence, immune modulation and nutrient uptake. Most of these proteins are transported by the different type VII secretion systems1,2. The most recently evolved type VII secretion system, ESX-5, secretes dozens of substrates belonging to the PE and PPE families, which are named for conserved proline and glutamic acid residues close to the amino terminus3,4. However, the role of these proteins remains largely elusive1. Here, we show that mutations of ppe38 completely block the secretion of two large subsets of ESX-5 substrates, that is, PPE-MPTR and PE_PGRS, together comprising >80 proteins. Importantly, hypervirulent clinical M. tuberculosis strains of the Beijing lineage have such a mutation and a concomitant loss of secretion5. Restoration of PPE38-dependent secretion partially reverted the hypervirulence phenotype of a Beijing strain, and deletion of ppe38 in moderately virulent M. tuberculosis increased virulence. This indicates that these ESX-5 substrates have an important role in virulence attenuation. Phylogenetic analysis revealed that deletion of ppe38 occurred at the branching point of the ‘modern’ Beijing sublineage and is shared by Beijing outbreak strains worldwide, suggesting that this deletion may have contributed to their success and global distribution6,7.

  19. Labia Majora Share

    Directory of Open Access Journals (Sweden)

    Hanjing Lee

    2017-01-01

    Full Text Available Defects involving specialised areas with characteristic anatomical features, such as the nipple, upper eyelid, and lip, benefit greatly from the use of sharing procedures. The vulva, a complex 3-dimensional structure, can also be reconstructed through a sharing procedure drawing upon the contralateral vulva. In this report, we present the interesting case of a patient with chronic, massive, localised lymphedema of her left labia majora that was resected in 2011. Five years later, she presented with squamous cell carcinoma over the left vulva region, which is rarely associated with chronic lymphedema. To the best of our knowledge, our management of the radical vulvectomy defect with a labia majora sharing procedure is novel and has not been previously described. The labia major flap presented in this report is a shared flap; that is, a transposition flap based on the dorsal clitoral artery, which has consistent vascular anatomy, making this flap durable and reliable. This procedure epitomises the principle of replacing like with like, does not interfere with leg movement or patient positioning, has minimal donor site morbidity, and preserves other locoregional flap options for future reconstruction. One limitation is the need for a lax contralateral vulva. This labia majora sharing procedure is a viable option in carefully selected patients.

  20. Economic Rationality in the Ultimatum Game

    Directory of Open Access Journals (Sweden)

    Jan Fiala

    2017-03-01

    Full Text Available Rigorous application of experimental methodology to the interdisciplinary research of economic decision making is the main purpose of our work. In this paper, we introduce the main decisionmaking theories and outline economic rationality. We explain why we find it useful to discriminate between the “irrational” and “non-rational” components of decision making. We offer an oriented interdisciplinary point of view on economic rationality. In the applied section, we describe the main features of the Ultimatum game and summarize the up-to-date theories explaining the non-rational course of the game. We discuss in detail the reported relations between the nominal value of the stakes and the distribution of the offers and responses. We introduce the blinded, randomized Ultimatum game experiment that we conducted in our laboratory. We stress the importance of anonymity of the study subjects and the difference in salience of a factual reward against a  hypothetical reward. We present the results of our study, showing that a  duly chosen non-monetary reward, directly inconvertible into money, leads to a different offer distribution in the Ultimatum game without the necessity to invest excessive sums of money in the rewards. We compare our results to research published by other authors. According to our theory, the rational, non-rational and irrational components contribute to the decision making in Ultimatum differently depending on the different reward stakes.

  1. [Rationalization and rationing at the bedside. A normative and empirical status quo analysis].

    Science.gov (United States)

    Strech, D

    2014-02-01

    The topic of bedside rationing is increasingly discussed in Germany. Further need for clarification exists for the question how bedside rationing (e.g., in the area of overcare) can be justified despite coexistent inefficiencies. This paper outlines and analyses the relationship of waste avoidance and rationing from an ethical perspective. Empirical findings regarding the status quo of bedside rationing and rationalization are presented. These normative and empirical explorations will then be further specified regarding opportunities for future physician-driven activities to tackle overuse. The self-government partners in Germany should communicate more explicitly within their communities and to the public how and with which benchmarks they aim to reduce inefficient health care (overuse) in an appropriate manner. Physician-driven activities such as the "Choosing Wisely®" initiative in the USA could provide a first step to raise the awareness for overuse among physicians as well as in the public.

  2. Collaborate, compete and share

    Science.gov (United States)

    Pugliese, Emanuele; Castellano, Claudio; Marsili, Matteo; Pietronero, Luciano

    2009-02-01

    We introduce and study a model of an interacting population of agents who collaborate in groups which compete for limited resources. Groups are formed by random matching agents and their worth is determined by the sum of the efforts deployed by agents in group formation. Agents, on their side, have to share their effort between contributing to their group’s chances to outcompete other groups and resource sharing among partners, when the group is successful. A simple implementation of this strategic interaction gives rise to static and evolutionary properties with a very rich phenomenology. A robust emerging feature is the separation of the population between agents who invest mainly in the success of their group and agents who concentrate in getting the largest share of their group’s profits.

  3. Urban sharing culture

    DEFF Research Database (Denmark)

    Fjalland, Emmy Laura Perez

    of the structures of the networked urban mobilities and holds the potentials to change the future mobilities. References Bauman, Zygmunt. 2000. Liquid Modernity. Cambridge: Polity. Beck, Ulrich. 1992. Risk Society: Towards a New Modernity (Published in Association with Theory, Culture & Society). London: SAGE......In urban areas sharing cultures, services and economies are rising. People share, rent and recycle their homes, cars, bikes, rides, tools, cloths, working space, knowhow and so on. The sharing culture can be understood as mobilities (Kesselring and Vogl 2013) of goods, values and ideas reshaping...... problems and side effects from concentration of consumption and contamination; and due to the shift from ownership to access it change our basic social cultural norms (Sayer 2005; Sayer 2011) about the ‘good’ life and social status (Freudendal-Pedersen 2007), commons and individuality, responsibility...

  4. Native Small Airways Secrete Bicarbonate

    OpenAIRE

    Shamsuddin, A. K. M.; Quinton, Paul M.

    2014-01-01

    Since the discovery of Cl− impermeability in cystic fibrosis (CF) and the cloning of the responsible channel, CF pathology has been widely attributed to a defect in epithelial Cl− transport. However, loss of bicarbonate (HCO3−) transport also plays a major, possibly more critical role in CF pathogenesis. Even though HCO3− transport is severely affected in the native pancreas, liver, and intestines in CF, we know very little about HCO3− secretion in small airways, the principle site of morbidi...

  5. Weegee’s City Secrets

    Directory of Open Access Journals (Sweden)

    Alan TRACHTENBERG

    2010-03-01

    Full Text Available En tant que photographe indépendant de meurtres, d’accidents, d’incendies, mais aussi de moments de loisirs dans la ville — de scènes de violence et de plaisir — Weegee travaillait essentiellement la nuit et utilisait un flash puissant associé à son appareil-photo de presse. Ses « secrets pour réaliser des photographies avec un flash » consistent à donner des conseils pratiques et techniques pour débutants. Mais au cœur de la rhétorique de ses « secrets » se trouvent des réflexions subtiles et convaincantes révélant la relation entre la lumière et l’obscurité, et plus particulièrement la manière dont la lumière du flash permet de rendre visible l’obscurité. Dans le récit de Weegee, le flash confère à la photographie le pouvoir d’écrire — d’écrire avec la lumière, un mode de représentation singulièrement approprié pour enregistrer des instants de vie dans les rues nocturnes de la ville.As a freelance photographer of crime, accidents, fires, and also of the recreational life of the city—scenes of violence and of pleasure—Weegee worked mainly at night and employed a powerful photoflash attachment to his press camera. His "secrets of shooting with photoflash" consist of practical technical advice for beginners. But within the rhetoric of his "secrets" there lie cogent and subtle reflections on the relation of light to darkness, especially on the way the flash of light makes darkness visible. In Weegee’s account, the photoflash gives photography the power of writing—writing with light, a mode of picturing uniquely suited to recording instants of life on city streets at night.

  6. Secretion management in the mechanically ventilated patient.

    Science.gov (United States)

    Branson, Richard D

    2007-10-01

    Secretion management in the mechanically ventilated patient includes routine methods for maintaining mucociliary function, as well as techniques for secretion removal. Humidification, mobilization of the patient, and airway suctioning are all routine procedures for managing secretions in the ventilated patient. Early ambulation of the post-surgical patient and routine turning of the ventilated patient are common secretion-management techniques that have little supporting evidence of efficacy. Humidification is a standard of care and a requisite for secretion management. Both active and passive humidification can be used. The humidifier selected and the level of humidification required depend on the patient's condition and the expected duration of intubation. In patients with thick, copious secretions, heated humidification is superior to a heat and moisture exchanger. Airway suctioning is the most important secretion removal technique. Open-circuit and closed-circuit suctioning have similar efficacy. Instilling saline prior to suctioning, to thin the secretions or stimulate a cough, is not supported by the literature. Adequate humidification and as-needed suctioning are the foundation of secretion management in the mechanically ventilated patient. Intermittent therapy for secretion removal includes techniques either to simulate a cough, to mechanically loosen secretions, or both. Patient positioning for secretion drainage is also widely used. Percussion and postural drainage have been widely employed for mechanically ventilated patients but have not been shown to reduce ventilator-associated pneumonia or atelectasis. Manual hyperinflation and insufflation-exsufflation, which attempt to improve secretion removal by simulating a cough, have been described in mechanically ventilated patients, but neither has been studied sufficiently to support routine use. Continuous lateral rotation with a specialized bed reduces atelectasis in some patients, but has not been shown

  7. Techno-Optimism and Rational Superstition

    DEFF Research Database (Denmark)

    Wilson, Alexander

    2017-01-01

    our common understanding of reason and rationality? To adopt rational expectations about the world, after all, should we not attempt to avoid the emotional over-determination of our assessments? I show that applied reason is conceptually entangled with this superstitious optimism in the continued...... of retro-causation, where the future is held to somehow have a retroactive effect on the past. This suggests, I argue, that the underlying mechanism by which techno-optimism is supposed to be instrumental in bringing about the future is fundamentally superstitious. But does this superstition not go against...... successes of technology. The article thus reveals a curious sense in which reason is intrinsically superstitious. I offer an evolutionary explanation for this, showing that the biological origins of reason will by nature tend to produce rational agents which are superstitiously bound to realism...

  8. Autonomy, rationality and the wish to die.

    Science.gov (United States)

    Clarke, D M

    1999-12-01

    Although suicide has traditionally carried a negative sanction in Western societies, this is now being challenged, and while there remains substantial public concern surrounding youth and elder suicide, there is a paradoxical push to relax the prohibition under certain circumstances. Central to the arguments behind this are the principles of respect for autonomy and the importance of rationality. It is argued here that the concepts of rationality and autonomy, while valuable, are not strong enough to substantiate a categorical "right to suicide" and that the concepts of "understandability" and "respect" are more useful and able to provide the foundation for responding to a person expressing a wish to die. Roman suicide, sometimes held as an example of "rational suicide", illustrates the effects of culture, tradition and values on the attitudes to, and the practice of, suicide.

  9. Rational speculative bubbles: A critical view

    Directory of Open Access Journals (Sweden)

    Radonjić Ognjen

    2007-01-01

    Full Text Available According to the theory of rational bubbles, the bubble is present whenever asset prices progressively diverge from their fundamental value, which occurs because agents expect that asset prices will continue to grow exponentially (self-fulfilling prophecies far in the future and consistently, which promises the realization of ever larger capital gains. In our opinion, the basic shortcoming of this theory refers to the assumption that all market agents are perfectly informed and rational and, accordingly, form homogeneous expectations. The model does not explain decision-making processes or expectation formation, nor does it detect potential psychological and institutional factors that might significantly influence decision making processes and market participants’ reactions to news. Since assumptions of the model critically determine its validity, we conclude that comprehensiveness of the rational bubble model is, to put it mildly, limited.

  10. Changing Conspiracy Beliefs through Rationality and Ridiculing.

    Science.gov (United States)

    Orosz, Gábor; Krekó, Péter; Paskuj, Benedek; Tóth-Király, István; Bőthe, Beáta; Roland-Lévy, Christine

    2016-01-01

    Conspiracy theory (CT) beliefs can be harmful. How is it possible to reduce them effectively? Three reduction strategies were tested in an online experiment using general and well-known CT beliefs on a comprehensive randomly assigned Hungarian sample ( N = 813): exposing rational counter CT arguments, ridiculing those who hold CT beliefs, and empathizing with the targets of CT beliefs. Several relevant individual differences were measured. Rational and ridiculing arguments were effective in reducing CT, whereas empathizing with the targets of CTs had no effect. Individual differences played no role in CT reduction, but the perceived intelligence and competence of the individual who conveyed the CT belief-reduction information contributed to the success of the CT belief reduction. Rational arguments targeting the link between the object of belief and its characteristics appear to be an effective tool in fighting conspiracy theory beliefs.

  11. Mathematical rationalization for the renal tubular transport: revised concepts.

    Science.gov (United States)

    Mioni, Roberto; Marega, Alessandra; Romano, Giulio; Montanaro, Domenico

    2017-09-01

    The current emphasis on kinetics and in situ control of molecular exchanges, across the tubular membrane, has not been paralleled by corresponding improvements in our understanding of tubular behaviour at the macroscopic level of classical physiology. In this paper, we propose a mathematical rationalization of macroscopic tubular transport by means of a principal transport equation, originating from the law of mass action between substrate and carrier. The other equations, derived from the main one, demonstrate the possibility of distinguishing between transporters with low affinity and high capacity and transporters with high affinity and low capacity. Moreover, our model formalizes both tubular reabsorption and tubular secretion. Regarding the renal calcium handling, our model confirms the two-compartment system proposed by Mioni in 1971, with some important variants, which are in agreement with the fractional reabsorptions of this cation along the tubule, as verified by micro-puncture technique. To obtain the frequency distribution of saturated tubules, we have utilized the infinitesimal analysis method, starting from the equations proposed by Smith in 1943, concluding that all titration curves result from the combined effect of enzymatic approach and anatomical heterogeneity of the nephrons. The theoretical equations included in our manuscript reflect substantial and palpable physiological mechanisms able to suggest diagnosis and therapy of some electrolyte and hormonal disorders. At the end of this paper, we highlight advantages and disadvantages detectable by comparing our mathematical approach with Marshall's and Bijvoet's methods, proposed, respectively, in 1976 and 1984.

  12. Sharing cost in social community networks

    DEFF Research Database (Denmark)

    Pal, Ranjan; Elango, Divya; Wardana, Satya Ardhy

    2012-01-01

    their deployment in a residential locality. Our proposed mechanism accounts for heterogeneous user preferences towards different router features and comes up with the optimal (feature-set, user costs) router blueprint that satisfies each user in a locality, in turn motivating them to buy routers and thereby improve......Wireless social community networks (WSCNs) is an emerging technology that operate in the unlicensed spectrum and have been created as an alternative to cellular wireless networks for providing low-cost, high speed wireless data access in urban areas. WSCNs is an upcoming idea that is starting...... reflect their slow progress in capturing the WiFi router market. In this paper, we look at a router design and cost sharing problem in WSCNs to improve deployment. We devise a simple to implement, successful, budget-balanced, ex-post efficient, and individually rational auction-based mechanism...

  13. Rationality and Emotions in Decision Making

    Directory of Open Access Journals (Sweden)

    Olga Markič

    2009-12-01

    Full Text Available Decision making is traditionally viewed as a rational process where reason calculates the best way to achieve the goal. Investigations from different areas of cognitive science have shown that human decisions and actions are much more influenced by intuition and emotional responses then it was previously thought. In this paper I examine the role of emotion in decision making, particularly Damasio’s hypothesis of somatic markers and Green’s dual process theory of moral judgment. I conclude the paper with the discussion of the threat that deliberation and conscious rationality is an illusion.

  14. Rationality and drug use: an experimental approach.

    Science.gov (United States)

    Blondel, Serge; Lohéac, Youenn; Rinaudo, Stéphane

    2007-05-01

    In rational addiction theory, higher discount rates encourage drug use. We test this hypothesis in the general framework of rationality and behaviour under risk. We do so using an experimental design with real monetary incentives. The decisions of 34 drug addicts are compared with those of a control group. The decisions of drug users (DU) are not any less consistent with standard theories of behaviour over time and under risk. Further, there is no difference in the estimated discount rate between drug users and the control group, but the former do appear to be more risk-seeking.

  15. Rationalization with ruled surfaces in architecture

    DEFF Research Database (Denmark)

    Steenstrup, Kasper Hornbak

    This thesis addresses the problems of rationalizing and segmenting large scale 3D models, and how to handle difficult production constraints in this area. The design choices when constructing large scale architecture are influenced by the budget. Therefore I strive to minimize the amount of time...... and material needed for production. This makes advanced free form architecture viable for low cost projects, allowing the architects to realize their designs. By pre-cutting building blocks using hot wire robots, the amount of milling necessary can be reduced drastically. I do this by rationalizing...

  16. Towards a formal logic of design rationalization

    DEFF Research Database (Denmark)

    Galle, Per

    1997-01-01

    Certain extensions to standard predicate logic are proposed and used as a framework for critical logical study of patterns of inference in design reasoning. It is shown that within this framework a modal logic of design rationalization (suggested by an empirical study reported earlier) can...... be formally defined in terms of quantification over a universe of discourse of ‘relevant points of view’. Five basic principles of the extended predicate logic are listed, on the basis of which the validity of ten modal patterns of inference encountered in design rationalization is tested. The basic idea...

  17. Were Neanderthals Rational? A Stoic Approach

    Directory of Open Access Journals (Sweden)

    Kai Whiting

    2018-04-01

    Full Text Available This paper adopts the philosophical approach of Stoicism as the basis for re-examining the cognitive and ethical relationship between Homo sapiens and Neanderthals. Stoicism sets out a clear criterion for the special moral status of human beings, namely rationality. We explore to what extent Neanderthals were sufficiently rational to be considered “human”. Recent findings in the fields of palaeoanthropology and palaeogenetics show that Neanderthals possessed high-level cognitive abilities and produced viable offspring with anatomically modern humans. Our discussion offers insights for reflecting on the relationship between humans and other forms of natural life and any moral obligations that result.

  18. Rational homotopy theory and differential forms

    CERN Document Server

    Griffiths, Phillip

    2013-01-01

    This completely revised and corrected version of the well-known Florence notes circulated by the authors together with E. Friedlander examines basic topology, emphasizing homotopy theory. Included is a discussion of Postnikov towers and rational homotopy theory. This is then followed by an in-depth look at differential forms and de Tham's theorem on simplicial complexes. In addition, Sullivan's results on computing the rational homotopy type from forms is presented.  New to the Second Edition: *Fully-revised appendices including an expanded discussion of the Hirsch lemma*Presentation of a natu

  19. Rational decisions, random matrices and spin glasses

    Science.gov (United States)

    Galluccio, Stefano; Bouchaud, Jean-Philippe; Potters, Marc

    We consider the problem of rational decision making in the presence of nonlinear constraints. By using tools borrowed from spin glass and random matrix theory, we focus on the portfolio optimisation problem. We show that the number of optimal solutions is generally exponentially large, and each of them is fragile: rationality is in this case of limited use. In addition, this problem is related to spin glasses with Lévy-like (long-ranged) couplings, for which we show that the ground state is not exponentially degenerate.

  20. Rational Homological Stability for Automorphisms of Manifolds

    DEFF Research Database (Denmark)

    Grey, Matthias

    In this thesis we prove rational homological stability for the classifying spaces of the homotopy automorphisms and block di↵eomorphisms of iterated connected sums of products of spheres of a certain connectivity.The results in particular apply to the manifolds       Npg,q  = (#g(Sp x Sq)) - int...... with coefficients in the homology of the universal covering, which is studied using rational homology theory. The result for the block di↵eomorphisms is deduced from the homological stability for the homotopy automorphisms upon using Surgery theory. Themain theorems of this thesis extend the homological stability...

  1. Rationing in the presence of baselines

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Moreno-Ternero, Juan D.; Østerdal, Lars Peter

    2013-01-01

    We analyze a general model of rationing in which agents have baselines, in addition to claims against the (insufficient) endowment of the good to be allocated. Many real-life problems fit this general model (e.g., bankruptcy with prioritized claims, resource allocation in the public health care...... sector, water distribution in drought periods). We introduce (and characterize) a natural class of allocation methods for this model. Any method within the class is associated with a rule in the standard rationing model, and we show that if the latter obeys some focal properties, the former obeys them...

  2. Information Sharing and Knowledge Sharing as Communicative Activities

    Science.gov (United States)

    Savolainen, Reijo

    2017-01-01

    Introduction: This paper elaborates the picture of information sharing and knowledge sharing as forms of communicative activity. Method: A conceptual analysis was made to find out how researchers have approached information sharing and knowledge sharing from the perspectives of transmission and ritual. The findings are based on the analysis of one…

  3. Shared Care in Diabetes?

    DEFF Research Database (Denmark)

    Bødker, Keld

    2006-01-01

    The Danish National Board of Health has recently released a report that is intended to mark the start of a new project to establish it support for shared care in diabetes. In this paper I raise a number of concerns where lack of attention towards participation from prospective users constitute...

  4. Sharing (and) familiarities

    DEFF Research Database (Denmark)

    Rasmussen, Jon Dag; Winther, Ida Wentzel; Davies, Hayley

    but not exclusive to lifestories/biographies, travels, times, spaces and material items, bodies and intimate knowledge of one another, surnames - in the subjective lives of family members? Sociology has traditionally been preoccupied with notions and logics of sharing in homely contexts (e.g. Simmel’s work...

  5. The Sharing Economy

    DEFF Research Database (Denmark)

    Hamari, Juho; Sjöklint, Mimmi; Ukkonen, Antti

    2016-01-01

    Information and communications technologies (ICTs) have enabled the rise of so-called “Collaborative Consumption” (CC): the peer-to-peer-based activity of obtaining, giving, or sharing the access to goods and services, coordinated through community-based online services. CC has been expected to a...

  6. Shared goals and development

    DEFF Research Database (Denmark)

    Blomberg, Olle

    2015-01-01

    undemanding for children to engage in, and therefore has the potential to play a part in fostering their understanding of other minds. Part of the functional role of shared goals is to enable agents to choose means that are appropriate to realising a goal with others rather than individually. By offering...

  7. Normal and abnormal secretion by haemopoietic cells

    Science.gov (United States)

    STINCHCOMBE, JANE C; GRIFFITHS, GILLIAN M

    2001-01-01

    The secretory lysosomes found in haemopoietic cells provide a very efficient mechanism for delivering the effector proteins of many immune cells in response to antigen recognition. Although secretion shows some similarities to the secretion of specialized granules in other secretory cell types, some aspects of secretory lysosome release appear to be unique to melanocytes and cells of the haemopoietic lineage. Mast cells and platelets have provided excellent models for studying secretion, but recent advances in characterizing the immunological synapse allow a very fine dissection of the secretory process in T lymphocytes. These studies show that secretory lysosomes are secreted from the centre of the talin ring at the synapse. Proper secretion requires a series of Rab and cytoskeletal elements which play critical roles in the specialized secretion of lysosomes in haemopoietic cells. PMID:11380687

  8. Melatonin Secretion Pattern in Critically Ill Patients

    DEFF Research Database (Denmark)

    Boyko, Yuliya; Holst, René; Jennum, Poul

    2017-01-01

    effect of remifentanil on melatonin secretion. We found that the risk of atypical sleep compared to normal sleep was significantly lower (p REM) sleep was only observed during the nonsedation period. We found preserved diurnal pattern of melatonin...... secretion in these patients. Remifentanil did not affect melatonin secretion but was associated with lower risk of atypical sleep pattern. REM sleep was only registered during the period of nonsedation.......Critically ill patients have abnormal circadian and sleep homeostasis. This may be associated with higher morbidity and mortality. The aims of this pilot study were (1) to describe melatonin secretion in conscious critically ill mechanically ventilated patients and (2) to describe whether melatonin...

  9. Thymidine secretion by hybridoma and myeloma cells

    International Nuclear Information System (INIS)

    Spilsberg, Bjorn; Rise, Frode; Petersen, Dirk; Nissen-Meyer, Jon

    2006-01-01

    Secretion of thymidine appeared to be a common property of hybridoma and myeloma cells, but not of other cell types, which were tested. Of three hybridoma cell lines tested, all secreted thymidine in amounts resulting in the accumulation of thymidine to concentrations of 10-20 μM in the culture medium. Also three of five myeloma cell lines that were analyzed secrete thymidine, but none of the other cell types that were studied. Thymidine was purified to homogeneity (4 mg purified from 3 l of culture medium) and identified as such by nuclear magnetic resonance spectroscopy. The cells that secreted thymidine showed high resistance to the growth inhibitory effect of thymidine

  10. Models of bounded rationality under certainty

    NARCIS (Netherlands)

    Rasouli, S.; Timmermans, H.J.P.; Rasouli, S.; Timmermans, H.J.P.

    2015-01-01

    Purpose This chapter reviews models of decision-making and choice under conditions of certainty. It allows readers to position the contribution of the other chapters in this book in the historical development of the topic area. Theory Bounded rationality is defined in terms of a strategy to simplify

  11. Suicide: rationality and responsibility for life.

    Science.gov (United States)

    Ho, Angela Onkay

    2014-03-01

    Death by suicide is widely held as an undesirable outcome. Most Western countries place emphasis on patient autonomy, a concept of controversy in relation to suicide. This paper explores the tensions between patients' rights and many societies' overarching desire to prevent suicide, while clarifying the relations between mental disorders, mental capacity, and rational suicide. A literature search was conducted using search terms of suicide and ethics in the PubMed and LexisNexis Academic databases. Article titles and abstracts were reviewed and deemed relevant if the paper addressed topics of rational suicide, patient autonomy or rights, or responsibility for life. Further articles were found from reference lists and by suggestion from preliminary reviewers of this paper. Suicidal behaviour in a person cannot be reliably predicted, yet various associations and organizations have developed standards of care for managing patients exhibiting suicidal behaviour. The responsibility for preventing suicide tends to be placed on the treating clinician. In cases where a person is capable of making treatment decisions--uninfluenced by any mental disorder--there is growing interest in the concept of rational suicide. There is much debate about whether suicide can ever be rational. Designating suicide as an undesirable event that should never occur raises the debate of who is responsible for one's life and runs the risk of erroneously attributing blame for suicide. While upholding patient rights of autonomy in psychiatric care is laudable, cases of suicidality warrant a delicate consideration of clinical judgment, duty of care, and legal obligations.

  12. Rationality, Motivation, Effectiveness: Bureaucracy's Triple Legacy.

    Science.gov (United States)

    Foster, William

    1984-01-01

    The United States has inherited an ideology concerning politics, culture, and the state that values the democratic distribution by the schools of rationality and of social motivation. Unfortunately, the bureaucratic organization of schools discourages this distribution, and the incentives for changing either the organization or the distribution…

  13. Rational approximations and quantum algorithms with postselection

    NARCIS (Netherlands)

    Mahadev, U.; de Wolf, R.

    2015-01-01

    We study the close connection between rational functions that approximate a given Boolean function, and quantum algorithms that compute the same function using post-selection. We show that the minimal degree of the former equals (up to a factor of 2) the minimal query complexity of the latter. We

  14. [Popper's critical rationalism and the biomedical sciences].

    Science.gov (United States)

    Havlícek, J

    1993-11-08

    Popper's rationalism makes an important contribution of the 20th century philosophy to the methodology of natural sciences. Through its criterion of falsification, it enabled the scientists to take a critical but constructive view on hypotheses, conjectures and theories. This attitude found its application also in medicine.

  15. Parity, Incomparability and Rationally Justified Choice

    NARCIS (Netherlands)

    Boot, Martijn

    2009-01-01

    This article discusses the possibility of a rationally justified choice between two options neither of which is better than the other while they are not equally good either (‘3NT’). Joseph Raz regards such options as incomparable and argues that reason cannot guide the choice between them. Ruth

  16. Heterogeneous Parking Market Subject to Parking Rationing

    Directory of Open Access Journals (Sweden)

    Saeed Asadi Bagloee

    2015-01-01

    Full Text Available Different types of drivers and parking spaces delineate a heterogeneous parking market for which the literature has yet to provide a model applicable to the real world. The main obstacle is computational complexities of considering various parking restrictions along with traffic congestion on the road network. In this study, the heterogeneity aspects are considered within a Logit parking choice model. A mathematical programming problem was introduced to explicitly consider parking capacities and parking rationing constraints. The parking rationing is defined as any arrangement to reserve parking space for some specific demand such as parking permit, private parking, VIP parking, and different parking durations. Introduction of parking rationing in the presence of other constraints is a unique factor in this study which makes the model more realistic. The algorithm was tested on a central business district case study. The results prove that the algorithm is able to converge rapidly. Among the algorithm’s output are shadow prices of the parking capacity and parking rationing constraints. The shadow prices contain important information which is key to addressing a variety of parking issues, such as the location of parking shortages, identification of fair parking charges, viability of parking permits, and the size of reserved parking.

  17. Rationally inattentive seller: sales and discrete pricing

    Czech Academy of Sciences Publication Activity Database

    Matějka, Filip

    2016-01-01

    Roč. 83, č. 3 (2016), s. 1125-1155 ISSN 0034-6527 R&D Projects: GA ČR(CZ) GPP402/11/P236 Institutional support: RVO:67985998 Keywords : rational inattention * nominal rigidity * sticky prices Subject RIV: AH - Economics Impact factor: 4.030, year: 2016

  18. Viagra: : A success story for rationing?

    NARCIS (Netherlands)

    Klein, R.; Sturm, H.

    2002-01-01

    The 1998 launch of Viagra prompted widespread fears about the budgetary consequences for insurers and governments, all the more so since Viagra was only the first of a new wave of so-called lifestyle drugs. The fears have turned out to be greatly exaggerated. This paper analyzes the rationing

  19. Confucianism and Critical Rationalism: Friends or Foes?

    Science.gov (United States)

    Lam, Chi-Ming

    2017-01-01

    According to Karl Popper's critical rationalism, criticism is the only way we have of systematically detecting and learning from our mistakes so as to get nearer to the truth. Meanwhile, it is arguable that the emphasis of Confucianism on creating a hierarchical and harmonious society can easily lead to submission rather than opposition, producing…

  20. Rational Rhymes for Addressing Common Childhood Issues

    Science.gov (United States)

    Warren, Jeffrey M.

    2011-01-01

    Music-based interventions are valuable tools counselors can use when working with children. Specific types of music-based interventions, such as songs or rhymes, can be especially pertinent in addressing the thoughts, feelings, and behaviors of children. Rational-emotive behavior therapy (REBT) provides a therapeutic framework that encourages…

  1. Rationalization of water consumption in paper industry

    Directory of Open Access Journals (Sweden)

    Žarković Darja

    2004-01-01

    Full Text Available The subject of this paper was to consider the possibilities of economical paper production with rationalization of water consumption. In accordance with the principles of viable development. The pulp & paper industry has had to face global market needs and strict regulation concerning the environment. The basic motive was to provide consistent and high product quality, which is competitive on the market. The pulp & paper industry is one of the largest consumers and pollutants of natural resources. In that light, the rationalization of raw material, water, energy and chemicals consumption with minimization of environmental impact is essential. The European directive on environmental protection obliges producers of pulp & paper to decrease the volume of wastewater and to increase the efficiency treatment. Pulp and paper industry in Serbia and Montenegro will also be faced with the demands for environmental protection. Numerous examples of water consumption rationalization and improvement of water quality in the pulp & paper industry could be found in different literature sources. It is necessary to increase water system closure and implement up-to-date treatment methods. The possibilities for water consumption rationalization, in a real system the paperboard mill UMKA, were examined.

  2. Macroeconomics after Two Decades of Rational Expectations.

    Science.gov (United States)

    McCallum, Bennett T.

    1994-01-01

    Discusses real business cycle analysis, growth theory, and other economic concepts in the context of the rational expectations revolution in macroeconomics. Focuses on post-1982 research. Concludes that the rejuvenation of growth analysis is an encouraging development because it could lead to changes in welfare policy. (CFR)

  3. Rigid pricing and rationally inattentive consumer

    Czech Academy of Sciences Publication Activity Database

    Matějka, Filip

    2010-01-01

    Roč. 20, č. 2 (2010), s. 1-40 ISSN 1211-3298 R&D Projects: GA MŠk LC542 Institutional research plan: CEZ:AV0Z70850503 Keywords : rational inattention * nominal rigidity Subject RIV: AH - Economics http://www.cerge-ei.cz/pdf/wp/Wp409.pdf

  4. The Assessment of Rational Thinking: IQ ? RQ

    Science.gov (United States)

    Stanovich, Keith E.; West, Richard F.

    2014-01-01

    In this article the authors argue that distinguishing between rationality and intelligence helps explain how people can be, at the same time, intelligent and irrational (Stanovich, 2009). As such, researchers need to study separately the individual differences in cognitive skills that underlie intelligence and the individual differences in…

  5. Rational and Mechanistic Perspectives on Reinforcement Learning

    Science.gov (United States)

    Chater, Nick

    2009-01-01

    This special issue describes important recent developments in applying reinforcement learning models to capture neural and cognitive function. But reinforcement learning, as a theoretical framework, can apply at two very different levels of description: "mechanistic" and "rational." Reinforcement learning is often viewed in mechanistic terms--as…

  6. Effecting attitudinal change towards rational drug use.

    Science.gov (United States)

    Singh, T; Natu, M V

    1995-01-01

    Attitudes of 40 interns towards rational drug use (RDU) were assessed, using a standardized Likert type scale. The assessment was repeated after 4 months to evaluate the effect of usual working conditions of the hospital. After this period, the attitudes had slided towards negative side (p attitudes of test group returned towards positive side (p attitudes.

  7. Rationalizing Cooperation: Moroccan Craft, Politics, and Education

    Science.gov (United States)

    Nicholas, Claire

    2018-01-01

    State attempts to rationalize Moroccan craft education reflect the ambivalent status of traditional knowledge in a modern economy. Female artisans, recently organized as a cooperative, navigate this ambivalence in a weaving "theory" class and in their "occupation" of the cooperative structure itself. During performances of…

  8. Feeling food: The rationality of perception

    NARCIS (Netherlands)

    Beekman, V.

    2006-01-01

    Regulatory bodies tend to treat people¿s emotional responses towards foods as a nuisance for rational opinion-formation and decision-making. This position is thought to be supported by such evidence as: (1) people showing negative emotional responses to the idea of eating meat products from

  9. CREDIT RATIONING AND SME DEVELOPMENT IN BOTSWANA ...

    African Journals Online (AJOL)

    None

    have the negative effect of stifling the growth of potential firms, thereby .... credit market may explain the credit rationing behaviour of banks to ... derive policy implications to enhance access to bank credit by SMEs. 4. ..... The main challenges to SMEs identified by the study were non-payment of outstanding ... This decision is.

  10. The quantum symmetry of rational field theories

    International Nuclear Information System (INIS)

    Fuchs, J.

    1993-12-01

    The quantum symmetry of a rational quantum field theory is a finite-dimensional multi-matrix algebra. Its representation category, which determines the fusion rules and braid group representations of superselection sectors, is a braided monoidal C*-category. Various properties of such algebraic structures are described, and some ideas concerning the classification programme are outlined. (orig.)

  11. More Than the Ten Rational Thinking Processes.

    Science.gov (United States)

    Torrance, E. Paul

    1980-01-01

    The 10 rational processes (which include recalling and imagining, classifying and generalizing, comparing and evaluating, analyzing and synthesizing, and deducting and inferring) are examined from a cultural and historical perspective, with particular emphasis on the suprarational aspects of creative thinking. A three stage model for facilitating…

  12. Rationality, Theory Acceptance and Decision Theory

    Directory of Open Access Journals (Sweden)

    J. Nicolas Kaufmann

    1998-06-01

    Full Text Available Following Kuhn's main thesis according to which theory revision and acceptance is always paradigm relative, I propose to outline some possible consequences of such a view. First, asking the question in what sense Bayesian decision theory could serve as the appropriate (normative theory of rationality examined from the point of view of the epistemology of theory acceptance, I argue that Bayesianism leads to a narrow conception of theory acceptance. Second, regarding the different types of theory revision, i.e. expansion, contraction, replacement and residuals shifts, I extract from Kuhn's view a series of indications showing that theory replacement cannot be rationalized within the framework of Bayesian decision theory, not even within a more sophisticated version of that model. Third, and finally, I will point to the need for a more comprehensive model of rationality than the Bayesian expected utility maximization model, the need for a model which could better deal with the different aspects of theory replacement. I will show that Kuhn's distinction between normal and revolutionary science gives us several hints for a more adequate theory of rationality in science. I will also show that Kuhn is not in a position to fully articulate his main ideas and that he well be confronted with a serious problem concerning collective choice of a paradigm.

  13. On A System of Rational Difference Equation

    OpenAIRE

    Din Qamar

    2014-01-01

    In this paper, we study local asymptotic stability, global character and periodic nature of solutions of the system of rational difference equations given by xn+1= , yn=, n=0, 1,…, where the parameters a; b; c; d; e; f ∊ (0; ∞), and with initial conditions x0; y0 ∊ (0; ∞). Some numerical examples are given to illustrate our results.

  14. Teachers\\' practical rationality of mathematics teaching and ...

    African Journals Online (AJOL)

    mathematics teaching as a practice and the way that teachers learn in such a practice. Conversations during interviews with the teachers in the sample indicate that SchoÈn\\'s notion of reflection-in-action is a key to understanding how teachers use their practical rationality as they try to understand nuanced meanings of the

  15. Adaptive Rationality, Adaptive Behavior and Institutions

    Directory of Open Access Journals (Sweden)

    Volchik Vyacheslav, V.

    2015-12-01

    Full Text Available The economic literature focused on understanding decision-making and choice processes reveals a vast collection of approaches to human rationality. Theorists’ attention has moved from absolutely rational, utility-maximizing individuals to boundedly rational and adaptive ones. A number of economists have criticized the concepts of adaptive rationality and adaptive behavior. One of the recent trends in the economic literature is to consider humans irrational. This paper offers an approach which examines adaptive behavior in the context of existing institutions and constantly changing institutional environment. It is assumed that adaptive behavior is a process of evolutionary adjustment to fundamental uncertainty. We emphasize the importance of actors’ engagement in trial and error learning, since if they are involved in this process, they obtain experience and are able to adapt to existing and new institutions. The paper aims at identifying relevant institutions, adaptive mechanisms, informal working rules and practices that influence actors’ behavior in the field of Higher Education in Russia (Rostov Region education services market has been taken as an example. The paper emphasizes the application of qualitative interpretative methods (interviews and discourse analysis in examining actors’ behavior.

  16. The Rational-Emotive Approach: A Critique

    Science.gov (United States)

    Morris, G. Barry

    1976-01-01

    The critique of Rational-Emotive Therapy aims criticism at Ellis' concept of irrationality, analysis of human behavior and therapeutic techniques. Ellis suggests that his critic's claims lack the support of experimental evidence. He further suggests that an "existential" bias pervades which differs from his own brand of…

  17. Rational Emotive Behavior Therapy: Humanism in Action.

    Science.gov (United States)

    Hill, Larry K.

    1996-01-01

    Claims that humanism, in both concept and philosophy, is encased in a literature that is predominantly abstract, making humanism difficult to translate into tangible day-to-day action. Argues that rational emotive behavior therapy (REBT), however, provides a detailed method for translating humanist concepts into humanist behavior. (RJM)

  18. Rational Emotive Behavior Therapy with Troubled Students.

    Science.gov (United States)

    Zionts, Paul; Zionts, Laura

    1997-01-01

    Based on the early work of Albert Ellis, seeks to identify and challenge irrational beliefs that underlie behavior problems. Outlines concepts and methods of Rational Emotive Behavior Theory and describes the application both in counseling and as a mental health curriculum for troubled children and youth. Offers classroom techniques. (RJM)

  19. Bounded Rationality of Generalized Abstract Fuzzy Economies

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2014-01-01

    Full Text Available By using a nonlinear scalarization technique, the bounded rationality model M for generalized abstract fuzzy economies in finite continuous spaces is established. Furthermore, by using the model M, some new theorems for structural stability and robustness to (λ,ϵ-equilibria of generalized abstract fuzzy economies are proved.

  20. Medicine, ethics and religion: rational or irrational?

    Science.gov (United States)

    Orr, R D; Genesen, L B

    1998-12-01

    Savulescu maintains that our paper, which encourages clinicians to honour requests for "inappropriate treatment" is prejudicial to his atheistic beliefs, and therefore wrong. In this paper we clarify and expand on our ideas, and respond to his assertion that medicine, ethics and atheism are objective, rational and true, while religion is irrational and false.