WorldWideScience

Sample records for rational secret sharing

  1. A linear construction of perfect secret sharing schemes

    NARCIS (Netherlands)

    Dijk, van M.; Santis, De A.

    1995-01-01

    In this paper, we generalize the vector space construction due to Brickell [5]. This generalization, introduced by Bertilsson [1], leads to perfect secret sharing schemes with rational information rates in which the secret can be computed efficiently by each qualified group. A one to one

  2. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  3. Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

    Science.gov (United States)

    Chen, Chien-Chang; Liu, Chong-An

    2013-01-01

    A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users' secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.

  4. Meaningful Share Generation for Increased Number of Secrets in Visual Secret-Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Mustafa Ulutas

    2010-01-01

    Full Text Available This paper presents a new scheme for hiding two halftone secret images into two meaningful shares created from halftone cover images. Meaningful shares are more desirable than noise-like (meaningless shares in Visual Secret Sharing because they look natural and do not attract eavesdroppers' attention. Previous works in the field focus on either increasing number of secrets or creating meaningful shares for one secret image. The method outlined in this paper both increases the number of secrets and creates meaningful shares at the same time. While the contrast ratio of shares is equal to that of Extended Visual Cryptography, two secrets are encoded into two shares as opposed to one secret in the Extended Visual Cryptography. Any two natural-looking images can be used as cover unlike the Halftone Visual Cryptography method where one cover should be the negative of the other cover image and can only encode one secret. Effectiveness of the proposed method is verified by an experiment.

  5. Dynamic quantum secret sharing

    International Nuclear Information System (INIS)

    Jia, Heng-Yue; Wen, Qiao-Yan; Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo

    2012-01-01

    In this Letter we consider quantum secret sharing (QSS) between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications. -- Highlights: ► We consider quantum secret sharing between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). ► In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. ► Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. ► Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. ► Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications.

  6. Quantum strongly secure ramp secret sharing

    DEFF Research Database (Denmark)

    Zhang, Paul; Matsumoto, Rytaro Yamashita

    2015-01-01

    Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares and distributing them among several participants. If a sufficient number of shares are put together, then the secret can be fully reconstructed. If an insufficient number of shares are put together...... however, no information about the secret can be revealed. In quantum ramp secret sharing, partial information about the secret is allowed to leak to a set of participants, called an unqualified set, that cannot fully reconstruct the secret. By allowing this, the size of a share can be drastically reduced....... This paper introduces a quantum analog of classical strong security in ramp secret sharing schemes. While the ramp secret sharing scheme still leaks partial information about the secret to unqualified sets of participants, the strong security condition ensures that qudits with critical information can...

  7. Probabilistic Infinite Secret Sharing

    OpenAIRE

    Csirmaz, László

    2013-01-01

    The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes. It highlights important properties, explains why certain definitions work better than others, connects this topic to other branches of mathematics, and might yield new design paradigms. A probabilistic secret sharing scheme is a joint probability distribution of the shares and the secret together with a colle...

  8. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  9. Efficient multiparty quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-01-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information

  10. Semiquantum secret sharing using entangled states

    International Nuclear Information System (INIS)

    Li Qin; Chan, W. H.; Long Dongyang

    2010-01-01

    Secret sharing is a procedure for sharing a secret among a number of participants such that only the qualified subsets of participants have the ability to reconstruct the secret. Even in the presence of eavesdropping, secret sharing can be achieved when all the members are quantum. So what happens if not all the members are quantum? In this paper, we propose two semiquantum secret sharing protocols by using maximally entangled Greenberger-Horne-Zeilinger-type states in which quantum Alice shares a secret with two classical parties, Bob and Charlie, in a way that both parties are sufficient to obtain the secret, but one of them cannot. The presented protocols are also shown to be secure against eavesdropping.

  11. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  12. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation

    NARCIS (Netherlands)

    R.J.F. Cramer (Ronald); I.B. Damgård (Ivan); Y. Ishai

    2005-01-01

    htmlabstractWe present a method for converting shares of a secret into shares of the same secret in a different secret-sharing scheme using only local computation and no communication between players. In particular, shares in a replicated scheme based on a CNF representation of the access structure

  13. On alternative approach for verifiable secret sharing

    OpenAIRE

    Kulesza, Kamil; Kotulski, Zbigniew; Pieprzyk, Joseph

    2002-01-01

    Secret sharing allows split/distributed control over the secret (e.g. master key). Verifiable secret sharing (VSS) is the secret sharing extended by verification capacity. Usually verification comes at the price. We propose "free lunch", the approach that allows to overcome this inconvenience.

  14. A quantum secret-sharing protocol with fairness

    International Nuclear Information System (INIS)

    Liu, Feng; Qin, Su-Juan; Wen, Qiao-Yan

    2014-01-01

    A quantum secret-sharing (QSS) protocol consists of two main phases, called sharing and reconstruction. In the first phase, the dealer selects a secret, divides it into several shares, and sends each participant its share securely with a quantum channel. In the second phase, the participants run an interactive protocol in order to reconstruct the secret. If the participants can communicate via a broadcast channel, they can show their shares and learn the secrets simultaneously. So what happens if the channel is not simultaneous? In this paper, we propose a QSS protocol with cheaters by using partially and maximally entangled states. A secure and fair reconstruction mechanism is designed, in a way that each participant can learn or cannot learn the secret simultaneously. (papers)

  15. SECURE VISUAL SECRET SHARING BASED ON DISCRETE WAVELET TRANSFORM

    Directory of Open Access Journals (Sweden)

    S. Jyothi Lekshmi

    2015-08-01

    Full Text Available Visual Cryptography Scheme (VCS is an encryption method to encode secret written materials. This method converts the secret written material into an image. Then encode this secret image into n shadow images called shares. For the recreation of the original secret, all or some selected subsets of shares are needed; individual shares are of no use on their own. The secret image can be recovered simply by selecting some subset of these n shares, makes transparencies of them and stacking on top of each other. Nowadays, the data security has an important role. The shares can be altered by an attacker. So providing security to the shares is important. This paper proposes a method of adding security to cryptographic shares. This method uses two dimensional discrete wavelet transform to hide visual secret shares. Then the hidden secrets are distributed among participants through the internet. All hidden shares are extracted to reconstruct the secret.

  16. Sagnac secret sharing over telecom fiber networks.

    Science.gov (United States)

    Bogdanski, Jan; Ahrens, Johan; Bourennane, Mohamed

    2009-01-19

    We report the first Sagnac quantum secret sharing (in three-and four-party implementations) over 1550 nm single mode fiber (SMF) networks, using a single qubit protocol with phase encoding. Our secret sharing experiment has been based on a single qubit protocol, which has opened the door to practical secret sharing implementation over fiber telecom channels and in free-space. The previous quantum secret sharing proposals were based on multiparticle entangled states, difficult in the practical implementation and not scalable. Our experimental data in the three-party implementation show stable (in regards to birefringence drift) quantum secret sharing transmissions at the total Sagnac transmission loop distances of 55-75 km with the quantum bit error rates (QBER) of 2.3-2.4% for the mean photon number micro?= 0.1 and 1.7-2.1% for micro= 0.3. In the four-party case we have achieved quantum secret sharing transmissions at the total Sagnac transmission loop distances of 45-55 km with the quantum bit error rates (QBER) of 3.0-3.7% for the mean photon number micro= 0.1 and 1.8-3.0% for micro?= 0.3. The stability of quantum transmission has been achieved thanks to our new concept for compensation of SMF birefringence effects in Sagnac, based on a polarization control system and a polarization insensitive phase modulator. The measurement results have showed feasibility of quantum secret sharing over telecom fiber networks in Sagnac configuration, using standard fiber telecom components.

  17. Secret Sharing of a Quantum State.

    Science.gov (United States)

    Lu, He; Zhang, Zhen; Chen, Luo-Kan; Li, Zheng-Da; Liu, Chang; Li, Li; Liu, Nai-Le; Ma, Xiongfeng; Chen, Yu-Ao; Pan, Jian-Wei

    2016-07-15

    Secret sharing of a quantum state, or quantum secret sharing, in which a dealer wants to share a certain amount of quantum information with a few players, has wide applications in quantum information. The critical criterion in a threshold secret sharing scheme is confidentiality: with less than the designated number of players, no information can be recovered. Furthermore, in a quantum scenario, one additional critical criterion exists: the capability of sharing entangled and unknown quantum information. Here, by employing a six-photon entangled state, we demonstrate a quantum threshold scheme, where the shared quantum secrecy can be efficiently reconstructed with a state fidelity as high as 93%. By observing that any one or two parties cannot recover the secrecy, we show that our scheme meets the confidentiality criterion. Meanwhile, we also demonstrate that entangled quantum information can be shared and recovered via our setting, which shows that our implemented scheme is fully quantum. Moreover, our experimental setup can be treated as a decoding circuit of the five-qubit quantum error-correcting code with two erasure errors.

  18. On Secret Sharing with Nonlinear Product Reconstruction

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego

    2015-01-01

    Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty computation and, since recently, in the area of two-party cryptography as well. In a nutshell, this notion guarantees that the product of two secrets is obtained as a linear function of the vector......-necessarily-linear “product reconstruction function.” Is the resulting notion equivalent to multiplicative linear secret sharing? We show the (perhaps somewhat counterintuitive) result that this relaxed notion is strictly more general. Concretely, fix a finite field ${\\mathbb F}_q$ as the base field over which linear secret...... sharing is considered. Then we show there exists an (exotic) linear secret sharing scheme with an unbounded number of players $n$ such that it has $t$-privacy with $t = \\Omega(n)$ and such that it does admit a product reconstruction function, yet this function is necessarily nonlinear. In addition, we...

  19. Shared Secrets versus Secrets Kept Private Are Linked to Better Adolescent Adjustment

    Science.gov (United States)

    Frijns, Tom; Finkenauer, Catrin; Keijsers, Loes

    2013-01-01

    It is a household notion that secrecy is bad while sharing is good. But what about shared secrets? The present research adopts a functional analysis of sharing secrets, arguing that it should negate harmful consequences generally associated with secrecy and serves important interpersonal functions in adolescence. A survey study among 790 Dutch…

  20. Quantum secret sharing protocol using modulated doubly entangled photons

    International Nuclear Information System (INIS)

    Chuan, Wang; Yong, Zhang

    2009-01-01

    In this paper, we propose a quantum secret sharing protocol utilizing polarization modulated doubly entangled photon pairs. The measurement devices are constructed. By modulating the polarizations of entangled photons, the boss could encode secret information on the initial state and share the photons with different members to realize the secret sharing process. This protocol shows the security against intercept-resend attack and dishonest member cheating. The generalized quantum secret sharing protocol is also discussed. (general)

  1. Threshold quantum secret sharing based on single qubit

    Science.gov (United States)

    Lu, Changbin; Miao, Fuyou; Meng, Keju; Yu, Yue

    2018-03-01

    Based on unitary phase shift operation on single qubit in association with Shamir's ( t, n) secret sharing, a ( t, n) threshold quantum secret sharing scheme (or ( t, n)-QSS) is proposed to share both classical information and quantum states. The scheme uses decoy photons to prevent eavesdropping and employs the secret in Shamir's scheme as the private value to guarantee the correctness of secret reconstruction. Analyses show it is resistant to typical intercept-and-resend attack, entangle-and-measure attack and participant attacks such as entanglement swapping attack. Moreover, it is easier to realize in physic and more practical in applications when compared with related ones. By the method in our scheme, new ( t, n)-QSS schemes can be easily constructed using other classical ( t, n) secret sharing.

  2. Quantum secret sharing with classical Bobs

    International Nuclear Information System (INIS)

    Li Lvzhou; Qiu Daowen; Mateus, Paulo

    2013-01-01

    Boyer et al (2007 Phys. Rev. Lett. 99 140501) proposed a novel idea of semi-quantum key distribution, where a key can be securely distributed between Alice, who can perform any quantum operation, and Bob, who is classical. Extending the ‘semi-quantum’ idea to other tasks of quantum information processing is of interest and worth considering. In this paper, we consider the issue of semi-quantum secret sharing, where a quantum participant Alice can share a secret key with two classical participants, Bobs. After analyzing the existing protocol, we propose a new protocol of semi-quantum secret sharing. Our protocol is more realistic, since it utilizes product states instead of entangled states. We prove that any attempt of an adversary to obtain information necessarily induces some errors that the legitimate users could notice. (paper)

  3. Applying secret sharing for HIS backup exchange.

    Science.gov (United States)

    Kuroda, Tomohiro; Kimura, Eizen; Matsumura, Yasushi; Yamashita, Yoshinori; Hiramatsu, Haruhiko; Kume, Naoto; Sato, Atsushi

    2013-01-01

    To secure business continuity is indispensable for hospitals to fulfill its social responsibility under disasters. Although to back up the data of the hospital information system (HIS) at multiple remote sites is a key strategy of business continuity plan (BCP), the requirements to treat privacy sensitive data jack up the cost for the backup. The secret sharing is a method to split an original secret message up so that each individual piece is meaningless, but putting sufficient number of pieces together to reveal the original message. The secret sharing method eases us to exchange HIS backups between multiple hospitals. This paper evaluated the feasibility of the commercial secret sharing solution for HIS backup through several simulations. The result shows that the commercial solution is feasible to realize reasonable HIS backup exchange platform when template of contract between participating hospitals is ready.

  4. Multi-group dynamic quantum secret sharing with single photons

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Hongwei [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Ma, Haiqiang, E-mail: hqma@bupt.edu.cn [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Wei, Kejin [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Yang, Xiuqing [School of Science, Beijing Jiaotong University, Beijing 100044 (China); Qu, Wenxiu; Dou, Tianqi; Chen, Yitian; Li, Ruixue; Zhu, Wu [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2016-07-15

    In this letter, we propose a novel scheme for the realization of single-photon dynamic quantum secret sharing between a boss and three dynamic agent groups. In our system, the boss can not only choose one of these three groups to share the secret with, but also can share two sets of independent keys with two groups without redistribution. Furthermore, the security of communication is enhanced by using a control mode. Compared with previous schemes, our scheme is more flexible and will contribute to a practical application. - Highlights: • A multi-group dynamic quantum secret sharing with single photons scheme is proposed. • Any one of the groups can be chosen to share secret through controlling the polarization of photons. • Two sets of keys can be shared simultaneously without redistribution.

  5. Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding Theory

    OpenAIRE

    Matsumoto, Ryutaroh

    2018-01-01

    We consider secret sharing schemes with a classical secret and quantum shares. One example of such schemes was recently reported whose access structure cannot be realized by any secret sharing schemes with classical shares. In this paper, we report further quantum secret sharing schemes whose access structures cannot be realized by any classical secret sharing schemes.

  6. Secret Sharing Schemes and Advanced Encryption Standard

    Science.gov (United States)

    2015-09-01

    25 4.7 Computational Example . . . . . . . . . . . . . . . . . . . . . 26 5 Side-Channel Effect on Advanced Encryption Standard ( AES ) 31...improvements, and to build upon them to discuss the side-channel effects on the Advanced Encryption Standard ( AES ). The following questions are asked...secret sharing scheme? • Can the improvements to the current secret sharing scheme prove to be beneficial in strengthening/weakening AES encryption

  7. Cooperative Secret Sharing Using QR Codes and Symmetric Keys

    Directory of Open Access Journals (Sweden)

    Yang-Wai Chow

    2018-04-01

    Full Text Available Secret sharing is an information security technique where a dealer divides a secret into a collection of shares and distributes these to members of a group. The secret will only be revealed when a predefined number of group members cooperate to recover the secret. The purpose of this study is to investigate a method of distributing shares by embedding them into cover Quick Response (QR codes in a secure manner using cryptographic keys. The advantage of this approach is that the shares can be disseminated over public channels, as anyone who scans the QR codes will only obtain public information. Only authorized individuals who are in possession of the required keys will be able to recover the shares. This also means that when group members cooperate to recover a secret, the group can determine the presence of an illegitimate participant if the person does not produce a valid share. This study proposes a protocol for accomplishing this and discusses the underlying security of the protocol.

  8. Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups

    DEFF Research Database (Denmark)

    Cramer, Ronald; Fehr, Serge

    2002-01-01

    A black-box secret sharing scheme for the threshold access structure T t,n is one which works over any finite Abelian group G. Briefly, such a scheme differs from an ordinary linear secret sharing scheme (over, say, a given finite field) in that distribution matrix and reconstruction vectors...... are defined over ℤ and are designed independently of the group G from which the secret and the shares are sampled. This means that perfect completeness and perfect privacy are guaranteed regardless of which group G is chosen. We define the black-box secret sharing problem as the problem of devising......, for an arbitrary given T t,n , a scheme with minimal expansion factor, i.e., where the length of the full vector of shares divided by the number of players n is minimal. Such schemes are relevant for instance in the context of distributed cryptosystems based on groups with secret or hard to compute group order...

  9. Multiparty secret sharing of quantum information based on entanglement swapping

    International Nuclear Information System (INIS)

    Li Yongmin; Zhang Kuanshou; Peng Kunchi

    2004-01-01

    A protocol of multiparty secret sharing of quantum information based on entanglement swapping is analyzed. In this protocol, Bell states are needed in order to realize the quantum information secret sharing and it is convenient to realize the quantum secret sharing among the members of any subset of users

  10. Secret Sharing and Secure Computing from Monotone Formulae

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Kölker, Jonas; Miltersen, Peter Bro

    2012-01-01

    We present a construction of log-depth formulae for various threshold functions based on atomic threshold gates of constant size. From this, we build a new family of linear secret sharing schemes that are multiplicative, scale well as the number of players increases and allows to raise a shared...... of our scheme for pseudorandom secret sharing as defined by Cramer, Damgård and Ishai...

  11. Security of a kind of quantum secret sharing with entangled states.

    Science.gov (United States)

    Wang, Tian-Yin; Liu, Ying-Zhao; Wei, Chun-Yan; Cai, Xiao-Qiu; Ma, Jian-Feng

    2017-05-30

    We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others' cooperation. Furthermore, we establish a general model for this kind of quantum secret sharing schemes and then give some necessary conditions to design a secure quantum secret sharing scheme under this model.

  12. How to Split a Shared Secret into Shared Bits in Constant-Round

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Fitzi, Matthias; Nielsen, Jesper Buus

    $ such that $l = \\lceil \\log_2(p) \\rceil$, $a_0, \\ldots, a_{l-1} \\in \\{0,1\\}$ and $a = \\sum_{i=0}^{l-1} a_i 2^i$. Our protocol is secure against active adversaries and works for any linear secret sharing scheme with a multiplication protocol. This result immediately implies solutions to other long-standing open...... problems, such as constant-round and unconditionally secure protocols for comparing shared numbers and deciding whether a shared number is zero. The complexity of our protocol is $O(l \\log(l))$ invocations of the multiplication protocol for the underlying secret sharing scheme, carried out in $O(1)$....

  13. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.

    Science.gov (United States)

    Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi

    2016-01-01

    After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t', n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.

  14. Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing.

    Science.gov (United States)

    Bao, Long; Yi, Shuang; Zhou, Yicong

    2017-12-01

    This paper first introduces a (k,n) -sharing matrix S (k, n) and its generation algorithm. Mathematical analysis is provided to show its potential for secret image sharing. Combining sharing matrix with image encryption, we further propose a lossless (k,n) -secret image sharing scheme (SMIE-SIS). Only with no less than k shares, all the ciphertext information and security key can be reconstructed, which results in a lossless recovery of original information. This can be proved by the correctness and security analysis. Performance evaluation and security analysis demonstrate that the proposed SMIE-SIS with arbitrary settings of k and n has at least five advantages: 1) it is able to fully recover the original image without any distortion; 2) it has much lower pixel expansion than many existing methods; 3) its computation cost is much lower than the polynomial-based secret image sharing methods; 4) it is able to verify and detect a fake share; and 5) even using the same original image with the same initial settings of parameters, every execution of SMIE-SIS is able to generate completely different secret shares that are unpredictable and non-repetitive. This property offers SMIE-SIS a high level of security to withstand many different attacks.

  15. Comment on "Dynamic quantum secret sharing"

    Science.gov (United States)

    Liao, Ci-Hong; Yang, Chun-Wei; Hwang, Tzonelish

    2013-10-01

    Hsu et al. (Quantum Inf Process 12:331-344,2013) proposed a dynamic quantum secret sharing (DQSS) protocol using the entanglement swapping of Bell states for an agent to easily join (or leave) the system. In 2013, Wang and Li (Quantum Inf Process 12(5):1991-1997, 2013) proposed a collusion attack on Hsu et al.'s DQSS protocol. Nevertheless, this study points out a new security issue on Hsu et al.'s DQSS protocol regarding to the honesty of a revoked agent. Without considering this issue, the DQSS protocol could be failed to provide secret sharing function.

  16. The Future Internet: A World of Secret Shares

    Directory of Open Access Journals (Sweden)

    William J. Buchanan

    2015-11-01

    Full Text Available The Public Key Infrastructure (PKI is crumbling, partially due to the lack of a strong understanding of how encryption actually works, but also due to weaknesses in its implementation. This paper outlines an Internet storage technique using secret sharing methods which could be used to overcome the problems inherent with PKI, while supporting new types of architectures incorporating such things as automated failover and break-glass data recovery. The paper outlines a novel architecture: SECRET, which supports a robust cloud-based infrastructure with in-built privacy and failover. In order to understand the performance overhead of SECRET, the paper outlines a range of experiments that investigate the overhead of this and other secret share methods.

  17. Threshold secret sharing scheme based on phase-shifting interferometry.

    Science.gov (United States)

    Deng, Xiaopeng; Shi, Zhengang; Wen, Wei

    2016-11-01

    We propose a new method for secret image sharing with the (3,N) threshold scheme based on phase-shifting interferometry. The secret image, which is multiplied with an encryption key in advance, is first encrypted by using Fourier transformation. Then, the encoded image is shared into N shadow images based on the recording principle of phase-shifting interferometry. Based on the reconstruction principle of phase-shifting interferometry, any three or more shadow images can retrieve the secret image, while any two or fewer shadow images cannot obtain any information of the secret image. Thus, a (3,N) threshold secret sharing scheme can be implemented. Compared with our previously reported method, the algorithm of this paper is suited for not only a binary image but also a gray-scale image. Moreover, the proposed algorithm can obtain a larger threshold value t. Simulation results are presented to demonstrate the feasibility of the proposed method.

  18. Some directions beyond traditional quantum secret sharing

    Energy Technology Data Exchange (ETDEWEB)

    Singh, Sudhir Kumar [Department of Electrical Engineering, University of California, Los Angeles, CA 90095 (United States); Srikanth, R [Poornaprajna Institute of Scientific Research, Devanahalli, Bangalore 562 110 (India)], E-mail: suds@ee.ucla.edu, E-mail: srik@rri.res.in

    2008-06-15

    We investigate two directions beyond the traditional quantum secret sharing (QSS). Firstly, a restriction on QSS that comes from the no-cloning theorem is that any pair of authorized sets in an access structure should overlap. From the viewpoint of application, this places an unnatural constraint on secret sharing. We present a generalization, called assisted QSS (AQSS), where access structures without pairwise overlap of authorized sets are permissible, provided some shares are withheld by the share dealer. We show that no more than {lambda}-1 withheld shares are required, where {lambda} is the minimum number of partially linked classes among the authorized sets for the QSS. Our result means that such applications of QSS need not be thwarted by the no-cloning theorem. Secondly, we point out a way of combining the features of QSS and quantum key distribution (QKD) for applications where classical information is shared by quantum means. We observe that in such case, it is often possible to reduce the security proof of QSS to that of QKD.

  19. Some directions beyond traditional quantum secret sharing

    International Nuclear Information System (INIS)

    Singh, Sudhir Kumar; Srikanth, R

    2008-01-01

    We investigate two directions beyond the traditional quantum secret sharing (QSS). Firstly, a restriction on QSS that comes from the no-cloning theorem is that any pair of authorized sets in an access structure should overlap. From the viewpoint of application, this places an unnatural constraint on secret sharing. We present a generalization, called assisted QSS (AQSS), where access structures without pairwise overlap of authorized sets are permissible, provided some shares are withheld by the share dealer. We show that no more than λ-1 withheld shares are required, where λ is the minimum number of partially linked classes among the authorized sets for the QSS. Our result means that such applications of QSS need not be thwarted by the no-cloning theorem. Secondly, we point out a way of combining the features of QSS and quantum key distribution (QKD) for applications where classical information is shared by quantum means. We observe that in such case, it is often possible to reduce the security proof of QSS to that of QKD

  20. Secret Sharing over Fast-Fading MIMO Wiretap Channels

    Directory of Open Access Journals (Sweden)

    Bloch Matthieu

    2009-01-01

    Full Text Available Secret sharing over the fast-fading MIMO wiretap channel is considered. A source and a destination try to share secret information over a fast-fading MIMO channel in the presence of an eavesdropper who also makes channel observations that are different from but correlated to those made by the destination. An interactive, authenticated public channel with unlimited capacity is available to the source and destination for the secret sharing process. This situation is a special case of the "channel model with wiretapper" considered by Ahlswede and Csiszár. An extension of their result to continuous channel alphabets is employed to evaluate the key capacity of the fast-fading MIMO wiretap channel. The effects of spatial dimensionality provided by the use of multiple antennas at the source, destination, and eavesdropper are then investigated.

  1. A Finite Equivalence of Verifiable Multi-secret Sharing

    Directory of Open Access Journals (Sweden)

    Hui Zhao

    2012-02-01

    Full Text Available We give an abstraction of verifiable multi-secret sharing schemes that is accessible to a fully mechanized analysis. This abstraction is formalized within the applied pi-calculus by using an equational theory which characterizes the cryptographic semantics of secret share. We also present an encoding from the equational theory into a convergent rewriting system, which is suitable for the automated protocol verifier ProVerif. Based on that, we verify the threshold certificate protocol in ProVerif.

  2. Multiparty Quantum Secret Sharing of Quantum States Using Entanglement States

    International Nuclear Information System (INIS)

    Ying, Guo; Da-Zu, Huang; Gui-Hua, Zeng; Ho, Lee Moon

    2008-01-01

    A multi-partite-controlled quantum secret sharing scheme using several non-orthogonal entanglement states is presented with unconditional security. In this scheme, the participants share the secret quantum state by exchanging the secret polarization angles of the disordered travel particles. The security of the secret quantum state is also guaranteed by the non-orthogonal multi-partite-controlled entanglement states, the participants' secret polarizations, and the disorder of the travelling particles. Moreover, the present scheme is secure against the particle-number splitting attack and the intercept-and-resend attack. It may be still secure even if the distributed quantum state is embedded in a not-so-weak coherent-state pulse

  3. (t, n) Threshold d-Level Quantum Secret Sharing.

    Science.gov (United States)

    Song, Xiu-Li; Liu, Yan-Bing; Deng, Hong-Yao; Xiao, Yong-Gang

    2017-07-25

    Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants' shares, even the trusted reconstructor Bob 1 is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n - 1.

  4. Authenticated quantum secret sharing with quantum dialogue based on Bell states

    International Nuclear Information System (INIS)

    Abulkasim, Hussein; Hamad, Safwat; El Bahnasy, Khalid; Rida, Saad Z

    2016-01-01

    This work proposes a scheme that combines the advantages of a quantum secret sharing procedure and quantum dialogue. The proposed scheme enables the participants to simultaneously make mutual identity authentications, in a simulated scenario where the boss, Alice, shares a secret with her two agents Bob and Charlie. The secret is protected by checking photons to keep untrustworthy agents and outer attacks from getting useful information. Before the two agents cooperate to recover Alice’s secret, they must authenticate their identity using parts of a pre-shared key. In addition, the whole pre-shared key is reused as part of recovering the secret data to avoid any leaks of information. In comparison with previous schemes, the proposed method can efficiently detect eavesdropping and it is free from information leaks. Furthermore, the proposed scheme proved to be secure against man-in-the-middle attacks, impersonation attacks, entangled-and-measure attacks, participant attacks, modification attacks and Trojan-horse attacks. (paper)

  5. A new (k,n verifiable secret image sharing scheme (VSISS

    Directory of Open Access Journals (Sweden)

    Amitava Nag

    2014-11-01

    Full Text Available In this paper, a new (k,n verifiable secret image sharing scheme (VSISS is proposed in which third order LFSR (linear-feedback shift register-based public key cryptosystem is applied for the cheating prevention and preview before decryption. In the proposed scheme the secret image is first partitioned into several non-overlapping blocks of k pixels. Every k pixel is then used to form m=⌈k/4⌉+1 pixels of one encrypted share. The original secret image can be reconstructed by gathering any k or more encrypted shared images. The experimental results show that the proposed VSISS is an efficient and safe method.

  6. Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding.

    Science.gov (United States)

    Lai, Hong; Zhang, Jun; Luo, Ming-Xing; Pan, Lei; Pieprzyk, Josef; Xiao, Fuyuan; Orgun, Mehmet A

    2016-08-12

    With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m-bonacci sequences to detect eavesdropping. Meanwhile, we encode m-bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in comparison with existing quantum secret sharing schemes, it still works when there are dynamic changes, such as the unavailability of some quantum channel, the arrival of new participants and the departure of participants. Finally, we provide security analysis of the new hybrid quantum secret sharing scheme and discuss its useful features for modern applications.

  7. Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

    Science.gov (United States)

    Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.

    2016-11-01

    The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.

  8. Secret and research

    Directory of Open Access Journals (Sweden)

    André PETITAT

    2013-12-01

    Full Text Available The postures of secrecy and revelation maintain our common relational dynamics between sharing and not sharing. Science, which has become the dominant form of knowledge, is a rational and empirical knowledge sharing. For this purpose, the knowledge articulates languages, if possible unambiguous, spaces of rational deliberation, technical devices and resources of the imagination. This activity meets other logics called power, prestige, status, profit, customer, blind adherence and revealed truth, in which the postures of secret invite themselves massively. The codes of ethics attempt to regulate this mix of contradictory logics by setting standards of scientific exchanges, recalling the person rights and particularly the subjects observed rights, protecting the working conditions of the researcher, preserving its autonomy from funders and policy makers, and ensuring the dissemination of its results.

  9. Dynamic (2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication

    International Nuclear Information System (INIS)

    Lai Hong; Xiao Jing-Hua; Mehmet, Orgun A.; Josef, Pieprzyk; Xue Li-Yin

    2015-01-01

    In this paper, we show that a (2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely. (paper)

  10. Adaptive Secret Sharing for Color Images

    Directory of Open Access Journals (Sweden)

    Jia-Hong Li

    2011-10-01

    Full Text Available A secret sharing model can secure a secret over multiple noise-like shadows and remain recoverable despite multiple shadow failures. Even if some of the shadows are compromised, the secret will not be revealed as long as the number of the compromised shadows is smaller than a pre-determined threshold. Moreover, there are some necessary details of concerns: the malicious tampering on shadows must be detectable; the shadows must be concealed in a camouflage image with adequate quality to reduce suspicion and possible attack; color image properties must be considered. In addition to these concerns, in this paper, an adaptable mechanism is further designed to balance the hiding quantity and the quality of camouflage images depending on different applications.This is an important and interesting aspect that has never been discussed in previous research.

  11. Comment on 'Quantum secret sharing between multiparty and multiparty without entanglement'

    International Nuclear Information System (INIS)

    Li, C.-M.; Hwang, T.; Chang, C.-C.

    2006-01-01

    Recently, Yan and Gao [Phys. Rev. A 72, 012304 (2005)] presented a quantum secret sharing protocol which allows a secret message to be shared between two groups of parties (m parties in group 1 and n parties in group 2). Their protocol is claimed to be secure that, except with the cooperation of the entire group 1 or group 2, no subgroup of either group 1 or group 2 can extract the secret message. However, this study points out that the mth party (the last party to process the quantum state) of group 1 can maliciously replace the secret message with an arbitrary message without the detection of the other parties

  12. Unified criterion for security of secret sharing in terms of violation of Bell inequalities

    International Nuclear Information System (INIS)

    Sen, Aditi; Sen, Ujjwal; Zukowski, Marek

    2003-01-01

    In secret sharing protocols, a secret is to be distributed among several partners such that leaving out any number of them, the rest do not have the complete information. Strong multiqubit correlations in the state by which secret sharing is carried out had been proposed as a criterion for security of such protocols against individual attacks by an eavesdropper. However we show that states with weak multiqubit correlations can also be used for secure secret sharing. That our state has weak multiqubit correlations is shown from the perspective of violation of local realism, and also by showing that its higher-order correlations are described by lower ones. We then present a unified criterion for security of secret sharing in terms of violation of local realism, which works when the secret sharing state is the Greenberger-Horne-Zeilinger state (with strong multiqubit correlations), as well as states of a different class (with weak multiqubit correlations)

  13. Two-party secret key distribution via a modified quantum secret sharing protocol.

    Science.gov (United States)

    Grice, W P; Evans, P G; Lawrie, B; Legré, M; Lougovski, P; Ray, W; Williams, B P; Qi, B; Smith, A M

    2015-03-23

    We present and demonstrate a novel protocol for distributing secret keys between two and only two parties based on N-party single-qubit Quantum Secret Sharing (QSS). We demonstrate our new protocol with N = 3 parties using phase-encoded photons. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N - 2 parties. Our implementation allows for an accessible transition between N-party QSS and arbitrary two party QKD without modification of hardware. In addition, our approach significantly reduces the number of resources such as single photon detectors, lasers and dark fiber connections needed to implement QKD.

  14. Secret Sharing Schemes with a large number of players from Toric Varieties

    DEFF Research Database (Denmark)

    Hansen, Johan P.

    A general theory for constructing linear secret sharing schemes over a finite field $\\Fq$ from toric varieties is introduced. The number of players can be as large as $(q-1)^r-1$ for $r\\geq 1$. We present general methods for obtaining the reconstruction and privacy thresholds as well as conditions...... for multiplication on the associated secret sharing schemes. In particular we apply the method on certain toric surfaces. The main results are ideal linear secret sharing schemes where the number of players can be as large as $(q-1)^2-1$. We determine bounds for the reconstruction and privacy thresholds...

  15. Quantum secret sharing via local operations and classical communication.

    Science.gov (United States)

    Yang, Ying-Hui; Gao, Fei; Wu, Xia; Qin, Su-Juan; Zuo, Hui-Juan; Wen, Qiao-Yan

    2015-11-20

    We investigate the distinguishability of orthogonal multipartite entangled states in d-qudit system by restricted local operations and classical communication. According to these properties, we propose a standard (2, n)-threshold quantum secret sharing scheme (called LOCC-QSS scheme), which solves the open question in [Rahaman et al., Phys. Rev. A, 91, 022330 (2015)]. On the other hand, we find that all the existing (k, n)-threshold LOCC-QSS schemes are imperfect (or "ramp"), i.e., unauthorized groups can obtain some information about the shared secret. Furthermore, we present a (3, 4)-threshold LOCC-QSS scheme which is close to perfect.

  16. Optical threshold secret sharing scheme based on basic vector operations and coherence superposition

    Science.gov (United States)

    Deng, Xiaopeng; Wen, Wei; Mi, Xianwu; Long, Xuewen

    2015-04-01

    We propose, to our knowledge for the first time, a simple optical algorithm for secret image sharing with the (2,n) threshold scheme based on basic vector operations and coherence superposition. The secret image to be shared is firstly divided into n shadow images by use of basic vector operations. In the reconstruction stage, the secret image can be retrieved by recording the intensity of the coherence superposition of any two shadow images. Compared with the published encryption techniques which focus narrowly on information encryption, the proposed method can realize information encryption as well as secret sharing, which further ensures the safety and integrality of the secret information and prevents power from being kept centralized and abused. The feasibility and effectiveness of the proposed method are demonstrated by numerical results.

  17. Key Recovery Using Noised Secret Sharing with Discounts over Large Clouds

    OpenAIRE

    JAJODIA , Sushil; Litwin , Witold; Schwarz , Thomas

    2013-01-01

    Encryption key loss problem is the Achilles's heel of cryptography. Key escrow helps, but favors disclosures. Schemes for recoverable encryption keys through noised secret sharing alleviate the dilemma. Key owner escrows a specifically encrypted backup. The recovery needs a large cloud. Cloud cost, money trail should rarefy illegal attempts. We now propose noised secret sharing schemes supporting discounts. The recovery request with discount code lowers the recovery complexity, easily by orde...

  18. Multilayer quantum secret sharing based on GHZ state and generalized Bell basis measurement in multiparty agents

    Science.gov (United States)

    Wang, Xiao-Jun; An, Long-Xi; Yu, Xu-Tao; Zhang, Zai-Chen

    2017-10-01

    A multilayer quantum secret sharing protocol based on GHZ state is proposed. Alice has the secret carried by quantum state and wants to distribute this secret to multiple agent nodes in the network. In this protocol, the secret is transmitted and shared layer by layer from root Alice to layered agents. The number of agents in each layer is a geometric sequence with a specific common ratio. By sharing GHZ maximally entangled states and making generalized Bell basis measurement, one qubit state can be distributed to multiparty agents and the secret is shared. Only when all agents at the last layer cooperate together, the secret can be recovered. Compared with other protocols based on the entangled state, this protocol adopts layered construction so that secret can be distributed to more agents with fewer particles GHZ state. This quantum secret sharing protocol can be used in wireless network to ensure the security of information delivery.

  19. Cryptanalysis of quantum secret sharing based on GHZ states

    International Nuclear Information System (INIS)

    Liu Xiaofen; Pan Rijing

    2011-01-01

    In a recent paper (Hwang et al 2011 Phys. Scr. 83 045004), a subtle quantum secret sharing (QSS) protocol was proposed. One major advantage of this protocol is its high efficiency; that is, it is more efficient than other QSS protocols using the Greenberger-Horne-Zeilinger states. However, we analyzed the security of this protocol and found that it is insecure for one agent who may deduce half of the information about the deal's secret directly just by his/her piece of secret. Finally, a feasible improvement of this QSS protocol is put forward.

  20. Secret sharing via quantum entanglement

    International Nuclear Information System (INIS)

    Hillery, M.; Buzek, V.

    1999-01-01

    Secret sharing is a procedure for splitting a message into several parts so that no single part is sufficient to read the message, but the entire set is. This procedure can be implemented using either GHZ states or two-particle entangled states. In the quantum case the presence of an eavesdropper will introduce errors so that her presence can be detected. We also discuss how quantum information can be split into parts so that the message can be reconstructed from a sufficiently large subset of the parts. (Authors)

  1. Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing

    Science.gov (United States)

    Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta

    2017-08-01

    This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.

  2. Cryptanalysis of quantum secret sharing based on GHZ states

    Energy Technology Data Exchange (ETDEWEB)

    Liu Xiaofen; Pan Rijing, E-mail: liuxiaofen23@fjnu.edu.cn [School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007 (China); Key Laboratory of Network Security and Cryptography, Fujian Normal University, Fuzhou 350007 (China)

    2011-10-15

    In a recent paper (Hwang et al 2011 Phys. Scr. 83 045004), a subtle quantum secret sharing (QSS) protocol was proposed. One major advantage of this protocol is its high efficiency; that is, it is more efficient than other QSS protocols using the Greenberger-Horne-Zeilinger states. However, we analyzed the security of this protocol and found that it is insecure for one agent who may deduce half of the information about the deal's secret directly just by his/her piece of secret. Finally, a feasible improvement of this QSS protocol is put forward.

  3. Multiparty Quantum Secret Sharing of Secure Direct Communication Using Teleportation

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojing

    2007-01-01

    We present an (n,n) threshold quantum secret sharing scheme of secure direct communication using Greenberger-Horne-Zeilinger state and teleportation. After ensuring the security of the quantum channel, the sender encodes the secret message directly on a sequence of particle states and transmits it to the receivers by teleportation. The receivers can recover the secret message by combining their measurement results with the sender's result. If a perfect quantum channel is used, our scheme is completely secure because the transmitting particle sequence does not carry the secret message. We also show our scheme is secure for noise quantum channel.

  4. Cryptanalysis of a semi-quantum secret sharing scheme based on Bell states

    Science.gov (United States)

    Gao, Gan; Wang, Yue; Wang, Dong

    2018-03-01

    In the paper [Mod. Phys. Lett. B 31 (2017) 1750150], Yin et al. proposed a semi-quantum secret sharing scheme by using Bell states. We find that the proposed scheme cannot finish the quantum secret sharing task. In addition, we also find that the proposed scheme has a security loophole, that is, it will not be detected that the dishonest participant, Charlie attacks on the quantum channel.

  5. Simulating cloud environment for HIS backup using secret sharing.

    Science.gov (United States)

    Kuroda, Tomohiro; Kimura, Eizen; Matsumura, Yasushi; Yamashita, Yoshinori; Hiramatsu, Haruhiko; Kume, Naoto

    2013-01-01

    In the face of a disaster hospitals are expected to be able to continue providing efficient and high-quality care to patients. It is therefore crucial for hospitals to develop business continuity plans (BCPs) that identify their vulnerabilities, and prepare procedures to overcome them. A key aspect of most hospitals' BCPs is creating the backup of the hospital information system (HIS) data at multiple remote sites. However, the need to keep the data confidential dramatically increases the costs of making such backups. Secret sharing is a method to split an original secret message so that individual pieces are meaningless, but putting sufficient number of pieces together reveals the original message. It allows creation of pseudo-redundant arrays of independent disks for privacy-sensitive data over the Internet. We developed a secret sharing environment for StarBED, a large-scale network experiment environment, and evaluated its potential and performance during disaster recovery. Simulation results showed that the entire main HIS database of Kyoto University Hospital could be retrieved within three days even if one of the distributed storage systems crashed during a disaster.

  6. Type VI Secretion System Toxins Horizontally Shared between Marine Bacteria.

    Directory of Open Access Journals (Sweden)

    Dor Salomon

    2015-08-01

    Full Text Available The type VI secretion system (T6SS is a widespread protein secretion apparatus used by Gram-negative bacteria to deliver toxic effector proteins into adjacent bacterial or host cells. Here, we uncovered a role in interbacterial competition for the two T6SSs encoded by the marine pathogen Vibrio alginolyticus. Using comparative proteomics and genetics, we identified their effector repertoires. In addition to the previously described effector V12G01_02265, we identified three new effectors secreted by T6SS1, indicating that the T6SS1 secretes at least four antibacterial effectors, of which three are members of the MIX-effector class. We also showed that the T6SS2 secretes at least three antibacterial effectors. Our findings revealed that many MIX-effectors belonging to clan V are "orphan" effectors that neighbor mobile elements and are shared between marine bacteria via horizontal gene transfer. We demonstrated that a MIX V-effector from V. alginolyticus is a functional T6SS effector when ectopically expressed in another Vibrio species. We propose that mobile MIX V-effectors serve as an environmental reservoir of T6SS effectors that are shared and used to diversify antibacterial toxin repertoires in marine bacteria, resulting in enhanced competitive fitness.

  7. Security of Linear Secret-Sharing Schemes Against Mass Surveillance

    DEFF Research Database (Denmark)

    Giacomelli, Irene; Olimid, Ruxandra; Ranellucci, Samuel

    2015-01-01

    by a proprietary code that the provider (“big brother”) could manipulate to covertly violate the privacy of the users (by implementing Algorithm-Substitution Attacks or ASAs). First, we formalize the security notion that expresses the goal of big brother and prove that for any linear secret-sharing scheme...... there exists an undetectable subversion of it that efficiently allows surveillance. Second, we formalize the security notion that assures that a sharing scheme is secure against ASAs and construct the first sharing scheme that meets this notion....

  8. Equal status in Ultimatum Games promotes rational sharing.

    Science.gov (United States)

    Han, Xiao; Cao, Shinan; Bao, Jian-Zhang; Wang, Wen-Xu; Zhang, Boyu; Gao, Zi-You; Sánchez, Angel

    2018-01-19

    Experiments on the Ultimatum Game (UG) repeatedly show that people's behaviour is far from rational. In UG experiments, a subject proposes how to divide a pot and the other can accept or reject the proposal, in which case both lose everything. While rational people would offer and accept the minimum possible amount, in experiments low offers are often rejected and offers are typically larger than the minimum, and even fair. Several theoretical works have proposed that these results may arise evolutionarily when subjects act in both roles and there is a fixed interaction structure in the population specifying who plays with whom. We report the first experiments on structured UG with subjects playing simultaneously both roles. We observe that acceptance levels of responders approach rationality and proposers accommodate their offers to their environment. More precisely, subjects keep low acceptance levels all the time, but as proposers they follow a best-response-like approach to choose their offers. We thus find that status equality promotes rational sharing while the influence of structure leads to fairer offers compared to well-mixed populations. Our results are far from what is observed in single-role UG experiments and largely different from available predictions based on evolutionary game theory.

  9. Quantum secret sharing based on quantum error-correcting codes

    International Nuclear Information System (INIS)

    Zhang Zu-Rong; Liu Wei-Tao; Li Cheng-Zu

    2011-01-01

    Quantum secret sharing(QSS) is a procedure of sharing classical information or quantum information by using quantum states. This paper presents how to use a [2k − 1, 1, k] quantum error-correcting code (QECC) to implement a quantum (k, 2k − 1) threshold scheme. It also takes advantage of classical enhancement of the [2k − 1, 1, k] QECC to establish a QSS scheme which can share classical information and quantum information simultaneously. Because information is encoded into QECC, these schemes can prevent intercept-resend attacks and be implemented on some noisy channels. (general)

  10. Cryptanalysis of Multiparty Quantum Secret Sharing of Quantum State Using Entangled States

    International Nuclear Information System (INIS)

    Su-Juan, Qin; Qiao-Yan, Wen; Fu-Chen, Zhu

    2008-01-01

    Security of a quantum secret sharing of quantum state protocol proposed by Guo et al. [Chin. Phys. Lett. 25 (2008) 16] is reexamined. It is shown that an eavesdropper can obtain some of the transmitted secret information by monitoring the classical channel or the entire secret by intercepting the quantum states, and moreover, the eavesdropper can even maliciously replace the secret message with an arbitrary message without being detected. Finally, the deep reasons why an eavesdropper can attack this protocol are discussed and the modified protocol is presented to amend the security loopholes

  11. Proof of the insecurity of quantum secret sharing based on the Smolin bound entangled states

    International Nuclear Information System (INIS)

    Ya-Fei, Yu; Zhi-Ming, Zhang

    2009-01-01

    This paper reconsiders carefully the possibility of using the Smolin bound entangled states as the carrier for sharing quantum secret. It finds that the process of quantum secret sharing based on Smolin states has insecurity though the Smolin state was reported to violate maximally the two-setting Bell-inequality. The general proof is given. (general)

  12. Multiparty quantum secret sharing of classical messages based on entanglement swapping

    International Nuclear Information System (INIS)

    Zhang Zhanjun; Man Zhongxiao

    2005-01-01

    A multiparty quantum secret sharing (QSS) protocol of classical messages (i.e., classical bits) is proposed by using swapping quantum entanglement of Bell states. The secret messages are imposed on Bell states by local unitary operations. The secret messages are split into several parts, and each part is distributed to a separate party so that no action of a subset of all the parties without the cooperation of the entire group is able to read out the secret messages. In addition, dense coding is used in this protocol to achieve a high efficiency. The security of the present multiparty QSS against eavesdropping has been analyzed and confirmed even in a noisy quantum channel

  13. Quantum secret sharing using orthogonal multiqudit entangled states

    Science.gov (United States)

    Bai, Chen-Ming; Li, Zhi-Hui; Liu, Cheng-Ji; Li, Yong-Ming

    2017-12-01

    In this work, we investigate the distinguishability of orthogonal multiqudit entangled states under restricted local operations and classical communication. According to these properties, we propose a quantum secret sharing scheme to realize three types of access structures, i.e., the ( n, n)-threshold, the restricted (3, n)-threshold and restricted (4, n)-threshold schemes (called LOCC-QSS scheme). All cooperating players in the restricted threshold schemes are from two disjoint groups. In the proposed protocol, the participants use the computational basis measurement and classical communication to distinguish between those orthogonal states and reconstruct the original secret. Furthermore, we also analyze the security of our scheme in four primary quantum attacks and give a simple encoding method in order to better prevent the participant conspiracy attack.

  14. A Rational Threshold Signature Model and Protocol Based on Different Permissions

    Directory of Open Access Journals (Sweden)

    Bojun Wang

    2014-01-01

    Full Text Available This paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together. We apply the secret sharing scheme based on difference equation to the private key distribution phase and secret reconstruction phrase of our threshold signature scheme. In addition, our scheme can achieve the signature success because of the punishment strategy of the repeated rational secret sharing. Besides, the bit commitment and verification method used to detect players’ cheating behavior acts as a contributing factor to prevent the internal fraud. Using bit commitments, verifiable parameters, and time sequences, this paper constructs a dynamic game model, which has the features of threshold signature management with different permissions, cheat proof, and forward security.

  15. Multiparty quantum secret sharing based on GHZ states

    Energy Technology Data Exchange (ETDEWEB)

    Hwang, Tzonelih; Hwang, Cheng-Chieh [Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan, 701 Taiwan (China); Li, Chuan-Ming, E-mail: hwangtl@ismail.csie.ncku.edu.tw [Department of Information Management, Shu-Zen College of Medicine and Management, Kaohsiung, 821 Taiwan (China)

    2011-04-15

    Gao (2009 Commun. Theor. Phys. 52 421-4) has proposed an efficient multiparty quantum secret sharing (MQSS) with two-photon three-dimensional Einstein-Podolsky-Rosen (EPR) pairs. This work shows that a similar idea can also be used to construct an MQSS using the Greenberger-Horne-Zeilinger (GHZ) states. Compared to other MQSSs using GHZ-related states, the newly proposed protocol is more efficient in the aspect of qubit utilization.

  16. A novel secret image sharing scheme based on chaotic system

    Science.gov (United States)

    Li, Li; Abd El-Latif, Ahmed A.; Wang, Chuanjun; Li, Qiong; Niu, Xiamu

    2012-04-01

    In this paper, we propose a new secret image sharing scheme based on chaotic system and Shamir's method. The new scheme protects the shadow images with confidentiality and loss-tolerance simultaneously. In the new scheme, we generate the key sequence based on chaotic system and then encrypt the original image during the sharing phase. Experimental results and analysis of the proposed scheme demonstrate a better performance than other schemes and confirm a high probability to resist brute force attack.

  17. Jones index, secret sharing and total quantum dimension

    Science.gov (United States)

    Fiedler, Leander; Naaijkens, Pieter; Osborne, Tobias J.

    2017-02-01

    We study the total quantum dimension in the thermodynamic limit of topologically ordered systems. In particular, using the anyons (or superselection sectors) of such models, we define a secret sharing scheme, storing information invisible to a malicious party, and argue that the total quantum dimension quantifies how well we can perform this task. We then argue that this can be made mathematically rigorous using the index theory of subfactors, originally due to Jones and later extended by Kosaki and Longo. This theory provides us with a ‘relative entropy’ of two von Neumann algebras and a quantum channel, and we argue how these can be used to quantify how much classical information two parties can hide form an adversary. We also review the total quantum dimension in finite systems, in particular how it relates to topological entanglement entropy. It is known that the latter also has an interpretation in terms of secret sharing schemes, although this is shown by completely different methods from ours. Our work provides a different and independent take on this, which at the same time is completely mathematically rigorous. This complementary point of view might be beneficial, for example, when studying the stability of the total quantum dimension when the system is perturbed.

  18. Improving the security of a quantum secret sharing protocol between multiparty and multiparty without entanglement

    International Nuclear Information System (INIS)

    Han Lianfang; Liu Yimin; Shi Shouhua; Zhang Zhanjun

    2007-01-01

    Recently Yan and Gao [F.L. Yan, T. Gao, Phys. Rev. A 72 (2005) 012304] have proposed a quantum secret sharing protocol which allows a secret message to be shared between one group of m parties and another group of n parties. The protocol is claimed to be secure. In this Letter, first we show that any subgroup consisting of evil cooperative parties (or one and only one evil party) can successfully cheat other parties to obtain the secret message without being detected. Then we improve the original Yan-Gao protocol such that the insider's cheats are prevented

  19. Multiparty Quantum Direct Secret Sharing of Classical Information with Bell States and Bell Measurements

    Science.gov (United States)

    Song, Yun; Li, Yongming; Wang, Wenhua

    2018-02-01

    This paper proposed a new and efficient multiparty quantum direct secret sharing (QDSS) by using swapping quantum entanglement of Bell states. In the proposed scheme, the quantum correlation between the possible measurement results of the members (except dealer) and the original local unitary operation encoded by the dealer was presented. All agents only need to perform Bell measurements to share dealer's secret by recovering dealer's operation without performing any unitary operation. Our scheme has several advantages. The dealer is not required to retain any photons, and can further share a predetermined key instead of a random key to the agents. It has high capacity as two bits of secret messages can be transmitted by an EPR pair and the intrinsic efficiency approaches 100%, because no classical bit needs to be transmitted except those for detection. Without inserting any checking sets for detecting the eavesdropping, the scheme can resist not only the existing attacks, but also the cheating attack from the dishonest agent.

  20. Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State

    International Nuclear Information System (INIS)

    Xia Yan; Song Jie; Song Heshan; Huang Xiaoli

    2008-01-01

    We propose a new multiparty quantum secret sharing protocol via introducing auxiliary particles using a non-maximally entangled (pure) two-particle state without a Bell measurement. The communication parties utilize decoy particles to check eavesdropping. After ensuring the security of the quantum channel, the sender encodes the secret message and transmits it to the receiver by using controlled-NOT operation and von Neumann measurement. If and only if all the agents agree to collaborate, they can read out the secret message

  1. Quantum information theoretical analysis of various constructions for quantum secret sharing

    NARCIS (Netherlands)

    Rietjens, K.P.T.; Schoenmakers, B.; Tuyls, P.T.

    2005-01-01

    Recently, an information theoretical model for quantum secret sharing (QSS) schemes was introduced. By using this model, we prove that pure state quantum threshold schemes (QTS) can be constructed from quantum MDS codes and vice versa. In particular, we consider stabilizer codes and give a

  2. Detector-device-independent quantum secret sharing with source flaws.

    Science.gov (United States)

    Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Liu, Hongwei; Yin, Zhenqiang; Cao, Zhu; Wu, Lingan

    2018-04-10

    Measurement-device-independent entanglement witness (MDI-EW) plays an important role for detecting entanglement with untrusted measurement device. We present a double blinding-attack on a quantum secret sharing (QSS) protocol based on GHZ state. Using the MDI-EW method, we propose a QSS protocol against all detector side-channels. We allow source flaws in practical QSS system, so that Charlie can securely distribute a key between the two agents Alice and Bob over long distances. Our protocol provides condition on the extracted key rate for the secret against both external eavesdropper and arbitrary dishonest participants. A tight bound for collective attacks can provide good bounds on the practical QSS with source flaws. Then we show through numerical simulations that using single-photon source a secure QSS over 136 km can be achieved.

  3. Experimental quantum secret sharing and third-man quantum cryptography.

    Science.gov (United States)

    Chen, Yu-Ao; Zhang, An-Ning; Zhao, Zhi; Zhou, Xiao-Qi; Lu, Chao-Yang; Peng, Cheng-Zhi; Yang, Tao; Pan, Jian-Wei

    2005-11-11

    Quantum secret sharing (QSS) and third-man quantum cryptography (TQC) are essential for advanced quantum communication; however, the low intensity and fragility of the multiphoton entanglement source in previous experiments have made their realization an extreme experimental challenge. Here, we develop and exploit an ultrastable high intensity source of four-photon entanglement to report an experimental realization of QSS and TQC. The technology developed in our experiment will be important for future multiparty quantum communication.

  4. Quantum secret sharing based on Smolin states alone

    International Nuclear Information System (INIS)

    He Guangping; Wang, Z D; Bai, Yankui

    2008-01-01

    It was indicated (Yu 2007 Phys. Rev. A 75 066301) that a previously proposed quantum secret sharing (QSS) protocol based on Smolin states (Augusiak 2006 Phys. Rev. A 73 012318) is insecure against an internal cheater. Here we build a different QSS protocol with Smolin states alone, and prove it to be secure against known cheating strategies. Thus we open a promising venue for building secure QSS using merely Smolin states, which is a typical kind of bound entangled states. We also propose a feasible scheme to implement the protocol experimentally

  5. Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks

    DEFF Research Database (Denmark)

    Fehr, Serge; Maurer, Ueli M.

    2002-01-01

    . VSS and DC are main building blocks for unconditional secure multi-party computation protocols. This general approach covers all known linear VSS and DC schemes. The main theorem states that the security of a scheme is equivalent to a pure linear-algebra condition on the linear mappings (e.......g. described as matrices and vectors) describing the scheme. The security of all known schemes follows as corollaries whose proofs are pure linear-algebra arguments, in contrast to some hybrid arguments used in the literature. Our approach is demonstrated for the CDM DC scheme, which we generalize to be secure......We present a general treatment of all non-cryptographic (i.e., information-theoretically secure) linear veriable-secret-sharing (VSS) and distributed-commitment (DC) schemes, based on an underlying secret sharing scheme, pairwise checks between players, complaints, and accusations of the dealer...

  6. A note on Wang et al's attack on Zhang et al's multiparty quantum secret sharing

    International Nuclear Information System (INIS)

    Gao Gan

    2012-01-01

    Recently, Wang et al (2008 Phys. Lett. A 373 65) proposed an attack on Zhang et al's (2007 Opt. Commun. 269 418) multiparty quantum secret sharing scheme, in which the first and the last agent are reported to be able to cooperatively eavesdrop on all the secret messages without being detected. In this paper, we show that in Wang et al's attack, on average no more than half the secret messages can be eavesdropped. (paper)

  7. Cryptanalysis on the improved multiparty quantum secret sharing protocol based on the GHZ state

    International Nuclear Information System (INIS)

    Chen Xiubo; Yang Shuai; Su Yuan; Yang Yixian

    2012-01-01

    Recently, Liu et al (2011 Phys. Scr. 84045015) pointed out that the multiparty quantum secret sharing (MQSS) protocol based on the GHZ state (Hwang et al 2011 Phys. Scr. 83045004) is insecure. They found that an inside participant can deduce half of the sender's secret information directly just by his piece of the secret. In order to resist this attack, an improvement was put forward. However, in this paper, we find that Liu et al's improved protocol is still insecure. We give details of three attack strategies to steal the secret information. It is shown that the eavesdropper can steal half or all of the secret information. Furthermore, a simple and ingenious MQSS protocol is proposed. We perform explicit cryptanalysis to prove that our improved protocol can resist the attacks from both the outside attackers and the inside participants, even the collusion attack.

  8. Improved Multipartite Quantum Secret Sharing Protocol Using Preshared Greenberger-Horne-Zeilinger States

    International Nuclear Information System (INIS)

    Xie Deng; Ye Mingyong; Li Xinghua

    2011-01-01

    Inspired by the protocol presented by Bagherinezhad and Karimipour [Phys. Rev. A 67 (2003) 044302], which will be shown to be insecure, we present a multipartite quantum secret sharing protocol using reusable Greenberger-Horne-Zeilinger (GHZ) states. This protocol is robust against eavesdropping and could be used for the circumstance of many parties. (general)

  9. Large-Capacity Three-Party Quantum Digital Secret Sharing Using Three Particular Matrices Coding

    International Nuclear Information System (INIS)

    Lai Hong; Tao Li; Liu Zhi-Ming; Luo Ming-Xing; Pieprzyk, Josef; Orgun, Mehmet A.

    2016-01-01

    In this paper, we develop a large-capacity quantum digital secret sharing (QDSS) scheme, combined the Fibonacci- and Lucas-valued orbital angular momentum (OAM) entanglement with the recursive Fibonacci and Lucas matrices. To be exact, Alice prepares pairs of photons in the Fibonacci- and Lucas-valued OAM entangled states, and then allocates them to two participants, say, Bob and Charlie, to establish the secret key. Moreover, the available Fibonacci and Lucas values from the matching entangled states are used as the seed for generating the Fibonacci and Lucas matrices. This is achieved because the entries of the Fibonacci and Lucas matrices are recursive. The secret key can only be obtained jointly by Bob and Charlie, who can further recover the secret. Its security is based on the facts that nonorthogonal states are indistinguishable, and Bob or Charlie detects a Fibonacci number, there is still a twofold uncertainty for Charlie' (Bob') detected value. (paper)

  10. Comment on ‘Authenticated quantum secret sharing with quantum dialogue based on Bell states’

    Science.gov (United States)

    Gao, Gan; Wang, Yue; Wang, Dong; Ye, Liu

    2018-02-01

    In the paper (2016 Phys. Scr. 91 085101), Abulkasim et al proposed a authenticated quantum secret sharing scheme. We study the security of the multiparty case in the proposed scheme and find that it is not secure.

  11. Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow.

    Science.gov (United States)

    Pang, Liaojun; Miao, Deyu; Li, Huixian; Wang, Qiong

    2015-01-01

    Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.

  12. Sequential Quantum Secret Sharing Using a Single Qudit

    Science.gov (United States)

    Bai, Chen-Ming; Li, Zhi-Hui; Li, Yong-Ming

    2018-05-01

    In this paper we propose a novel and efficient quantum secret sharing protocol using d-level single particle, which it can realize a general access structure via the thought of concatenation. In addition, Our scheme includes all advantages of Tavakoli’s scheme [Phys. Rev. A 92 (2015) 030302(R)]. In contrast to Tavakoli’s scheme, the efficiency of our scheme is 1 for the same situation, and the access structure is more general and has advantages in practical significance. Furthermore, we also analyze the security of our scheme in the primary quantum attacks. Sponsored by the National Natural Science Foundation of China under Grant Nos. 61373150 and 61602291, and Industrial Research and Development Project of Science and Technology of Shaanxi Province under Grant No. 2013k0611

  13. Multiparty quantum secret sharing of secure direct communication

    International Nuclear Information System (INIS)

    Zhang Zhanjun

    2005-01-01

    Based on the two-step protocol [F.G. Deng, G.L. Long, X.S. Liu, Phys. Rev. A 68 (2003) 042317], we propose a (n,n)-threshold multiparty quantum secret sharing protocol of secure direct communication. In our protocol, the sender's secure direct communication message can be extracted only if all the sharers collaborate. We show a variant version of this protocol based on the variant two-step protocol. This variant version can considerably reduce the realization difficulty in experiment. In contrast to the use of multi-particle GHZ states in the case that the sharer number is larger than 3, the use and identification of Bell states are enough in our two protocols disregarding completely the sharer number, hence, our protocols are more feasible in technique

  14. Algebra for applications cryptography, secret sharing, error-correcting, fingerprinting, compression

    CERN Document Server

    Slinko, Arkadii

    2015-01-01

    This book examines the relationship between mathematics and data in the modern world. Indeed, modern societies are awash with data which must be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from an unauthorised access and transmitted over unreliable channels. All of these operations can be understood only by a person with knowledge of basics in algebra and number theory. This book provides the necessary background in arithmetic, polynomials, groups, fields and elliptic curves that is sufficient to understand such real-life applications as cryptography, secret sharing, error-correcting, fingerprinting and compression of information. It is the first to cover many recent developments in these topics. Based on a lecture course given to third-year undergraduates, it is self-contained with numerous worked examples and exercises provided to test understanding. It can additionally be used for self-study.

  15. Three-party quantum secret sharing of secure direct communication based on χ-type entangled states

    International Nuclear Information System (INIS)

    Yu-Guang, Yang; Wei-Feng, Cao; Qiao-Yan, Wen

    2010-01-01

    Based on χ-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on χ-type entangled states |χ 00 ) 3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed. (general)

  16. Toric Varieties and Codes, Error-correcting Codes, Quantum Codes, Secret Sharing and Decoding

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    We present toric varieties and associated toric codes and their decoding. Toric codes are applied to construct Linear Secret Sharing Schemes (LSSS) with strong multiplication by the Massey construction. Asymmetric Quantum Codes are obtained from toric codes by the A.R. Calderbank P.W. Shor and A.......M. Steane construction of stabilizer codes (CSS) from linear codes containing their dual codes....

  17. Efficient quantum secret sharing scheme with two-particle entangled states

    International Nuclear Information System (INIS)

    Zhu Zhen-Chao; Fu An-Min; Zhang Yu-Qing

    2011-01-01

    This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time. (general)

  18. Comment on 'Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers'

    International Nuclear Information System (INIS)

    Gao Fei; Guo Fenzhuo; Wen Qiaoyan; Zhu Fuchen

    2005-01-01

    In a recent paper [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)], a quantum secret sharing protocol based on reusable Greenberger-Horne-Zeilinger states was proposed. However, in this Comment, it is shown that this protocol is insecure if Eve employs a special strategy to attack

  19. SECRET SHARING SCHEMES WITH STRONG MULTIPLICATION AND A LARGE NUMBER OF PLAYERS FROM TORIC VARIETIES

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    2017-01-01

    This article consider Massey's construction for constructing linear secret sharing schemes from toric varieties over a finite field $\\Fq$ with $q$ elements. The number of players can be as large as $(q-1)^r-1$ for $r\\geq 1$. The schemes have strong multiplication, such schemes can be utilized in ...

  20. Quantum secret sharing based on modulated high-dimensional time-bin entanglement

    International Nuclear Information System (INIS)

    Takesue, Hiroki; Inoue, Kyo

    2006-01-01

    We propose a scheme for quantum secret sharing (QSS) that uses a modulated high-dimensional time-bin entanglement. By modulating the relative phase randomly by {0,π}, a sender with the entanglement source can randomly change the sign of the correlation of the measurement outcomes obtained by two distant recipients. The two recipients must cooperate if they are to obtain the sign of the correlation, which is used as a secret key. We show that our scheme is secure against intercept-and-resend (IR) and beam splitting attacks by an outside eavesdropper thanks to the nonorthogonality of high-dimensional time-bin entangled states. We also show that a cheating attempt based on an IR attack by one of the recipients can be detected by changing the dimension of the time-bin entanglement randomly and inserting two 'vacant' slots between the packets. Then, cheating attempts can be detected by monitoring the count rate in the vacant slots. The proposed scheme has better experimental feasibility than previously proposed entanglement-based QSS schemes

  1. Robust Multiparty Quantum Secret Key Sharing Over Two Collective-Noise Channels via Three-Photon Mixed States

    International Nuclear Information System (INIS)

    Wang Zhangyin; Yuan Hao; Gao Gan; Shi Shouhua

    2006-01-01

    We present a robust (n,n)-threshold scheme for multiparty quantum secret sharing of key over two collective-noise channels (i.e., the collective dephasing channel and the collective rotating channel) via three-photon mixed states. In our scheme, only if all the sharers collaborate together can they establish a joint key with the message sender and extract the secret message from the sender's encrypted message. This scheme can be implemented using only a Bell singlet, a one-qubit state and polarization identification of single photon, so it is completely feasible according to the present-day technique.

  2. Reply to 'Comment II on 'Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers''

    International Nuclear Information System (INIS)

    Karimipour, V.

    2006-01-01

    In the preceding Comment [Jian-Zhong Du, Su-Juan Qin, Qiao-Yan Wen, and Fu-Chen Zhu, Phys. Rev. A 74, 016301 (2006)], it has been shown that in a quantum secret sharing protocol proposed in [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)], one of the receivers can cheat by splitting the entanglement of the carrier and intercepting the secret, without being detected. In this reply we show that a simple modification of the protocol prevents the receivers from this kind of cheating

  3. Improving the multiparty quantum secret sharing over two collective-noise channels against insider attack

    Science.gov (United States)

    Sun, Ying; Wen, Qiao-yan; Zhu, Fu-chen

    2010-01-01

    The security of the multiparty quantum secret sharing protocol presented by Zhang [Z.J. Zhang, Physica A, 361 (2006) 233] is analyzed. It is shown that this protocol is vulnerable to the insider attack since eavesdropping detection is performed only when all states arrive at the last agent. We propose an attack strategy and give an improved version of the original protocol. The improved protocol is robust and has the same traits with the original one.

  4. Embodying rationality

    OpenAIRE

    Mastrogiorgio, Antonio; Petracca, Enrico

    2016-01-01

    The current notions of bounded rationality in economics share distinctive features with Simon’s original notion, which still influences the theoretical and experimental research in the fields of choice, judgment, decision making, problem solving, and social cognition. All these notions of bounded rationality are in fact equally rooted in the information-processing approach to human cognition, expressing the view that reasoning is disembodied and that it can be reduced to the processing of abs...

  5. Navajo Code Talker Joe Morris, Sr. shared insights from his time as a secret World War Two messenger

    Science.gov (United States)

    2002-01-01

    Navajo Code Talker Joe Morris, Sr. shared insights from his time as a secret World War Two messenger with his audience at NASA's Dryden Flight Research Center on Nov. 26, 2002. NASA Dryden is located on Edwards Air Force Base in California's Mojave Desert.

  6. Shared secrets: Web 2.0 and research in Social Sciences

    Directory of Open Access Journals (Sweden)

    Sandra MARTORELL

    2013-12-01

    Full Text Available Web 2.0 represents a revolution in terms of the possibilities it offers for facilitating communication and collaboration between users – something that has become increasingly common in the world of research. A mere few years ago, the information produced by scientists and scholars remained in the hands of a very limited circle of institutions and publishers, as if it were a guarded secret. Today that secret is being shouted from the rooftops and shared with the rest of the scientific community in order to make it more accessible and to allow new advances. A clear example of this can be found in the social sciences, where there is a constant increase in the production of articles and materials that in turn serve for the pursuit of further research, thereby promoting the continuous development of scientific knowledge. This new situation is being fostered by the proliferation of tools and applications that make it possible, but also by a change in mentality towards a philosophy of exchange and open access. In this article, we will examine this phenomenon using a methodological system based on the analysis of platforms for the exchange of scientific knowledge, and especially social networks (both general and specialising in the social sciences, in order to demonstrate their potential in a society that is becoming increasingly aware of the need to overcome physical or institutional boundaries and move forward together.

  7. Shamir secret sharing scheme with dynamic access structure (SSSDAS). Case study on nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V. [Indira Gandhi Centre for Atomic Research (IGCAR), Kalpakkam (India). Computer Div.; Aghila, G. [National Institute of Technology, Karaikal (India). Dept. of Computer Science and Engineering

    2015-05-15

    In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.

  8. Shamir secret sharing scheme with dynamic access structure (SSSDAS). Case study on nuclear power plant

    International Nuclear Information System (INIS)

    Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V.; Aghila, G.

    2015-01-01

    In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.

  9. Improving the security of multiparty quantum secret sharing against Trojan horse attack

    International Nuclear Information System (INIS)

    Deng Fuguo; Li Xihan; Zhou Hongyu; Zhang Zhanjun

    2005-01-01

    We analyzed the security of the multiparty quantum secret sharing (MQSS) protocol recently proposed by Zhang, Li, and Man [Phys. Rev. A 71, 044301 (2005)] and found that this protocol is secure for any other eavesdropper except for the agent Bob who prepares the quantum signals as he can attack the quantum communication with a Trojan horse. That is, Bob replaces the single-photon signal with a multiphoton one and the other agent Charlie cannot find this cheating as she does not measure the photons before they run back from the boss Alice, which reveals that this MQSS protocol is not secure for Bob. Finally, we present a possible improvement of the MQSS protocol security with two single-photon measurements and four unitary operations

  10. A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability.

    Science.gov (United States)

    Lee, Che-Wei; Tsai, Wen-Hsiang

    2012-01-01

    A new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images via the use of the Portable Network Graphics (PNG) image is proposed. An authentication signal is generated for each block of a grayscale document image, which, together with the binarized block content, is transformed into several shares using the Shamir secret sharing scheme. The involved parameters are carefully chosen so that as many shares as possible are generated and embedded into an alpha channel plane. The alpha channel plane is then combined with the original grayscale image to form a PNG image. During the embedding process, the computed share values are mapped into a range of alpha channel values near their maximum value of 255 to yield a transparent stego-image with a disguise effect. In the process of image authentication, an image block is marked as tampered if the authentication signal computed from the current block content does not match that extracted from the shares embedded in the alpha channel plane. Data repairing is then applied to each tampered block by a reverse Shamir scheme after collecting two shares from unmarked blocks. Measures for protecting the security of the data hidden in the alpha channel are also proposed. Good experimental results prove the effectiveness of the proposed method for real applications.

  11. Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate

    International Nuclear Information System (INIS)

    Chau, H.F.

    2002-01-01

    A secret key shared through quantum key distribution between two cooperative players is secure against any eavesdropping attack allowed by the laws of physics. Yet, such a key can be established only when the quantum channel error rate due to eavesdropping or imperfect apparatus is low. Here, a practical quantum key distribution scheme by making use of an adaptive privacy amplification procedure with two-way classical communication is reported. Then, it is proven that the scheme generates a secret key whenever the bit error rate of the quantum channel is less than 0.5-0.1√(5)≅27.6%, thereby making it the most error resistant scheme known to date

  12. Quantum-Secret-Sharing Scheme Based on Local Distinguishability of Orthogonal Seven-Qudit Entangled States

    Science.gov (United States)

    Liu, Cheng-Ji; Li, Zhi-Hui; Bai, Chen-Ming; Si, Meng-Meng

    2018-02-01

    The concept of judgment space was proposed by Wang et al. (Phys. Rev. A 95, 022320, 2017), which was used to study some important properties of quantum entangled states based on local distinguishability. In this study, we construct 15 kinds of seven-qudit quantum entangled states in the sense of permutation, calculate their judgment space and propose a distinguishability rule to make the judgment space more clearly. Based on this rule, we study the local distinguishability of the 15 kinds of seven-qudit quantum entangled states and then propose a ( k, n) threshold quantum secret sharing scheme. Finally, we analyze the security of the scheme.

  13. A secure data outsourcing scheme based on Asmuth-Bloom secret sharing

    Science.gov (United States)

    Idris Muhammad, Yusuf; Kaiiali, Mustafa; Habbal, Adib; Wazan, A. S.; Sani Ilyasu, Auwal

    2016-11-01

    Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.

  14. A novel lost packets recovery scheme based on visual secret sharing

    Science.gov (United States)

    Lu, Kun; Shan, Hong; Li, Zhi; Niu, Zhao

    2017-08-01

    In this paper, a novel lost packets recovery scheme which encrypts the effective parts of an original packet into two shadow packets based on (2, 2)-threshold XOR-based visual Secret Sharing (VSS) is proposed. The two shadow packets used as watermarks would be embedded into two normal data packets with digital watermarking embedding technology and then sent from one sensor node to another. Each shadow packet would reveal no information of the original packet, which can improve the security of original packet delivery greatly. The two shadow packets which can be extracted from the received two normal data packets delivered from a sensor node can recover the original packet lossless based on XOR-based VSS. The Performance analysis present that the proposed scheme provides essential services as long as possible in the presence of selective forwarding attack. The proposed scheme would not increase the amount of additional traffic, namely, lower energy consumption, which is suitable for Wireless Sensor Network (WSN).

  15. Fault-Tolerate Three-Party Quantum Secret Sharing over a Collective-Noise Channel

    International Nuclear Information System (INIS)

    Li Chun-Yan; Li Yan-Song

    2011-01-01

    We present a fault-tolerate three-party quantum secret sharing (QSS) scheme over a collective-noise channel. Decoherence-free subspaces are used to tolerate two noise modes, a collective-dephasing channel and a collective-rotating channel, respectively. In this scheme, the boss uses two physical qubits to construct a logical qubit which acts as a quantum channel to transmit one bit information to her two agents. The agents can get the information of the private key established by the boss only if they collaborate. The boss Alice encodes information with two unitary operations. Only single-photon measurements are required to rebuilt Alice's information and detect the security by the agents Bob and Charlie, not Bell-state measurements. Moreover, Almost all of the photons are used to distribute information, and its success efficiency approaches 100% in theory. (general)

  16. Quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared secret Bell state

    International Nuclear Information System (INIS)

    Ye, Tian-Yu; Jiang, Li-Zhen

    2014-01-01

    In order to avoid the risk of information leakage during the information mutual transmission between two authorized participants, i.e. Alice and Bob, a quantum dialogue protocol based on the entanglement swapping between any two Bell states and the shared secret Bell state is proposed. The proposed protocol integrates the ideas of block transmission, two-step transmission and unitary operation encoding together using the Bell states as the information carriers. Besides the entanglement swapping between any two Bell states, a shared secret Bell state is also used to overcome the information leakage problem, which not only makes Bob aware of the prepared initial state but also is used for Bob's encoding and entanglement swapping. Security analysis shows that the proposed protocol can resist the general active attacks from an outside eavesdropper Eve. Moreover, the relation between the maximal amount of information Eve can gain and the detection probability is derived. (paper)

  17. Dynamics of market structure driven by the degree of consumer’s rationality

    Science.gov (United States)

    Yanagita, Tatsuo; Onozaki, Tamotsu

    2010-03-01

    We study a simple model of market share dynamics with boundedly rational consumers and firms interacting with each other. As the number of consumers is large, we employ a statistical description to represent firms’ distribution of consumer share, which is characterized by a single parameter representing how rationally the mass of consumers pursue higher utility. As the boundedly rational firm does not know the shape of demand function it faces, it revises production and price so as to raise its profit with the aid of a simple reinforcement learning rule. Simulation results show that (1) three phases of market structure, i.e. the uniform share phase, the oligopolistic phase, and the monopolistic phase, appear depending upon how rational consumers are, and (2) in an oligopolistic phase, the market share distribution of firms follows Zipf’s law and the growth-rate distribution of firms follows Gibrat’s law, and (3) an oligopolistic phase is the best state of market in terms of consumers’ utility but brings the minimum profit to the firms because of severe competition based on the moderate rationality of consumers.

  18. A Novel Multiparty Quantum Secret Sharing Scheme of Secure Direct Communication Based on Bell States and Bell Measurements

    International Nuclear Information System (INIS)

    Shi Run-Hua; Huang Liu-Sheng; Yang Wei; Zhong Hong

    2011-01-01

    We present a novel quantum secret sharing scheme of secure direct communication and analyze its security. This scheme takes Einstein—Podolsky—Rosen (EPR) pairs in Bell states as quantum resources. In order to obtain the direct communication message, all agents only need to perform Bell measurements, not to perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is unnecessary except for the eavesdropping checks. (general)

  19. 50 CFR 660.337 - Trawl rationalization program - data collection requirements.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Trawl rationalization program - data... COAST STATES West Coast Groundfish Fisheries § 660.337 Trawl rationalization program - data collection... guarantee that they will qualify for quota share under a future trawl rationalization program. The following...

  20. Behavior of temperature dependent SRAM-PUFs, and consequences for secret-key capacity

    NARCIS (Netherlands)

    Kusters, C.J.; Ignatenko, T.; Willems, F.M.J.

    2017-01-01

    Physical Unclonable Functions (PUFs) are a resource for generating and sharing secret keys. The mutual information between two respective observations of the same PUF gives an upper bound for the achievable secret-key rate of a secret-sharing scheme that relies on this PUF. This mutual information

  1. Serial interpolation for secure membership testing and matching in a secret-split archive

    Energy Technology Data Exchange (ETDEWEB)

    Kroeger, Thomas M.; Benson, Thomas R.

    2016-12-06

    The various technologies presented herein relate to analyzing a plurality of shares stored at a plurality of repositories to determine whether a secret from which the shares were formed matches a term in a query. A threshold number of shares are formed with a generating polynomial operating on the secret. A process of serially interpolating the threshold number of shares can be conducted whereby a contribution of a first share is determined, a contribution of a second share is determined while seeded with the contribution of the first share, etc. A value of a final share in the threshold number of shares can be determined and compared with the search term. In the event of the value of the final share and the search term matching, the search term matches the secret in the file from which the shares are formed.

  2. CERTIFICATE REVOCATION SCHEME BASED ON WEIGHTED VOTING GAME AND RATIONAL SECURE MULTIPARTY COMPUTING

    Directory of Open Access Journals (Sweden)

    N Aravinthan

    2017-03-01

    Full Text Available The Mobile Adhoc Network consists of deployed mobile nodes which lead to the frequent changes in network topology. Due to topology changes, required infrastructure is unavailable for communication. Moreover, malicious nodes present in MANET make use of this modification and can easily launch highly vulnerable attacks on the routing path of the network. Hence, Security issue such as removing misbehaving nodes is the primary issue in MANET. Effective certificate revocation scheme was introduced to identify and eliminate the node with malicious activities in the network based on the weighted voting game (ECR-WVG approach. In this approach, weights and quota were two factors, determined for an effective revocation of malicious nodes certificates. However, security during multiparty transmission was not taken into account in ECR-WVG. In Effective Certificate Revocation Scheme based on Weighted Voting Game and Rational Secure Multi-Party Computing (ECR-WVG-RSMPC method, rational secret sharing scheme is introduced along with ECR-WVG approach for securing multiparty transmission. Performance evaluation can be done between ECR-WVG and ECR-WVG-RSMPC in terms of false revocation, malicious node revocation, normalized time for revocation and revocation accuracy ratio.

  3. Spacetime Replication of Quantum Information Using (2 , 3) Quantum Secret Sharing and Teleportation

    Science.gov (United States)

    Wu, Yadong; Khalid, Abdullah; Davijani, Masoud; Sanders, Barry

    The aim of this work is to construct a protocol to replicate quantum information in any valid configuration of causal diamonds and assess resources required to physically realize spacetime replication. We present a set of codes to replicate quantum information along with a scheme to realize these codes using continuous-variable quantum optics. We use our proposed experimental realizations to determine upper bounds on the quantum and classical resources required to simulate spacetime replication. For four causal diamonds, our implementation scheme is more efficient than the one proposed previously. Our codes are designed using a decomposition algorithm for complete directed graphs, (2 , 3) quantum secret sharing, quantum teleportation and entanglement swapping. These results show the simulation of spacetime replication of quantum information is feasible with existing experimental methods. Alberta Innovates, NSERC, China's 1000 Talent Plan and the Institute for Quantum Information and Matter, which is an NSF Physics Frontiers Center (NSF Grant PHY-1125565) with support of the Gordon and Betty Moore Foundation (GBMF-2644).

  4. Secret rate - Privacy leakage in biometric systems

    NARCIS (Netherlands)

    Ignatenko, T.; Willems, F.M.J.

    2009-01-01

    Ahlswede and Csiszár [1993] introduced the concept of secret sharing. In their source model two terminals observe two correlated sequences. It is the objective of the terminals to form a common secret by interchanging a public message (helper data) in such a way that the secrecy leakage is

  5. Shared decision making, paternalism and patient choice.

    Science.gov (United States)

    Sandman, Lars; Munthe, Christian

    2010-03-01

    In patient centred care, shared decision making is a central feature and widely referred to as a norm for patient centred medical consultation. However, it is far from clear how to distinguish SDM from standard models and ideals for medical decision making, such as paternalism and patient choice, and e.g., whether paternalism and patient choice can involve a greater degree of the sort of sharing involved in SDM and still retain their essential features. In the article, different versions of SDM are explored, versions compatible with paternalism and patient choice as well as versions that go beyond these traditional decision making models. Whenever SDM is discussed or introduced it is of importance to be clear over which of these different versions are being pursued, since they connect to basic values and ideals of health care in different ways. It is further argued that we have reason to pursue versions of SDM involving, what is called, a high level dynamics in medical decision-making. This leaves four alternative models to choose between depending on how we balance between the values of patient best interest, patient autonomy, and an effective decision in terms of patient compliance or adherence: Shared Rational Deliberative Patient Choice, Shared Rational Deliberative Paternalism, Shared Rational Deliberative Joint Decision, and Professionally Driven Best Interest Compromise. In relation to these models it is argued that we ideally should use the Shared Rational Deliberative Joint Decision model. However, when the patient and professional fail to reach consensus we will have reason to pursue the Professionally Driven Best Interest Compromise model since this will best harmonise between the different values at stake: patient best interest, patient autonomy, patient adherence and a continued care relationship.

  6. Structural Characterization and Oligomerization of the TssL Protein, a Component Shared by Bacterial Type VI and Type IVb Secretion Systems*

    Science.gov (United States)

    Durand, Eric; Zoued, Abdelrahim; Spinelli, Silvia; Watson, Paul J. H.; Aschtgen, Marie-Stéphanie; Journet, Laure; Cambillau, Christian; Cascales, Eric

    2012-01-01

    The Type VI secretion system (T6SS) is a macromolecular system distributed in Gram-negative bacteria, responsible for the secretion of effector proteins into target cells. The T6SS has a broad versatility as it can target both eukaryotic and prokaryotic cells. It is therefore involved in host pathogenesis or killing neighboring bacterial cells to colonize a new niche. At the architecture level, the T6SS core apparatus is composed of 13 proteins, which assemble in two subcomplexes. One of these subcomplexes, composed of subunits that share structural similarities with bacteriophage tail and baseplate components, is anchored to the cell envelope by the membrane subcomplex. This latter is constituted of at least three proteins, TssL, TssM, and TssJ. The crystal structure of the TssJ outer membrane lipoprotein and its interaction with the inner membrane TssM protein have been recently reported. TssL and TssM share sequence homology and characteristics with two components of the Type IVb secretion system (T4bSS), IcmH/DotU and IcmF, respectively. In this study, we report the crystal structure of the cytoplasmic domain of the TssL inner membrane protein from the enteroaggregative Escherichia coli Sci-1 T6SS. It folds as a hook-like structure composed of two three-helix bundles. Two TssL molecules associate to form a functional complex. Although the TssL trans-membrane segment is the main determinant of self-interaction, contacts between the cytoplasmic domains are required for TssL function. Based on sequence homology and secondary structure prediction, we propose that the TssL structure is the prototype for the members of the TssL and IcmH/DotU families. PMID:22371492

  7. 77 FR 66577 - Fisheries Off West Coast States; Pacific Coast Groundfish Fishery; Trawl Rationalization Program...

    Science.gov (United States)

    2012-11-06

    ...-XC165 Fisheries Off West Coast States; Pacific Coast Groundfish Fishery; Trawl Rationalization Program... implemented as part of the trawl rationalization program. FOR FURTHER INFORMATION CONTACT: Jamie Goen, phone..., NMFS implemented a trawl rationalization program, a catch share program, for the Pacific coast...

  8. Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop

    Directory of Open Access Journals (Sweden)

    Su-Hyun Kim

    2014-07-01

    Full Text Available In a cloud computing environment, user data is encrypted and stored using a large number of distributed servers. Global Internet service companies such as Google and Yahoo have recognized the importance of Internet service platforms and conducted their own research and development to utilize large cluster-based cloud computing platform technologies based on low-cost commercial off-the-shelf nodes. Accordingly, as various data services are now allowed over a distributed computing environment, distributed management of big data has become a major issue. On the other hand, security vulnerability and privacy infringement due to malicious attackers or internal users can occur by means of various usage types of big data. In particular, various security vulnerabilities can occur in the block access token, which is used for the permission control of data blocks in Hadoop. To solve this problem, we have proposed a weight-applied XOR-based efficient distribution storage and recovery scheme in this paper. In particular, various security vulnerabilities can occur in the block access token, which is used for the permission control of data blocks in Hadoop. In this paper, a secret sharing-based block access token management scheme is proposed to overcome such security vulnerabilities.

  9. Digging Up "The Secret Garden": Noble Innocents or Little Savages?

    Science.gov (United States)

    Wilkie, Christine

    1997-01-01

    Offers a rereading of Frances Hodgson Burnett's "The Secret Garden," finding in it the triumph of Apollonian male rationalism over the Dionysian female cult of nature. Examines images of primitivism and wildness in the book, connecting them to polarities in conceptions of primitivism. (SR)

  10. Application of homomorphism to secure image sharing

    Science.gov (United States)

    Islam, Naveed; Puech, William; Hayat, Khizar; Brouzet, Robert

    2011-09-01

    In this paper, we present a new approach for sharing images between l players by exploiting the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, i.e. RSA and Paillier. Contrary to the traditional schemes, the proposed approach employs secret sharing in a way that limits the influence of the dealer over the protocol and allows each player to participate with the help of his key-image. With the proposed approach, during the encryption step, each player encrypts his own key-image using the dealer's public key. The dealer encrypts the secret-to-be-shared image with the same public key and then, the l encrypted key-images plus the encrypted to-be shared image are multiplied homomorphically to get another encrypted image. After this step, the dealer can safely get a scrambled image which corresponds to the addition or multiplication of the l + 1 original images ( l key-images plus the secret image) because of the additive homomorphic property of the Paillier algorithm or multiplicative homomorphic property of the RSA algorithm. When the l players want to extract the secret image, they do not need to use keys and the dealer has no role. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own key-image with no specific order from the scrambled image. Thus, the proposed approach provides an opportunity to use operators like multiplication on encrypted images for the development of a secure privacy preserving protocol in the image domain. We show that it is still possible to extract a visible version of the secret image with only l-1 key-images (when one key-image is missing) or when the l key-images used for the extraction are different from the l original key-images due to a lossy compression for example. Experimental results and security analysis verify and prove that the proposed approach is secure from cryptographic viewpoint.

  11. Quantum state sharing against the controller's cheating

    Science.gov (United States)

    Shi, Run-hua; Zhong, Hong; Huang, Liu-sheng

    2013-08-01

    Most existing QSTS schemes are equivalent to the controlled teleportation, in which a designated agent (i.e., the recoverer) can recover the teleported state with the help of the controllers. However, the controller may attempt to cheat the recoverer during the phase of recovering the secret state. How can we detect this cheating? In this paper, we considered the problem of detecting the controller's cheating in Quantum State Sharing, and further proposed an effective Quantum State Sharing scheme against the controller's cheating. We cleverly use Quantum Secret Sharing, Multiple Quantum States Sharing and decoy-particle techniques. In our scheme, via a previously shared entanglement state Alice can teleport multiple arbitrary multi-qubit states to Bob with the help of Charlie. Furthermore, by the classical information shared previously, Alice and Bob can check whether there is any cheating of Charlie. In addition, our scheme only needs to perform Bell-state and single-particle measurements, and to apply C-NOT gate and other single-particle unitary operations. With the present techniques, it is feasible to implement these necessary measurements and operations.

  12. Deterministic MDI QKD with two secret bits per shared entangled pair

    Science.gov (United States)

    Zebboudj, Sofia; Omar, Mawloud

    2018-03-01

    Although quantum key distribution schemes have been proven theoretically secure, they are based on assumptions about the devices that are not yet satisfied with today's technology. The measurement-device-independent scheme has been proposed to shorten the gap between theory and practice by removing all detector side-channel attacks. On the other hand, two-way quantum key distribution schemes have been proposed to raise the secret key generation rate. In this paper, we propose a new quantum key distribution scheme able to achieve a relatively high secret key generation rate based on two-way quantum key distribution that also inherits the robustness of the measurement-device-independent scheme against detector side-channel attacks.

  13. Pituitary-hormone secretion by thyrotropinomas.

    Science.gov (United States)

    Roelfsema, Ferdinand; Kok, Simon; Kok, Petra; Pereira, Alberto M; Biermasz, Nienke R; Smit, Jan W; Frolich, Marijke; Keenan, Daniel M; Veldhuis, Johannes D; Romijn, Johannes A

    2009-01-01

    Hormone secretion by somatotropinomas, corticotropinomas and prolactinomas exhibits increased pulse frequency, basal and pulsatile secretion, accompanied by greater disorderliness. Increased concentrations of growth hormone (GH) or prolactin (PRL) are observed in about 30% of thyrotropinomas leading to acromegaly or disturbed sexual functions beyond thyrotropin (TSH)-induced hyperthyroidism. Regulation of non-TSH pituitary hormones in this context is not well understood. We there therefore evaluated TSH, GH and PRL secretion in 6 patients with up-to-date analytical and mathematical tools by 24-h blood sampling at 10-min intervals in a clinical research laboratory. The profiles were analyzed with a new deconvolution method, approximate entropy, cross-approximate entropy, cross-correlation and cosinor regression. TSH burst frequency and basal and pulsatile secretion were increased in patients compared with controls. TSH secretion patterns in patients were more irregular, but the diurnal rhythm was preserved at a higher mean with a 2.5 h phase delay. Although only one patient had clinical acromegaly, GH secretion and IGF-I levels were increased in two other patients and all three had a significant cross-correlation between the GH and TSH. PRL secretion was increased in one patient, but all patients had a significant cross-correlation with TSH and showed decreased PRL regularity. Cross-ApEn synchrony between TSH and GH did not differ between patients and controls, but TSH and PRL synchrony was reduced in patients. We conclude that TSH secretion by thyrotropinomas shares many characteristics of other pituitary hormone-secreting adenomas. In addition, abnormalities in GH and PRL secretion exist ranging from decreased (joint) regularity to overt hypersecretion, although not always clinically obvious, suggesting tumoral transformation of thyrotrope lineage cells.

  14. Comparativism and the Grounds for Person-Centered Care and Shared Decision Making.

    Science.gov (United States)

    Herlitz, Anders

    2017-01-01

    This article provides a new argument and a new value-theoretical ground for person-centered care and shared decision making that ascribes to it the role of enabling rational choice in situations involving clinical choice. Rather than referring to good health outcomes and/or ethical grounds such as patient autonomy, it argues that a plausible justification and ground for person-centered care and shared decision making is preservation of rationality in the face of comparative non-determinacy in clinical settings. Often, no alternative treatment will be better than or equal to every other alternative. In the face of such comparative non-determinacy, Ruth Chang has argued that we can make rational decisions by invoking reasons that are created through acts of willing. This article transfers this view to clinical decision making and argues that shared decision making provides a solution to non-determinacy problems in clinical settings. This view of the role of shared decision making provides a new understanding of its nature, and it also allows us to better understand when caregivers should engage in shared decision making and when they should not. Copyright 2017 The Journal of Clinical Ethics. All rights reserved.

  15. Liberal rationalism and medical decision-making.

    Science.gov (United States)

    Savulescu, Julian

    1997-04-01

    I contrast Robert Veatch's recent liberal vision of medical decision-making with a more rationalist liberal model. According to Veatch, physicians are biased in their determination of what is in their patient's overall interests in favour of their medical interests. Because of the extent of this bias, we should abandon the practice of physicians offering what they guess to be the best treatment option. Patients should buddy up with physicians who share the same values -- 'deep value pairing'. The goal of choice is maximal promotion of patient values. I argue that if subjectivism about value and valuing is true, this move is plausible. However, if objectivism about value is true -- that there really are states which are good for people regardless of whether they desire to be in them -- then we should accept a more rationalist liberal alternative. According to this alternative, what is required to decide which course is best is rational dialogue between physicians and patients, both about the patient's circumstances and her values, and not the seeking out of people, physicians or others, who share the same values. Rational discussion requires that physicians be reasonable and empathic. I describe one possible account of a reasonable physician.

  16. Robust Steganography Using LSB-XOR and Image Sharing

    OpenAIRE

    Adak, Chandranath

    2013-01-01

    Hiding and securing the secret digital information and data that are transmitted over the internet is of widespread and most challenging interest. This paper presents a new idea of robust steganography using bitwise-XOR operation between stego-key-image-pixel LSB (Least Significant Bit) value and secret message-character ASCII-binary value (or, secret image-pixel value). The stego-key-image is shared in dual-layer using odd-even position of each pixel to make the system robust. Due to image s...

  17. Insulin-like growth factor-1 is a negative modulator of glucagon secretion

    OpenAIRE

    Mancuso, Elettra; Mannino, Gaia C.; Fatta, Concetta Di; Fuoco, Anastasia; Spiga, Rosangela; Andreozzi, Francesco; Sesti, Giorgio

    2017-01-01

    Glucagon secretion involves a combination of paracrine, autocrine, hormonal, and autonomic neural mechanisms. Type 2 diabetes often presents impaired glucagon suppression by insulin and glucose. Insulin-like growth factor-I (IGF-1) has elevated homology with insulin, and regulates pancreatic ?-cells insulin secretion. Insulin and IGF-1 receptors share considerable structure homology and function. We hypothesized the existence of a mechanism linking the inhibition of ?-cells glucagon secretion...

  18. Standby Gasoline Rationing Plan. Contingency gasoline rationing regulations

    Energy Technology Data Exchange (ETDEWEB)

    1979-02-01

    The Economic Regulatory Administration issues final rules with respect to standby gasoline rationing. The plan is designed for and would be used only in the event of a severe gasoline shortage. The plan provides that eligibility for ration allotments will be primarily on the basis of motor vehicle registrations. DOE will mail government ration checks to the parties named in a national vehicle registration file to be maintained by DOE. Ration recipients may cash these checks for ration coupons at various designated coupon issuance points. Retail outlets and other suppliers will be required to redeem the ration coupons received in exchange for gasoline sold. Supplemental gas will be given to high-priority activities. A ration banking system will be established with two separate and distinct of ration accounts: retail outlets and other suppliers will open redemption accounts for the deposit of redeemed ration rights; and individuals or firms may open ration rights accounts, which will operate in much the same manner as monetary checking accounts. A white market will be permitted for the sale of transfer of ration rights. A percentage of the total ration rights to be issued will be reserved for distribution to the states as a State Ration Reserve, to be used by the states primarily for the relief of hardship. A National Ration Reserave will also be established. All sections of the Standby Gasoline Rationing Regulations are analyzed. (MCW)

  19. Shared Secrets: Motherhood and Male Homosexuality in Doppelgänger Narratives

    DEFF Research Database (Denmark)

    Sencindiver, Susan Yi

    2011-01-01

    narratives. Enlisting Joseph Conrad’s short story, “The Secret Sharer,” among others, as both a paradigmatic yet self-conscious example, I examine the intersecting hotbed of these two strange bedfellows, motherhood and homosexuality, as well as the significance of gender in the male doppelgänger imaginary....

  20. Rationality of limited rationality : some aggregate implications

    OpenAIRE

    Uri M. Possen; Mikko Puhakka

    1994-01-01

    In this paper we let economic agents choose whether to become fully rational or stay boundedly rational. Boundedly rational agents are less sophisticated in their information processing abilities. It is costly to acquire information needed to become fully rational, and thus not all agents are willing to incur those costs. We then explore the aggregate effects of endogenizing the decision whether the agent should or should not become fully rational in handling information. Since fully and boun...

  1. Equality versus equity bases pay systems and their effects on rational altruism motivation in teams: wicked masked altruism

    OpenAIRE

    Javier García Bernal; Marisa Ramírez Alesón

    2007-01-01

    This paper analyses the design of optimal incentives in teams both with and without rational altruism. The main contribution of the paper is to study the influence of the incentive function on the altruism parameter chosen by team members. We find that optimal incentive is independent of the presence of rational altruism. Secondly, we compare the welfare loss of equal sharing rules versus second best optimal sharing rules (based on equity). Finally, we distinguish between two sources of ratio...

  2. Maximizing potential for impact: Measuring and addressing issues of sharing and diversion in MAM management programs

    International Nuclear Information System (INIS)

    Rogers, Beatrice; Webb, Patrick; Marcus, Shelley; Maganga, Gray; Ashong, Joseph; Jayson, Lauren

    2014-01-01

    Programs to prevent and treat moderate acute malnutrition (MAM) commonly depend on providing supplementary foods to children. The Prevention of Malnutrition in Children Under Two Years of Age (PM2A) approach recommends providing nutritional supplements to pregnant and lactating women and to children six months to two years; some treatment programs reach older children and may provide family rations. Typically, the supplements used in such programs are variants of corn-soy blend (CSB), a micronutrient-enhanced blended food cooked as porridge, sometimes mixed with oil, or a lipid-based nutritional supplement (LNS). A comprehensive review of USAID-supported programs found that the size of the CSB ration targeting children ranged from 17.5g to 400g/ day; one reason for this disparity was differing assumptions about sharing of supplementary food, from none to equal sharing among all household members. WFP bases its ration calculation on the presumed need to provide twice the ration intended for the target child, to account for sharing. Expectations of sharing are thus a critical determinant of the amount of food needed to ensure that the target child receives an effective dose. Little empirical information is available about sharing supplementary foods, and the majority of such studies have appeared in the non-refereed literature. What literature exists suggests that sharing of supplementary food, at least among children in the household, is the norm. There is little evidence that one type of food is more likely to be shared than another (e.g., that LNS shows different patterns of sharing from CSB variants or that the CSBs vary), and little systematic evidence concerning their perception as a food or a medical treatment (or both). Factors affecting the degree of sharing or diversion of the supplement may include household composition, food insecurity, effectiveness of social and behavioural communication, mother’s involvement in child feeding, child age, desirability

  3. Shared Genetic Control of Brain Activity During Sleep and Insulin Secretion: A Laboratory-Based Family Study.

    Science.gov (United States)

    Morselli, Lisa L; Gamazon, Eric R; Tasali, Esra; Cox, Nancy J; Van Cauter, Eve; Davis, Lea K

    2018-01-01

    Over the past 20 years, a large body of experimental and epidemiologic evidence has linked sleep duration and quality to glucose homeostasis, although the mechanistic pathways remain unclear. The aim of the current study was to determine whether genetic variation influencing both sleep and glucose regulation could underlie their functional relationship. We hypothesized that the genetic regulation of electroencephalographic (EEG) activity during non-rapid eye movement sleep, a highly heritable trait with fingerprint reproducibility, is correlated with the genetic control of metabolic traits including insulin sensitivity and β-cell function. We tested our hypotheses through univariate and bivariate heritability analyses in a three-generation pedigree with in-depth phenotyping of both sleep EEG and metabolic traits in 48 family members. Our analyses accounted for age, sex, adiposity, and the use of psychoactive medications. In univariate analyses, we found significant heritability for measures of fasting insulin sensitivity and β-cell function, for time spent in slow-wave sleep, and for EEG spectral power in the delta, theta, and sigma ranges. Bivariate heritability analyses provided the first evidence for a shared genetic control of brain activity during deep sleep and fasting insulin secretion rate. © 2017 by the American Diabetes Association.

  4. Sharing a common resource with concave benefits

    OpenAIRE

    Ambec, S.

    2006-01-01

    A group of agents enjoy concave and single-peak benefit functions from consuming a shared resource. They also value money (transfers). The resource is scarce in the sense that not everybody can consume its peak. The paper characterizes the unique (resource and money) allocation that is efficient, incentive compatible and equal-sharing individual rational. It can be implemented (i) by selling the resource or taxing extraction and redistributing the money collected equally, or (ii) by assigning...

  5. Shared decision-making and patient autonomy.

    Science.gov (United States)

    Sandman, Lars; Munthe, Christian

    2009-01-01

    In patient-centred care, shared decision-making is advocated as the preferred form of medical decision-making. Shared decision-making is supported with reference to patient autonomy without abandoning the patient or giving up the possibility of influencing how the patient is benefited. It is, however, not transparent how shared decision-making is related to autonomy and, in effect, what support autonomy can give shared decision-making. In the article, different forms of shared decision-making are analysed in relation to five different aspects of autonomy: (1) self-realisation; (2) preference satisfaction; (3) self-direction; (4) binary autonomy of the person; (5) gradual autonomy of the person. It is argued that both individually and jointly these aspects will support the models called shared rational deliberative patient choice and joint decision as the preferred versions from an autonomy perspective. Acknowledging that both of these models may fail, the professionally driven best interest compromise model is held out as a satisfactory second-best choice.

  6. Performance Analysis of Chaotic Encryption Using a Shared Image ...

    African Journals Online (AJOL)

    Most of the secret key encryption algorithms in use today are designed based on either the feistel structure or the substitution-permutation structure. This paper focuses on data encryption technique using multi-scroll chaotic natures and a publicly shared image as a key. A key is generated from the shared image using a full ...

  7. Secret-Sharing over Multiple-Antenna Channels with Transmit Correlation

    KAUST Repository

    Zorgui, Marwen

    2015-01-07

    We consider secret-key agreement with public discussion over Rayleigh fastfading channels with transmit correlation. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the transmit correlation matrix. First, We derive the expression of the key capacity under the considered setup. Then, we show that the optimal transmit strategy achieving the key capacity consists in transmitting Gaussian signals along the eingenvectors of the channel covariance matrix. The powers allocated to each channel mode are determined as the solution of a numerical optimization problem that we derive. We also provide a waterfilling interpretation of the optimal power allocation. Finally, we develop a necessary and sufficient condition for beamforming to be optimal, i.e., transmitting along the strongest channel mode only is key capacity-achieving.

  8. Secret-Sharing over Multiple-Antenna Channels with Transmit Correlation

    KAUST Repository

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Alouini, Mohamed-Slim

    2015-01-01

    We consider secret-key agreement with public discussion over Rayleigh fastfading channels with transmit correlation. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the transmit correlation matrix. First, We derive the expression of the key capacity under the considered setup. Then, we show that the optimal transmit strategy achieving the key capacity consists in transmitting Gaussian signals along the eingenvectors of the channel covariance matrix. The powers allocated to each channel mode are determined as the solution of a numerical optimization problem that we derive. We also provide a waterfilling interpretation of the optimal power allocation. Finally, we develop a necessary and sufficient condition for beamforming to be optimal, i.e., transmitting along the strongest channel mode only is key capacity-achieving.

  9. Melioration as Rational Choice: Sequential Decision Making in Uncertain Environments

    Science.gov (United States)

    Sims, Chris R.; Neth, Hansjorg; Jacobs, Robert A.; Gray, Wayne D.

    2013-01-01

    Melioration--defined as choosing a lesser, local gain over a greater longer term gain--is a behavioral tendency that people and pigeons share. As such, the empirical occurrence of meliorating behavior has frequently been interpreted as evidence that the mechanisms of human choice violate the norms of economic rationality. In some environments, the…

  10. Rationalization: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    Rationalization was studied by Sigmund Freud and was specifically labeled by Ernest Jones. Rationalization ought to be differentiated from rational, rationality, logical analysis, etc. On the one hand, rationalization is considered a defense mechanism, on the other hand, rationality is not. Haan has done much work with self-report inventories and…

  11. Rational Decision Making as Performative Praxis: Explaining Rationality's Éternel Retour

    OpenAIRE

    Cabantous, L.; Gond, J-P.

    2011-01-01

    Organizational theorists built their knowledge of decision making through a progressive critique of rational choice theory. Their positioning towards rationality, however, is at odds with the observation of rationality persistence in organizational life. This paper addresses this paradox. It proposes a new perspective on rationality that allows the theorizing of the production of rational decisions by organizations. To account for rationality's éternel retour, we approach rational decision ma...

  12. Microfluidic screening and whole-genome sequencing identifies mutations associated with improved protein secretion by yeast

    DEFF Research Database (Denmark)

    Huang, Mingtao; Bai, Yunpeng; Sjostrom, Staffan L.

    2015-01-01

    There is an increasing demand for biotech-based production of recombinant proteins for use as pharmaceuticals in the food and feed industry and in industrial applications. Yeast Saccharomyces cerevisiae is among preferred cell factories for recombinant protein production, and there is increasing...... interest in improving its protein secretion capacity. Due to the complexity of the secretory machinery in eukaryotic cells, it is difficult to apply rational engineering for construction of improved strains. Here we used high-throughput microfluidics for the screening of yeast libraries, generated by UV...... mutagenesis. Several screening and sorting rounds resulted in the selection of eight yeast clones with significantly improved secretion of recombinant a-amylase. Efficient secretion was genetically stable in the selected clones. We performed whole-genome sequencing of the eight clones and identified 330...

  13. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-05-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public-key cryptography, secret-key distribution and symmetric encryption. Such techniques are deemed secure based on the assumption of limited computational abilities of a wiretapper. Given the relentless progress in computational capacities and the dynamic topology and proliferation of modern wireless networks, the relevance of the previous techniques in securing communications is more and more questionable and less and less reliable. In contrast to this paradigm, PLS does not assume a specific computational power at any eavesdropper, its premise to guarantee provable security via employing channel coding techniques at the physical layer exploiting the inherent randomness in most communication systems. In this dissertation, we investigate a particular aspect of PLS, which is secret-key agreement, also known as secret-sharing. In this setup, two legitimate parties try to distill a secret-key via the observation of correlated signals through a noisy wireless channel, in the presence of an eavesdropper who must be kept ignorant of the secret-key. Additionally, a noiseless public channel is made available to the legitimate parties to exchange public messages that are also accessible to the eavesdropper. Recall that key agreement is an important aspect toward realizing secure communications in the sense that the key can be used in a one-time pad scheme to send the confidential message. In the first part, our focus is on secret-sharing over Rayleigh fading quasi-static channels. We study the fundamental relationship relating the probability of error and a given target secret-key rate in the high power regime. This is characterized through the diversity multiplexing tradeoff (DMT) concept, that we define for our model and then

  14. MASY: Management of secret keys in federated wireless sensor networks

    OpenAIRE

    Maerien, Jef; Michiels, Sam; Huygens, Christophe; Joosen, Wouter

    2010-01-01

    Wireless Sensor Networks are becoming federated and mobile environments. These new capabilities pose a lot of new possibilities and challenges. One of these challenges is to create a secure environment to allow multiple trusted companies to share and merge their sensor network infrastructure. The most basic need for a secure environment is the deployment of key material. However, most current day research assumes pre-shared secrets between the sensor nodes of most, if not all, companies in a ...

  15. A Phytase-Based Reporter System for Identification of Functional Secretion Signals in Bifidobacteria

    Science.gov (United States)

    Osswald, Annika; Westermann, Christina; Sun, Zhongke; Riedel, Christian U.

    2015-01-01

    Health-promoting effects have been attributed to a number of Bifidobacterium sp. strains. These effects as well as the ability to colonise the host depend on secreted proteins. Moreover, rational design of protein secretion systems bears the potential for the generation of novel probiotic bifidobacteria with improved health-promoting or therapeutic properties. To date, there is only very limited data on secretion signals of bifidobacteria available. Using in silico analysis, we demonstrate that all bifidobacteria encode the major components of Sec-dependent secretion machineries but only B. longum strains harbour Tat protein translocation systems. A reporter plasmid for secretion signals in bifidobacteria was established by fusing the coding sequence of the signal peptide of a sialidase of Bifidobacterium bifidum S17 to the phytase gene appA of E. coli. The recombinant strain showed increased phytase activity in spent culture supernatants and reduced phytase levels in crude extracts compared to the control indicating efficient phytase secretion. The reporter plasmid was used to screen seven predicted signal peptides in B. bifidum S17 and B. longum E18. The tested signal peptides differed substantially in their efficacy to mediate protein secretion in different host strains. An efficient signal peptide was used for expression and secretion of a therapeutically relevant protein in B. bifidum S17. Expression of a secreted cytosine deaminase led to a 100-fold reduced sensitivity of B. bifidum S17 to 5-fluorocytosine compared to the non-secreted cytosine deaminase suggesting efficient conversion of 5-fluorocytosine to the cytotoxic cancer drug 5-fluorouracil by cytosine deaminase occurred outside the bacterial cell. Selection of appropriate signal peptides for defined protein secretion might improve therapeutic efficacy as well as probiotic properties of bifidobacteria. PMID:26086721

  16. A Phytase-Based Reporter System for Identification of Functional Secretion Signals in Bifidobacteria.

    Directory of Open Access Journals (Sweden)

    Annika Osswald

    Full Text Available Health-promoting effects have been attributed to a number of Bifidobacterium sp. strains. These effects as well as the ability to colonise the host depend on secreted proteins. Moreover, rational design of protein secretion systems bears the potential for the generation of novel probiotic bifidobacteria with improved health-promoting or therapeutic properties. To date, there is only very limited data on secretion signals of bifidobacteria available. Using in silico analysis, we demonstrate that all bifidobacteria encode the major components of Sec-dependent secretion machineries but only B. longum strains harbour Tat protein translocation systems. A reporter plasmid for secretion signals in bifidobacteria was established by fusing the coding sequence of the signal peptide of a sialidase of Bifidobacterium bifidum S17 to the phytase gene appA of E. coli. The recombinant strain showed increased phytase activity in spent culture supernatants and reduced phytase levels in crude extracts compared to the control indicating efficient phytase secretion. The reporter plasmid was used to screen seven predicted signal peptides in B. bifidum S17 and B. longum E18. The tested signal peptides differed substantially in their efficacy to mediate protein secretion in different host strains. An efficient signal peptide was used for expression and secretion of a therapeutically relevant protein in B. bifidum S17. Expression of a secreted cytosine deaminase led to a 100-fold reduced sensitivity of B. bifidum S17 to 5-fluorocytosine compared to the non-secreted cytosine deaminase suggesting efficient conversion of 5-fluorocytosine to the cytotoxic cancer drug 5-fluorouracil by cytosine deaminase occurred outside the bacterial cell. Selection of appropriate signal peptides for defined protein secretion might improve therapeutic efficacy as well as probiotic properties of bifidobacteria.

  17. Rational kinematics

    CERN Document Server

    Angeles, Jorge

    1988-01-01

    A rational study of kinematics is a treatment of the subject based on invariants, i.e., quantities that remain essentially unchanged under a change of observer. An observer is understood to be a reference frame supplied with a clock (Truesdell 1966). This study will therefore include an introduction to invariants. The language of these is tensor analysis and multilinear algebra, both of which share many isomorphic relations, These subjects are treated in full detail in Ericksen (1960) and Bowen and Wang (1976), and hence will not be included here. Only a short account of notation and definitions will be presented. Moreover, definitions and basic concepts pertaining to the kinematics of rigid bodies will be also included. Although the kinematics of rigid bodies can be regarded as a particular case of the kinematics of continua, the former deserves attention on its own merits for several reasons. One of these is that it describes locally the motions undergone by continua. Another reason is that a whole area of ...

  18. Using Bar Representations as a Model for Connecting Concepts of Rational Number.

    Science.gov (United States)

    Middleton, James A.; van den Heuvel-Panhuizen, Marja; Shew, Julia A.

    1998-01-01

    Examines bar models as graphical representations of rational numbers and presents related real life problems. Concludes that, through pairing the fraction bars with ratio tables and other ways of teaching numbers, numeric strategies become connected with visual strategies that allow students with diverse ways of thinking to share their…

  19. Rationality in Society

    NARCIS (Netherlands)

    Flache, Andreas; Dijkstra, Jacob; Wright, James D.

    2015-01-01

    Contemporary theories of rational behavior in human society augment the orthodox model of rationality both by adding various forms of bounded rationality and relaxing the assumptions of self-interest and materialistic preferences. This entry discusses how these extensions of the theory of rational

  20. A Rational Approach to Rational Suicide.

    Science.gov (United States)

    Richman, Joseph

    1992-01-01

    Describes suicide as reaction to internal and external sources of stress and the impact of life events. Notes that, in the elderly, these situations are prevalent in many who are not suicidal. Contends that much more is written about rational suicide than its alternative (rational nonsuicide). Reviews reasons for this and suggests rational…

  1. The stand-alone test and decreasing serial cost sharing

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Thorlund-Petersen, Lars

    2000-01-01

    The rule of decreasing serial cost sharing defined in de Frutos [1] over the class of concave cost functions may violate the important stand-alone test. Sufficient conditions for the test to be satisfied are given, in terms of individual rationality as well as coalitional stability...

  2. The invisible hand and the rational agent are behind bubbles and crashes

    International Nuclear Information System (INIS)

    Galam, Serge

    2016-01-01

    The 2000 dot-com crash and the 2008 subprime crisis have fueled the belief that the two classical paradigms of economics, the invisible hand and the rational agent, are not well appropriate to describe market dynamics and should be abandoned at the benefit of alternative new theoretical concepts. At odd with such a view, using a simple model of choice dynamics from sociophysics, the invisible hand and the rational agent paradigms are given a new legitimacy. Indeed, it is sufficient to introduce the holding of a few intermediate mini market aggregations by agents sharing their own private information, to recenter the invisible hand and the rational agent at the heart of market self regulation. An elasticity is discovered in the market efficiency mechanism due to the existence of an agent collective anticipation. This elasticity is shown to create spontaneous bubbles, which are rationally founded. At the same time, crashes occur at once when the limit of elasticity is reached. Plasticity can also be achieved through a combination of a crash with a sudden shift of the collective anticipation. Although the findings disclose a path to put an end to the bubble-crash phenomena, it is argued to be rationally not feasible. Bubbles and crashes are thus an intrinsic internal part of classical economics.

  3. On rationally supported surfaces

    DEFF Research Database (Denmark)

    Gravesen, Jens; Juttler, B.; Sir, Z.

    2008-01-01

    We analyze the class of surfaces which are equipped with rational support functions. Any rational support function can be decomposed into a symmetric (even) and an antisymmetric (odd) part. We analyze certain geometric properties of surfaces with odd and even rational support functions....... In particular it is shown that odd rational support functions correspond to those rational surfaces which can be equipped with a linear field of normal vectors, which were discussed by Sampoli et al. (Sampoli, M.L., Peternell, M., Juttler, B., 2006. Rational surfaces with linear normals and their convolutions...... with rational surfaces. Comput. Aided Geom. Design 23, 179-192). As shown recently, this class of surfaces includes non-developable quadratic triangular Bezier surface patches (Lavicka, M., Bastl, B., 2007. Rational hypersurfaces with rational convolutions. Comput. Aided Geom. Design 24, 410426; Peternell, M...

  4. An Outreach Program in Drug Education; Teaching a Rational Approach to Drug Use

    Science.gov (United States)

    Sorensen, James L.; Joffe, Stephen J.

    1975-01-01

    Aimed at encouraging rational decision making about drug use, a peer oriented drug education program was conducted in a community youth project. Youth and leaders shared feelings and knowledge about drugs. Compared with four program dropouts, six participants exhibited more positive attitudes toward the drug group, its leaders and themselves.…

  5. Pragmatics & rationality.

    OpenAIRE

    Allott, N. E.

    2007-01-01

    This thesis is about the reconciliation of realistic views of rationality with inferential-intentional theories of communication. Grice (1957 1975) argued that working out what a speaker meant by an utterance is a matter of inferring the speaker's intentions on the presumption that she is acting rationally. This is abductive inference: inference to the best explanation for the utterance. Thus an utterance both rationalises and causes the interpretation the hearer constructs. Human rationality...

  6. Secret Key Agreement: Fundamental Limits and Practical Challenges

    KAUST Repository

    Rezki, Zouheir

    2017-02-15

    Despite the tremendous progress made toward establishing PLS as a new paradigm to guarantee security of communication systems at the physical layerthere is a common belief among researchers and industrials that there are many practical challenges that prevent PLS from flourishing at the industrial scale. Most secure message transmission constructions available to date are tied to strong assumptions on CSI, consider simple channel models and undermine eavesdropping capabilities; thus compromising their practical interest to a big extent. Perhaps arguably, the most likely reasonable way to leverage PLS potential in securing modern wireless communication systems is via secret-key agreement. In the latter setting, the legitimate parties try to agree on a key exploiting availability of a public channel with high capacity which is also accessible to the eavesdropper. Once a key is shared by the legitimate parties, they may use it in a one-time pad encryption, for instance. In this article, we investigate two performance limits of secret-key agreement communications; namely, the secret-key diversity-multiplexing trade-off and the effect of transmit correlation on the secretkey capacity. We show via examples how secretkey agreement offers more flexibility than secure message transmissions. Finally, we explore a few challenges of secret-key agreement concept and propose a few guidelines to overturn them.

  7. Baseline rationing

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Moreno-Ternero, Juan D.; Østerdal, Lars Peter Raahave

    The standard problem of adjudicating conflicting claims describes a situation in which a given amount of a divisible good has to be allocated among agents who hold claims against it exceeding the available amount. This paper considers more general rationing problems in which, in addition to claims...... to international protocols for the reduction of greenhouse emissions, or water distribution in drought periods. We define a family of allocation methods for such general rationing problems - called baseline rationing rules - and provide an axiomatic characterization for it. Any baseline rationing rule within...... the family is associated with a standard rule and we show that if the latter obeys some properties reflecting principles of impartiality, priority and solidarity, the former obeys them too....

  8. Cooperation among liquefied natural gas suppliers. Is rationalization the sole objective?

    International Nuclear Information System (INIS)

    Massol, Olivier; Tchung-Ming, Stephane

    2010-01-01

    This paper examines the development of cooperative strategies between countries exporting Liquefied Natural Gas (LNG) and members of the Gas Exporting Countries Forum (GECF). This economic study focuses specifically on an often-raised scenario: the emergence of a cooperative approach designed with the sole aim of logistic rationalization, and which would not have any effect on LNG prices. We first assess the annual gains that may result from this market-power-free cooperative approach using a simple static transportation model. The numerical results obtained suggest that, in the absence of a gain redistribution policy, this cooperative strategy will probably not be adopted because cooperation would not be a rational move for some exporters. The problem of gain sharing is then formulated using cooperative game theory concepts. Several gain-sharing methods have been studied, including the Shapley value and various nucleolus-inspired concepts. Our results suggest that the choice of a redistribution policy appears relatively restricted. Out of the methods studied, only one - per capita nucleolus - satisfies two key requirements. core belonging and monotonicity (in the aggregate). Lastly, we look at how cooperation may give rise to a coordination cost and try to determine the maximum amount of this cost. In view of the low level of this amount and the relative complexity of the sharing method implemented, we consider that the credibility of a logistic cooperation scenario exempt from market power should be reappraised. (author)

  9. Cooperation among liquefied natural gas suppliers: Is rationalization the sole objective?

    International Nuclear Information System (INIS)

    MASSOL, Olivier; TCHUNG-MING, Stephane

    2009-01-01

    This paper examines the development of cooperative strategies between 12 countries exporting Liquefied Natural Gas (LNG) and belonging to the Gas Exporting Countries Forum (GECF). This economic study is more specifically focused on a scenario often raised: that of the emergence of a cooperative approach designed with the sole aim of logistic rationalization, and which would not have any effect on LNG prices. As this is a standard transportation problem, we first assess the gains that may result from this cooperative approach using a simple static model calibrated on the year 2007. The numerical results obtained suggest that, in the absence of a gain redistribution policy, this cooperative strategy will probably not be adopted because cooperation would not be a rational move for some exporters. The problem of gain sharing is then formulated using cooperative game theory concepts. Several gain sharing methods have been studied, including the Shapley value and various nucleolus-inspired concepts. Our results suggest that the choice of a redistribution policy appears relatively restricted. Out of the methods studied, only one - the per capita nucleolus - satisfies two key requirements: core belonging and mono-tonicity (in the aggregate). Lastly, coordination costs are considered and we determine the maximum amount that can be tolerated by such a cooperation. In view of the low level of this amount and the relative complexity of the sharing method implemented, we consider that the credibility of a logistic cooperation scenario exempt from market power should be reappraised. (authors)

  10. Cooperation among liquefied natural gas suppliers. Is rationalization the sole objective?

    Energy Technology Data Exchange (ETDEWEB)

    Massol, Olivier [Center for Economics and Management, IFP School, 228-232 av. Napoleon Bonaparte, F-92852 Rueil-Malmaison (France); Department of Economics, City University, Northampton Square, London EC1V 0HB (United Kingdom); Tchung-Ming, Stephane [Economic Studies Division, IFP, 1-4 av. de Bois-Preau, F-92852 Rueil Malmaison (France); CREDEN, Universite Montpellier I, Av. de la mer, BP 9606, F-34054, Montpellier (France)

    2010-07-15

    This paper examines the development of cooperative strategies between countries exporting Liquefied Natural Gas (LNG) and members of the Gas Exporting Countries Forum (GECF). This economic study focuses specifically on an often-raised scenario: the emergence of a cooperative approach designed with the sole aim of logistic rationalization, and which would not have any effect on LNG prices. We first assess the annual gains that may result from this market-power-free cooperative approach using a simple static transportation model. The numerical results obtained suggest that, in the absence of a gain redistribution policy, this cooperative strategy will probably not be adopted because cooperation would not be a rational move for some exporters. The problem of gain sharing is then formulated using cooperative game theory concepts. Several gain-sharing methods have been studied, including the Shapley value and various nucleolus-inspired concepts. Our results suggest that the choice of a redistribution policy appears relatively restricted. Out of the methods studied, only one - per capita nucleolus - satisfies two key requirements. core belonging and monotonicity (in the aggregate). Lastly, we look at how cooperation may give rise to a coordination cost and try to determine the maximum amount of this cost. In view of the low level of this amount and the relative complexity of the sharing method implemented, we consider that the credibility of a logistic cooperation scenario exempt from market power should be reappraised. (author)

  11. Rationing with baselines

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Moreno-Ternero, Juan D.; Østerdal, Lars Peter Raahave

    2013-01-01

    We introduce a new operator for general rationing problems in which, besides conflicting claims, individual baselines play an important role in the rationing process. The operator builds onto ideas of composition, which are not only frequent in rationing, but also in related problems...... such as bargaining, choice, and queuing. We characterize the operator and show how it preserves some standard axioms in the literature on rationing. We also relate it to recent contributions in such literature....

  12. Inaugurating Rationalization: Three Field Studies Find Increased Rationalization When Anticipated Realities Become Current.

    Science.gov (United States)

    Laurin, Kristin

    2018-04-01

    People will often rationalize the status quo, reconstruing it in an exaggeratedly positive light. They will even rationalize the status quo they anticipate, emphasizing the upsides and minimizing the downsides of sociopolitical realities they expect to take effect. Drawing on recent findings on the psychological triggers of rationalization, I present results from three field studies, one of which was preregistered, testing the hypothesis that an anticipated reality becoming current triggers an observable boost in people's rationalizations. San Franciscans rationalized a ban on plastic water bottles, Ontarians rationalized a targeted smoking ban, and Americans rationalized the presidency of Donald Trump, more in the days immediately after these realities became current compared with the days immediately before. Additional findings show evidence for a mechanism underlying these behaviors and rule out alternative accounts. These findings carry implications for scholarship on rationalization, for understanding protest behavior, and for policymakers.

  13. Realization theory for rational systems: Minimal rational realizations

    NARCIS (Netherlands)

    J. Nemcová (Jana); J.H. van Schuppen (Jan)

    2010-01-01

    htmlabstractThe study of realizations of response maps is a topic of control and system theory. Realization theory is used in system identification and control synthesis. A minimal rational realization of a given response map p is a rational realization of p such that the dimension of its state

  14. Many faces of rationality: Implications of the great rationality debate for clinical decision‐making

    Science.gov (United States)

    Elqayam, Shira

    2017-01-01

    Abstract Given that more than 30% of healthcare costs are wasted on inappropriate care, suboptimal care is increasingly connected to the quality of medical decisions. It has been argued that personal decisions are the leading cause of death, and 80% of healthcare expenditures result from physicians' decisions. Therefore, improving healthcare necessitates improving medical decisions, ie, making decisions (more) rational. Drawing on writings from The Great Rationality Debate from the fields of philosophy, economics, and psychology, we identify core ingredients of rationality commonly encountered across various theoretical models. Rationality is typically classified under umbrella of normative (addressing the question how people “should” or “ought to” make their decisions) and descriptive theories of decision‐making (which portray how people actually make their decisions). Normative theories of rational thought of relevance to medicine include epistemic theories that direct practice of evidence‐based medicine and expected utility theory, which provides the basis for widely used clinical decision analyses. Descriptive theories of rationality of direct relevance to medical decision‐making include bounded rationality, argumentative theory of reasoning, adaptive rationality, dual processing model of rationality, regret‐based rationality, pragmatic/substantive rationality, and meta‐rationality. For the first time, we provide a review of wide range of theories and models of rationality. We showed that what is “rational” behaviour under one rationality theory may be irrational under the other theory. We also showed that context is of paramount importance to rationality and that no one model of rationality can possibly fit all contexts. We suggest that in context‐poor situations, such as policy decision‐making, normative theories based on expected utility informed by best research evidence may provide the optimal approach to medical decision

  15. Open Secrets

    OpenAIRE

    Madison, Michael

    2017-01-01

    The law of trade secrets is often conceptualized in bilateral terms, as creating and enforcing rights between trade secret owners, on the one hand, and misappropriators on the other hand. This paper, a chapter in a forthcoming collection on the law of trade secrets, argues that trade secrets and the law that guards them can serve structural and insitutional roles as well. Somewhat surprisingly, given the law’s focus on secrecy, among the institutional products of trade secrets law are commons...

  16. Many faces of rationality: Implications of the great rationality debate for clinical decision-making.

    Science.gov (United States)

    Djulbegovic, Benjamin; Elqayam, Shira

    2017-10-01

    Given that more than 30% of healthcare costs are wasted on inappropriate care, suboptimal care is increasingly connected to the quality of medical decisions. It has been argued that personal decisions are the leading cause of death, and 80% of healthcare expenditures result from physicians' decisions. Therefore, improving healthcare necessitates improving medical decisions, ie, making decisions (more) rational. Drawing on writings from The Great Rationality Debate from the fields of philosophy, economics, and psychology, we identify core ingredients of rationality commonly encountered across various theoretical models. Rationality is typically classified under umbrella of normative (addressing the question how people "should" or "ought to" make their decisions) and descriptive theories of decision-making (which portray how people actually make their decisions). Normative theories of rational thought of relevance to medicine include epistemic theories that direct practice of evidence-based medicine and expected utility theory, which provides the basis for widely used clinical decision analyses. Descriptive theories of rationality of direct relevance to medical decision-making include bounded rationality, argumentative theory of reasoning, adaptive rationality, dual processing model of rationality, regret-based rationality, pragmatic/substantive rationality, and meta-rationality. For the first time, we provide a review of wide range of theories and models of rationality. We showed that what is "rational" behaviour under one rationality theory may be irrational under the other theory. We also showed that context is of paramount importance to rationality and that no one model of rationality can possibly fit all contexts. We suggest that in context-poor situations, such as policy decision-making, normative theories based on expected utility informed by best research evidence may provide the optimal approach to medical decision-making, whereas in the context

  17. Standby Gasoline Rationing Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-06-01

    The final rules adopted by the President for a Standby Gasoline Rationing Plan are presented. The plan provides that eligibility for ration allotments will be determined primarily on the basis of motor vehicle registrations, taking into account historical differences in the use of gasoline among states. The regulations also provide authority for supplemental allotments to firms so that their allotment will equal a specified percentage of gasoline use during a base period. Priority classifications, i.e., agriculture, defense, etc., are established to assure adequate gasoline supplies for designated essential services. Ration rights must be provided by end-users to their suppliers for each gallon sold. DOE will regulate the distribution of gasoline at the wholesale level according to the transfer by suppliers of redeemed ration rights and the gasoline allocation regulations. Ration rights are transferable. A ration banking system is created to facilitate transfers of ration rights. Each state will be provided with a reserve of ration rights to provide for hardship needs and to alleviate inequities. (DC)

  18. Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks

    KAUST Repository

    Shafie, Ahmed El

    2017-06-12

    This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been previously shared between Alice and Bob during the perfectly secured time slots (i.e., when the channel secrecy rate is positive). The secret-key bits exchanged between Alice and Bob are stored in a finite-length buffer and are used to secure data transmission whenever needed. We model the secret-key buffer as a queueing system and analyze its Markov chain. Our numerical results show the gains of our proposed scheme relative to benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure throughput.

  19. Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks

    KAUST Repository

    Shafie, Ahmed El; Salem, Ahmed Sultan; Mabrouk, Asma; Tourki, Kamel; Al-Dhahir, Naofal

    2017-01-01

    This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been previously shared between Alice and Bob during the perfectly secured time slots (i.e., when the channel secrecy rate is positive). The secret-key bits exchanged between Alice and Bob are stored in a finite-length buffer and are used to secure data transmission whenever needed. We model the secret-key buffer as a queueing system and analyze its Markov chain. Our numerical results show the gains of our proposed scheme relative to benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure throughput.

  20. A Comparison of Rational Emotive Therapy and Tibetan Buddhism: Albert Ellis and the Dalai Lama

    Science.gov (United States)

    Holt, Susan A; Austad, Carol Shaw

    2013-01-01

    This article explores conceptual and methodological similarities between Rational Emotive Behavior Therapy (REBT) and Tibetan Buddhism (TB). The authors examine some of the values and concepts they share. They compare the two systems on a number of issues: philosophical underpinnings, concepts of what causes human psychopathology, techniques to…

  1. Novel Quantum Secret Sharing and Controlled Communication Schemes Based on Einstein–Podolsky–Rosen Correlations

    International Nuclear Information System (INIS)

    Yuan, Li; Gui-Hua, Zeng

    2009-01-01

    Employing quantum registers, we first proposed a novel (2, 3) quantum threshold scheme based on Einstein–Podolsky–Rosen (EPR) correlations in this letter. Motivated by the present threshold scheme, we also propose a controlled communication scheme to transmit the secret message with a controller. In the communication protocol, the encoded quantum message carried by particles sequence, is transmitted by legitimate communicators

  2. Adolescent rationality.

    Science.gov (United States)

    Moshman, David

    2013-01-01

    Adolescents are commonly seen as irrational, a position supported to varying degrees by many developmentalists, who often appeal to recent research on adolescent brains. Careful review of relevant evidence, however, shows that (1) adults are less rational than is generally assumed, (2) adolescents (and adults) are categorically different from children with respect to the attainment of advanced levels of rationality and psychological functioning, and (3) adolescents and adults do not differ categorically from each other with respect to any rational competencies, irrational tendencies, brain structures, or neurological functioning. Development often continues in adolescence and beyond but categorical claims about adolescents as distinct from adults cannot be justified. A review of U.S. Supreme Court decisions concerning intellectual freedom, reproductive freedom, and criminal responsibility shows ongoing ambivalence and confusion about the rationality of adolescents. Developmental theory and research suggest that adolescents should be conceptualized as young adults, not immature brains, with important implications for their roles, rights, and responsibilities.

  3. Love and rationality: on some possible rational effects of love

    Directory of Open Access Journals (Sweden)

    Gustavo Ortiz-Millán

    Full Text Available In this paper I defend the idea that rather than disrupting rationality, as the common-sense conception has done it, love may actually help us to develop rational ways of thinking and acting. I make the case for romantic or erotic love, since this is the kind of love that is more frequently associated with irrationality in acting and thinking. I argue that this kind of love may make us develop epistemic and practical forms of rationality. Based on an analysis of its characteristic action tendencies, I argue that love may help us to develop an instrumental form of rationality in determining the best means to achieve the object of love. It may also narrow down the number of practical considerations that may help us to achieve our goals. Finally, love may generate rational ways of belief-formation by framing the parameters taken into account in perception and attention, and by bringing into light only a small portion of the epistemic information available. Love may make us perceive reality more acutely.

  4. Hermeneutics of reason: the principle of common rationality as premise of understanding the Other(s

    Directory of Open Access Journals (Sweden)

    Mihai Stelian Rusu

    2013-06-01

    Full Text Available The central argument defended in this paper is made up of two interconnected statements: i that a minimally defined rationality is an anthropological constant, being shared by all conceivable human cultures; and ii that this “commonality of reason” constitutes the basis on which inter-cultural understanding is possible. In proving the first thesis (the universality of reason, the paper contrasts Western thought, epitomized in scientific reason, with non-Western thinking patterns, expressed by ethno-sciences, magic rituals, and other knowledge practices. The conclusion drawn from this comparison is that both modern scientific reason and non-literate peoples thought patterns are two “cognitive modes” sharing a strong structural similarity. Building on some loci classici of anthropological literature written by Malinowski, Evans-Pritchard, and Lévi-Strauss (among others, the paper argues that although modern Western science and indigenous knowledge(s share a common rational denominator, the two cognitive modes are nonetheless hierarchical, the former being epistemically superior to the latter thanks to its unique self-correcting methodology. The paper ends by arguing the case for the possibility of understanding the Other(s by way of reason, a possibility grounded on the commonality of reason between cultures.

  5. Secrets and disclosure in donor conception.

    Science.gov (United States)

    Frith, Lucy; Blyth, Eric; Crawshaw, Marilyn; van den Akker, Olga

    2018-01-01

    This article considers the disclosure, sharing and exchange of information on being donor conceived within families, drawing on data from a study undertaken with donor-conceived adults registered with UK Donor Link (a voluntary DNA-linking register). This paper considers the narratives of how respondents found out they were donor-conceived and what events triggered disclosure of this information. This paper then goes on to examine the role secrecy played in their family life and uses the concept of 'display' to explore how secrecy affected their relationships with their immediate and extended family. Secrets are notoriously 'leaky' and we found complex patterns of knowing and uncertainty about whom in the family knew that the person was donor-conceived. We argue that what is kept secret and from whom provides insights into the multifaceted web of social relationships that can be created by donor-conception, and how knowledge can be managed and controlled in attempts to display and maintain family narratives of biogenetic connection. © 2017 Foundation for the Sociology of Health & Illness.

  6. CONTRIBUTIONS TO RATIONAL APPROXIMATION,

    Science.gov (United States)

    Some of the key results of linear Chebyshev approximation theory are extended to generalized rational functions. Prominent among these is Haar’s...linear theorem which yields necessary and sufficient conditions for uniqueness. Some new results in the classic field of rational function Chebyshev...Furthermore a Weierstrass type theorem is proven for rational Chebyshev approximation. A characterization theorem for rational trigonometric Chebyshev approximation in terms of sign alternation is developed. (Author)

  7. Rational points, rational curves, and entire holomorphic curves on projective varieties

    CERN Document Server

    Gasbarri, Carlo; Roth, Mike; Tschinkel, Yuri

    2015-01-01

    This volume contains papers from the Short Thematic Program on Rational Points, Rational Curves, and Entire Holomorphic Curves and Algebraic Varieties, held from June 3-28, 2013, at the Centre de Recherches Mathématiques, Université de Montréal, Québec, Canada. The program was dedicated to the study of subtle interconnections between geometric and arithmetic properties of higher-dimensional algebraic varieties. The main areas of the program were, among others, proving density of rational points in Zariski or analytic topology on special varieties, understanding global geometric properties of rationally connected varieties, as well as connections between geometry and algebraic dynamics exploring new geometric techniques in Diophantine approximation.

  8. Rational Multiparty Computation

    OpenAIRE

    Wallrabenstein, John Ross

    2014-01-01

    The field of rational cryptography considers the design of cryptographic protocols in the presence of rational agents seeking to maximize local utility functions. This departs from the standard secure multiparty computation setting, where players are assumed to be either honest or malicious. ^ We detail the construction of both a two-party and a multiparty game theoretic framework for constructing rational cryptographic protocols. Our framework specifies the utility function assumptions neces...

  9. Investigating issues influencing knowledge sharing in a research organization, using the Appreciative Inquiry Method

    OpenAIRE

    Hart, Penny

    2013-01-01

    This research contributes to the literature on the subjective experience of knowledge sharing from the perspective of those actively engaged in it. The sharing of knowledge in organizations is influenced by interconnecting factors, including organizational mission, the use made of information technology, and the motivation of individuals. Much of the existing literature takes a reductionist approach to investigating these, treating knowledge as an asset and humans as rational beings. A re...

  10. [Shared medical decision making in gynaecology].

    Science.gov (United States)

    This, P; Panel, P

    2010-02-01

    When two options or more can be chosen in medical care, the final decision implies two steps: facts analysis, and patient evaluation of preferences. Shared Medical Decision-Making is a rational conceptual frame that can be used in such cases. In this paper, we describe the concept, its practical modalities, and the questions raised by its use. In gynaecology, many medical situations involve "sensitive preferences choice": for example, contraceptive choice, menorrhagia treatment, and approach of menopause. Some tools from the "Shared Medical Decision Making" concept are useful to structure medical consultations, to convey information, and to reveal patients preferences. Decision aid are used in clinical research settings, but some of them may also be easily used in usual practice, and help physicians to improve both quality and traceability of the decisional process. Copyright 2009 Elsevier Masson SAS. All rights reserved.

  11. Irrational Rationality of Terrorism

    Directory of Open Access Journals (Sweden)

    Robert Nalbandov

    2013-12-01

    Full Text Available The present article deals with the ontological problem of applying the rational choice frameworks to the study of terrorism. It testing the application of the rational choice to the “old” (before the end of the Cold War and the “new” (after the end of the Cold War terrorisms. It starts with analyzing the fundamentals of rationality and applies it at two levels: the individual (actors and group (collective via two outlooks: tactical (short-term and strategic (long-term. The main argument of the article is that while the “old” terrorism can be explained by the rational choice theory its “new” version represents a substantial departure from rationality.

  12. Lying for Strategic Advantage: Rational and Boundedly Rational Misrepresentation of Intentions

    OpenAIRE

    Crawford, Vincent P.

    2001-01-01

    Starting from Hendricks and McAfee's (2000) example of the Allies' decision to feint at Calais and attack at Normandy on D-Day, this paper models misrepresentation of intentions to competitors or enemies. Allowing for the possibility of bounded strategic rationality and rational players' responses to it yields a sensible account of lying via costless, noiseless messages. In many cases the model has generically unique pure-strategy sequential equilibria, in which rational players exploit bound...

  13. Neural basis of quasi-rational decision making.

    Science.gov (United States)

    Lee, Daeyeol

    2006-04-01

    Standard economic theories conceive homo economicus as a rational decision maker capable of maximizing utility. In reality, however, people tend to approximate optimal decision-making strategies through a collection of heuristic routines. Some of these routines are driven by emotional processes, and others are adjusted iteratively through experience. In addition, routines specialized for social decision making, such as inference about the mental states of other decision makers, might share their origins and neural mechanisms with the ability to simulate or imagine outcomes expected from alternative actions that an individual can take. A recent surge of collaborations across economics, psychology and neuroscience has provided new insights into how such multiple elements of decision making interact in the brain.

  14. Authentication Without Secrets

    Energy Technology Data Exchange (ETDEWEB)

    Pierson, Lyndon G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Robertson, Perry J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  15. Determinants of Actor Rationality

    DEFF Research Database (Denmark)

    Ellegaard, Chris

    Industrial companies must exercise influence on their suppliers (or supplier actors). Actor rationality is a central theme connected to this management task. In this article, relevant literature is studied with the purpose of shedding light on determinants of actor rationality. Two buyer-supplier...... relations are investigated in a multiple case study, leading to the proposal of various additional factors that determine and shape actor rationality. Moreover a conceptual model of rationality determinants in the buyer-supplier relation is proposed, a model that may help supply managers analyse...

  16. Two Concepts of Rationality

    Directory of Open Access Journals (Sweden)

    Danny Frederick

    2010-02-01

    Full Text Available The dominant tradition in Western philosophy sees rationality as dictating. Thus rationality may require that we believe the best explanation and simple conceptual truths and that we infer in accordance with evident rules of inference. I argue that, given what we know about the growth of knowledge, this authoritarian concept of rationality leads to absurdities and should be abandoned. I then outline a libertarian concept of rationality, derived from Popper, which eschews the dictates and which sees a rational agent as one who questions, criticises, conjectures and experiments. I argue that, while the libertarian approach escapes the absurdities of the authoritarian, it requires two significant developments and an important clarification to be made fully consistent with itself.

  17. Rationality and institutions : an inquiry into the normative implications of rational choice theory

    OpenAIRE

    Engelen, Bart

    2007-01-01

    I aim to analyze in this dissertation what a desirable basic institutional structure looks like from the perspective of rationality. While the main topic is thus normative in nature, I start by clarifying in the first part what the notion of rationality exactly entails. I do so by focusing explicitly on the economic conception of rationality, according to which a rational individual is motivated to serve his self-interest on the basis of cost-benefit calculations. Such a Homo Economicus is ch...

  18. Rationing medical education.

    African Journals Online (AJOL)

    This paper discussed the pros and cons of the application of rationing to medical education and the different ... Different types of rationing exist in healthcare professional education. ... state-of-the-art resources, technology and tutors con-.

  19. Cortisol Secretion and Change in Sleep Problems in Early Childhood: Moderation by Maternal Overcontrol

    Science.gov (United States)

    Kiel, Elizabeth J.; Hummel, Alexandra C.; Luebbe, Aaron M.

    2015-01-01

    Childhood sleep problems are prevalent and relate to a wide range of negative psychological outcomes. However, it remains unclear how biological processes, such as HPA activity, may predict sleep problems over time in childhood in the context of certain parenting environments. Fifty-one mothers and their 18–20 month-old toddlers participated in a short-term longitudinal study assessing how shared variance among morning levels, diurnal change, and nocturnal change in toddlers’ cortisol secretion predicted change in sleep problems in the context of maternal overprotection and critical control. A composite characterized by low variability in, and, to a lesser extent, high morning values of cortisol, predicted increasing sleep problems from age 2 to age 3 when mothers reported high critical control. Results suggest value in assessing shared variance among different indices of cortisol secretion patterns and the interaction between cortisol and the environment in predicting sleep problems in early childhood. PMID:25766262

  20. Rationality problem for algebraic tori

    CERN Document Server

    Hoshi, Akinari

    2017-01-01

    The authors give the complete stably rational classification of algebraic tori of dimensions 4 and 5 over a field k. In particular, the stably rational classification of norm one tori whose Chevalley modules are of rank 4 and 5 is given. The authors show that there exist exactly 487 (resp. 7, resp. 216) stably rational (resp. not stably but retract rational, resp. not retract rational) algebraic tori of dimension 4, and there exist exactly 3051 (resp. 25, resp. 3003) stably rational (resp. not stably but retract rational, resp. not retract rational) algebraic tori of dimension 5. The authors make a procedure to compute a flabby resolution of a G-lattice effectively by using the computer algebra system GAP. Some algorithms may determine whether the flabby class of a G-lattice is invertible (resp. zero) or not. Using the algorithms, the suthors determine all the flabby and coflabby G-lattices of rank up to 6 and verify that they are stably permutation. The authors also show that the Krull-Schmidt theorem for G-...

  1. Rational Approximations to Rational Models: Alternative Algorithms for Category Learning

    Science.gov (United States)

    Sanborn, Adam N.; Griffiths, Thomas L.; Navarro, Daniel J.

    2010-01-01

    Rational models of cognition typically consider the abstract computational problems posed by the environment, assuming that people are capable of optimally solving those problems. This differs from more traditional formal models of cognition, which focus on the psychological processes responsible for behavior. A basic challenge for rational models…

  2. Mutations in ppe38 block PE_PGRS secretion and increase virulence of Mycobacterium tuberculosis.

    Science.gov (United States)

    Ates, Louis S; Dippenaar, Anzaan; Ummels, Roy; Piersma, Sander R; van der Woude, Aniek D; van der Kuij, Kim; Le Chevalier, Fabien; Mata-Espinosa, Dulce; Barrios-Payán, Jorge; Marquina-Castillo, Brenda; Guapillo, Carolina; Jiménez, Connie R; Pain, Arnab; Houben, Edith N G; Warren, Robin M; Brosch, Roland; Hernández-Pando, Rogelio; Bitter, Wilbert

    2018-02-01

    Mycobacterium tuberculosis requires a large number of secreted and exported proteins for its virulence, immune modulation and nutrient uptake. Most of these proteins are transported by the different type VII secretion systems 1,2 . The most recently evolved type VII secretion system, ESX-5, secretes dozens of substrates belonging to the PE and PPE families, which are named for conserved proline and glutamic acid residues close to the amino terminus 3,4 . However, the role of these proteins remains largely elusive 1 . Here, we show that mutations of ppe38 completely block the secretion of two large subsets of ESX-5 substrates, that is, PPE-MPTR and PE_PGRS, together comprising >80 proteins. Importantly, hypervirulent clinical M. tuberculosis strains of the Beijing lineage have such a mutation and a concomitant loss of secretion 5 . Restoration of PPE38-dependent secretion partially reverted the hypervirulence phenotype of a Beijing strain, and deletion of ppe38 in moderately virulent M. tuberculosis increased virulence. This indicates that these ESX-5 substrates have an important role in virulence attenuation. Phylogenetic analysis revealed that deletion of ppe38 occurred at the branching point of the 'modern' Beijing sublineage and is shared by Beijing outbreak strains worldwide, suggesting that this deletion may have contributed to their success and global distribution 6,7 .

  3. Mutations in ppe38 block PE_PGRS secretion and increase virulence of Mycobacterium tuberculosis

    KAUST Repository

    Ates, Louis S.

    2018-01-12

    Mycobacterium tuberculosis requires a large number of secreted and exported proteins for its virulence, immune modulation and nutrient uptake. Most of these proteins are transported by the different type VII secretion systems1,2. The most recently evolved type VII secretion system, ESX-5, secretes dozens of substrates belonging to the PE and PPE families, which are named for conserved proline and glutamic acid residues close to the amino terminus3,4. However, the role of these proteins remains largely elusive1. Here, we show that mutations of ppe38 completely block the secretion of two large subsets of ESX-5 substrates, that is, PPE-MPTR and PE_PGRS, together comprising >80 proteins. Importantly, hypervirulent clinical M. tuberculosis strains of the Beijing lineage have such a mutation and a concomitant loss of secretion5. Restoration of PPE38-dependent secretion partially reverted the hypervirulence phenotype of a Beijing strain, and deletion of ppe38 in moderately virulent M. tuberculosis increased virulence. This indicates that these ESX-5 substrates have an important role in virulence attenuation. Phylogenetic analysis revealed that deletion of ppe38 occurred at the branching point of the ‘modern’ Beijing sublineage and is shared by Beijing outbreak strains worldwide, suggesting that this deletion may have contributed to their success and global distribution6,7.

  4. Mutations in ppe38 block PE_PGRS secretion and increase virulence of Mycobacterium tuberculosis

    KAUST Repository

    Ates, Louis S.; Dippenaar, Anzaan; Ummels, Roy; Piersma, Sander R.; van der Woude, Aniek D.; van der Kuij, Kim; Le Chevalier, Fabien; Mata-Espinosa, Dulce; Barrios-Payá n, Jorge; Marquina-Castillo, Brenda; Guapillo, Carolina; Jimé nez, Connie R.; Pain, Arnab; Houben, Edith N. G.; Warren, Robin M.; Brosch, Roland; Herná ndez-Pando, Rogelio; Bitter, Wilbert

    2018-01-01

    Mycobacterium tuberculosis requires a large number of secreted and exported proteins for its virulence, immune modulation and nutrient uptake. Most of these proteins are transported by the different type VII secretion systems1,2. The most recently evolved type VII secretion system, ESX-5, secretes dozens of substrates belonging to the PE and PPE families, which are named for conserved proline and glutamic acid residues close to the amino terminus3,4. However, the role of these proteins remains largely elusive1. Here, we show that mutations of ppe38 completely block the secretion of two large subsets of ESX-5 substrates, that is, PPE-MPTR and PE_PGRS, together comprising >80 proteins. Importantly, hypervirulent clinical M. tuberculosis strains of the Beijing lineage have such a mutation and a concomitant loss of secretion5. Restoration of PPE38-dependent secretion partially reverted the hypervirulence phenotype of a Beijing strain, and deletion of ppe38 in moderately virulent M. tuberculosis increased virulence. This indicates that these ESX-5 substrates have an important role in virulence attenuation. Phylogenetic analysis revealed that deletion of ppe38 occurred at the branching point of the ‘modern’ Beijing sublineage and is shared by Beijing outbreak strains worldwide, suggesting that this deletion may have contributed to their success and global distribution6,7.

  5. A cyber-physical approach to secret key generation in smart environments

    OpenAIRE

    Barsocchi, Paolo; Chessa, Stefano; Martinovic, Ivan; Oligeri, Gabriele

    2011-01-01

    Encrypted communication in wireless sensor networks oftentimes requires additional randomness and frequent re-keying in order to avoid known-plain text attacks. Conventional approaches for shared secret generation suffer however from various disadvantages, such as necessity of a trusted third party, protocol scalability, and especially, the computational resources needed for performance-demanding public-key protocols. To appropriately respond to the increasing disproportions between a computa...

  6. Optimal public rationing and price response.

    Science.gov (United States)

    Grassi, Simona; Ma, Ching-To Albert

    2011-12-01

    We study optimal public health care rationing and private sector price responses. Consumers differ in their wealth and illness severity (defined as treatment cost). Due to a limited budget, some consumers must be rationed. Rationed consumers may purchase from a monopolistic private market. We consider two information regimes. In the first, the public supplier rations consumers according to their wealth information (means testing). In equilibrium, the public supplier must ration both rich and poor consumers. Rationing some poor consumers implements price reduction in the private market. In the second information regime, the public supplier rations consumers according to consumers' wealth and cost information. In equilibrium, consumers are allocated the good if and only if their costs are below a threshold (cost effectiveness). Rationing based on cost results in higher equilibrium consumer surplus than rationing based on wealth. Copyright © 2011 Elsevier B.V. All rights reserved.

  7. Beyond the knowledge level : descriptions of rational behavior for sharing and reuse

    OpenAIRE

    Schmalhofer, Franz; Aitken, J. Stuart; Bourne, Lyle E.

    1994-01-01

    The currently dominant approach to the sharing and reuse of knowledge strives to develop ontologies, with clearly constrained interpretations. The idea of ontological commitments is based on the knowledge level perspective. Several shortcomings of the knowledge level have been identified (Clancey, 1991). Pursuing Clancey's argument, if KBS are to be situated in ever changing environments, their purposes and significance will change over time and they have to be redescribed accordingly. The be...

  8. Global health governance as shared health governance.

    Science.gov (United States)

    Ruger, Jennifer Prah

    2012-07-01

    With the exception of key 'proven successes' in global health, the current regime of global health governance can be understood as transnational and national actors pursuing their own interests under a rational actor model of international cooperation, which fails to provide sufficient justification for an obligation to assist in meeting the health needs of others. An ethical commitment to providing all with the ability to be healthy is required. This article develops select components of an alternative model of shared health governance (SHG), which aims to provide a 'road map,' 'focal points' and 'the glue' among various global health actors to better effectuate cooperation on universal ethical principles for an alternative global health equilibrium. Key features of SHG include public moral norms as shared authoritative standards; ethical commitments, shared goals and role allocation; shared sovereignty and constitutional commitments; legitimacy and accountability; country-level attention to international health relations. A framework of social agreement based on 'overlapping consensus' is contrasted against one based on self-interested political bargaining. A global health constitution delineating duties and obligations of global health actors and a global institute of health and medicine for holding actors responsible are proposed. Indicators for empirical assessment of select SHG principles are described. Global health actors, including states, must work together to correct and avert global health injustices through a framework of SHG based on shared ethical commitments.

  9. Exploring rationality in schizophrenia

    DEFF Research Database (Denmark)

    Revsbech, Rasmus; Mortensen, Erik Lykke; Owen, Gareth

    2015-01-01

    Background Empirical studies of rationality (syllogisms) in patients with schizophrenia have obtained different results. One study found that patients reason more logically if the syllogism is presented through an unusual content. Aims To explore syllogism-based rationality in schizophrenia. Meth...... differences became non-significant. Conclusions When taking intelligence and neuropsychological performance into account, patients with schizophrenia and controls perform similarly on syllogism tests of rationality.......Background Empirical studies of rationality (syllogisms) in patients with schizophrenia have obtained different results. One study found that patients reason more logically if the syllogism is presented through an unusual content. Aims To explore syllogism-based rationality in schizophrenia. Method...... Thirty-eight first-admitted patients with schizophrenia and 38 healthy controls solved 29 syllogisms that varied in presentation content (ordinary v. unusual) and validity (valid v. invalid). Statistical tests were made of unadjusted and adjusted group differences in models adjusting for intelligence...

  10. Respect for rational autonomy.

    Science.gov (United States)

    Walker, Rebecca L

    2009-12-01

    The standard notion of autonomy in medical ethics does not require that autonomous choices not be irrational. The paper gives three examples of seemingly irrational patient choices and discusses how a rational autonomy analysis differs from the standard view. It then considers whether a switch to the rational autonomy view would lead to overriding more patient decisions but concludes that this should not be the case. Rather, a determination of whether individual patient decisions are autonomous is much less relevant than usually considered in determining whether health care providers must abide by these decisions. Furthermore, respect for rational autonomy entails strong positive requirements of respect for the autonomy of the person as a rational decision maker. The rationality view of autonomy is conceptually stronger than the standard view, allows for a more nuanced understanding of the practical moral calculus involved in respecting patient autonomy, and promotes positive respect for patient autonomy.

  11. Capital Requirements and Credit Rationing

    OpenAIRE

    Itai Agur

    2010-01-01

    This paper analyzes the trade-off between financial stability and credit rationing that arises when increasing capital requirements. It extends the Stiglitz-Weiss model of credit rationing to allow for bank default. Bank capital structure then matters for lending incentives. With default and rationing endogenous, optimal capital requirements can be analyzed. Introducing bank financiers, the paper also shows that uninsured funding raises the sensitivity of rationing to capital requirements. In...

  12. [Rationalization and rationing at the bedside. A normative and empirical status quo analysis].

    Science.gov (United States)

    Strech, D

    2014-02-01

    The topic of bedside rationing is increasingly discussed in Germany. Further need for clarification exists for the question how bedside rationing (e.g., in the area of overcare) can be justified despite coexistent inefficiencies. This paper outlines and analyses the relationship of waste avoidance and rationing from an ethical perspective. Empirical findings regarding the status quo of bedside rationing and rationalization are presented. These normative and empirical explorations will then be further specified regarding opportunities for future physician-driven activities to tackle overuse. The self-government partners in Germany should communicate more explicitly within their communities and to the public how and with which benchmarks they aim to reduce inefficient health care (overuse) in an appropriate manner. Physician-driven activities such as the "Choosing Wisely®" initiative in the USA could provide a first step to raise the awareness for overuse among physicians as well as in the public.

  13. High levels of DegU-P activate an Esat-6-like secretion system in Bacillus subtilis.

    Directory of Open Access Journals (Sweden)

    Catarina Baptista

    Full Text Available The recently discovered Type VII/Esat-6 secretion systems seem to be widespread among bacteria of the phyla Actinobacteria and Firmicutes. In some species they play an important role in pathogenic interactions with eukaryotic hosts. Several studies have predicted that the locus yukEDCByueBC of the non-pathogenic, Gram-positive bacterium Bacillus subtilis would encode an Esat-6-like secretion system (Ess. We provide here for the first time evidences for the functioning of this secretion pathway in an undomesticated B. subtilis strain. We show that YukE, a small protein with the typical features of the secretion substrates from the WXG100 superfamily is actively secreted to culture media. YukE secretion depends on intact yukDCByueBC genes, whose products share sequence or structural homology with known components of the S. aureus Ess. Biochemical characterization of YukE indicates that it exists as a dimer both in vitro and in vivo. We also show that the B. subtilis Ess essentially operates in late stationary growth phase in absolute dependence of phosphorylated DegU, the response regulator of the two-component system DegS-DegU. We present possible reasons that eventually have precluded the study of this secretion system in the B. subtilis laboratory strain 168.

  14. Rational BRDF.

    Science.gov (United States)

    Pacanowski, Romain; Salazar Celis, Oliver; Schlick, Christophe; Granier, Xavier; Poulin, Pierre; Cuyt, Annie

    2012-11-01

    Over the last two decades, much effort has been devoted to accurately measuring Bidirectional Reflectance Distribution Functions (BRDFs) of real-world materials and to use efficiently the resulting data for rendering. Because of their large size, it is difficult to use directly measured BRDFs for real-time applications, and fitting the most sophisticated analytical BRDF models is still a complex task. In this paper, we introduce Rational BRDF, a general-purpose and efficient representation for arbitrary BRDFs, based on Rational Functions (RFs). Using an adapted parametrization, we demonstrate how Rational BRDFs offer 1) a more compact and efficient representation using low-degree RFs, 2) an accurate fitting of measured materials with guaranteed control of the residual error, and 3) efficient importance sampling by applying the same fitting process to determine the inverse of the Cumulative Distribution Function (CDF) generated from the BRDF for use in Monte-Carlo rendering.

  15. Is It Rational to Assume that Infants Imitate Rationally? A Theoretical Analysis and Critique

    Science.gov (United States)

    Paulus, Markus

    2012-01-01

    It has been suggested that preverbal infants evaluate the efficiency of others' actions (by applying a "principle of rational action") and that they imitate others' actions rationally. The present contribution presents a conceptual analysis of the claim that preverbal infants imitate rationally. It shows that this ability rests on at least three…

  16. Bounded Rationality and Budgeting

    OpenAIRE

    Ibrahim, Mukdad

    2016-01-01

    This article discusses the theory of bounded rationality which had been introduced by Herbert Simon in the 1950s. Simon introduced the notion of bounded rationality stating that while decision-makers strive for rationality, they are limited by the effect of the environment, their information process capacity and by the constraints on their information storage and retrieval capabilities. Moreover, this article tries to specifically blend this notion into budgeting, using the foundations of inc...

  17. LcrG secretion is not required for blocking of Yops secretion in Yersinia pestis

    Directory of Open Access Journals (Sweden)

    Matson Jyl S

    2008-02-01

    Full Text Available Abstract Background LcrG, a negative regulator of the Yersinia type III secretion apparatus has been shown to be primarily a cytoplasmic protein, but is secreted at least in Y. pestis. LcrG secretion has not been functionally analyzed and the relevance of LcrG secretion on LcrG function is unknown. Results An LcrG-GAL4AD chimera, originally constructed for two-hybrid analyses to analyze LcrG protein interactions, appeared to be not secreted but the LcrG-GAL4AD chimera retained the ability to regulate Yops secretion. This result led to further investigation to determine the significance of LcrG secretion on LcrG function. Additional analyses including deletion and substitution mutations of amino acids 2–6 in the N-terminus of LcrG were constructed to analyze LcrG secretion and LcrG's ability to control secretion. Some changes to the N-terminus of LcrG were found to not affect LcrG's secretion or LcrG's secretion-controlling activity. However, substitution of poly-isoleucine in the N-terminus of LcrG did eliminate LcrG secretion but did not affect LcrG's secretion controlling activity. Conclusion These results indicate that secretion of LcrG, while observable and T3SS mediated, is not relevant for LcrG's ability to control secretion.

  18. Secret-key agreement over spatially correlated multiple-antenna channels in the low-SNR regime

    KAUST Repository

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Jorswieck, Eduard A.; Alouini, Mohamed-Slim

    2015-01-01

    We consider secret-key agreement with public discussion over Rayleigh fast-fading channels with transmit, receive and eavesdropper correlation. The legitimate receiver along with the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the correlation matrices. We analyze the secret-key capacity in the low signal-to-noise ratio (SNR) regime. We derive closed-form expressions for the first and the second derivatives of the secret-key capacity with respect to SNR at SNR= 0, for arbitrary correlation matrices and number of transmit, receive and eavesdropper antennas. Moreover, we identify optimal transmission strategies achieving these derivatives. For instance, we prove that achieving the first and the second derivatives requires a uniform power distribution between the eigenvectors spanning the maximal-eigenvalue eigenspace of the transmit correlation matrix. We also compare the optimal transmission scheme to a simple uniform power allocation. Finally, we express the minimum energy required for sharing a secret-key bit as well as the wideband slope in terms of the system parameters.

  19. Secret-key agreement over spatially correlated multiple-antenna channels in the low-SNR regime

    KAUST Repository

    Zorgui, Marwen

    2015-09-28

    We consider secret-key agreement with public discussion over Rayleigh fast-fading channels with transmit, receive and eavesdropper correlation. The legitimate receiver along with the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the correlation matrices. We analyze the secret-key capacity in the low signal-to-noise ratio (SNR) regime. We derive closed-form expressions for the first and the second derivatives of the secret-key capacity with respect to SNR at SNR= 0, for arbitrary correlation matrices and number of transmit, receive and eavesdropper antennas. Moreover, we identify optimal transmission strategies achieving these derivatives. For instance, we prove that achieving the first and the second derivatives requires a uniform power distribution between the eigenvectors spanning the maximal-eigenvalue eigenspace of the transmit correlation matrix. We also compare the optimal transmission scheme to a simple uniform power allocation. Finally, we express the minimum energy required for sharing a secret-key bit as well as the wideband slope in terms of the system parameters.

  20. Wrapped up in Covers: Preschoolers' Secrets and Secret Hiding Places

    Science.gov (United States)

    Corson, Kimberly; Colwell, Malinda J.; Bell, Nancy J.; Trejos-Castillo, Elizabeth

    2014-01-01

    In this qualitative study, interviews about children's secret hiding places were conducted with 3-5-year-olds (n?=?17) in a university sponsored preschool programme using art narratives. Since prior studies indicate that children understand the concept of a secret as early as five and that they associate secrets with hiding places, the purpose of…

  1. Rational valuations

    Directory of Open Access Journals (Sweden)

    Georg Spielthenner

    2007-01-01

    Full Text Available Valuations are ubiquitous. We may be for or against genetically modified food; we find some politicians irresponsible; we prefer Beethoven to rock ‘n’ roll or vice versa; some enjoy bird-watching while others find it boring; and we may think that we have to tighten up on green-house gas emissions. Valuing is pervasive and often we are not even aware that we are valuing. However, many of ourvaluations are ill grounded and rationally defective. They are frequently based on misinformation, sloppy thinking, prejudice, and are biased in many ways as psychological research shows. For this reason there is widespread agreement among phi-losophers that we need an account of substantive valuational rationality, both for the theory of practical reasoning and for ethics as well. My main objectin this paper is to outline such an account and to present a principle that allows a non-technical rational criticism of valuations

  2. Rational emotions.

    Science.gov (United States)

    Meshulam, Meir; Winter, Eyal; Ben-Shakhar, Gershon; Aharon, Itzhak

    2012-01-01

    We present here the concept of rational emotions: Emotions may be directly controlled and utilized in a conscious, analytic fashion, enabling an individual to size up a situation, to determine that a certain "mental state" is strategically advantageous and adjust accordingly. Building on the growing body of literature recognizing the vital role of emotions in determining decisions, we explore the complementary role of rational choice in choosing emotional states. Participants played the role of "recipient" in the dictator game, in which an anonymous "dictator" decides how to split an amount of money between himself and the recipient. A subset of recipients was given a monetary incentive to be angry at low-split offers. That subset demonstrated increased physiological arousal at low offers relative to high offers as well as more anger than other participants. These results provide a fresh outlook on human decision-making and contribute to the continuing effort to build more complete models of rational behavior.

  3. Models for Rational Number Bases

    Science.gov (United States)

    Pedersen, Jean J.; Armbruster, Frank O.

    1975-01-01

    This article extends number bases to negative integers, then to positive rationals and finally to negative rationals. Methods and rules for operations in positive and negative rational bases greater than one or less than negative one are summarized in tables. Sample problems are explained and illustrated. (KM)

  4. Seeking to Expand Middle Level Success to All Students: A Not-So-Secret Recipe

    Science.gov (United States)

    White, Jesse

    2014-01-01

    The recipe for success of Strive Preparatory Charter School (formerly West Denver Preparatory Charter School) is not a secret. This summer program, turned four-campus, middle level phenomenon, is proving to satisfy the appetite of parents hungry for a change in their children's educational opportunities. The intent of this article is to share a…

  5. A Study on an efficient management system, proper investment, and cost sharing for improving the quality of water in water system

    Energy Technology Data Exchange (ETDEWEB)

    Moon, Hyun Joo [Korea Environment Institute, Seoul (Korea)

    1998-12-01

    With the overall prospects on water quality management in water system, the problems on policy and implementation, investment and cost sharing were analyzed. Considering water system, a scheme for the rationalization of management policy and financial supply was presented. Also, based on the analysis on problem of present management structure, the rationalizing plan of management structure and organization was provided. 30 refs., 2 figs., 31 tabs.

  6. Are security analysts rational? a literature review

    OpenAIRE

    Peixinho, Rúben; Coelho, Luís; Taffler, Richard J.

    2005-01-01

    Rational choice theory and bounded rationality constitute the basis for the discussion in several areas regarding human rationality. In finance, this discussion has been made between traditional finance and behavioural finance approach, which have different perspectives concerning market agents’ rationality. This paper reviews several studies addressing rationality among security analysts. The analysis shows that analysts’systematic optimism seems to be inconsistent with rationality....

  7. Salmonella-secreted Virulence Factors

    Energy Technology Data Exchange (ETDEWEB)

    Heffron, Fred; Niemann, George; Yoon, Hyunjin; Kidwai, Afshan S.; Brown, Roslyn N.; McDermott, Jason E.; Smith, Richard D.; Adkins, Joshua N.

    2011-05-01

    In this short review we discuss secreted virulence factors of Salmonella, which directly affect Salmonella interaction with its host. Salmonella secretes protein to subvert host defenses but also, as discussed, to reduce virulence thereby permitting the bacteria to persist longer and more successfully disperse. The type III secretion system (TTSS) is the best known and well studied of the mechanisms that enable secretion from the bacterial cytoplasm to the host cell cytoplasm. Other secretion systems include outer membrane vesicles, which are present in all Gram-negative bacteria examined to date, two-partner secretion, and type VI secretion will also be addressed. Excellent reviews of Salmonella secreted effectors have focused on themes such as actin rearrangements, vesicular trafficking, ubiquitination, and the activities of the virulence factors themselves. This short review is based on S. Typhimurium infection of mice because it is a model of typhoid like disease in humans. We have organized effectors in terms of events that happen during the infection cycle and how secreted effectors may be involved.

  8. Venom allergen-like proteins in secretions of plant-parasitic nematodes activate and suppress extracellular plant immune receptors

    NARCIS (Netherlands)

    Lozano Torres, J.L.

    2014-01-01

    Parasitic worms threaten human, animal and plant health by infecting people, livestock and crops worldwide. Animals and plants share an anciently evolved innate immune system. Parasites modulate this immune system by secreting proteins to maintain their parasitic lifestyle. This thesis

  9. A Shared Secret

    Science.gov (United States)

    Lyngstad, Idar

    2014-01-01

    This article is based on an interview with a Norwegian physical education (PE) teacher on the social contact she had with pupils when teaching them PE. The article examines a two-dimensional aspect of a teaching situation relating to swimming instruction in PE, especially focusing on pupils' positive experiences of learning to swim and the…

  10. Melioration as rational choice: sequential decision making in uncertain environments.

    Science.gov (United States)

    Sims, Chris R; Neth, Hansjörg; Jacobs, Robert A; Gray, Wayne D

    2013-01-01

    Melioration-defined as choosing a lesser, local gain over a greater longer term gain-is a behavioral tendency that people and pigeons share. As such, the empirical occurrence of meliorating behavior has frequently been interpreted as evidence that the mechanisms of human choice violate the norms of economic rationality. In some environments, the relationship between actions and outcomes is known. In this case, the rationality of choice behavior can be evaluated in terms of how successfully it maximizes utility given knowledge of the environmental contingencies. In most complex environments, however, the relationship between actions and future outcomes is uncertain and must be learned from experience. When the difficulty of this learning challenge is taken into account, it is not evident that melioration represents suboptimal choice behavior. In the present article, we examine human performance in a sequential decision-making experiment that is known to induce meliorating behavior. In keeping with previous results using this paradigm, we find that the majority of participants in the experiment fail to adopt the optimal decision strategy and instead demonstrate a significant bias toward melioration. To explore the origins of this behavior, we develop a rational analysis (Anderson, 1990) of the learning problem facing individuals in uncertain decision environments. Our analysis demonstrates that an unbiased learner would adopt melioration as the optimal response strategy for maximizing long-term gain. We suggest that many documented cases of melioration can be reinterpreted not as irrational choice but rather as globally optimal choice under uncertainty.

  11. Limited rationality and strategic interaction

    DEFF Research Database (Denmark)

    Fehr, Ernst; Tyran, Jean-Robert

    2008-01-01

    Much evidence suggests that people are heterogeneous with regard to their abilities to make rational, forward-looking decisions. This raises the question as to when the rational types are decisive for aggregate outcomes and when the boundedly rational types shape aggregate results. We examine...... this question in the context of a long-standing and important economic problem: the adjustment of nominal prices after an anticipated monetary shock. Our experiments suggest that two types of bounded rationality-money illusion and anchoring-are important behavioral forces behind nominal inertia. However......, depending on the strategic environment, bounded rationality has vastly different effects on aggregate price adjustment. If agents' actions are strategic substitutes, adjustment to the new equilibrium is extremely quick, whereas under strategic complementarity, adjustment is both very slow and associated...

  12. Interpolation of rational matrix functions

    CERN Document Server

    Ball, Joseph A; Rodman, Leiba

    1990-01-01

    This book aims to present the theory of interpolation for rational matrix functions as a recently matured independent mathematical subject with its own problems, methods and applications. The authors decided to start working on this book during the regional CBMS conference in Lincoln, Nebraska organized by F. Gilfeather and D. Larson. The principal lecturer, J. William Helton, presented ten lectures on operator and systems theory and the interplay between them. The conference was very stimulating and helped us to decide that the time was ripe for a book on interpolation for matrix valued functions (both rational and non-rational). When the work started and the first partial draft of the book was ready it became clear that the topic is vast and that the rational case by itself with its applications is already enough material for an interesting book. In the process of writing the book, methods for the rational case were developed and refined. As a result we are now able to present the rational case as an indepe...

  13. Application of SharePoint Portal Technologies in Public Enterprises

    Directory of Open Access Journals (Sweden)

    Dragan Đokić

    2015-03-01

    Full Text Available Nowadays, systematic reforms are realized acrossmany countries. One of the characteristics of these reforms is necessity for rationalization of expenses in governmental and public enterprises. Rationalization of expenses can be achieved by more extensive application of information and communication technologies based on internet technologies and cloud computing. These systems include huge number of services, applications, resources, users and roles. At the same time, concepts of scalability, availability, ubiquity and pervasiveness need to be applied. This paper deals with application of portal technologies for enhanced content management, document management, and collaboration within public enterprises. The goal is to achieve efficient exchange of information on all hierarchical levels, as well as mechanisms of reporting and performance measurements, such as business intelligence and key performance indicators. The model is based on SharePoint portal technologies. A case study of application within the public enterprise Post of Serbia is described.

  14. History of Economic Rationalities

    DEFF Research Database (Denmark)

    This book concentrates upon how economic rationalities have been embedded into particular historical practices, cultures, and moral systems. Through multiple case-studies, situated in different historical contexts of the modern West, the book shows that the development of economic rationalities...... takes place in the meeting with other regimes of thought, values, and moral discourses. The book offers new and refreshing insights, ranging from the development of early economic thinking to economic aspects and concepts in the works of classical thinkers such as Thomas Hobbes, John Locke and Karl Marx......, to the role of economic reasoning in contemporary policies of art and health care. With economic rationalities as the read thread, the reader is offered a unique chance of historical self-awareness and recollection of how economic rationality became the powerful ideological and moral force that it is today....

  15. Psychology and the Rationality of Emotion.

    Science.gov (United States)

    Clore, Gerald L

    2011-04-01

    Questions addressed by recent psychological research on emotion include questions about how thought shapes emotion and how emotion, in turn, shapes thought. Research on emotion and cognition paints a somewhat different picture than that seen in traditional discussions of passion and reason. This article reviews several aspects of this research, concentrating specifically on three views of rationality: Rationality as Process, Rationality as Product, and Rationality as Outcome.

  16. Psychology and the Rationality of Emotion*

    OpenAIRE

    Clore, Gerald L.

    2011-01-01

    Questions addressed by recent psychological research on emotion include questions about how thought shapes emotion and how emotion, in turn, shapes thought. Research on emotion and cognition paints a somewhat different picture than that seen in traditional discussions of passion and reason. This article reviews several aspects of this research, concentrating specifically on three views of rationality: Rationality as Process, Rationality as Product, and Rationality as Outcome.

  17. Information Sharing and Credit Rationing : Evidence from the Introduction of a Public Credit Registry

    NARCIS (Netherlands)

    Cheng, X.; Degryse, H.A.

    2010-01-01

    We provide the first evidence on how the introduction of information sharing via a public credit registry affects banks’ lending decisions. We employ a unique dataset containing detailed information on credit card applications and decisions from one of the leading banks in China. While we do not

  18. Testing bounded rationality against full rationality in job changing behavior

    OpenAIRE

    Contini, Bruno; Morini, Matteo

    2007-01-01

    In this paper we question the hypothesis of full rationality in the context of job changing behaviour, via simple econometric explorations on microdata drawn from WHIP (Worker Histories Italian Panel). Workers' performance is compared at the end of a three-year time window that starts when choices are expressed, under the accepted notion that the main driving forces of job change are future real wages and expected job quality. Bounded rationality suggests that individuals will search for new ...

  19. Testing Bounded Rationality Against Full Rationality in Job Changing Behavior

    OpenAIRE

    Bruno Contini

    2008-01-01

    In this paper I question the hypothesis of full rationality in the context of job changing behaviour, via simple econometric explorations on microdata drawn from WHIP (Worker Histories Italian Panel). Workers’ performance is compared at the end of a three-year time window that starts when choices are expressed, under the accepted notion that the main driving forces of job change are future real wages and expected job quality. Bounded rationality suggests that individuals will search for new o...

  20. Psychology and the Rationality of Emotion*

    Science.gov (United States)

    Clore, Gerald L.

    2014-01-01

    Questions addressed by recent psychological research on emotion include questions about how thought shapes emotion and how emotion, in turn, shapes thought. Research on emotion and cognition paints a somewhat different picture than that seen in traditional discussions of passion and reason. This article reviews several aspects of this research, concentrating specifically on three views of rationality: Rationality as Process, Rationality as Product, and Rationality as Outcome. PMID:25125770

  1. Cholecystokinin inhibits gastrin secretion independently of paracrine somatostatin secretion in the pig

    DEFF Research Database (Denmark)

    Schmidt, P T; Hansen, L; Hilsted, L

    2004-01-01

    BACKGROUND: Cholecystokinin inhibits the secretion of gastrin from antral G cells, an effect that is speculated to be mediated by D cells secreting somatostatin. The aim of the study was to test directly whether cholecystokinin inhibition of antral gastrin secretion is mediated by somatostatin....... METHODS: The effects of CCK on gastrin and somatostatin secretion were studied in isolated vascularly perfused preparations of pig antrum before and after immunoneutralization brought about by infusion of large amounts of a high affinity monoclonal antibody against somatostatin. RESULTS: CCK infusion...... at 10(-9) M and 10(-8) M decreased gastrin output to 70.5% +/- 7.6% (n = 8) and 76.3% +/- 3.6% (n = 7) of basal output, respectively. CCK at 10(-10) M had no effect (n = 6). Somatostatin secretion was dose-dependently increased by CCK infusion and increased to 268 +/- 38.2% (n = 7) of basal secretion...

  2. DISTRIBUTED RC NETWORKS WITH RATIONAL TRANSFER FUNCTIONS,

    Science.gov (United States)

    A distributed RC circuit analogous to a continuously tapped transmission line can be made to have a rational short-circuit transfer admittance and...one rational shortcircuit driving-point admittance. A subcircuit of the same structure has a rational open circuit transfer impedance and one rational ...open circuit driving-point impedance. Hence, rational transfer functions may be obtained while considering either generator impedance or load

  3. Max Weber's Types of Rationality: Cornerstones for the Analysis of Rationalization Processes in History.

    Science.gov (United States)

    Kalberg, Stephen

    1980-01-01

    Explores rationality in Max Weber's works and identifies four types of rationality which play major roles in his writing--practical, theoretical, substantive, and formal. Implications for society and education are discussed. (DB)

  4. The concept of rational suicide.

    Science.gov (United States)

    Mayo, D J

    1986-05-01

    Suicide has been condemned in our culture in one way or another since Augustine offered theological arguments against it in the sixth century. More recently, theological condemnation has given way to the view that suicidal behavior must always be symptomatic of emotional disturbance and mental illness. However, suicide has not always been viewed so negatively. In other times and cultures, it has been held that circumstances might befall a person in which suicide would be a perfectly rational course of action, in the same sense that any other course of action could be rational: that it could be sensible, i.e., defensible by good reasons, or that it could be in keeping with the agent's fundamental interests. Indiscriminate use of modern life-sustaining technologies has renewed interest in the possibility of rational suicide. Today proponents of rational suicide tend to equate the rationality of suicide with the competence of the decision to commit suicide.

  5. RATGRAPH: Computer Graphing of Rational Functions.

    Science.gov (United States)

    Minch, Bradley A.

    1987-01-01

    Presents an easy-to-use Applesoft BASIC program that graphs rational functions and any asymptotes that the functions might have. Discusses the nature of rational functions, graphing them manually, employing a computer to graph rational functions, and describes how the program works. (TW)

  6. F-theory and all things rational: surveying U(1) symmetries with rational sections

    International Nuclear Information System (INIS)

    Lawrie, Craig; Schäfer-Nameki, Sakura; Wong, Jin-Mann

    2015-01-01

    We study elliptic fibrations for F-theory compactifications realizing 4d and 6d supersymmetric gauge theories with abelian gauge factors. In the fibration these U(1) symmetries are realized in terms of additional rational section. We obtain a universal characterization of all the possible U(1) charges of matter fields by determining the corresponding codimension two fibers with rational sections. In view of modelling supersymmetric Grand Unified Theories, one of the main examples that we analyze are U(1) symmetries for SU(5) gauge theories with 5̄ and 10 matter. We use a combination of constraints on the normal bundle of rational curves in Calabi-Yau three- and four-folds, as well as the splitting of rational curves in the fibers in codimension two, to determine the possible configurations of smooth rational sections. This analysis straightforwardly generalizes to multiple U(1)s. We study the flops of such fibers, as well as some of the Yukawa couplings in codimension three. Furthermore, we carry out a universal study of the U(1)-charged GUT singlets, including their KK-charges, and determine all realizations of singlet fibers. By giving vacuum expectation values to these singlets, we propose a systematic way to analyze the Higgsing of U(1)s to discrete gauge symmetries in F-theory.

  7. "Leaky" Rationality: How Research on Behavioral Decision Making Challenges Normative Standards of Rationality.

    Science.gov (United States)

    Keys, Daniel J; Schwartz, Barry

    2007-06-01

    For more than 30 years, decision-making research has documented that people often violate various principles of rationality, some of which are so fundamental that theorists of rationality rarely bother to state them. We take these characteristics of decision making as a given but argue that it is problematic to conclude that they typically represent departures from rationality. The very psychological processes that lead to "irrational" decisions (e.g., framing, mental accounting) continue to exert their influence when one experiences the results of the decisions. That is, psychological processes that affect decisions may be said also to "leak" into one's experience. The implication is that formal principles of rationality do not provide a good enough normative standard against which to assess decision making. Instead, what is needed is a substantive theory of rationality-one that takes subjective experience seriously, considers both direct and indirect consequences of particular decisions, considers how particular decisions fit into life as a whole, and considers the effects of decisions on others. Formal principles may play a role as approximations of the substantive theory that can be used by theorists and decision makers in cases in which the formal principles can capture most of the relevant considerations and leakage into experience is negligible. © 2007 Association for Psychological Science.

  8. Popper, Rationality and the Possibility of Social Science

    Directory of Open Access Journals (Sweden)

    Danny Frederick

    2013-02-01

    Full Text Available Social science employs teleological explanations which depend upon the rationality principle, according to which people exhibit instrumental rationality. Popper points out that people also exhibit critical rationality, the tendency to stand back from, and to question or criticise, their views. I explain how our critical rationality impugns the explanatory value of the rationality principle and thereby threatens the very possibility of social science. I discuss the relationship between instrumental and critical rationality and show how we can reconcile our critical rationality with the possibility of social science if we invoke Popper’s conception of limited rationality and his indeterminism.

  9. Ethics of rationing of nursing care.

    Science.gov (United States)

    Rooddehghan, Zahra; Yekta, Zohreh Parsa; Nasrabadi, Alireza N

    2016-09-21

    Rationing of various needed services, for example, nursing care, is inevitable due to unlimited needs and limited resources. Rationing of nursing care is considered an ethical issue since it requires judgment about potential conflicts between personal and professional values. The present research sought to explore aspects of rationing nursing care in Iran. This study applied qualitative content analysis, a method to explore people's perceptions of everyday life phenomena and interpret the subjective content of text data. Data collection was performed through in-depth, unstructured, face-to-face interviews with open-ended questions. The study population included Iranian nurses of all nursing positions, from clinical nurses to nurse managers. Purposive sampling was employed to select 15 female and 3 male nurses (11 clinical nurses, 3 supervisors, 1 matron, 1 nurse, and 2 members of the Nursing Council) working in hospitals of three cities in Iran. The study protocol was approved by Tehran University of Medical Sciences (91D1302870). Written informed consent was also obtained from all participants. According to the participants, rationing of nursing care consisted of two categories, that is, causes of rationing and consequences of rationing. The first category comprised three subcategories, namely, patient needs and demands, routinism, and VIP patients. The three subcategories forming the second category were missed nursing care, patient dissatisfaction, and nurses' feeling of guilt. Levels at which healthcare practices are rationed and clarity of the rationing are important structural considerations in the development of an equal, appropriate, and ethical healthcare system. Moreover, the procedure of rationing is critical as it not only influences people's lives but also reflects the values that dominate in the society. Therefore, in order to minimize the negative consequences of rationing of nursing care, further studies on the ethical dimensions of this phenomenon

  10. Casebook on rationalization of power use

    International Nuclear Information System (INIS)

    1986-06-01

    This book introduces the cases on rationalization of power use, which is divided into four parts. The first part refers the goal of rational use of energy and the result. The second part deals with the excellent cases on rationalization of domestic power use, which list the name of the company, hotel and factory according to the field such as building, textile and food. The third part contains the outstanding cases on rationalization of foreign power use, which were listed by the specific way to reduce electricity use each section. The fourth part is comprised of two chapters, which deals with the cases of domestic technical data and foreign technical data for rational use of energy.

  11. Formulas for Rational-Valued Separability Probabilities of Random Induced Generalized Two-Qubit States

    Directory of Open Access Journals (Sweden)

    Paul B. Slater

    2015-01-01

    Full Text Available Previously, a formula, incorporating a 5F4 hypergeometric function, for the Hilbert-Schmidt-averaged determinantal moments ρPTnρk/ρk of 4×4 density-matrices (ρ and their partial transposes (|ρPT|, was applied with k=0 to the generalized two-qubit separability probability question. The formula can, furthermore, be viewed, as we note here, as an averaging over “induced measures in the space of mixed quantum states.” The associated induced-measure separability probabilities (k=1,2,… are found—via a high-precision density approximation procedure—to assume interesting, relatively simple rational values in the two-re[al]bit (α=1/2, (standard two-qubit (α=1, and two-quater[nionic]bit (α=2 cases. We deduce rather simple companion (rebit, qubit, quaterbit, … formulas that successfully reproduce the rational values assumed for general  k. These formulas are observed to share certain features, possibly allowing them to be incorporated into a single master formula.

  12. From rational creatures to the rational Creator: ancient and patristic analogies of the “fine-tuning” argument

    Directory of Open Access Journals (Sweden)

    Alexey Fokin

    2017-12-01

    Full Text Available In this article the author deals with the proofs of the existence of God, based on the fact of the presence of rational beings in the world. These proofs can be found in Greek and Roman Classical philosophy and early Patristics, and can be viewed as an analogue of the modern “fine-tuning argument”. The author considers the origins and development of this argument in the Greek and Roman philosophy: in Socrates, Plato, Cicero, Sextus Empiricus, and especially the Stoics, who gave to the argument a logical form, based on the relationship between “the parts and the whole”: if the world as a whole produces and contains rational beings as its parts, it should also be rational or contain a rational principle that generates all its parts and governs them, just as human soul governs human body. The correction of this argument was proposed by Sextus Empiricus, who introduced the concept of "spermatic logoi", or rational principles, to explain the generation of the rational beings by the world, so that if the world contains the spermatic logoi of rational and living beings, then the world as a whole is also rational. The author also investigates the reception of the argument based on the existence of rational beings in the world in Latin Patristics: in Minucius Felix, Tertullian and especially Lactantius, in whom this argument has reached the climax of its development. At the same time it was shown, that the ancient argument has undergone a transformation from the postulation of the rationality of the world as a whole or its equation with God himself to a genuine proof of the existence of the one God who is the Creator both of the world and human beings, superior to the both as the all-powerful and transcendent Mind.

  13. Rationing medical education | Walsh | African Health Sciences

    African Journals Online (AJOL)

    Even though some stakeholders in medical education might be taken aback at the prospect of rationing, the truth is that rationing has always occurred in one form or another in medical education and in healthcare more broadly. Different types of rationing exist in healthcare professional education. For example rationing may ...

  14. Effects of Rational-Emotive Therapy, Rational Role Reversal, and Rational-Emotive Imagery on the Emotional Adjustment of Community Mental Health Center Patients.

    Science.gov (United States)

    Lipsky, Marc J.; And Others

    1980-01-01

    Results showed that rational-emotive therapy (RET), with the addition of rational role reversal, produced significantly better results than did relaxation training and support or no contact. This was the first study to demonstrate the efficacy of RET with multisymptomatic applicants to a community mental health center. (Author/BEF)

  15. Argumentation, rationality, and psychology of reasoning

    Directory of Open Access Journals (Sweden)

    David Godden

    2015-05-01

    Full Text Available This paper explicates an account of argumentative rationality by articulating the common, basic idea of its nature, and then identifying a collection of assumptions inherent in it. Argumentative rationality is then contrasted with dual-process theories of reasoning and rationality prevalent in the psychology of reasoning. It is argued that argumentative rationality properly corresponds only with system-2 reasoning in dual-process theories. This result challenges the prescriptive force of argumentative norms derives if they derive at all from their descriptive accuracy of our cognitive capacities. In response, I propose an activity-based account of reasoning which retains the assumptions of argumentative rationality while recontextualizing the relationship between reasoning as a justificatory activity and the psychological states and processes underlying that activity.

  16. A novel secretion pathway of Salmonella enterica acts as an antivirulence modulator during salmonellosis.

    Directory of Open Access Journals (Sweden)

    Ohad Gal-Mor

    2008-04-01

    Full Text Available Salmonella spp. are Gram-negative enteropathogenic bacteria that infect a variety of vertebrate hosts. Like any other living organism, protein secretion is a fundamental process essential for various aspects of Salmonella biology. Herein we report the identification and characterization of a horizontally acquired, autonomous and previously unreported secretion pathway. In Salmonella enterica serovar Typhimurium, this novel secretion pathway is encoded by STM1669 and STM1668, designated zirT and zirS, respectively. We show that ZirT is localized to the bacterial outer membrane, expected to adopt a compact beta-barrel conformation, and functions as a translocator for ZirS. ZirS is an exoprotein, which is secreted into the extracellular environment in a ZirT-dependent manner. The ZirTS secretion pathway was found to share several important features with two-partner secretion (TPS systems and members of the intimin/invasin family of adhesions. We show that zirTS expression is affected by zinc; and that in vivo, induction of zirT occurs distinctively in Salmonella colonizing the small intestine, but not in systemic sites. Additionally, strong expression of zirT takes place in Salmonella shed in fecal pellets during acute and persistent infections of mice. Inactivation of ZirTS results in a hypervirulence phenotype of Salmonella during oral infection of mice. Cumulatively, these results indicate that the ZirTS pathway plays a unique role as an antivirulence modulator during systemic disease and is involved in fine-tuning a host-pathogen balance during salmonellosis.

  17. Rational Thinking in School-Based Practice

    Science.gov (United States)

    Clark, Mary Kristen; Flynn, Perry

    2011-01-01

    Purpose: We reflect on Alan Kamhi's (2011) prologue on balancing certainty and uncertainty as it pertains to school-based practice. Method: In schools, rational thinking depends on effective team processes, much like professional learning communities. We consider the conditions that are required for rational thinking and how rational team dialogue…

  18. Rationality in Machiavelli and in Kant

    Directory of Open Access Journals (Sweden)

    Vadim Chaly

    2016-11-01

    Full Text Available The paper contains interpretation and comparative analysis of Machiavelli’s and Kant’s conceptions on rationality as two prime examples of “realist” and “idealist” modes of agency. Kantian model of rationality is viewed as an augmentation of the Machiavellian one, not an opposition to it. To elaborate the point, Robert Aumann’s model of act-rationality and rulerationality is applied to the two philosophical models. Kantian practical reason is interpreted as an addition to Aumann’s instrumental rationality, providing rules for rules, or “rule-rule-rationality”.

  19. Effective Entrepreneurial Choice: The Role of Rationality and Non-Rationality in Three Entrepreneurs Success Stories

    OpenAIRE

    Chong, Anne Michele, Siang Yoon

    2007-01-01

    Good entrepreneurship is important for economic growth and productivity in any modern economy. The purpose of this dissertation is to research how good entrepreneurial decisions are made. In theory, optimal or rational decision making means choosing the best alternative in response to the problem. However, in reality, people do not act rationally because they often cannot make rational choices. The reason is that people do not have enough brain power, time or resources to process the compl...

  20. The Yersinia enterocolitica type three secretion chaperone SycO is integrated into the Yop regulatory network and binds to the Yop secretion protein YscM1

    Directory of Open Access Journals (Sweden)

    Heesemann Jürgen

    2007-07-01

    Full Text Available Abstract Background Pathogenic yersiniae (Y. pestis, Y. pseudotuberculosis, Y. enterocolitica share a virulence plasmid encoding a type three secretion system (T3SS. This T3SS comprises more than 40 constituents. Among these are the transport substrates called Yops (Yersinia outer proteins, the specific Yop chaperones (Sycs, and the Ysc (Yop secretion proteins which form the transport machinery. The effectors YopO and YopP are encoded on an operon together with SycO, the chaperone of YopO. The characterization of SycO is the focus of this study. Results We have established the large-scale production of recombinant SycO in its outright form. We confirm that Y. enterocolitica SycO forms homodimers which is typical for Syc chaperones. SycO overproduction in Y. enterocolitica decreases secretion of Yops into the culture supernatant suggesting a regulatory role of SycO in type III secretion. We demonstrate that in vitro SycO interacts with YscM1, a negative regulator of Yop expression in Y. enterocolitica. However, the SycO overproduction phenotype was not mediated by YscM1, YscM2, YopO or YopP as revealed by analysis of isogenic deletion mutants. Conclusion We present evidence that SycO is integrated into the regulatory network of the Yersinia T3SS. Our picture of the Yersinia T3SS interactome is supplemented by identification of the SycO/YscM1 interaction. Further, our results suggest that at least one additional interaction partner of SycO has to be identified.

  1. Discrete Choice and Rational Inattention

    DEFF Research Database (Denmark)

    Fosgerau, Mogens; Melo, Emerson; de Palma, André

    2017-01-01

    This paper establishes a general equivalence between discrete choice and rational inattention models. Matejka and McKay (2015, AER) showed that when information costs are modelled using the Shannon entropy, the result- ing choice probabilities in the rational inattention model take the multinomial...... logit form. We show that when information costs are modelled using a class of generalized entropies, then the choice probabilities in any rational inattention model are observationally equivalent to some additive random utility discrete choice model and vice versa. This equivalence arises from convex...

  2. Rational top and its classical r-matrix

    International Nuclear Information System (INIS)

    Aminov, G; Arthamonov, S; Smirnov, A; Zotov, A

    2014-01-01

    We construct a rational integrable system (the rational top) on a co-adjoint orbit of SL N Lie group. It is described by the Lax operator with spectral parameter and classical non-dynamical skew-symmetric r-matrix. In the case of the orbit of minimal dimension the model is gauge equivalent to the rational Calogero–Moser (CM) system. To obtain the results we represent the Lax operator of the CM model in two different factorized forms—without spectral parameter (related to the spinless case) and another one with the spectral parameter. The latter gives rise to the rational top while the first one is related to generalized Cremmer–Gervais r-matrices. The gauge transformation relating the rational top and CM model provides the classical rational version of the IRF-Vertex correspondence. From the geometrical point of view it describes the modification of SL(N,C)-bundles over degenerated elliptic curve. In view of the Symplectic Hecke Correspondence the rational top is related to the rational spin CM model. Possible applications and generalizations of the suggested construction are discussed. In particular, the obtained r-matrix defines a class of KZB equations. (paper)

  3. Fiber sources for complete calf starter rations.

    Science.gov (United States)

    Murdock, F R; Wallenius, R W

    1980-11-01

    Complete calf starter rations containing either 1) alfalfa hay, 2) cottonseed hulls, or 3) alfalfa-beet pulp as sources of fiber were fed to Holstein heifer calves at two locations on a limited milk program from 3 days to 12 wk of age. Rations were isonitrogenous and similar in content of crude fiber and acid detergent fiber. Although growth and development were normal on all rations, calves fed the cottonseed hull ration consumed more starter and gained more body weight than calves fed the other sources of fiber. The similarity of feed efficiencies, rumen pH, and molar ratios of volatile fatty acids between rations indicated no appreciable differences in rumen development or function. The growth response of calves fed the cottonseed hull ration appeared to be a result of better ration acceptability for which no reason was evident. Calves raised at Puyallup gained more body weight than calves at Pullman, and these gains were made more efficiently. These location effects may be related to seasonal differences and greater demands for production of body heat. Although the incidence of scours was less for calves fed alfalfa hay starter, the incidence and severity of bloat were higher for that ration.

  4. Lessons from Learning to Have Rational Expectations

    OpenAIRE

    Lindh, Thomas

    1989-01-01

    This paper reviews a growing literature investigating how economic agents may learn rational expectations. Fully rational learning requires implausible initial information assumptions, therefore some form of bounded rationality has come into focus. Such learning models often converge to rational expectations equilibria within certain bounds. Convergence analysis has been much simplified by methods from adaptive control theory. Learning stability as a correspondence principle show some promise...

  5. Modelling of rational economic proportions of the balance sheet structure of the petrochemical enterprises

    Directory of Open Access Journals (Sweden)

    G. S. Tsvetkova

    2016-01-01

    Full Text Available The paper provides the assessment of the balance sheet structure of rival companies of a petrochemical complex of the Russian Federation. J. Aubert-Kriye's method is chosen as a main methodical tool. Practical demonstration of the method is offered on the example of the enterprises of petrochemical business of PJSC “Sibur”, PJSC “Nizhnekamskneftekhim” and JSC “Sterlitamak Petrochemical Plant”. The analysis of balance sheets showed that the enterprises have elements of irrational structure. “Sibur” differs in a low share of owner’s equity and a high share of long-term liabilities. “Nizhnekamskneftekhim” is characterized by the high share of owner’s equity which use for the purposes of development of the company and it is more expensive in comparison with liabilities. “Sterlitamak Petrochemical Plant” has excessive values of liquidity rates that demonstrates accumulation of a money, their derivation in receivables. At the same time, processes of ongoing investment in upgrade of the equipment and expansion of capacities require cause necessity of support of a rational balance sheet structure of the enterprises of a petrochemical complex. On the example of “Nizhnekamskneftekhim” modeling of a rational balance sheet structure of the company is carried out. The sequence of calculations included performing diagnostics of structural distribution of current assets and sources of means; determination of structure of financial and active elements of the entity; establishment of permissible limit of change of basic proportions and ratios by criterion of solvency and financial stability. Modeling of structure of a liability and current assets on the basis of the J. Aubert-Kriye's method showed a possibility of improvement of economic indicators of “Nizhnekamskneftekhim”. Further determination of range of tolerance for elements of the liabilities and current assets will allow to provide balance of economic proportions and

  6. Mammalian protein secretion without signal peptide removal. Biosynthesis of plasminogen activator inhibitor-2 in U-937 cells

    International Nuclear Information System (INIS)

    Ye, R.D.; Wun, T.C.; Sadler, J.E.

    1988-01-01

    Plasminogen activator inhibitor-2 (PAI-2) is a serine protease inhibitor that regulates plasmin generation by inhibiting urokinase and tissue plasminogen activator. The primary structure of PAI-2 suggests that it may be secreted without cleavage of a single peptide. To confirm this hypothesis we have studied the glycosylation and secretion of PAI-2 in human monocytic U-937 cells by metabolic labeling, immunoprecipitation, glycosidase digestion, and protein sequencing. PAI-2 is variably glycosylated on asparagine residues to yield intracellular intermediates with zero, one, two, or three high mannose-type oligosaccharide units. Secretion of the N-glycosylated species began by 1 h of chase and the secreted molecules contained both complex-type N-linked and O-linked oligosaccharides. Enzymatically deglycosylated PAI-2 had an electrophoretic mobility identical to that of the nonglycosylated precursor and also to that of PAI-2 synthesized in vitro in a rabbit reticulocyte lysate from synthetic mRNA derived from full length PAI-2 cDNA. The amino-terminal protein sequence of secreted PAI-2 began with the initiator methionine residue. These results indicate that PAI-2 is glycosylated and secreted efficiently without the cleavage of a signal peptide. PAI-2 shares this property with its nearest homologue in the serine protease inhibitor family, chicken ovalbumin, and appears to be the first well characterized example of this phenomenon among natural mammalian proteins

  7. Strategy selection as rational metareasoning.

    Science.gov (United States)

    Lieder, Falk; Griffiths, Thomas L

    2017-11-01

    Many contemporary accounts of human reasoning assume that the mind is equipped with multiple heuristics that could be deployed to perform a given task. This raises the question of how the mind determines when to use which heuristic. To answer this question, we developed a rational model of strategy selection, based on the theory of rational metareasoning developed in the artificial intelligence literature. According to our model people learn to efficiently choose the strategy with the best cost-benefit tradeoff by learning a predictive model of each strategy's performance. We found that our model can provide a unifying explanation for classic findings from domains ranging from decision-making to arithmetic by capturing the variability of people's strategy choices, their dependence on task and context, and their development over time. Systematic model comparisons supported our theory, and 4 new experiments confirmed its distinctive predictions. Our findings suggest that people gradually learn to make increasingly more rational use of fallible heuristics. This perspective reconciles the 2 poles of the debate about human rationality by integrating heuristics and biases with learning and rationality. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  8. Should informed consent be based on rational beliefs?

    Science.gov (United States)

    Savulescu, J; Momeyer, R W

    1997-10-01

    Our aim is to expand the regulative ideal governing consent. We argue that consent should not only be informed but also based on rational beliefs. We argue that holding true beliefs promotes autonomy. Information is important insofar as it helps a person to hold the relevant true beliefs. But in order to hold the relevant true beliefs, competent people must also think rationally. Insofar as information is important, rational deliberation is important. Just as physicians should aim to provide relevant information regarding the medical procedures prior to patients consenting to have those procedures, they should also assist patients to think more rationally. We distinguish between rational choice/action and rational belief. While autonomous choice need not necessarily be rational, it should be based on rational belief. The implication for the doctrine of informed consent and the practice of medicine is that, if physicians are to respect patient autonomy and help patients to choose and act more rationally, not only must they provide information, but they should care more about the theoretical rationality of their patients. They should not abandon their patients to irrationality. They should help their patients to deliberate more effectively and to care more about thinking rationally. We illustrate these arguments in the context of Jehovah's Witnesses refusing life-saving blood transfusions. Insofar as Jehovah's Witnesses should be informed of the consequences of their actions, they should also deliberate rationally about these consequences.

  9. Dynamic secrets in communication security

    CERN Document Server

    Xiao, Sheng; Towsley, Donald

    2013-01-01

    Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. 'Dynamic Secrets in Communication Security' presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic

  10. Product differentiation under bounded rationality

    NARCIS (Netherlands)

    Vermeulen, B.; Poutré, La J.A.; Kok, de A.G.; Pyka, A.; Handa, H.; Ishibuchi, H.; Ong, Y.-S.; Tan, K.-C.

    2015-01-01

    We study product differentiation equilibria and dynamics on the Salop circle under bounded rationality. Due to bounded rationality, firms tend to agglomerate in pairs. Upon adding a second tier of component suppliers, downstream assemblers may escape pairwise horizontal agglomeration. Moreover, we

  11. An evaluation of rational-emotive imagery as a component of rational-emotive therapy in the treatment of test anxiety.

    Science.gov (United States)

    Hymen, S P; Warren, R

    1978-06-01

    This study evaluated the efficacy of rational-emotive imagery as a component of rational-emotive therapy in reduction of college students' test anxiety. 11 volunteers met for 6 1-hr. group treatment sessions over a 3-wk. period. After 2 initial treatment sessions subjects were randomly assigned to groups given either rational-emotive therapy with rational-emotive imagery or rational-emotive therapy without imagery. Contrary to predictions, improvement between groups on self-report and performance measures was nonsignificant. Failure to obtain differences was attributed to similarities in content of treatment sessions and short treatment time. Combined groups reported significant improvement on all dependent measures. Although the study did not yield the predicted benefits of the imagery, results lend further support to the efficacy of rational-emotive therapy procedures in the reduction of test anxiety.

  12. Rationing in health systems: A critical review.

    Science.gov (United States)

    Keliddar, Iman; Mosadeghrad, Ali Mohammad; Jafari-Sirizi, Mehdi

    2017-01-01

    Background: It is difficult to provide health care services to all those in need of such services due to limited resources and unlimited demands. Thus, priority setting and rationing have to be applied. This study aimed at critically examining the concept of rationing in health sector and identifying its purposes, influencing factors, mechanisms, and outcomes. Methods: The critical interpretive synthesis methodology was used in this study. PubMed, Cochrane, and Proquest databases were searched using the related key words to find related documents published between 1970 and 2015. In total, 161 published reports were reviewed and included in the study. Thematic content analysis was applied for data analysis. Results: Health services rationing means restricting the access of some people to useful or potentially useful health services due to budgetary limitation. The inherent features of the health market and health services, limited resources, and unlimited needs necessitate health services rationing. Rationing can be applied in 4 levels: health care policy- makers, health care managers, health care providers, and patients. Health care rationing can be accomplished through fixed budget, benefit package, payment mechanisms, queuing, copayments, and deductibles. Conclusion: This paper enriched our understanding of health services rationing and its mechanisms at various levels and contributed to the literature by broadly conceptualizing health services rationing.

  13. Research on Bounded Rationality of Fuzzy Choice Functions

    Directory of Open Access Journals (Sweden)

    Xinlin Wu

    2014-01-01

    Full Text Available The rationality of a fuzzy choice function is a hot research topic in the study of fuzzy choice functions. In this paper, two common fuzzy sets are studied and analyzed in the framework of the Banerjee choice function. The complete rationality and bounded rationality of fuzzy choice functions are defined based on the two fuzzy sets. An assumption is presented to study the fuzzy choice function, and especially the fuzzy choice function with bounded rationality is studied combined with some rationality conditions. Results show that the fuzzy choice function with bounded rationality also satisfies some important rationality conditions, but not vice versa. The research gives supplements to the investigation in the framework of the Banerjee choice function.

  14. Mining secreted proteins that function in pepper fruit development and ripening using a yeast secretion trap (YST)

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Je Min, E-mail: jemin@knu.ac.kr [Department of Plant Science, College of Agriculture and Life Sciences, Seoul National University, Seoul (Korea, Republic of); Department of Horticultural Science, Kyungpook National University, Daegu (Korea, Republic of); Lee, Sang-Jik [Biotechnology Institute, Nongwoo Bio Co, Ltd, Yeoju (Korea, Republic of); Department of Plant Biology, Cornell University, Ithaca, NY (United States); Rose, Jocelyn K.C. [Department of Plant Biology, Cornell University, Ithaca, NY (United States); Yeam, Inhwa [Department of Horticulture and Breeding, Andong National University, Andong (Korea, Republic of); Kim, Byung-Dong [Department of Plant Science, College of Agriculture and Life Sciences, Seoul National University, Seoul (Korea, Republic of)

    2014-04-18

    Highlights: • Yeast secretion trap (YST) is a valuable tool for mining secretome. • A total of 80 secreted proteins are newly identified via YST in pepper fruits. • The secreted proteins are differentially regulated during pepper development and ripening. • Transient GFP-fusion assay and in planta secretion trap can effectively validate the secretion of proteins. - Abstract: Plant cells secrete diverse sets of constitutively- and conditionally-expressed proteins under various environmental and developmental states. Secreted protein populations, or secretomes have multiple functions, including defense responses, signaling, metabolic processes, and developmental regulation. To identify genes encoding secreted proteins that function in fruit development and ripening, a yeast secretion trap (YST) screen was employed using pepper (Capsicum annuum) fruit cDNAs. The YST screen revealed 80 pepper fruit-related genes (CaPFRs) encoding secreted proteins including cell wall proteins, several of which have not been previously described. Transient GFP-fusion assay and an in planta secretion trap were used to validate the secretion of proteins encoded by selected YST clones. In addition, RNA gel blot analyses provided further insights into their expression and regulation during fruit development and ripening. Integrating our data, we conclude that the YST provides a valuable functional genomics tool for the identification of substantial numbers of novel secreted plant proteins that are associated with biological processes, including fruit development and ripening.

  15. Mining secreted proteins that function in pepper fruit development and ripening using a yeast secretion trap (YST)

    International Nuclear Information System (INIS)

    Lee, Je Min; Lee, Sang-Jik; Rose, Jocelyn K.C.; Yeam, Inhwa; Kim, Byung-Dong

    2014-01-01

    Highlights: • Yeast secretion trap (YST) is a valuable tool for mining secretome. • A total of 80 secreted proteins are newly identified via YST in pepper fruits. • The secreted proteins are differentially regulated during pepper development and ripening. • Transient GFP-fusion assay and in planta secretion trap can effectively validate the secretion of proteins. - Abstract: Plant cells secrete diverse sets of constitutively- and conditionally-expressed proteins under various environmental and developmental states. Secreted protein populations, or secretomes have multiple functions, including defense responses, signaling, metabolic processes, and developmental regulation. To identify genes encoding secreted proteins that function in fruit development and ripening, a yeast secretion trap (YST) screen was employed using pepper (Capsicum annuum) fruit cDNAs. The YST screen revealed 80 pepper fruit-related genes (CaPFRs) encoding secreted proteins including cell wall proteins, several of which have not been previously described. Transient GFP-fusion assay and an in planta secretion trap were used to validate the secretion of proteins encoded by selected YST clones. In addition, RNA gel blot analyses provided further insights into their expression and regulation during fruit development and ripening. Integrating our data, we conclude that the YST provides a valuable functional genomics tool for the identification of substantial numbers of novel secreted plant proteins that are associated with biological processes, including fruit development and ripening

  16. Immunoglobins in mammary secretions

    DEFF Research Database (Denmark)

    Hurley, W L; Theil, Peter Kappel

    2013-01-01

    Immunoglobulins secreted in colostrum and milk by the lactating mammal are major factors providing immune protection to the newborn. Immunoglobulins in mammary secretions represent the cumulative immune response of the lactating animal to exposure to antigenic stimulation that occurs through...... the immunoglobulins found in mammary secretions in the context of their diversity of structure, origin, mechanisms of transfer, and function....

  17. Genetic and biochemical characterization of the cell wall hydrolase activity of the major secreted protein of Lactobacillus rhamnosus GG

    NARCIS (Netherlands)

    Claes, I.J.; Schoofs, G.; Regulski, K.; Vos, de W.M.

    2012-01-01

    Lactobacillus rhamnosus GG (LGG) produces two major secreted proteins, designated here Msp1 (LGG_00324 or p75) and Msp2 (LGG_00031 or p40), which have been reported to promote the survival and growth of intestinal epithelial cells. Intriguingly, although each of these proteins shares homology with

  18. Extracellular secretion of recombinant proteins

    Science.gov (United States)

    Linger, Jeffrey G.; Darzins, Aldis

    2014-07-22

    Nucleic acids encoding secretion signals, expression vectors containing the nucleic acids, and host cells containing the expression vectors are disclosed. Also disclosed are polypeptides that contain the secretion signals and methods of producing polypeptides, including methods of directing the extracellular secretion of the polypeptides. Exemplary embodiments include cellulase proteins fused to secretion signals, methods to produce and isolate these polypeptides, and methods to degrade lignocellulosic biomass.

  19. Sharing "Sex Secrets" on Facebook: A Content Analysis of Youth Peer Communication and Advice Exchange on Social Media about Sexual Health and Intimate Relations.

    Science.gov (United States)

    Yeo, Tien Ee Dominic; Chu, Tsz Hang

    2017-09-01

    Social media present opportunities and challenges for sexual health communication among young people. This study is one of the first to examine the actual use of Facebook for peer communication of sexual health and intimate relations. Content analysis of 2186 anonymous posts in a "sex secrets" Facebook page unofficially affiliated with a Hong Kong University shows gender balance among posters, inclusiveness of sexual minorities, and frequent sharing of personal experiences in storytelling or advice seeking. The findings illuminate young people's health concerns regarding condom use, avoiding pain, birth control, sexually transmitted infections, and body appearance. Relational concerns found entailed sexual practices, expectations, and needs-predominantly within dating relationships and include not wanting to have sex. Supportive communication among users was prevalent. A majority of posts involved advice solicitation in the form of request for opinion or information (30.38%), request for advice (13.68%), situation comparison (5.40%), or problem disclosure (9.97%). Comments to the advice-seeking posts were mostly supportive (69.49%); nonsupportive responses (unsolicited messages and gratuitous humor) were concentrated with ambiguous advice solicitations. These findings hold implications for understanding self-disclosure of intimate concerns within social networks, and attuning sexual health intervention on social media to young people's actual needs and advice preferences.

  20. Using Rational-Emotive Therapy to Prevent Classroom Problems.

    Science.gov (United States)

    Webber, Jo; Coleman, Maggie

    1988-01-01

    Teachers are encouraged to utilize rational-emotive therapy to prevent and deal with classroom behavior problems. Rational-emotive therapy is defined, the ABC model of rational thinking briefly explained, types of irrational thinking identified, and suggestions for becoming a rational thinker are offered. Classroom examples are given. (DB)

  1. [Rationalization, rationing, prioritization: terminology and ethical approaches to the allocation of limited resources in hematology/oncology].

    Science.gov (United States)

    Winkler, Eva

    2011-01-01

    The field of oncology with its numerous high-priced innovations contributes considerably to the fact that medical progress is expensive. Additionally, due to the demographic changes and the increasing life expectancy, a growing number of cancer patients want to profit from this progress. Since resources are limited also in the health system, the fair distribution of the available resources urgently needs to be addressed. Dealing with scarcity is a typical problem in the domain of justice theory; therefore, this article first discusses different strategies to manage limited resources: rationalization, rationing, and prioritization. It then presents substantive as well as procedural criteria that assist in the just distribution of effective health benefits. There are various strategies to reduce the utilization of limited resources: Rationalization means that efficiency reserves are being exhausted; by means of rationing, effective health benefits are withheld due to cost considerations. Rationing can occur implicitly and thus covertly, e.g. through budgeting or the implementation of waiting periods, or explicitly, through transparent rules or policies about healthcare coverage. Ranking medical treatments according to their importance (prioritization) is often a prerequisite for rationing decisions. In terms of requirements of justice, both procedural and substantive criteria (e.g. equality, urgency, benefit) are relevant for the acceptance and quality of a decision to limit access to effective health benefits. Copyright © 2011 S. Karger AG, Basel.

  2. Differential Rationality and Personal Development.

    Science.gov (United States)

    Fincher, Cameron

    This publication discusses differential rationality; it asserts that the development of institutions, professions, and individuals involves the differentiation of forms and styles of thinking and knowing that are, in various ways, idiosyncratic. Based on this understanding, differential rationality can be seen as a developmental construct that…

  3. Rational reconstructions of modern physics

    CERN Document Server

    Mittelstaedt, Peter

    2013-01-01

    Newton’s classical physics and its underlying ontology are loaded with several metaphysical hypotheses that cannot be justified by rational reasoning nor by experimental evidence. Furthermore, it is well known that some of these hypotheses are not contained in the great theories of Modern Physics, such as the theory of Special Relativity and Quantum Mechanics. This book shows that, on the basis of Newton’s classical physics and by rational reconstruction, the theory of Special Relativity as well as Quantum Mechanics can be obtained by partly eliminating or attenuating the metaphysical hypotheses. Moreover, it is shown that these reconstructions do not require additional hypotheses or new experimental results. In the second edition the rational reconstructions are completed with respect to General Relativity and Cosmology. In addition, the statistics of quantum objects is elaborated in more detail with respect to the rational reconstruction of quantum mechanics. The new material completes the approach of t...

  4. Rational Choice and the Framing of Decisions.

    Science.gov (United States)

    1986-05-29

    survival in a competitive environment , and a minority of rational individuals can sometimes impose rationality on the whole market. Third, the...intuitive appeal of the axioms of rational choice makes it plausible that the theory derived from these axioms should provide an acceptable account of choice...rn-use U? RATIONAL CHOICE AMD THE FINNING OF KCISIOUS(U mi/ STANFORD UNIV CR A TYERSEY ET AL. 29 NAYN4-S4-K-S61SWICLASS IF lED FO 5/10S IL EEEEEEEE

  5. Intergroup conflict and rational decision making.

    Science.gov (United States)

    Martínez-Tur, Vicente; Peñarroja, Vicente; Serrano, Miguel A; Hidalgo, Vanesa; Moliner, Carolina; Salvador, Alicia; Alacreu-Crespo, Adrián; Gracia, Esther; Molina, Agustín

    2014-01-01

    The literature has been relatively silent about post-conflict processes. However, understanding the way humans deal with post-conflict situations is a challenge in our societies. With this in mind, we focus the present study on the rationality of cooperative decision making after an intergroup conflict, i.e., the extent to which groups take advantage of post-conflict situations to obtain benefits from collaborating with the other group involved in the conflict. Based on dual-process theories of thinking and affect heuristic, we propose that intergroup conflict hinders the rationality of cooperative decision making. We also hypothesize that this rationality improves when groups are involved in an in-group deliberative discussion. Results of a laboratory experiment support the idea that intergroup conflict -associated with indicators of the activation of negative feelings (negative affect state and heart rate)- has a negative effect on the aforementioned rationality over time and on both group and individual decision making. Although intergroup conflict leads to sub-optimal decision making, rationality improves when groups and individuals subjected to intergroup conflict make decisions after an in-group deliberative discussion. Additionally, the increased rationality of the group decision making after the deliberative discussion is transferred to subsequent individual decision making.

  6. Intergroup Conflict and Rational Decision Making

    Science.gov (United States)

    Martínez-Tur, Vicente; Peñarroja, Vicente; Serrano, Miguel A.; Hidalgo, Vanesa; Moliner, Carolina; Salvador, Alicia; Alacreu-Crespo, Adrián; Gracia, Esther; Molina, Agustín

    2014-01-01

    The literature has been relatively silent about post-conflict processes. However, understanding the way humans deal with post-conflict situations is a challenge in our societies. With this in mind, we focus the present study on the rationality of cooperative decision making after an intergroup conflict, i.e., the extent to which groups take advantage of post-conflict situations to obtain benefits from collaborating with the other group involved in the conflict. Based on dual-process theories of thinking and affect heuristic, we propose that intergroup conflict hinders the rationality of cooperative decision making. We also hypothesize that this rationality improves when groups are involved in an in-group deliberative discussion. Results of a laboratory experiment support the idea that intergroup conflict –associated with indicators of the activation of negative feelings (negative affect state and heart rate)– has a negative effect on the aforementioned rationality over time and on both group and individual decision making. Although intergroup conflict leads to sub-optimal decision making, rationality improves when groups and individuals subjected to intergroup conflict make decisions after an in-group deliberative discussion. Additionally, the increased rationality of the group decision making after the deliberative discussion is transferred to subsequent individual decision making. PMID:25461384

  7. Intergroup conflict and rational decision making.

    Directory of Open Access Journals (Sweden)

    Vicente Martínez-Tur

    Full Text Available The literature has been relatively silent about post-conflict processes. However, understanding the way humans deal with post-conflict situations is a challenge in our societies. With this in mind, we focus the present study on the rationality of cooperative decision making after an intergroup conflict, i.e., the extent to which groups take advantage of post-conflict situations to obtain benefits from collaborating with the other group involved in the conflict. Based on dual-process theories of thinking and affect heuristic, we propose that intergroup conflict hinders the rationality of cooperative decision making. We also hypothesize that this rationality improves when groups are involved in an in-group deliberative discussion. Results of a laboratory experiment support the idea that intergroup conflict -associated with indicators of the activation of negative feelings (negative affect state and heart rate- has a negative effect on the aforementioned rationality over time and on both group and individual decision making. Although intergroup conflict leads to sub-optimal decision making, rationality improves when groups and individuals subjected to intergroup conflict make decisions after an in-group deliberative discussion. Additionally, the increased rationality of the group decision making after the deliberative discussion is transferred to subsequent individual decision making.

  8. On the Ergodic Secret-Key Agreement over Spatially Correlated Multiple-Antenna Channels with Public Discussion

    KAUST Repository

    Zorgui, Marwen

    2015-09-28

    We consider secret-key agreement with public discussion over multiple-input multiple-output (MIMO) Rayleigh fast-fading channels under correlated environment. We assume that transmit, legitimate receiver and eavesdropper antennas are correlated. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the correlation matrices. First, we derive the expression of the secret-key capacity under the considered setup. We prove that the optimal transmit strategy achieving the secret-key capacity consists in transmitting independent Gaussian signals along the eingenvectors of the transmit correlation matrix. The powers allocated to each channel mode are determined as the solution to a numerical optimization problem. A necessary and sufficient condition for beamforming (i.e., transmitting along the strongest channel mode) to be capacity-achieving is derived. Moreover, we analyze the impact of correlation matrices on the system performance. Finally, we study the system’s performance in the two extreme power regimes. In the high-power regime, we provide closed-form expressions of the gain/loss due to correlation. In the low signal-to-noise ratio (SNR) regime, we investigate the energy efficiency of the system by determining the minimum energy required for sharing a secret-key bit and the wideband slope while highlighting the impact of correlation matrices.

  9. Rational customs clearance technology choice

    OpenAIRE

    Shramenko, N.; Andriets, V.

    2008-01-01

    Issues concerning cargo delivery efficiencyincrease by choice of rational customs clearance technology have been considered. Three possible variants of customs clearance andmethods which allow to define the most rational version of cargo delivery in international road communication based on main efficiency criteria for definite distance have been presented.

  10. Interactions in multiagent systems fairness, social optimality and individual rationality

    CERN Document Server

    Hao, Jianye

    2016-01-01

    This book mainly aims at solving the problems in both cooperative and competitive multi-agent systems (MASs), exploring aspects such as how agents can effectively learn to achieve the shared optimal solution based on their local information and how they can learn to increase their individual utility by exploiting the weakness of their opponents. The book describes fundamental and advanced techniques of how multi-agent systems can be engineered towards the goal of ensuring fairness, social optimality, and individual rationality; a wide range of further relevant topics are also covered both theoretically and experimentally. The book will be beneficial to researchers in the fields of multi-agent systems, game theory and artificial intelligence in general, as well as practitioners developing practical multi-agent systems.

  11. Cognitive Rationality and Its Logic-Mathematical Language

    Science.gov (United States)

    Masalova, Svetlana

    2012-01-01

    The article deals with the cognitive (flexible) rationality, combining rational and irrational moments of the scientific search of the cognizing subject. Linguo-cognitive model of the concept as the flexible regulative rationality reveals the activity of the cognitive processes and the mentality of the epistemological-ontic subject, its leading…

  12. Secrets of mlearning failures: confronting reality

    Directory of Open Access Journals (Sweden)

    Thomas Cochrane

    2012-08-01

    Full Text Available Having implemented and evaluated over 35 mlearning projects in a variety of contexts in higher education over the past 6 years the researcher is ready to share the untold secret: not all mlearning projects succeed! This article critiques three of the researcher's mlearning projects that can be classed as “failures” and compares them to successful projects to draw out critical implications for mlearning project design and implementation to avoid common pitfalls leading to potential project failure. This article uses the researcher's six critical success factors identified across the 35 mlearning projects to evaluate these three projects, and concludes that projects resulting in “no significant difference” in pedagogical outcomes are the result of attempts to shoehorn old pedagogies into new technologies. Lecturer professional development and sustained collaborative support are critical to fostering new pedagogies utilising the unique affordances of mobile devices.

  13. RSA-Based Secret Handshakes

    OpenAIRE

    Vergnaud , Damien

    2006-01-01

    A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, Smetters, Staddon and Wong and, so far, all the schemes proposed are based on discrete log systems. This paper proposes three new secret handshake protocols secure against active impersonator and detector adversaries. Inspired by two RSA-based key agreement protocols introduced by Okamoto and Tanaka in 1989 and Gira...

  14. Technique on rationalization of using electricity and cases

    International Nuclear Information System (INIS)

    1988-04-01

    This book deals with rationalization of using electric and cases. It is divided into four parts. The first part introduces necessity and of progression rationalization of using electric. The second part describes the technique on rationalization of using electric with management of electric energy. The third part depicts domestic cases of rationalization on using of electric such as substation and motor. The last part also introduces foreign cases of rationalization on using of electric with measure of generator circuit, design of motor, design of lighting and design of other equipment.

  15. Book Selection, Collection Development, and Bounded Rationality.

    Science.gov (United States)

    Schwartz, Charles A.

    1989-01-01

    Reviews previously proposed schemes of classical rationality in book selection, describes new approaches to rational choice behavior, and presents a model of book selection based on bounded rationality in a garbage can decision process. The role of tacit knowledge and symbolic content in the selection process are also discussed. (102 references)…

  16. Love and rationality: on some possible rational effects of love

    Directory of Open Access Journals (Sweden)

    Gustavo Ortiz-Millán

    2007-01-01

    Full Text Available In this paper I defend the idea that rather than disrupting rationality, as the common-sense conception has done it, love may actually help us to develop rational ways of thinking and acting. I make the case for romantic or erotic love, since this is the kind of love that is more frequently associated with irrationality in acting and thinking. I argue that this kind of love may make us develop epistemic and practical forms of rationality. Based on an analysis of its characteristic action tendencies, I argue that love may help us to develop an instrumental form of rationality in determining the best means to achieve the object of love. It may also narrow down the number of practical considerations that may help us to achieve our goals. Finally, love may generate rational ways of belief-formation by framing the parameters taken into account in perception and attention, and by bringing into light only a small portion of the epistemic information available. Love may make us perceive reality more acutely.Neste artigo defendo a idéia de que, em vez de perturbar a racionalidade, como a concepção do senso comum o faz, o amor pode, na verdade, ajudar-nos a desenvolver modos racionais de pensar e agir. Dou bons argumentos para o amor romântico ou erótico, uma vez que esse é o tipo de amor que é mais freqüentemente associado à irracionalidade no agir e no pensar. Argumento que esse tipo de amor pode fazer-nos desenvolver formas epistêmicas e práticas de racionalidade. Com base em uma análise de suas tendências características para a ação, argumento que o amor pode ajudar-nos a desenvolver uma forma instrumental de racionalidade para se determinar o melhor meio de atingir o objeto de amor. Ele também pode limitar o número de considerações práticas que podem ajudar-nos a atingir os nossos objetivos. Finalmente, o amor pode gerar modos racionais de formação de crenças ao estruturar os parâmetros considerados na percepção e na aten

  17. A discussion of theoretical and practical rationality

    Energy Technology Data Exchange (ETDEWEB)

    Wahlstroem, B. [Technical Research Centre of Finland, Espoo (Finland). VTT Automation

    1999-12-01

    Theoretical rationality as defined in Expected Utility Theory and amended with other considerations gives a good basis for decision making. One should however always keep in mind that practical rationality often is far more complicated. People use their everyday experience when placed before new problems and this may lead to apparently irrational choices which on a closer scrutiny may be completely rational. Theories in human decision making unfortunately becomes untestable, firstly because a theory taking all considerations into account would be to complex to be practical and secondly because the data needed to test the theory cannot be collected. The benefit of EUT is that it is simple and straightforward as compared with competing theories. In the natural sciences rationality is often seen simply as a problem of optimisation. This view is practical, but it has to include also psychological and sociological considerations. The apparent controversy between natural and behavioural sciences could at least in principle be resolved by a better understanding of the complexity of human rationality. The human mind does not work in isolation, but it is adapted to a social community and a continuously changing environment. Understanding all components of human rationality is a challenge which cannot be solved on a short term basis. An important part of human rationality is connected to the intricate balance between individual and societal utility. The human mind has over thousands of years learnt to resolve that balance, but in the modern society there are decisions which may not be solvable with an intuitive approach and a strategy of trial and error. For these decisions more solid theories of rationality will be needed. EUT can in spite of its dismerits be used as the backbone for such a theory, but it has to be extended with better explanations of both individual and social rationality. If this understanding of the practical aspects of human rationality can be reached

  18. A discussion of theoretical and practical rationality

    International Nuclear Information System (INIS)

    Wahlstroem, B.

    1999-01-01

    Theoretical rationality as defined in Expected Utility Theory and amended with other considerations gives a good basis for decision making. One should however always keep in mind that practical rationality often is far more complicated. People use their everyday experience when placed before new problems and this may lead to apparently irrational choices which on a closer scrutiny may be completely rational. Theories in human decision making unfortunately becomes untestable, firstly because a theory taking all considerations into account would be to complex to be practical and secondly because the data needed to test the theory cannot be collected. The benefit of EUT is that it is simple and straightforward as compared with competing theories. In the natural sciences rationality is often seen simply as a problem of optimisation. This view is practical, but it has to include also psychological and sociological considerations. The apparent controversy between natural and behavioural sciences could at least in principle be resolved by a better understanding of the complexity of human rationality. The human mind does not work in isolation, but it is adapted to a social community and a continuously changing environment. Understanding all components of human rationality is a challenge which cannot be solved on a short term basis. An important part of human rationality is connected to the intricate balance between individual and societal utility. The human mind has over thousands of years learnt to resolve that balance, but in the modern society there are decisions which may not be solvable with an intuitive approach and a strategy of trial and error. For these decisions more solid theories of rationality will be needed. EUT can in spite of its dismerits be used as the backbone for such a theory, but it has to be extended with better explanations of both individual and social rationality. If this understanding of the practical aspects of human rationality can be reached

  19. Novel Kazal-type proteinase inhibitors from the skin secretion of the Splendid leaf frog, Cruziohyla calcarifer

    Directory of Open Access Journals (Sweden)

    Carolina Proaño-Bolaños

    2017-06-01

    Full Text Available Peptidase inhibitors have an important role controlling a variety of biological processes. Here, we employed a peptidomic approach including molecular cloning, tandem mass spectrometry and enzymatic assays to reveal 7 Kazal-type proteinase inhibitors (CCKPs (18 variants in the skin secretion of the unexplored frog, Cruziohyla calcarifer. All 18 proteins shared the Kazal pattern C-X(7-C-X(6,7-C-X(6,7-Y-X(3-C-X(2-C-X(15-21-C and 3 disulphide bridges. Based on structural comparative analysis, we deemed trypsin and chymotrypsin inhibitory activity in CCKP-1, 4 and CCKP 2, 5, 7, respectively. These peptidase inhibitors presumably play a role to control the balance between other functional peptides produced in the amphibian skin secretions.

  20. THE HICKSIAN RATIONAL CONSUMER

    OpenAIRE

    Manuel FERNÁNDEZ-GRELA

    2005-01-01

    The aim of this paper is to trace the evolution of the concept of ''rational consumer'' in Hicks's writings. After being one of the pioneers in the introduction of rationality assumptions about consumer behaviour in economic models, Hicks gradually developed a sceptical view about some of the uses to which those assumptions were put into. The focus of the paper is on continuity in Hicksian views, providing a picture of gradual changes in the long series of Hicks's works

  1. Quantitative proteomic analysis reveals effects of epidermal growth factor receptor (EGFR) on invasion-promoting proteins secreted by glioblastoma cells.

    Science.gov (United States)

    Sangar, Vineet; Funk, Cory C; Kusebauch, Ulrike; Campbell, David S; Moritz, Robert L; Price, Nathan D

    2014-10-01

    Glioblastoma multiforme is a highly invasive and aggressive brain tumor with an invariably poor prognosis. The overexpression of epidermal growth factor receptor (EGFR) is a primary influencer of invasion and proliferation in tumor cells and the constitutively active EGFRvIII mutant, found in 30-65% of Glioblastoma multiforme, confers more aggressive invasion. To better understand how EGFR contributes to tumor aggressiveness, we investigated the effect of EGFR on the secreted levels of 65 rationally selected proteins involved in invasion. We employed selected reaction monitoring targeted mass spectrometry using stable isotope labeled internal peptide standards to quantity proteins in the secretome from five GBM (U87) isogenic cell lines in which EGFR, EGFRvIII, and/or PTEN were expressed. Our results show that cell lines with EGFR overexpression and constitutive EGFRvIII expression differ remarkably in the expression profiles for both secreted and intracellular signaling proteins, and alterations in EGFR signaling result in reproducible changes in concentrations of secreted proteins. Furthermore, the EGFRvIII-expressing mutant cell line secretes the majority of the selected invasion-promoting proteins at higher levels than other cell lines tested. Additionally, the intracellular and extracellular protein measurements indicate elevated oxidative stress in the EGFRvIII-expressing cell line. In conclusion, the results of our study demonstrate that EGFR signaling has a significant effect on the levels of secreted invasion-promoting proteins, likely contributing to the aggressiveness of Glioblastoma multiforme. Further characterization of these proteins may provide candidates for new therapeutic strategies and targets as well as biomarkers for this aggressive disease. © 2014 by The American Society for Biochemistry and Molecular Biology, Inc.

  2. Coping More Effectively Through Rational Self-Counseling.

    Science.gov (United States)

    Rogers, George W., Jr.

    1981-01-01

    Rational Self-Counseling, a variation of rational-emotive therapy, is a self-help therapeutic technique in which students are encouraged to be responsible for their own behavior and emotions. The primary function of self-counseling is to evaluate whether thoughts are rational. A list of questions which students might ask themselves is presented.…

  3. Freedom and Rationality : Rousseau on Citizenship

    OpenAIRE

    Salvat, Christophe

    2008-01-01

    This paper deals with Rousseau's idea of freedom in terms of rationality and deliberation. It gives support to Berlin's interpretation of the general will as a rational and objective will but dismisses the idea that Rousseau's theory necessarily leads to authoritarianism. The general will, publicly expressed by the law, may be defined as the rational and self-regarding will agents would have if put in an independent and objective state, i.e. the state of nature. The general and the particular...

  4. Rational choice in field archaelology

    Directory of Open Access Journals (Sweden)

    Cătălin Pavel

    2011-11-01

    Full Text Available In the present article I attempt to apply advances in the study of instrumental and epistemic rationality to field archaeology in order to gain insights into the ways archaeologists reason. The cognitive processes, particularly processes of decision making, that enable archaeologists to conduct the excavation in the trench have not been adequately studied so far. I take my cues from two different bodies of theory. I first inquire into the potential that rational choice theory (RCT may have in modeling archaeological behaviour, and I define subjective expected utility, which archaeologists attempt to maximize, in terms of knowledge acquisition and social gain. Following Elster’s criticism of RCT, I conclude that RCT’s standards for rational action do not correspond with those ostensibly used in field archaeology, but that instrumental rationality has a prominent role in the “archaeological experiment”. I further explore if models proposed as reaction to RCT may account for archaeological decision making. I focus on fast and frugal heuristics, and search for archaeological illustrations for some of the cognitive biases that are better documented in psychological literature. I document confirmation and congruence biases, the endowment effect, observer-expectancy bias, illusory correlation, clustering illusion, sunk cost bias, and anchoring, among others and I propose that some of these biases are used as cognitive tools by archaeologists at work and retain epistemic value. However, I find formal logic to be secondary in the development of archaeological reasoning, with default logic and defeasible logic being used instead. I emphasize scientific knowledge as an actively negotiated social product of human inquiry, and conclude that to describe rationality in field archaeology a bounded rationality model is the most promising avenue of investigation.

  5. The rational maps Fλ(z)

    Indian Academy of Sciences (India)

    It is proved that the rational maps in the family {z → zm +λ/zd : λ ∈ C\\{0}} for integers m, d ≥ 2 ... The problem of the existence of Herman rings of a rational map has been studied by. Lyubich in [9] ..... Surveys 41(4) (1986) 35–95. [10] Milnor J ...

  6. Heterogeneity and the (de)stabilizing role of rationality

    International Nuclear Information System (INIS)

    Cavalli, Fausto; Naimzada, Ahmad; Pireddu, Marina

    2015-01-01

    Highlights: • We analyze Cournot oligopolies with heterogeneous firms of generic size. • Rational and naive players are considered. • Stability with respect to oligopoly composition is studied. • In some settings, increasing the rational firms fraction introduces instability. - Abstract: In this paper we study oligopolies of generic size consisting of heterogeneous firms, which adopt best response adjustment mechanisms with either perfect foresight (rational firms) or static expectations (naive firms). Assuming an isoelastic demand function and possibly different marginal costs for the two groups of firms, we focus on the local stability of the Nash equilibrium. We show that, with respect to the oligopoly composition, described in terms of the fraction of rational firms, different scenarios are possible. We find that a high rationality degree may not always guarantee stability, in particular when rational firms have sufficiently larger marginal costs. In fact, in this situation, increasing the fraction of rational firms can even introduce instability. Besides the usual scenarios in which replacing some naive firms with rational ones leads to a stabilization of (or at least keeps unchanged) the dynamics, we provide a family of situations, characterized by costs ratio favorable to naive firms, in which equilibrium loses its stability when naive firms are replaced by rational ones. The results we present are both analytical and simulative.

  7. Rationality and the Logic of Good Reasons.

    Science.gov (United States)

    Fisher, Walter R.

    This paper contends that the rationality of the logic of good reasons is constituted in its use. To support this claim, the paper presents an analysis of the relationship between being reasonable and being rational. It then considers how following the logic of good reasons leads to rationality in the behavior of individuals and groups; the latter…

  8. Rationality, mental causation and social sciences

    OpenAIRE

    Mladenović Ivan

    2009-01-01

    The aim of this paper is to investigate the role of mental causation in the context of rational choice theory. The author defends psychological aspect of rational explanation against the challenge of contemporary reductive materialism.

  9. Physiological responses to rational-emotive self-verbalizations.

    Science.gov (United States)

    Master, S; Gershman, L

    1983-12-01

    This study tested Albert Ellis' Rational Emotive Therapy (RET) theory which predicts that cognitive beliefs, not the stimulus situation, generate human emotions. According to RET, emotions created by rational beliefs are adaptive, while irrational beliefs result in an unadaptive anxiety level. Results demonstrated that at high levels of problem relevance there was (1) a significantly greater GSR in direct response to the stimulus situation, and also to irrational statements, than to rational and control statements, and (2) no significant difference between rational and neutral control statements. The authors argue that these results are more parsimoniously explained by conditioning theory than by RET theory.

  10. Towards a Characterization of Rational Expectations

    OpenAIRE

    Itai Arieli

    2008-01-01

    R. J. Aumann and J. H. Drèze (2008) define a rational expectation of a player i in a game G as the expected payo of some type of i in some belief system for G in which common knowledge of rationality and common priors obtain. Our goal is to characterize the set of rational expectations in terms of the game's payoff matrix. We provide such a characterization for a specific class of strategic games, called semi-elementary, which includes Myerson's "elementary" games.

  11. Rational inattention or rational overreaction?

    DEFF Research Database (Denmark)

    Browning, Martin; Hansen, Lars Gårn; Smed, Sinne

    We investigate differences in how consumers of fish react to health information in the mass media. We specify a dynamic empirical model that allows for heterogeneity in all basic parameters of consumer behavior as well as in how consumers react to information. We estimate the model using a unique...... houshold panel tracking consumption, prices, news stories and media habits over 24 quarters. We fi nd that the consumers most likely to be ’rationally ignorant’ of health effects react more dramatically to health news than the consumers who most likely are well informed....

  12. Rationality, mental causation and social sciences

    Directory of Open Access Journals (Sweden)

    Mladenović Ivan

    2009-01-01

    Full Text Available The aim of this paper is to investigate the role of mental causation in the context of rational choice theory. The author defends psychological aspect of rational explanation against the challenge of contemporary reductive materialism.

  13. Pandemic ventilator rationing and appeals processes.

    Science.gov (United States)

    Patrone, Daniel; Resnik, David

    2011-06-01

    In a severe influenza pandemic, hospitals will likely experience serious and widespread shortages of patient pulmonary ventilators and of staff qualified to operate them. Deciding who will receive access to mechanical ventilation will often determine who lives and who dies. This prospect raises an important question whether pandemic preparedness plans should include some process by which individuals affected by ventilator rationing would have the opportunity to appeal adverse decisions. However, the issue of appeals processes to ventilator rationing decisions has been largely neglected in state pandemic planning efforts. If we are to devise just and effective plans for coping with a severe influenza pandemic, more attention to the issue of appeals processes for pandemic ventilator rationing decisions is needed. Arguments for and against appeals processes are considered, and some suggestions are offered to help efforts at devising more rational pandemic preparedness plans.

  14. Enhanced Load Power Sharing Accuracy in Droop-Controlled DC Microgrids with Both Mesh and Radial Configurations

    Directory of Open Access Journals (Sweden)

    Yiqi Liu

    2015-04-01

    Full Text Available The rational power sharing among different interface converters should be determined by the converter capacity. In order to guarantee that each converter operates at the ideal condition, considering the radial and mesh configuration, a modified strategy for load power sharing accuracy enhancement in droop-controlled DC microgrid is proposed in this paper. Two compensating terms which include averaging output power control and averaging DC voltage control of neighboring converters are employed. Since only the information of the neighboring converter is used, the complexity of the communication network can be reduced. The rational distribution of load power for different line resistance conditions is realized by using modified droop control that can be regarded as a distributed approach. Low bandwidth communication is used for exchanging sampled information between different converters. The feasibility and effectiveness of the proposed method for different network configurations and line resistances under different communication delay is analyzed in detail. Simulation results derived from a DC microgrid with three converters is implemented in MATLAB/Simulink to verify the proposed approach. Experimental results from a 3 × 10 kW prototype also show the performance of the proposed modified droop control scheme.

  15. RATIONAL APPROXIMATIONS TO GENERALIZED HYPERGEOMETRIC FUNCTIONS.

    Science.gov (United States)

    Under weak restrictions on the various free parameters, general theorems for rational representations of the generalized hypergeometric functions...and certain Meijer G-functions are developed. Upon specialization, these theorems yield a sequency of rational approximations which converge to the

  16. Many faces of rationality: Implications of the great rationality debate for clinical decision-making

    OpenAIRE

    Djulbegovic, B.; Elqayam, Shira

    2017-01-01

    open access article Given that more than 30% of healthcare costs are wasted on inappropriate care, suboptimal care is increasingly connected to the quality of medical decisions. It has been argued that personal decisions are the leading cause of death, and 80% of healthcare expenditures result from physicians' decisions. Therefore, improving healthcare necessitates improving medical decisions, ie, making decisions (more) rational. Drawing on writings fromThe Great Rationality Debate from t...

  17. Rationalizing the Promotion of Non-Rational Behaviors in Organizations.

    Science.gov (United States)

    Smith, Peter A. C.; Sharma, Meenakshi

    2002-01-01

    Organizations must balance rational/technical efficiency and emotions. Action learning has been proven to be effective for developing emotional openness in the workplace. Facilitators of action learning should draw upon the disciplines of counseling, Gestalt, psychodynamics, and Eastern philosophies. (Contains 23 references.) (SK)

  18. Generalized NLS hierarchies from rational W algebras

    International Nuclear Information System (INIS)

    Toppan, F.

    1993-11-01

    Finite rational W algebras are very natural structures appearing in coset constructions when a Kac-Moody subalgebra is factored out. The problem of relating these algebras to integrable hierarchies of equations is studied by showing how to associate to a rational W algebra its corresponding hierarchy. Two examples are worked out, the sl(2)/U(1) coset, leading to the Non-Linear Schroedinger hierarchy, and the U(1) coset of the Polyakov-Bershadsky W algebra, leading to a 3-field representation of the KP hierarchy already encountered in the literature. In such examples a rational algebra appears as algebra of constraints when reducing a KP hierarchy to a finite field representation. This fact arises the natural question whether rational algebras are always associated to such reductions and whether a classification of rational algebras can lead to a classification of the integrable hierarchies. (author). 19 refs

  19. Glucagon-like peptide-1 secretion in women with gestational diabetes mellitus during and after pregnancy.

    Science.gov (United States)

    Lencioni, C; Resi, V; Romero, F; Lupi, R; Volpe, L; Bertolotto, A; Ghio, A; Del Prato, S; Marchetti, P; Di Cianni, G

    2011-10-01

    Gestational diabetes mellitus (GDM) predisposes women to future development of Type 2 diabetes mellitus (DM2) and the two conditions share similar metabolic alterations. Recent observations suggest that a defective glucose stimulated insulin secretion by glucagon-like peptide-1 (GLP- 1) plays a role in the pathogenesis of DM2. Whether such a defect is impaired in GDM remains to be ascertained. We have determined GLP-1 secretion in response to oral glucose tolerance test (OGTT) in GDM and normal glucose tolerance (NGT) during and after pregnancy. 100-g-3h OGTT was performed in 12 GDM and 16 NGT women at 27.3 ± 4.1 weeks of gestation, for determination of plasma GLP-1, glucose, insulin, and C-peptide. Insulin sensitivity (ISI) and insulin secretion (first and second phase); as well as ISI-secretion index (ISSI) were also derived. NGT and GDM women were comparable for age pre-pregnancy body mass index (BMI) and weight gain. GDM had higher glucose area under the curve (AUC): 27,575.5 ± 3448 vs 20,685.88 ± 2715 mg/dl min (pwomen (2542 ± 273 vs 10,092 ± 7367 pmol·l-1·min-1, pwomen is inadequate for the prevailing glycemic levels both in pregnancy and post partum. Moreover, we cannot exclude that other important aspects of the incretin effect may be involved in GDM development.

  20. Secretion management in the mechanically ventilated patient.

    Science.gov (United States)

    Branson, Richard D

    2007-10-01

    Secretion management in the mechanically ventilated patient includes routine methods for maintaining mucociliary function, as well as techniques for secretion removal. Humidification, mobilization of the patient, and airway suctioning are all routine procedures for managing secretions in the ventilated patient. Early ambulation of the post-surgical patient and routine turning of the ventilated patient are common secretion-management techniques that have little supporting evidence of efficacy. Humidification is a standard of care and a requisite for secretion management. Both active and passive humidification can be used. The humidifier selected and the level of humidification required depend on the patient's condition and the expected duration of intubation. In patients with thick, copious secretions, heated humidification is superior to a heat and moisture exchanger. Airway suctioning is the most important secretion removal technique. Open-circuit and closed-circuit suctioning have similar efficacy. Instilling saline prior to suctioning, to thin the secretions or stimulate a cough, is not supported by the literature. Adequate humidification and as-needed suctioning are the foundation of secretion management in the mechanically ventilated patient. Intermittent therapy for secretion removal includes techniques either to simulate a cough, to mechanically loosen secretions, or both. Patient positioning for secretion drainage is also widely used. Percussion and postural drainage have been widely employed for mechanically ventilated patients but have not been shown to reduce ventilator-associated pneumonia or atelectasis. Manual hyperinflation and insufflation-exsufflation, which attempt to improve secretion removal by simulating a cough, have been described in mechanically ventilated patients, but neither has been studied sufficiently to support routine use. Continuous lateral rotation with a specialized bed reduces atelectasis in some patients, but has not been shown

  1. Do Librarians Have a Shared Set of Values? A Comparative Study of 36 Codes of Ethics Based on Gorman's "Enduring Values"

    Science.gov (United States)

    Foster, Catherine; McMenemy, David

    2012-01-01

    Thirty-six ethical codes from national professional associations were studied, the aim to test whether librarians have global shared values or if political and cultural contexts have significantly influenced the codes' content. Gorman's eight core values of stewardship, service, intellectual freedom, rationalism, literacy and learning, equity of…

  2. Lying for the Greater Good: Bounded Rationality in a Team

    Directory of Open Access Journals (Sweden)

    Oktay Sürücü

    2014-10-01

    Full Text Available This paper is concerned with the interaction between fully and boundedly rational agents in situations where their interests are perfectly aligned. The cognitive limitations of the boundedly rational agent do not allow him to fully understand the market conditions and lead him to take non-optimal decisions in some situations. Using categorization to model bounded rationality, we show that the fully rational agent can nudge, i.e., he can manipulate the information he sends and decrease the expected loss caused by the boundedly rational agent. Assuming different types for the boundedly rational agent, who differ only in the categories used, we show that the fully rational agent may learn the type of the boundedly rational agent along their interaction. Using this additional information, the outcome can be improved and the amount of manipulated information can be decreased. Furthermore, as the length of the interaction increases the probability that the fully rational agent learns the type of the boundedly rational agent grows

  3. Incretin secretion: direct mechanisms

    DEFF Research Database (Denmark)

    Balk-Møller, Emilie; Holst, Jens Juul; Kuhre, Rune Ehrenreich

    2014-01-01

    The incretin hormones glucose-dependent insulinotropic polypeptide (GIP) and glucagon-like peptide 1 (GLP-1) are secreted from gastro-intestinal K- and L-cells, respectively, and play an important role in post-prandial blood glucose regulation. They do this by direct stimulation of the pancreatic β...... enzyme responsible for incretin degradation (dipeptidyl peptidase-4) is inhibited (drugs are already on the market) while the secretion of endogenous GLP-1 secretion is stimulated at the same time may prove particularly rewarding. In this section we review current knowledge on the mechanisms for direct...

  4. Pro-environmental behavior: rational choice meets moral motivation.

    Science.gov (United States)

    Turaga, Rama Mohana R; Howarth, Richard B; Borsuk, Mark E

    2010-01-01

    The determinants of individual behaviors that provide shared environmental benefits are a longstanding theme in social science research. Alternative behavioral models yield markedly different predictions and policy recommendations. This paper reviews and compares the literatures from two disciplines that appear to be moving toward a degree of convergence. In social psychology, moral theories of pro-environmental behavior have focused on the influence of personal moral norms while recognizing that external factors, such as costs and incentives, ultimately limit the strength of the norm-behavior relationship. Rational choice models, such as the theory of planned behavior in social psychology and the theories of voluntary provision of public goods in economics, have sought to incorporate the effects of personal norms and to measure their importance in explaining behaviors, such as recycling and the demand for green products. This paper explores the relationship between these approaches and their implications for the theory and practice of ecological economics.

  5. Normative and descriptive rationality: from nature to artifice and back

    Science.gov (United States)

    Besold, T. R.; Uckelman, S. L.

    2018-03-01

    Rationality plays a key role in both the study of human reasoning and Artificial Intelligence (AI). Certain notions of rationality have been adopted in AI as guides for the development of intelligent machines and these notions have been given a normative function. The notions of rationality in AI are often taken to be closely related to conceptions of rationality in human contexts. In this paper, we argue that the normative role of rationality differs in the human and artificial contexts. While rationality in human-focused fields of study is normative, prescribing how humans ought to reason, the normative conception in AI is built on a notion of human rationality which is descriptive, not normative, in the human context, as AI aims at building agents which reason as humans do. In order to make this point, we review prominent notions of rationality used in psychology, cognitive science, and (the history of) philosophy, as well as in AI, and discuss some factors that contributed to rationality being assigned the differing normative statuses in the differing fields of study. We argue that while 'rationality' is a normative notion in both AI and in human reasoning, the normativity of the AI conception of 'rationality' is grounded in a descriptive account of human rationality.

  6. Momentum effect in stocks’ returns between the rational and the behavioural financial theories: Proposition of the progressive rationality

    Directory of Open Access Journals (Sweden)

    Faten Zoghlami

    2013-01-01

    Full Text Available     The puzzling momentum strategies’ payoffs defied the rational financial theory asserting the stocks returns’ unpredictability. Moreover, the momentum effect persist the main stocks returns’ anomaly escaping any risk-based explanation. The resilience of this phenomenon had favoured the development of behavioural financial field, which breaks with the investor’ full rationality hypothesis. This paper attempts to reconcile between the rational and behavioural financial theories, through the introduction of the progressive rationality concept. Especially, we argue that recognizing the temporary inappropriate investors’ reactions; can resolve the puzzling momentum anomaly. To fulfil our objective, we identify the appropriate autoregressive level that captures the significant autocorrelations involved by the investors’ over and under reactions. Then, we explore the profitability of the 6/6 momentum strategy implemented on the adjusted stocks’ returns. The adjusted momentum strategy is still profitable but no longer puzzling, since the related excess return is henceforth fully captured by a β and a size effect.Key words: Tunisian momentum effect, the rational finance theory, the behavioural finance theory, the three-factorial model and the autoregressive process.

  7. Sharing cost in social community networks

    DEFF Research Database (Denmark)

    Pal, Ranjan; Elango, Divya; Wardana, Satya Ardhy

    2012-01-01

    their deployment in a residential locality. Our proposed mechanism accounts for heterogeneous user preferences towards different router features and comes up with the optimal (feature-set, user costs) router blueprint that satisfies each user in a locality, in turn motivating them to buy routers and thereby improve......Wireless social community networks (WSCNs) is an emerging technology that operate in the unlicensed spectrum and have been created as an alternative to cellular wireless networks for providing low-cost, high speed wireless data access in urban areas. WSCNs is an upcoming idea that is starting...... reflect their slow progress in capturing the WiFi router market. In this paper, we look at a router design and cost sharing problem in WSCNs to improve deployment. We devise a simple to implement, successful, budget-balanced, ex-post efficient, and individually rational auction-based mechanism...

  8. Neurophysiology and Rationality in Political Thinking.

    Science.gov (United States)

    Peterson, Steven A.

    Research both in cognitive psychology and psychobiology suggests that political behavior is often less rational than individuals believe it to be. Information processing, memory, and decision making are interlinked processes. Studies in cognitive psychology reveal that even though decision making requires rationality, individuals often adopt…

  9. Water and Benefit Sharing in Transboundary River Basins

    Science.gov (United States)

    Arjoon, D.; Tilmant, A.; Herrmann, M.

    2015-12-01

    Growing water scarcity underlies the importance of cooperation for the effective management of river basins, particularly in the context of international rivers in which unidirectional externalities can lead to asymmetric relationships between riparian countries. Studies have shown that significant economic benefits can be expected through basin-wide cooperation, however, the equitable partitioning of these benefits over the basin is less well studied and tends to overlook the importance of stakeholder input in the definition of equitability. In this study, an institutional arrangement to maximize welfare and then share the scarcity cost in a river basin is proposed. A river basin authority plays the role of a bulk water market operator, efficiently allocating bulk water to the users and collecting bulk water charges which are then equitably redistributed among water users. This highly regulated market restrains the behaviour of water users to control externalities and to ensure basin-wide coordination, enhanced efficiency, and the equitable redistribution of the scarcity cost. The institutional arrangement is implemented using the Eastern Nile River basin as a case study. The importance of this arrangement is that it can be adopted for application in negotiations to cooperate in trans-boundary river basins. The benefit sharing solution proposed is more likely to be perceived as equitable because water users help define the sharing rule. As a result, the definition of the sharing rule is not in question, as it would be if existing rules, such as bankruptcy rules or cooperative game theory solutions, are applied, with their inherent definitions of fairness. Results of the case study show that the sharing rule is predictable. Water users can expect to receive between 93.5% and 95% of their uncontested benefits (benefits that they expect to receive if water was not rationed), depending on the hydrologic scenario.

  10. Positroids Induced by Rational Dyck Paths

    OpenAIRE

    Gotti, Felix

    2017-01-01

    A rational Dyck path of type $(m,d)$ is an increasing unit-step lattice path from $(0,0)$ to $(m,d) \\in \\mathbb{Z}^2$ that never goes above the diagonal line $y = (d/m)x$. On the other hand, a positroid of rank $d$ on the ground set $[d+m]$ is a special type of matroid coming from the totally nonnegative Grassmannian. In this paper we describe how to naturally assign a rank $d$ positroid on the ground set $[d+m]$, which we name rational Dyck positroid, to each rational Dyck path of type $(m,d...

  11. Rationalization and the Role of the School Counselor.

    Science.gov (United States)

    Clark, Arthur J.

    1995-01-01

    Examines rationalization in counselors' interactions with students, parents, and teachers--provides examples of each kind of interaction. Describes the dynamics of rationalization in the schools and outlines interventions that may be used with students, parents, and teachers. Also explores counselors' use of rationalization and gives examples of…

  12. Rationality in the Cryptographic Model

    DEFF Research Database (Denmark)

    Hubacek, Pavel

    This thesis presents results in the field of rational cryptography. In the first part we study the use of cryptographic protocols to avoid mediation and binding commitment when implementing game theoretic equilibrium concepts. First, we concentrate on the limits of cryptographic cheap talk...... to implement correlated equilibria of two-player strategic games in a sequentially rational way. We show that there exist two-player games for which no cryptographic protocol can implement the mediator in a sequentially rational way; that is, without introducing empty threats. In the context of computational...... with appealing economic applications. Our implementation puts forward a notion of cryptographically blinded games that exploits the power of encryption to selectively restrict the information available to players about sampled action profiles, such that these desirable equilibria can be stably achieved...

  13. Proposed standby gasoline rationing plan: public comments

    Energy Technology Data Exchange (ETDEWEB)

    1978-12-01

    Under the proposed plan, DOE would allocate ration rights (rights to purchase gasoline) to owners of registered vehicles. All vehicles in a given class would receive the same entitlement. Essential services would receive supplemental allotments of ration rights as pririty firms. Once every 3 months, ration checks would be mailed out to all vehicle registrants, allotting them a certain amount of ration rights. These checks would then be cashed at Coupon Issuance Points, where the bearer would receive ration coupons to be used at gasoline stations. Large users of gasoline could deposit their allotment checks in accounts at ration banks. Coupons or checks would be freely exchangeable in a white market. A certain percentage of the gasoline supply would be set aside in reserve for use in national emergencies. When the plan was published in the Federal Register, public comments were requested. DOE also solicited comments from private citizens, public interest groups, business and industry, state and local governments. A total of 1126 responses were reveived and these are analyzed in this paper. The second part of the report describes how the comments were classified, and gives a statistical breakdown of the major responses. The last section is a discussion and analysis of theissue raised by commenting agencies, firms, associations, and individuals. (MCW)

  14. Privacy-Enhancing Auctions Using Rational Cryptography

    DEFF Research Database (Denmark)

    Miltersen, Peter Bro; Nielsen, Jesper Buus; Triandopoulos, Nikolaos

    2009-01-01

    show how to use rational cryptography to approximately implement any given ex interim individually strictly rational equilibrium of such an auction without a trusted mediator through a cryptographic protocol that uses only point-to-point authenticated channels between the players. By “ex interim...

  15. Principles of Economic Rationality in Mice.

    Science.gov (United States)

    Rivalan, Marion; Winter, York; Nachev, Vladislav

    2017-12-12

    Humans and non-human animals frequently violate principles of economic rationality, such as transitivity, independence of irrelevant alternatives, and regularity. The conditions that lead to these violations are not completely understood. Here we report a study on mice tested in automated home-cage setups using rewards of drinking water. Rewards differed in one of two dimensions, volume or probability. Our results suggest that mouse choice conforms to the principles of economic rationality for options that differ along a single reward dimension. A psychometric analysis of mouse choices further revealed that mice responded more strongly to differences in probability than to differences in volume, despite equivalence in return rates. This study also demonstrates the synergistic effect between the principles of economic rationality and psychophysics in making quantitative predictions about choices of healthy laboratory mice. This opens up new possibilities for the analyses of multi-dimensional choice and the use of mice with cognitive impairments that may violate economic rationality.

  16. Decision Making: Rational, Nonrational, and Irrational.

    Science.gov (United States)

    Simon, Herbert A.

    1993-01-01

    Describes the current state of knowledge about human decision-making and problem-solving processes, explaining recent developments and their implications for management and management training. Rational goal-setting is the key to effective decision making and accomplishment. Bounded rationality is a realistic orientation, because the world is too…

  17. Trade Secrets in Life Science and Pharmaceutical Companies

    Science.gov (United States)

    Nealey, Tara; Daignault, Ronald M.; Cai, Yu

    2015-01-01

    Trade secret protection arises under state common law and state statutes. In general, a trade secret is information that is not generally known to the public and is maintained as a secret, and it provides a competitive advantage or economic benefit to the trade secret holder. Trade secrets can be worth tens or hundreds of millions of dollars, and damage awards in trade secret litigation have been high; often, there is a lot at stake. Obtaining a trade secret through “improper means” is misappropriation. If the alleged trade secret, however, was developed independently, known publicly, or not maintained as a secret, then those defenses may successfully overcome a claim for trade secret misappropriation. With today’s interconnectedness in the biotechnology and pharmaceutical fields, more collaborations, joint ventures, and outsourcing arrangements among firms, and increased mobility of employees’ careers, life science companies need to not only understand how to protect their trade secrets, but also know how to defend against a claim for trade secret theft. PMID:25414378

  18. Trade secrets in life science and pharmaceutical companies.

    Science.gov (United States)

    Nealey, Tara; Daignault, Ronald M; Cai, Yu

    2014-11-20

    Trade secret protection arises under state common law and state statutes. In general, a trade secret is information that is not generally known to the public and is maintained as a secret, and it provides a competitive advantage or economic benefit to the trade secret holder. Trade secrets can be worth tens or hundreds of millions of dollars, and damage awards in trade secret litigation have been high; often, there is a lot at stake. Obtaining a trade secret through "improper means" is misappropriation. If the alleged trade secret, however, was developed independently, known publicly, or not maintained as a secret, then those defenses may successfully overcome a claim for trade secret misappropriation. With today's interconnectedness in the biotechnology and pharmaceutical fields, more collaborations, joint ventures, and outsourcing arrangements among firms, and increased mobility of employees' careers, life science companies need to not only understand how to protect their trade secrets, but also know how to defend against a claim for trade secret theft. Copyright © 2015 Cold Spring Harbor Laboratory Press; all rights reserved.

  19. Simplifications of rational matrices by using UML

    OpenAIRE

    Tasić, Milan B.; Stanimirović, Ivan P.

    2013-01-01

    The simplification process on rational matrices consists of simplifying each entry represented by a rational function. We follow the classic approach of dividing the numerator and denominator polynomials by their common GCD polynomial, and provide the activity diagram in UML for this process. A rational matrix representation as the quotient of a polynomial matrix and a polynomial is also discussed here and illustrated via activity diagrams. Also, a class diagram giving the links between the c...

  20. Local Choices: Rationality and the Contextuality of Decision-Making

    Science.gov (United States)

    Vlaev, Ivo

    2018-01-01

    Rational explanation is ubiquitous in psychology and social sciences, ranging from rational analysis, expectancy-value theories, ideal observer models, mental logic to probabilistic frameworks, rational choice theory, and informal “folk psychological” explanation. However, rational explanation appears to be challenged by apparently systematic irrationality observed in psychological experiments, especially in the field of judgement and decision-making (JDM). Here, it is proposed that the experimental results require not that rational explanation should be rejected, but that rational explanation is local, i.e., within a context. Thus, rational models need to be supplemented with a theory of contextual shifts. We review evidence in JDM that patterns of choices are often consistent within contexts, but unstable between contexts. We also demonstrate that for a limited, though reasonably broad, class of decision-making domains, recent theoretical models can be viewed as providing theories of contextual shifts. It is argued that one particular significant source of global inconsistency arises from a cognitive inability to represent absolute magnitudes, whether for perceptual variables, utilities, payoffs, or probabilities. This overall argument provides a fresh perspective on the scope and limits of human rationality. PMID:29301289

  1. Local Choices: Rationality and the Contextuality of Decision-Making.

    Science.gov (United States)

    Vlaev, Ivo

    2018-01-02

    Rational explanation is ubiquitous in psychology and social sciences, ranging from rational analysis, expectancy-value theories, ideal observer models, mental logic to probabilistic frameworks, rational choice theory, and informal "folk psychological" explanation. However, rational explanation appears to be challenged by apparently systematic irrationality observed in psychological experiments, especially in the field of judgement and decision-making (JDM). Here, it is proposed that the experimental results require not that rational explanation should be rejected, but that rational explanation is local , i.e., within a context. Thus, rational models need to be supplemented with a theory of contextual shifts. We review evidence in JDM that patterns of choices are often consistent within contexts, but unstable between contexts. We also demonstrate that for a limited, though reasonably broad, class of decision-making domains, recent theoretical models can be viewed as providing theories of contextual shifts. It is argued that one particular significant source of global inconsistency arises from a cognitive inability to represent absolute magnitudes, whether for perceptual variables, utilities, payoffs, or probabilities. This overall argument provides a fresh perspective on the scope and limits of human rationality.

  2. Techno-Optimism and Rational Superstition

    DEFF Research Database (Denmark)

    Wilson, Alexander

    2017-01-01

    our common understanding of reason and rationality? To adopt rational expectations about the world, after all, should we not attempt to avoid the emotional over-determination of our assessments? I show that applied reason is conceptually entangled with this superstitious optimism in the continued...... of retro-causation, where the future is held to somehow have a retroactive effect on the past. This suggests, I argue, that the underlying mechanism by which techno-optimism is supposed to be instrumental in bringing about the future is fundamentally superstitious. But does this superstition not go against...... successes of technology. The article thus reveals a curious sense in which reason is intrinsically superstitious. I offer an evolutionary explanation for this, showing that the biological origins of reason will by nature tend to produce rational agents which are superstitiously bound to realism...

  3. Information-Theoretic Bounded Rationality and ε-Optimality

    Directory of Open Access Journals (Sweden)

    Daniel A. Braun

    2014-08-01

    Full Text Available Bounded rationality concerns the study of decision makers with limited information processing resources. Previously, the free energy difference functional has been suggested to model bounded rational decision making, as it provides a natural trade-off between an energy or utility function that is to be optimized and information processing costs that are measured by entropic search costs. The main question of this article is how the information-theoretic free energy model relates to simple ε-optimality models of bounded rational decision making, where the decision maker is satisfied with any action in an ε-neighborhood of the optimal utility. We find that the stochastic policies that optimize the free energy trade-off comply with the notion of ε-optimality. Moreover, this optimality criterion even holds when the environment is adversarial. We conclude that the study of bounded rationality based on ε-optimality criteria that abstract away from the particulars of the information processing constraints is compatible with the information-theoretic free energy model of bounded rationality.

  4. Rationing critical care medicine: recent studies and current trends.

    Science.gov (United States)

    Ward, Nicholas S

    2005-12-01

    This paper reviews the literature on the rationing of critical care resources. Although much has been written about the concept of rationing, there have been few scientific studies as to its prevalence. A recent meta-analysis reviewed all previously published studies on rationing access to intensive care units but little is known about practices within the intensive care unit. Much literature in the past few years has focused on the growing use of critical care resources and projections for the future. Several authors suggest there may be a crisis in financial or personnel resources if some rationing does not take place. Other papers have argued that the methods of rationing critical care previously proposed, such as limiting the care of dying patients or using cost-effectiveness analysis to determine care, may not be effective or viewed as ethical by some. Finally, several recent papers review how critical care is practiced and allocated in India and Asian countries that already practice open rationing in their health care systems. There is currently no published evidence that overt rationing is taking place in critical care medicine. There is growing evidence that in the future, the need for critical care may outstrip financial resources unless some form of rationing takes place. It is also clear from the literature that choosing how to ration critical care will be a difficult task.

  5. Decision rules and group rationality: cognitive gain or standstill?

    Directory of Open Access Journals (Sweden)

    Petru Lucian Curşeu

    Full Text Available Recent research in group cognition points towards the existence of collective cognitive competencies that transcend individual group members' cognitive competencies. Since rationality is a key cognitive competence for group decision making, and group cognition emerges from the coordination of individual cognition during social interactions, this study tests the extent to which collaborative and consultative decision rules impact the emergence of group rationality. Using a set of decision tasks adapted from the heuristics and biases literature, we evaluate rationality as the extent to which individual choices are aligned with a normative ideal. We further operationalize group rationality as cognitive synergy (the extent to which collective rationality exceeds average or best individual rationality in the group, and we test the effect of collaborative and consultative decision rules in a sample of 176 groups. Our results show that the collaborative decision rule has superior synergic effects as compared to the consultative decision rule. The ninety one groups working in a collaborative fashion made more rational choices (above and beyond the average rationality of their members than the eighty five groups working in a consultative fashion. Moreover, the groups using a collaborative decision rule were closer to the rationality of their best member than groups using consultative decision rules. Nevertheless, on average groups did not outperformed their best member. Therefore, our results reveal how decision rules prescribing interpersonal interactions impact on the emergence of collective cognitive competencies. They also open potential venues for further research on the emergence of collective rationality in human decision-making groups.

  6. Decision rules and group rationality: cognitive gain or standstill?

    Science.gov (United States)

    Curşeu, Petru Lucian; Jansen, Rob J G; Chappin, Maryse M H

    2013-01-01

    Recent research in group cognition points towards the existence of collective cognitive competencies that transcend individual group members' cognitive competencies. Since rationality is a key cognitive competence for group decision making, and group cognition emerges from the coordination of individual cognition during social interactions, this study tests the extent to which collaborative and consultative decision rules impact the emergence of group rationality. Using a set of decision tasks adapted from the heuristics and biases literature, we evaluate rationality as the extent to which individual choices are aligned with a normative ideal. We further operationalize group rationality as cognitive synergy (the extent to which collective rationality exceeds average or best individual rationality in the group), and we test the effect of collaborative and consultative decision rules in a sample of 176 groups. Our results show that the collaborative decision rule has superior synergic effects as compared to the consultative decision rule. The ninety one groups working in a collaborative fashion made more rational choices (above and beyond the average rationality of their members) than the eighty five groups working in a consultative fashion. Moreover, the groups using a collaborative decision rule were closer to the rationality of their best member than groups using consultative decision rules. Nevertheless, on average groups did not outperformed their best member. Therefore, our results reveal how decision rules prescribing interpersonal interactions impact on the emergence of collective cognitive competencies. They also open potential venues for further research on the emergence of collective rationality in human decision-making groups.

  7. Anxiety reduction through group instruction in rational therapy.

    Science.gov (United States)

    Maxwell, J W; Wilkerson, J

    1982-09-01

    This study investigated the effects of group Rational Therapy in promoting rational thinking and self-enhancing emotions among 24 college students. Each subject was administered the Sixteen Personality Factor Questionnaire as a pre- and post-test measurement. Results reveal that some aspects of personality are affected by Rational Therapy group programs while others are not.

  8. Thinking about acting logical foundations for rational decision making

    CERN Document Server

    Pollock, John L

    2006-01-01

    John Pollock aims to construct a theory of rational decision making for real agents--not ideal agents. Real agents have limited cognitive powers, but traditional theories of rationality have applied only to idealized agents that lack such constraints. Pollock argues that theories of ideal rationality are largely irrelevant to the decision making of real agents. Thinking about Acting aims to provide a theory of ""real rationality.""

  9. Choice, internal consistency, and rationality

    OpenAIRE

    Aditi Bhattacharyya; Prasanta K. Pattanaik; Yongsheng Xu

    2010-01-01

    The classical theory of rational choice is built on several important internal consistency conditions. In recent years, the reasonableness of those internal consistency conditions has been questioned and criticized, and several responses to accommodate such criticisms have been proposed in the literature. This paper develops a general framework to accommodate the issues raised by the criticisms of classical rational choice theory, and examines the broad impact of these criticisms from both no...

  10. Management between Rationality and Irrationality

    OpenAIRE

    Cene Bavec

    2012-01-01

    In the paper, we discuss theoretical and practical aspects of management and its rational and irrational behavior in the light of traditional management theories and contemporary social theories and theories of complexity. We exposed differences between middle and top management, where rationality is ascribed mainly to middle management, while top management often acts on seemingly irrational way. For the part of this irrationality, we cannot blame management because it originates from the na...

  11. Self-Reported Rationing Behavior Among US Physicians: A National Survey.

    Science.gov (United States)

    Sheeler, Robert D; Mundell, Tim; Hurst, Samia A; Goold, Susan Dorr; Thorsteinsdottir, Bjorg; Tilburt, Jon C; Danis, Marion

    2016-12-01

    Rationing is a controversial topic among US physicians. Understanding their attitudes and behaviors around rationing may be essential to a more open and sensible professional discourse on this important but controversial topic. To describe rationing behavior and associated factors among US physicians. Survey mailed to US physicians in 2012 to evaluate self-reported rationing behavior and variables related to this behavior. US physicians across a full spectrum of practice settings. A total of 2541 respondents, representing 65.6 % of the original mailing list of 3872 US addresses. The study was a cross-sectional analysis of physician attitudes and self-reported behaviors, with neutral language representations of the behaviors as well as an embedded experiment to test the influence of the word "ration" on perceived responsibility. Overall percentage of respondents reporting rationing behavior in various contexts and assessment of attitudes toward rationing. In total, 1348 respondents (53.1 %) reported having personally refrained within the past 6 months from using specific clinical services that would have provided the best patient care, because of health system cost. Prescription drugs (n = 1073 [48.3 %]) and magnetic resonance imaging (n = 922 [44.5 %]) were most frequently rationed. Surgical and procedural specialists were less likely to report rationing behavior (adjusted odds ratio [OR] [95 % CI], 0.8 [0.9-0.9] and 0.5 [0.4-0.6], respectively) compared to primary care. Compared with small or solo practices, those in medical school settings reported less rationing (adjusted OR [95 % CI], 0.4 [0.2-0.7]). Physicians who self-identified as very or somewhat liberal were significantly less likely to report rationing (adjusted OR [95 % CI], 0.7 [0.6-0.9]) than those self-reporting being very or somewhat conservative. A more positive opinion about rationing tended to align with greater odds of rationing. More than one-half of respondents engaged in

  12. Rational-driver approximation in car-following theory

    Science.gov (United States)

    Lubashevsky, Ihor; Wagner, Peter; Mahnke, Reinhard

    2003-11-01

    The problem of a car following a lead car driven with constant velocity is considered. To derive the governing equations for the following car dynamics a cost functional is constructed. This functional ranks the outcomes of different driving strategies, which applies to fairly general properties of the driver behavior. Assuming rational-driver behavior, the existence of the Nash equilibrium is proved. Rational driving is defined by supposing that a driver corrects continuously the car motion to follow the optimal path minimizing the cost functional. The corresponding car-following dynamics is described quite generally by a boundary value problem based on the obtained extremal equations. Linearization of these equations around the stationary state results in a generalization of the widely used optimal velocity model. Under certain conditions (the “dense traffic” limit) the rational car dynamics comprises two stages, fast and slow. During the fast stage a driver eliminates the velocity difference between the cars, the subsequent slow stage optimizes the headway. In the dense traffic limit an effective Hamiltonian description is constructed. This allows a more detailed nonlinear analysis. Finally, the differences between rational and bounded rational driver behavior are discussed. The latter, in particular, justifies some basic assumptions used recently by the authors to construct a car-following model lying beyond the frameworks of rationality.

  13. Rationality and ritual

    International Nuclear Information System (INIS)

    Wynne, B.

    1982-01-01

    The book concerns the Windscale Public Inquiry, held to investigate the application by British Nuclear Fuels to build a 1200 tonne per year thermal oxide reprocessing plant (THORP) for spent nuclear fuels from Britain and overseas. The subject is discussed under the headings: introduction (international dimensions; the Windscale Inquiry; conflict resolution and social drama; public debate and the sociology of knowledge); the decision-making legacy; oxide reprocessing - the background; the public inquiry tradition - a comparative perspective; the emergence of THORP from a private to a public issue (local and national planning politics); the process and impact of the Inquiry (opposition groups); judicial rationality, expert conflict, and political authority); the rationality and politics of analysis (proliferation; radiation risks; relative risks; the Ravenglass issue; discharge targets; general radiation protection arrangements); conclusion. (U.K.)

  14. Rational accountability and rational autonomy in academic practice: An extended case study of the communicative ethic of interdisciplinary science

    Science.gov (United States)

    Robertson, Susan Margaret

    The dissertation investigates the interaction of rational accountability and rational autonomy in interdisciplinary science within the lifeworld of the university. It focuses on the cultural, social and motivational forces that university researchers draw on, and develop, to constitute and regulate interdisciplinary science. Findings are analyzed within an applied critical social theory framework that attends to the interaction of instrumental and communicative rational action within the public spaces that constitute the lifeworld of the university as a public sphere in society. The research raises questions of how academics practice interdisciplinary science and how these practices relate to the reproduction of the regulative ideal of the university as a community that practices public reason. The conceptual framework informing the research is Habermas' (1984) theory of communicative action. Using Burawoy's (1991) extended case study method as an operational strategy, two modes of constituting and regulating interdisciplinary science were found. Instrumental rational modes dominated in social contexts of interdisciplinary science where consensus on the normative goals and purposes of rational academic action were pre-existing and pre-supposed by participants. Communicative rational modes dominated in social contexts of interdisciplinary science where the normative goals and purposes of rational academic action entered a contested domain. Endorsements for interdisciplinary science policies are coinciding with demands for increased accountability and relevance of Canada's university system. At the same time that the university system must respond to external demands, it must reproduce itself as a public institution open to the discursive redemption of factual and normative validity claims. The study found that academics participate in, but also contest the instrumental regulation of academic inquiry and conduct by using their constitutional autonomy and freedom to

  15. 5 CFR 1312.27 - Top secret control.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Top secret control. 1312.27 Section 1312... Classified Information § 1312.27 Top secret control. The EOP Security Officer serves as the Top Secret... Top Secret material. The ATSCOs will be responsible for the accountability and custodianship of Top...

  16. Effect of adrenal hormones on thyroid secretion and thyroid hormones on adrenal secretion in the sheep.

    Science.gov (United States)

    Falconer, I R; Jacks, F

    1975-01-01

    1. Previous work has shown that after stressful stimuli, sheep initially secrete increased amounts of thyroid hormone, at a time when adrenal secretion is also elevated. 2. This study was designed to evaluate (a) any short-term activation or inhibition of thyroid secretion by exogenous cortisol or ACTH administered in quantities comparable to those secreted after stress in sheep and (b) any short-term effect that exogenous thyroxine or triiodothyronine may have on the concentration of plasma cortisol in the sheep. 3. Thyroid activity was measured by determination of plasma protein bound 125I (PB125I) and total 125I in thyroid vein and mixed venous (jugular) blood. Plasma cortisol and thyroxine concentrations were measured by a competitive protein-binding assay at intervals for up to 5 hr after commencement of the experiment. 4. No evidence of an activation of thyroid secretion was found during cortisol or ACTH infusion, as monitored by thyroid vein PB125I. Similarly there was no evidence of any inhibition of thyroid function, as measured by continued secretion of thyroid hormones into thyroid vein blood. 5. No effect on plasma cortisol concentration due to thyroid hormone treatment was observed. 6. It was concluded that (a) elevated circulating corticosteroids in physiological concentrations have no short-term effects on thyroid activity in the sheep and (b) the short-term alterations in thyroid and adrenal cortical secretion observed during stress in the sheep could not be attributed to direct interaction of elevated thyroid hormone concentrations with adrenal cortical secretion. PMID:170400

  17. Sharing and Unsharing Memories of Jews of Moroccan Origin in Montréal and Paris Compared

    Directory of Open Access Journals (Sweden)

    Yolande Cohen

    2012-11-01

    Full Text Available This text 1 explores the memories of Moroccan Jews who left their country of origin to go to France and to Canada, through their life stories. By questioning the constitution of a shared memory and of a group memory, it stresses the interest to adopt a generational perspective to better understand the migration of this population. While some interviewees emphasize the rationalization of their departure, the younger ones, consider their leaving as a natural step in their many migrations. These distinctions are central to show how the memory of the departures and the depiction of the colonial society are shared by members of a group, and unshared with the larger Moroccan society.

  18. Secretion Trap Tagging of Secreted and Membrane-Spanning Proteins Using Arabidopsis Gene Traps

    Science.gov (United States)

    Andrew T. Groover; Joseph R. Fontana; Juana M. Arroyo; Cristina Yordan; W. Richard McCombie; Robert A. Martienssen

    2003-01-01

    Secreted and membrane-spanning proteins play fundamental roles in plant development but pose challenges for genetic identification and characterization. We describe a "secretion trap" screen for gene trap insertions in genes encoding proteins routed through the secretory pathway. The gene trap transposon encodes a ß-glucuronidase reporter enzyme...

  19. RATIONAL-IRRATIONAL ELECTORAL PREFERENCES, ALTRUISM AND EXPRESSIVE BEHAVIOR

    Directory of Open Access Journals (Sweden)

    Mihai Ungureanu

    2015-01-01

    Full Text Available Caplan (2000, 2001, 2006 proposed the rational-irrationality model arguing that irrationality is a good as any other, whose consumption is maximized in relation to its costs and benefits. Applying this model to the problem of electoral behavior Caplan implies that voters ‘afford’ many irrational beliefs, because the lack of individual decisiveness renders vote as a consequenceless act. This paper contributes to the development of knowledge by analyzing the compatibility of rational irrationality with active electoral behavior. Two important arguments are being proposed: First, Wittman’s (2008 intuition that rational irrationality is incompatible with voting could be supported only about a particular type of altruism, which Caplan actually seems to reject. Second, rational irrationality seems to be compatible with expressive motivations, reinforcing the conclusion that rational-irrational individuals are active voters in mass elections.

  20. The Problem of Rational Moral Enlistment

    Science.gov (United States)

    Tillson, John

    2017-01-01

    How can one bring children to recognize the requirements of morality without resorting only to non-rational means of persuasion (i.e. what rational ground can be offered to children for their moral enlistment)? Michael Hand has recently defended a foundationalist approach to answering this question and John White has responded by (a) criticizing…

  1. 22 CFR 1421.15 - Secret ballot.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Secret ballot. 1421.15 Section 1421.15 Foreign Relations FOREIGN SERVICE LABOR RELATIONS BOARD; FEDERAL LABOR RELATIONS AUTHORITY; GENERAL COUNSEL OF THE... THIS SUBCHAPTER § 1421.15 Secret ballot. Secret ballot means the expression by ballot, voting machine...

  2. Confucian Rationalism

    Science.gov (United States)

    Lam, Chi-Ming

    2014-01-01

    Nowadays, there is still a widely held view that the Chinese and Western modes of thought are quite distinct from each other. In particular, the Chinese mode of thought derived from Confucianism is considered as comparatively less rational than the Western one. In this article, I first argue that although the analogical mode of argumentation,…

  3. Cognitive distance, absorptive capacity and group rationality: a simulation study.

    Directory of Open Access Journals (Sweden)

    Petru Lucian Curşeu

    Full Text Available We report the results of a simulation study in which we explore the joint effect of group absorptive capacity (as the average individual rationality of the group members and cognitive distance (as the distance between the most rational group member and the rest of the group on the emergence of collective rationality in groups. We start from empirical results reported in the literature on group rationality as collective group level competence and use data on real-life groups of four and five to validate a mathematical model. We then use this mathematical model to predict group level scores from a variety of possible group configurations (varying both in cognitive distance and average individual rationality. Our results show that both group competence and cognitive distance are necessary conditions for emergent group rationality. Group configurations, in which the groups become more rational than the most rational group member, are groups scoring low on cognitive distance and scoring high on absorptive capacity.

  4. Cognitive distance, absorptive capacity and group rationality: a simulation study.

    Science.gov (United States)

    Curşeu, Petru Lucian; Krehel, Oleh; Evers, Joep H M; Muntean, Adrian

    2014-01-01

    We report the results of a simulation study in which we explore the joint effect of group absorptive capacity (as the average individual rationality of the group members) and cognitive distance (as the distance between the most rational group member and the rest of the group) on the emergence of collective rationality in groups. We start from empirical results reported in the literature on group rationality as collective group level competence and use data on real-life groups of four and five to validate a mathematical model. We then use this mathematical model to predict group level scores from a variety of possible group configurations (varying both in cognitive distance and average individual rationality). Our results show that both group competence and cognitive distance are necessary conditions for emergent group rationality. Group configurations, in which the groups become more rational than the most rational group member, are groups scoring low on cognitive distance and scoring high on absorptive capacity.

  5. Alternative protein secretion: The Mam1 ABC transporter supports secretion of M-factor linked GFP in fission yeast

    International Nuclear Information System (INIS)

    Kjaerulff, Soren; Mueller, Sven; Jensen, Martin Roland

    2005-01-01

    To examine whether the fission yeast Mam1 ABC transporter can be used for secretion of heterologous proteins, thereby bypassing the classical secretion pathway, we have analyzed chimeric forms of the M-factor precursor. It was demonstrated that GFP can be exported when fused to both the amino-terminal prosequence from mfm1 and a CaaX motif. This secretion was dependent on the Mam1 transporter and not the classical secretion pathway. The secretion efficiency of GFP, however, was relatively low and most of the reporter protein was trapped in the vacuolar membranes. Our findings suggest that the Mam1 ABC protein is a promiscuous peptide transporter that can accommodate globular proteins of a relatively large size. Furthermore, our results help in defining the sequences required for processing and secretion of natural M-factor

  6. Cloned Erwinia chrysanthemi out genes enable Escherichia coli to selectively secrete a diverse family of heterologous proteins to its milieu.

    Science.gov (United States)

    He, S Y; Lindeberg, M; Chatterjee, A K; Collmer, A

    1991-02-01

    The out genes of the enterobacterial plant pathogen Erwinia chrysanthemi are responsible for the efficient extracellular secretion of multiple plant cell wall-degrading enzymes, including four isozymes of pectate lyase, exo-poly-alpha-D-galacturonosidase, pectin methylesterase, and cellulase. Out- mutants of Er. chrysanthemi are unable to export any of these proteins beyond the periplasm and are severely reduced in virulence. We have cloned out genes from Er. chrysanthemi in the stable, low-copy-number cosmid pCPP19 by complementing several transposon-induced mutations. The cloned out genes were clustered in a 12-kilobase chromosomal DNA region, complemented all existing out mutations in Er. chrysanthemi EC16, and enabled Escherichia coli strains to efficiently secrete the extracellular pectic enzymes produced from cloned Er. chrysanthemi genes, while retaining the periplasmic marker protein beta-lactamase. DNA sequencing of a 2.4-kilobase EcoRI fragment within the out cluster revealed four genes arranged colinearly and sharing substantial similarity with the Klebsiella pneumoniae genes pulH, pulI, pulJ, and pulK, which are necessary for pullulanase secretion. However, K. pneumoniae cells harboring the cloned Er. chrysanthemi pelE gene were unable to secrete the Erwinia pectate lyase. Furthermore, the Er. chrysanthemi Out system was unable to secrete an extracellular pectate lyase encoded by a gene from a closely related plant pathogen. Erwinia carotovora ssp. carotovora. The results suggest that these enterobacteria secrete polysaccharidases by a conserved mechanism whose protein-recognition capacities have diverged.

  7. 29 CFR 401.11 - Secret ballot.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Secret ballot. 401.11 Section 401.11 Labor Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS MEANING OF TERMS USED IN THIS SUBCHAPTER § 401.11 Secret ballot. Secret ballot means the expression by...

  8. Emotions as a Vehicle for Rationality: Rational Decision Making Models Based on Emotion-Related Valuing and Hebbian Learning

    NARCIS (Netherlands)

    Treur, J.; Umair, M.

    2015-01-01

    In this paper an adaptive decision model based on predictive loops through feeling states is analysed from the perspective of rationality. Hebbian learning is considered for different types of connections in the decision model. To assess the extent of rationality, a measure is introduced reflecting

  9. Re-visions of rationality?

    Science.gov (United States)

    Newell, Ben R

    2005-01-01

    The appeal of simple algorithms that take account of both the constraints of human cognitive capacity and the structure of environments has been an enduring theme in cognitive science. A novel version of such a boundedly rational perspective views the mind as containing an 'adaptive toolbox' of specialized cognitive heuristics suited to different problems. Although intuitively appealing, when this version was proposed, empirical evidence for the use of such heuristics was scant. I argue that in the light of empirical studies carried out since then, it is time this 'vision of rationality' was revised. An alternative view based on integrative models rather than collections of heuristics is proposed.

  10. Rationing medical education.

    African Journals Online (AJOL)

    This paper discussed the pros and cons of the application of rationing to medical education and the different ... Even though some stakeholders in medical education might be taken aback at .... Walsh K. Online educational tools to improve the.

  11. Rationality, perception, and the all-seeing eye.

    Science.gov (United States)

    Felin, Teppo; Koenderink, Jan; Krueger, Joachim I

    2017-08-01

    Seeing-perception and vision-is implicitly the fundamental building block of the literature on rationality and cognition. Herbert Simon and Daniel Kahneman's arguments against the omniscience of economic agents-and the concept of bounded rationality-depend critically on a particular view of the nature of perception and vision. We propose that this framework of rationality merely replaces economic omniscience with perceptual omniscience. We show how the cognitive and social sciences feature a pervasive but problematic meta-assumption that is characterized by an "all-seeing eye." We raise concerns about this assumption and discuss different ways in which the all-seeing eye manifests itself in existing research on (bounded) rationality. We first consider the centrality of vision and perception in Simon's pioneering work. We then point to Kahneman's work-particularly his article "Maps of Bounded Rationality"-to illustrate the pervasiveness of an all-seeing view of perception, as manifested in the extensive use of visual examples and illusions. Similar assumptions about perception can be found across a large literature in the cognitive sciences. The central problem is the present emphasis on inverse optics-the objective nature of objects and environments, e.g., size, contrast, and color. This framework ignores the nature of the organism and perceiver. We argue instead that reality is constructed and expressed, and we discuss the species-specificity of perception, as well as perception as a user interface. We draw on vision science as well as the arts to develop an alternative understanding of rationality in the cognitive and social sciences. We conclude with a discussion of the implications of our arguments for the rationality and decision-making literature in cognitive psychology and behavioral economics, along with suggesting some ways forward.

  12. Inhibition of type VI secretion by an anti-TssM llama nanobody.

    Directory of Open Access Journals (Sweden)

    Van Son Nguyen

    Full Text Available The type VI secretion system (T6SS is a secretion pathway widespread in Gram-negative bacteria that targets toxins in both prokaryotic and eukaryotic cells. Although most T6SSs identified so far are involved in inter-bacterial competition, a few are directly required for full virulence of pathogens. The T6SS comprises 13 core proteins that assemble a large complex structurally and functionally similar to a phage contractile tail structure anchored to the cell envelope by a trans-membrane spanning stator. The central part of this stator, TssM, is a 1129-amino-acid protein anchored in the inner membrane that binds to the TssJ outer membrane lipoprotein. In this study, we have raised camelid antibodies against the purified TssM periplasmic domain. We report the crystal structure of two specific nanobodies that bind to TssM in the nanomolar range. Interestingly, the most potent nanobody, nb25, competes with the TssJ lipoprotein for TssM binding in vitro suggesting that TssJ and the nb25 CDR3 loop share the same TssM binding site or causes a steric hindrance preventing TssM-TssJ complex formation. Indeed, periplasmic production of the nanobodies displacing the TssM-TssJ interaction inhibits the T6SS function in vivo. This study illustrates the power of nanobodies to specifically target and inhibit bacterial secretion systems.

  13. 29 CFR 1202.4 - Secret ballot.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Secret ballot. 1202.4 Section 1202.4 Labor Regulations Relating to Labor (Continued) NATIONAL MEDIATION BOARD RULES OF PROCEDURE § 1202.4 Secret ballot. In conducting such investigation, the Board is authorized to take a secret ballot of the employees involved, or...

  14. Towards a classification of rational Hopf algebras

    International Nuclear Information System (INIS)

    Fuchs, J.; Ganchev, A.; Vecsernyes, P.

    1994-02-01

    Rational Hopf algebras, i.e. certain quasitriangular weak quasi-Hopf *-algebras, are expected to describe the quantum symmetry of rational field theories. In this paper methods are developed which allow for a classification of all rational Hopf algebras that are compatible with some prescribed set of fusion rules. The algebras are parametrized by the solutions of the square, pentagon and hexagon identities. As examples, we classify all solutions for fusion rules with not more than three sectors, as well as for the level three affine A 1 (1) fusion rules. We also establish several general properties of rational Hopf algebras and present a graphical description of the coassociator in terms of labelled tetrahedra. The latter construction allows to make contact with conformal field theory fusing matrices and with invariants of three-manifolds and topological lattice field theory. (orig.)

  15. Bounded rational choice behaviour: applications in transport

    DEFF Research Database (Denmark)

    Jensen, Anders Fjendbo

    2016-01-01

    Even though the theory of rational behaviour has been challenged for almost 100 years, the dominant approach within the field of transport has been based upon the assumptions of neoclassical economics that we live in a world of rational decision makers who always have perfect knowledge and aim...... rational choice behaviour focuses on how the latter approach can be seriously taken into account within transport applications. As the editors discuss in the introduction, a true optimal choice can only be made if an individual has full and perfect information of all relevant attributes in his/her choice...... set. An individual is said to demonstrate bounded rational behaviour if he/she does not systematically consider all attributes deemed relevant for the decision problem at hand, does not consider all choice options and/or does not choose the best choice alternative. Such simplified representation...

  16. Economic Rationality in the Ultimatum Game

    Directory of Open Access Journals (Sweden)

    Jan Fiala

    2017-03-01

    Full Text Available Rigorous application of experimental methodology to the interdisciplinary research of economic decision making is the main purpose of our work. In this paper, we introduce the main decisionmaking theories and outline economic rationality. We explain why we find it useful to discriminate between the “irrational” and “non-rational” components of decision making. We offer an oriented interdisciplinary point of view on economic rationality. In the applied section, we describe the main features of the Ultimatum game and summarize the up-to-date theories explaining the non-rational course of the game. We discuss in detail the reported relations between the nominal value of the stakes and the distribution of the offers and responses. We introduce the blinded, randomized Ultimatum game experiment that we conducted in our laboratory. We stress the importance of anonymity of the study subjects and the difference in salience of a factual reward against a  hypothetical reward. We present the results of our study, showing that a  duly chosen non-monetary reward, directly inconvertible into money, leads to a different offer distribution in the Ultimatum game without the necessity to invest excessive sums of money in the rewards. We compare our results to research published by other authors. According to our theory, the rational, non-rational and irrational components contribute to the decision making in Ultimatum differently depending on the different reward stakes.

  17. The Secret of Future Victories

    Science.gov (United States)

    1992-02-01

    Copy S of 320 copies AD--A25 0 718 IDA PAPER P-265 3 THE SECRET OF FUTURE VICTORIES Paul F. Gormnan General, USA (Retired) DTIC 05M February 1992 NAY...TYPE AND DATES COVERED IFebruary 1992 Final--June 1991-January 1992 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS The Secret of Future Victories C -MDA...8 2N0-102 IDA PAPER P-2653 THE SECRET OF FUTURE VICTORIES Paul F. Gorman General. LUSA (Retired) February 1992 Approved for public release

  18. The anchoring bias reflects rational use of cognitive resources

    OpenAIRE

    Goodman, Noah; Huys, Quentin; Griffiths, Tom; Lieder, Falk

    2017-01-01

    © 2017, Psychonomic Society, Inc. Cognitive biases, such as the anchoring bias, pose a serious challenge to rational accounts of human cognition. We investigate whether rational theories can meet this challenge by taking into account the mind’s bounded cognitive resources. We asked what reasoning under uncertainty would look like if people made rational use of their finite time and limited cognitive resources. To answer this question, we applied a mathematical theory of bounded rationality to...

  19. Current Therapies That Modify Glucagon Secretion

    DEFF Research Database (Denmark)

    Grøndahl, Magnus F.; Keating, Damien J.; Vilsbøll, Tina

    2017-01-01

    and provide insights into how antidiabetic drugs influence glucagon secretion as well as a perspective on the future of glucagon-targeting drugs. Recent Findings: Several older as well as recent investigations have evaluated the effect of antidiabetic agents on glucagon secretion to understand how glucagon...... may be involved in the drugs’ efficacy and safety profiles. Based on these findings, modulation of glucagon secretion seems to play a hitherto underestimated role in the efficacy and safety of several glucose-lowering drugs. Summary: Numerous drugs currently available to diabetologists are capable...... of altering glucagon secretion: metformin, sulfonylurea compounds, insulin, glucagon-like peptide-1 receptor agonists, dipeptidyl peptidase-4 inhibitors, sodium-glucose cotransporter 2 inhibitors and amylin mimetics. Their diverse effects on glucagon secretion are of importance for their individual efficacy...

  20. Characterization of a secreted Chlamydia protease

    DEFF Research Database (Denmark)

    Shaw, A.C.; Vandahl, B.B.; Larsen, M.R.

    2002-01-01

    Chlamydiae are obligate intracellular bacteria that are important human pathogens. The Chlamydia genomes contain orthologues to secretion apparatus proteins from other intracellular bacteria, but only a few secreted proteins have been identified. Most likely, effector proteins are secreted in order...... to promote infection. Effector proteins cannot be identified by motif or similarity searches. As a new strategy for identification of secreted proteins we have compared 2D-PAGE profiles of [35S]-labelled Chlamydia proteins from whole lysates of infected cells to 2D-PAGE profiles of proteins from purified...... Chlamydia. Several secretion candidates from Chlamydia trachomatis D and Chlamydia pneumoniae were detected by this method. Two protein spots were identified among the candidates. These represent fragments of the 'chlamydial protease- or proteasome-like activity factor' (CPAF) and were clearly present in 2D...

  1. EFFECTS OF SECRETABLE PLACENTAL FACTORS UPON SECRETION OF CYTOKINES BY THP-1 MONOCYTE-LIKE CELLS

    Directory of Open Access Journals (Sweden)

    Ya. S. Onokhina

    2013-01-01

    Full Text Available Abstract. Мonocytes in feto-placental circulation are exposed to factors secreted by placental tissue. These factors influence monocyte functions in pregnancy. In present study, an in vitro model (monocyte-like THP-1 cells was used for assessing effects of soluble placental factors obtained from women with physiological pregnancies, or preeclampsia cases. The following effects of placental factors were revealed: increased secretion of VEGF by THP-1 cells along with decreased secretion of IL-6, IL-8 and MCP-1 under the influence of placental factors from the I. trimester of pregnancy in comparison with III. trimester. Secretion of IL-6 and MCP-1 by THP-1 cells was increased, and secretion of soluble TNFRII was decreased upon co-cultivation with soluble placental factors from the women with preeclampsia, as compared with placental products from physiological pregnancies.The work is supported by grants ГК № 02.740.11.0711 from Ministry of Education and Science, and НШ-3594.2010.7 grant from the President of Russian Federation.

  2. 5 CFR 2421.15 - Secret ballot.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Secret ballot. 2421.15 Section 2421.15... FEDERAL LABOR RELATIONS AUTHORITY MEANING OF TERMS AS USED IN THIS SUBCHAPTER § 2421.15 Secret ballot. Secret ballot means the expression by ballot, voting machine or otherwise, but in no event by proxy, of a...

  3. 29 CFR 452.97 - Secret ballot.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Secret ballot. 452.97 Section 452.97 Labor Regulations... OF 1959 Election Procedures; Rights of Members § 452.97 Secret ballot. (a) A prime requisite of elections regulated by title IV is that they be held by secret ballot among the members or in appropriate...

  4. Secretive eating among youth with overweight or obesity.

    Science.gov (United States)

    Kass, Andrea E; Wilfley, Denise E; Eddy, Kamryn T; Boutelle, Kerri N; Zucker, Nancy; Peterson, Carol B; Le Grange, Daniel; Celio-Doyle, Angela; Goldschmidt, Andrea B

    2017-07-01

    Secretive eating, characterized by eating privately to conceal being seen, may reflect eating- and/or body-related shame, be associated with depression, and correlate with binge eating, which predicts weight gain and eating disorder onset. Increasing understanding of secretive eating in youth may improve weight status and reduce eating disorder risk. This study evaluated the prevalence and correlates of secretive eating in youth with overweight or obesity. Youth (N = 577) presented to five research/clinical institutions. Using a cross-sectional design, secretive eating was evaluated in relation to eating-related and general psychopathology via linear and logistic regression analyses. Secretive eating was endorsed by 111 youth, who were, on average, older than youth who denied secretive eating (mean age = 12.07 ± 2.83 versus 10.97 ± 2.31). Controlling for study site and age, youth who endorsed secretive eating had higher eating-related psychopathology and were more likely to endorse loss of control eating and purging than their counterparts who did not endorse secretive eating. Groups did not differ in excessive exercise or behavioral problems. Dietary restraint and purging were elevated among adolescents (≥13y) but not children (<13y) who endorsed secretive eating; depression was elevated among children, but not adolescents, who endorsed secretive eating. Secretive eating may portend heightened risk for eating disorders, and correlates of secretive eating may differ across pediatric development. Screening for secretive eating may inform identification of problematic eating behaviors, and understanding factors motivating secretive eating may improve intervention tailoring. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Rational points on elliptic curves

    CERN Document Server

    Silverman, Joseph H

    2015-01-01

    The theory of elliptic curves involves a pleasing blend of algebra, geometry, analysis, and number theory. This book stresses this interplay as it develops the basic theory, thereby providing an opportunity for advanced undergraduates to appreciate the unity of modern mathematics. At the same time, every effort has been made to use only methods and results commonly included in the undergraduate curriculum. This accessibility, the informal writing style, and a wealth of exercises make Rational Points on Elliptic Curves an ideal introduction for students at all levels who are interested in learning about Diophantine equations and arithmetic geometry. Most concretely, an elliptic curve is the set of zeroes of a cubic polynomial in two variables. If the polynomial has rational coefficients, then one can ask for a description of those zeroes whose coordinates are either integers or rational numbers. It is this number theoretic question that is the main subject of this book. Topics covered include the geometry and ...

  6. Long-term outcomes of surgery and radiotherapy for secreting and non-secreting pituitary adenoma

    International Nuclear Information System (INIS)

    Kim, Mi Young; Kim, Jin Hee; Oh, Young Kee; Kim, El

    2016-01-01

    To investigate treatment outcome and long term complication after surgery and radiotherapy (RT) for pituitary adenoma. From 1990 to 2009, 73 patients with surgery and RT for pituitary adenoma were analyzed in this study. Median age was 51 years (range, 25 to 71 years). Median tumor size was 3 cm (range, 1 to 5 cm) with suprasellar (n = 21), cavernous sinus extension (n = 14) or both (n = 5). Hormone secreting tumor was diagnosed in 29 patients; 16 patients with prolactin, 12 patients with growth hormone, and 1 patient with adrenocorticotrophic hormone. Impairment of visual acuity or visual field was presented in 33 patients at first diagnosis. Most patients (n = 64) received RT as postoperative adjuvant setting. Median RT dose was 45 Gy (range, 45 to 59.4 Gy). Median follow-up duration was 8 years (range, 3 to 22 years). In secreting tumors, hormone normalization rate was 55% (16 of 29 patients). For 25 patients with evaluable visual field and visual acuity test, 21 patients (84%) showed improvement of visual disturbance after treatment. The 10-year tumor control rate for non-secreting and secreting adenoma was 100% and 58%, respectively (p < 0.001). Progression free survival rate at 10 years was 98%. Only 1 patient experienced endocrinological recurrence. Following surgery, 60% (n = 44) suffered from pituitary function deficit. Late complication associated with RT was only 1 patient, who developed cataract. Surgery and RT are very effective and safe in hormonal and tumor growth control for secreting and non-secreting pituitary adenoma

  7. Long-term outcomes of surgery and radiotherapy for secreting and non-secreting pituitary adenoma

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Mi Young; Kim, Jin Hee; Oh, Young Kee; Kim, El [Dongsan Medical Center, Keimyung University School of Medicine, Daegu (Korea, Republic of)

    2016-06-15

    To investigate treatment outcome and long term complication after surgery and radiotherapy (RT) for pituitary adenoma. From 1990 to 2009, 73 patients with surgery and RT for pituitary adenoma were analyzed in this study. Median age was 51 years (range, 25 to 71 years). Median tumor size was 3 cm (range, 1 to 5 cm) with suprasellar (n = 21), cavernous sinus extension (n = 14) or both (n = 5). Hormone secreting tumor was diagnosed in 29 patients; 16 patients with prolactin, 12 patients with growth hormone, and 1 patient with adrenocorticotrophic hormone. Impairment of visual acuity or visual field was presented in 33 patients at first diagnosis. Most patients (n = 64) received RT as postoperative adjuvant setting. Median RT dose was 45 Gy (range, 45 to 59.4 Gy). Median follow-up duration was 8 years (range, 3 to 22 years). In secreting tumors, hormone normalization rate was 55% (16 of 29 patients). For 25 patients with evaluable visual field and visual acuity test, 21 patients (84%) showed improvement of visual disturbance after treatment. The 10-year tumor control rate for non-secreting and secreting adenoma was 100% and 58%, respectively (p < 0.001). Progression free survival rate at 10 years was 98%. Only 1 patient experienced endocrinological recurrence. Following surgery, 60% (n = 44) suffered from pituitary function deficit. Late complication associated with RT was only 1 patient, who developed cataract. Surgery and RT are very effective and safe in hormonal and tumor growth control for secreting and non-secreting pituitary adenoma.

  8. Extracellular secretion of a recombinant therapeutic peptide by Bacillus halodurans utilizing a modified flagellin type III secretion system

    CSIR Research Space (South Africa)

    Berger, E

    2011-08-01

    Full Text Available further 3.5-fold increase in the secretion of recombinant peptide fusions. Conclusions: The type III flagellar secretion system of B. halodurans has been shown to successfully secrete a therapeutic peptide as a heterologous flagellin fusion. Improvements...

  9. Pituitary-hormone secretion by thyrotropinomas

    NARCIS (Netherlands)

    Roelfsema, Ferdinand; Kok, Simon; Kok, Petra; Pereira, Alberto M.; Biermasz, Nienke R.; Smit, Jan W.; Frolich, Marijke; Keenan, Daniel M.; Veldhuis, Johannes D.; Romijn, Johannes A.

    2009-01-01

    Hormone secretion by somatotropinomas, corticotropinomas and prolactinomas exhibits increased pulse frequency, basal and pulsatile secretion, accompanied by greater disorderliness. Increased concentrations of growth hormone (GH) or prolactin (PRL) are observed in about 30% of thyrotropinomas leading

  10. Rationality, perception, and the all-seeing eye

    NARCIS (Netherlands)

    Felin, Teppo; Koenderink, Jan|info:eu-repo/dai/nl/070864543; Krueger, Joachim I

    Seeing-perception and vision-is implicitly the fundamental building block of the literature on rationality and cognition. Herbert Simon and Daniel Kahneman's arguments against the omniscience of economic agents-and the concept of bounded rationality-depend critically on a particular view of the

  11. Dimension counts for singular rational curves via semigroups

    OpenAIRE

    Cotterill, Ethan; Feital, Lia; Martins, Renato Vidal

    2015-01-01

    We study singular rational curves in projective space, deducing conditions on their parametrizations from the value semigroups $\\sss$ of their singularities. In particular, we prove that a natural heuristic for the codimension of the space of nondegenerate rational curves of arithmetic genus $g>0$ and degree $d$ in $\\mb{P}^n$, viewed as a subspace of all degree-$d$ rational curves in $\\mb{P}^n$, holds whenever $g$ is small.

  12. The anchoring bias reflects rational use of cognitive resources.

    Science.gov (United States)

    Lieder, Falk; Griffiths, Thomas L; M Huys, Quentin J; Goodman, Noah D

    2018-02-01

    Cognitive biases, such as the anchoring bias, pose a serious challenge to rational accounts of human cognition. We investigate whether rational theories can meet this challenge by taking into account the mind's bounded cognitive resources. We asked what reasoning under uncertainty would look like if people made rational use of their finite time and limited cognitive resources. To answer this question, we applied a mathematical theory of bounded rationality to the problem of numerical estimation. Our analysis led to a rational process model that can be interpreted in terms of anchoring-and-adjustment. This model provided a unifying explanation for ten anchoring phenomena including the differential effect of accuracy motivation on the bias towards provided versus self-generated anchors. Our results illustrate the potential of resource-rational analysis to provide formal theories that can unify a wide range of empirical results and reconcile the impressive capacities of the human mind with its apparently irrational cognitive biases.

  13. Differences and Similarities among Parotoid Macrogland Secretions in South American Toads: A Preliminary Biochemical Delineation

    Directory of Open Access Journals (Sweden)

    Juliana Mozer Sciani

    2013-01-01

    Full Text Available Amphibians are known by cutaneous glands, spread over the skin, containing toxins (proteins, peptides, biogenic amines, steroidal bufadienolides, and alkaloids used as chemical defense against predators and microbial infection. Toads are characterized by the presence of parotoid macroglands. The common toads have lately been divided into two genera: Bufo (Europe, Asia, and Africa and Rhinella (South America. Basal Rhaebo genus is exclusively of Central America and Amazon region. Although Rhinella and Rhaebo are related, species may share differences due to the diversity of environments that they live in. In this work, we have performed a biochemical characterization of the components of the poison of eight Rhinella species and one Rhaebo by means of RP-HPLC with either UV or MS detection and by SDS-PAGE, in order to verify whether phylogenetic and biological differences, such as habitat, diet, and defensive strategies, between them may also be reflected in poison composition. Although some components were common among the secretions, we were able to identify exclusive molecules to some species. The fact that closely related animals living in different habitats secrete different molecules into the skin is an indication that biological features, and not only evolution, seem to directly influence the skin secretion composition.

  14. Normal and abnormal secretion by haemopoietic cells

    Science.gov (United States)

    STINCHCOMBE, JANE C; GRIFFITHS, GILLIAN M

    2001-01-01

    The secretory lysosomes found in haemopoietic cells provide a very efficient mechanism for delivering the effector proteins of many immune cells in response to antigen recognition. Although secretion shows some similarities to the secretion of specialized granules in other secretory cell types, some aspects of secretory lysosome release appear to be unique to melanocytes and cells of the haemopoietic lineage. Mast cells and platelets have provided excellent models for studying secretion, but recent advances in characterizing the immunological synapse allow a very fine dissection of the secretory process in T lymphocytes. These studies show that secretory lysosomes are secreted from the centre of the talin ring at the synapse. Proper secretion requires a series of Rab and cytoskeletal elements which play critical roles in the specialized secretion of lysosomes in haemopoietic cells. PMID:11380687

  15. Adaptive Rationality, Adaptive Behavior and Institutions

    Directory of Open Access Journals (Sweden)

    Volchik Vyacheslav, V.

    2015-12-01

    Full Text Available The economic literature focused on understanding decision-making and choice processes reveals a vast collection of approaches to human rationality. Theorists’ attention has moved from absolutely rational, utility-maximizing individuals to boundedly rational and adaptive ones. A number of economists have criticized the concepts of adaptive rationality and adaptive behavior. One of the recent trends in the economic literature is to consider humans irrational. This paper offers an approach which examines adaptive behavior in the context of existing institutions and constantly changing institutional environment. It is assumed that adaptive behavior is a process of evolutionary adjustment to fundamental uncertainty. We emphasize the importance of actors’ engagement in trial and error learning, since if they are involved in this process, they obtain experience and are able to adapt to existing and new institutions. The paper aims at identifying relevant institutions, adaptive mechanisms, informal working rules and practices that influence actors’ behavior in the field of Higher Education in Russia (Rostov Region education services market has been taken as an example. The paper emphasizes the application of qualitative interpretative methods (interviews and discourse analysis in examining actors’ behavior.

  16. The effectiveness of rational emotive therapy on achievement ...

    African Journals Online (AJOL)

    The effectiveness of rational emotive therapy on achievement motivation of students. ... PROMOTING ACCESS TO AFRICAN RESEARCH ... the effectiveness of Rational Emotive Behaviour Therapy on Students Achievement Motivation.

  17. Cognitive rationalizations for tanning-bed use: a preliminary exploration.

    Science.gov (United States)

    Banerjee, Smita C; Hay, Jennifer L; Greene, Kathryn

    2013-09-01

    To examine construct and predictive utility of an adapted cognitive rationalization scale for tanning-bed use. Current/former tanning-bedusing undergraduate students (N = 216; 87.6% females; 78.4% white) at a large northeastern university participated in a survey. A cognitive rationalization for tanning-bed use scale was adapted. Standardized self-report measures of past tanning-bed use, advantages of tanning, perceived vulnerability to photoaging, tanning-bed use dependence, and tanning-bed use intention were also administered. The cognitive rationalization scale exhibited strong construct and predictive validity. Current tanners and tanning-bed-use-dependent participants endorsed rationalizations more strongly than did former tanners and not-tanning-bed-use-dependent participants respectively. Findings indicate that cognitive rationalizations help explain discrepancy between inconsistent cognitions.

  18. Multivariate rational data fitting

    Science.gov (United States)

    Cuyt, Annie; Verdonk, Brigitte

    1992-12-01

    Sections 1 and 2 discuss the advantages of an object-oriented implementation combined with higher floating-point arithmetic, of the algorithms available for multivariate data fitting using rational functions. Section 1 will in particular explain what we mean by "higher arithmetic". Section 2 will concentrate on the concepts of "object orientation". In sections 3 and 4 we shall describe the generality of the data structure that can be dealt with: due to some new results virtually every data set is acceptable right now, with possible coalescence of coordinates or points. In order to solve the multivariate rational interpolation problem the data sets are fed to different algorithms depending on the structure of the interpolation points in then-variate space.

  19. Some Economics of Trade Secret Law

    OpenAIRE

    David D. Friedman; William M. Landes; Richard A. Posner

    1991-01-01

    Despite the practical importance of trade secrets to the business community, the law of trade secrets is a neglected orphan in economic analysis. This paper sketches an approach to the economics of trade secret law that connects it more closely both to other areas of intellectual property and to broader issues in the positive economic theory of the common law.

  20. Positivity Preserving Interpolation Using Rational Bicubic Spline

    Directory of Open Access Journals (Sweden)

    Samsul Ariffin Abdul Karim

    2015-01-01

    Full Text Available This paper discusses the positivity preserving interpolation for positive surfaces data by extending the C1 rational cubic spline interpolant of Karim and Kong to the bivariate cases. The partially blended rational bicubic spline has 12 parameters in the descriptions where 8 of them are free parameters. The sufficient conditions for the positivity are derived on every four boundary curves network on the rectangular patch. Numerical comparison with existing schemes also has been done in detail. Based on Root Mean Square Error (RMSE, our partially blended rational bicubic spline is on a par with the established methods.

  1. From receptor balance to rational glucocorticoid therapy.

    Science.gov (United States)

    de Kloet, E Ron

    2014-08-01

    Corticosteroids secreted as end product of the hypothalamic-pituitary-adrenal axis act like a double-edged sword in the brain. The hormones coordinate appraisal processes and decision making during the initial phase of a stressful experience and promote subsequently cognitive performance underlying the management of stress adaptation. This action exerted by the steroids on the initiation and termination of the stress response is mediated by 2 related receptor systems: mineralocorticoid receptors (MRs) and glucocorticoid receptors (GRs). The receptor types are unevenly distributed but colocalized in abundance in neurons of the limbic brain to enable these complementary hormone actions. This contribution starts from a historical perspective with the observation that phasic occupancy of GR during ultradian rhythmicity is needed to maintain responsiveness to corticosteroids. Then, during stress, initially MR activation enhances excitability of limbic networks that are engaged in appraisal and emotion regulation. Next, the rising hormone concentration occupies GR, resulting in reallocation of energy to limbic-cortical circuits with a role in behavioral adaptation and memory storage. Upon MR:GR imbalance, dysregulation of the hypothalamic-pituitary-adrenal axis occurs, which can enhance an individual's vulnerability. Imbalance is characteristic for chronic stress experience and depression but also occurs during exposure to synthetic glucocorticoids. Hence, glucocorticoid psychopathology may develop in susceptible individuals because of suppression of ultradian/circadian rhythmicity and depletion of endogenous corticosterone from brain MR. This knowledge generated from testing the balance hypothesis can be translated to a rational glucocorticoid therapy.

  2. Probability and rational choice

    Directory of Open Access Journals (Sweden)

    David Botting

    2014-05-01

    Full Text Available http://dx.doi.org/10.5007/1808-1711.2014v18n1p1 In this paper I will discuss the rationality of reasoning about the future. There are two things that we might like to know about the future: which hypotheses are true and what will happen next. To put it in philosophical language, I aim to show that there are methods by which inferring to a generalization (selecting a hypothesis and inferring to the next instance (singular predictive inference can be shown to be normative and the method itself shown to be rational, where this is due in part to being based on evidence (although not in the same way and in part on a prior rational choice. I will also argue that these two inferences have been confused, being distinct not only conceptually (as nobody disputes but also in their results (the value given to the probability of the hypothesis being not in general that given to the next instance and that methods that are adequate for one are not by themselves adequate for the other. A number of debates over method founder on this confusion and do not show what the debaters think they show.

  3. Competition Law and the Bounded Rationality of Firms

    OpenAIRE

    Bhattacharya, Shilpi

    2016-01-01

    Firm rationality plays a role in several aspects of competition law. Yet, the conception of the firm as a rational, profit maximizing entity has been disputed in different disciplines. This literature shows that neoclassical economic assumptions on which competition law is based can fall short of explaining the full range of observed firm behaviour. Accordingly, an alternative conception of the firm as boundedly rational can impact the understanding of firm conduct in competition law. Be...

  4. Physiology of bile secretion.

    Science.gov (United States)

    Esteller, Alejandro

    2008-10-07

    The formation of bile depends on the structural and functional integrity of the bile-secretory apparatus and its impairment, in different situations, results in the syndrome of cholestasis. The structural bases that permit bile secretion as well as various aspects related with its composition and flow rate in physiological conditions will first be reviewed. Canalicular bile is produced by polarized hepatocytes that hold transporters in their basolateral (sinusoidal) and apical (canalicular) plasma membrane. This review summarizes recent data on the molecular determinants of this primary bile formation. The major function of the biliary tree is modification of canalicular bile by secretory and reabsorptive processes in bile-duct epithelial cells (cholangiocytes) as bile passes through bile ducts. The mechanisms of fluid and solute transport in cholangiocytes will also be discussed. In contrast to hepatocytes where secretion is constant and poorly controlled, cholangiocyte secretion is regulated by hormones and nerves. A short section dedicated to these regulatory mechanisms of bile secretion has been included. The aim of this revision was to set the bases for other reviews in this series that will be devoted to specific issues related with biliary physiology and pathology.

  5. Public policy, rationality and reason

    Directory of Open Access Journals (Sweden)

    Rodolfo Canto Sáenz

    2015-07-01

    Full Text Available This work suggests the incorporation of practical reason in the design, implementation and evaluation of public policies, alongside instrumental rationality. It takes two proposals that today point in this direction: Rawls distinction between reasonable (practical reason and rational (instrumental reason and what this author calls the CI Procedure (categorical imperative procedure and Habermas model of deliberative democracy. The main conclusion is that the analysis of public policies can not be limited to rather narrow limits of science, but requires the contribution of political and moral philosophy.

  6. MARSI: metabolite analogues for rational strain improvement

    DEFF Research Database (Denmark)

    Cardoso, João G. R.; Zeidan, Ahmad A; Jensen, Kristian

    2018-01-01

    reactions in an organism can be used to predict effects of MAs on cellular phenotypes. Here, we present the Metabolite Analogues for Rational Strain Improvement (MARSI) framework. MARSI provides a rational approach to strain improvement by searching for metabolites as targets instead of genes or reactions...

  7. Simple market equilibria with rationally inattentive consumers

    Czech Academy of Sciences Publication Activity Database

    Matějka, Filip; McKay, A.

    2012-01-01

    Roč. 102, č. 3 (2012), s. 24-29 ISSN 0002-8282 R&D Projects: GA ČR(CZ) GPP402/11/P236 Institutional support: RVO:67985998 Keywords : rational choice theory * bounded rationality * consumer research Subject RIV: AH - Economics Impact factor: 2.792, year: 2012

  8. Unconventional Pathways of Secretion Contribute to Inflammation

    Directory of Open Access Journals (Sweden)

    Michael J. D. Daniels

    2017-01-01

    Full Text Available In the conventional pathway of protein secretion, leader sequence-containing proteins leave the cell following processing through the endoplasmic reticulum (ER and Golgi body. However, leaderless proteins also enter the extracellular space through mechanisms collectively known as unconventional secretion. Unconventionally secreted proteins often have vital roles in cell and organism function such as inflammation. Amongst the best-studied inflammatory unconventionally secreted proteins are interleukin (IL-1β, IL-1α, IL-33 and high-mobility group box 1 (HMGB1. In this review we discuss the current understanding of the unconventional secretion of these proteins and highlight future areas of research such as the role of nuclear localisation.

  9. Proton pump inhibitors inhibit pancreatic secretion

    DEFF Research Database (Denmark)

    Wang, Jing; Barbuskaite, Dagne; Tozzi, Marco

    2015-01-01

    +/K+-ATPases are expressed and functional in human pancreatic ducts and whether proton pump inhibitors (PPIs) have effect on those. Here we show that the gastric HKα1 and HKβ subunits (ATP4A; ATP4B) and non-gastric HKα2 subunits (ATP12A) of H+/K+-ATPases are expressed in human pancreatic cells. Pumps have similar...... of major ions in secretion follow similar excretory curves in control and PPI treated animals. In addition to HCO3-, pancreas also secretes K+. In conclusion, this study calls for a revision of the basic model for HCO3- secretion. We propose that proton transport is driving secretion, and that in addition...

  10. Hoopoes color their eggs with antimicrobial uropygial secretions

    Science.gov (United States)

    Soler, Juan J.; Martín-Vivaldi, M.; Peralta-Sánchez, J. M.; Arco, L.; Juárez-García-Pelayo, N.

    2014-09-01

    Uropygial gland secretions are used as cosmetics by some species of birds to color and enhance properties of feathers and teguments, which may signal individual quality. Uropygial secretions also reach eggshells during incubation and, therefore, may influence the coloration of birds' eggs, a trait that has attracted the attention of evolutionary biologists for more than one century. The color of hoopoe eggs typically changes along incubation, from bluish-gray to greenish-brown. Here, we test experimentally the hypothesis that dark uropygial secretion of females is responsible for such drastic color change. Moreover, since uropygial secretion of hoopoes has antimicrobial properties, we also explore the association between color and antimicrobial activity of the uropygial secretion of females. We found that eggs stayed bluish-gray in nests where female access to the uropygial secretion was experimentally blocked. Furthermore, experimental eggs that were maintained in incubators and manually smeared with uropygial secretion experienced similar color changes that naturally incubated eggs did, while control eggs that were not in contact with the secretions did not experience such color changes. All these results strongly support the hypothesis that female hoopoes use their uropygial gland secretion to color the eggs. Moreover, saturation of the uropygial secretion was associated with antimicrobial activity against Bacillus licheniformis. Given the known antimicrobial potential of uropygial secretions of birds, this finding opens the possibility that in scenarios of sexual selection, hoopoes in particular and birds in general signal antimicrobial properties of their uropygial secretion by mean of changes in egg coloration along incubation.

  11. Fields of rational constants of cyclic factorizable derivations

    Directory of Open Access Journals (Sweden)

    Janusz Zielinski

    2015-12-01

    Full Text Available We describe all rational constants of a large family of four-variable cyclic factorizable derivations. Thus, we determine all rational first integrals of their corresponding systems of differential equations. Moreover, we give a characteristic of all four-variable Lotka-Volterra derivations with a nontrivial rational constant. All considerations are over an arbitrary field of characteristic zero. Our main tool is the investigation of the cofactors of strict Darboux polynomials. Factorizable derivations are important in derivation theory. Namely, we may associate the factorizable derivation with any given derivation of a polynomial ring and that construction helps to determine rational constants of arbitrary derivations. Besides, Lotka-Volterra systems play a significant role in population biology, laser physics and plasma physics.

  12. Crab Rationalization Permit Program

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Crab Rationalization Program (Program) allocates BSAI crab resources among harvesters, processors, and coastal communities. The North Pacific Fishery Management...

  13. Should informed consent be based on rational beliefs?

    OpenAIRE

    Savulescu, J; Momeyer, R W

    1997-01-01

    Our aim is to expand the regulative ideal governing consent. We argue that consent should not only be informed but also based on rational beliefs. We argue that holding true beliefs promotes autonomy. Information is important insofar as it helps a person to hold the relevant true beliefs. But in order to hold the relevant true beliefs, competent people must also think rationally. Insofar as information is important, rational deliberation is important. Just as physicians should aim to provide ...

  14. Positive Feedback Investment Strategies and Destabilizing Rational Speculation

    OpenAIRE

    J. Bradford De Long; Andrei Shleifer; Lawrence H. Summers; Robert J. Waldmann

    1989-01-01

    Analyses of the role of rational speculators in financial markets usually presume that such investors dampen price fluctuations by trading against liquidity or noise traders. This conclusion does not necessarily hold when noise traders follow positive-feedback investment strategies buy when prices rise and sell when prices fall. In such cases, it may pay rational speculators to try to jump on the bandwagon early and to purchase ahead of noise trader demand. If rational speculators' attempts t...

  15. Brief Report: Risk-Aversion and Rationality in Autism Spectrum Disorders.

    Science.gov (United States)

    Gosling, Corentin J; Moutier, Sylvain

    2018-05-30

    Risk-aversion and rationality have both been highlighted as core features of decision making in individuals with Autism Spectrum Disorders (ASD). This study tested whether risk-aversion is related to rational decision-making in ASD individuals. ASD and matched control adults completed a decision-making task that discriminated between the use of risk-averse and rational strategies. Results showed that overall, ASD participants were more risk-averse than control participants. Specifically, both groups made similar choices when risk-aversion was the less rational strategy but ASD participants chose more rational options than control participants when risk-aversion was the most rational strategy. This study confirmed that risk-aversion is a core feature of ASD and revealed that ASD individuals can switch their decision-making strategy adaptively to avoid negative consequences.

  16. The impact of economic rationalization, prioritization and rationing on job satisfaction, motivation and team cohesion in hospitals: a survey among retired physician executives in Germany.

    Science.gov (United States)

    Schnoor, Joerg; Braehler, Elmar; Ghanem, Mohamed; Heyde, Christoph E

    2017-01-01

    The growing economization of the health care system and implication of market principles in the medical field have risen new and serious questions on the meaning of the medical profession, the doctor-patient relationship and the orientation of medicine itself. The impact of the dynamic clinical structures on the doctor-doctor and the doctor-patient interaction appear even unpredictable. Therefore, the impact of market-based methods, i.e. rationalization, prioritization and rationing, on job satisfaction, motivation and team cohesion should be quantified. The experiences of former and now retired physician executives in numerous hospitals in Saxony were determined. For this purpose, an anonymously written survey using a standardized questionnaire was conducted in the first quarter of 2016. Rationalization measures were confirmed by 88% of respondents. In more than a third of cases, former executives also experienced prioritization and rationing. The impact of these management techniques on job satisfaction, motivation and team cohesion was carried out in a differentiated manner. There was a tendency to regard rationalization and prioritization measures indifferently to rather disadvantageous, while rationing was predominantly rated negatively. In addition to rationalization, prioritization and rationing measures have now been part of working strategy at the hospitals. On one hand, the conceptual distinction between the terms still seems imprecise; on the other hand, a creeping and imperceptible medico-ethical transgression of the prioritization to rationing seems to have already taken place.

  17. The role of jasmonates in floral nectar secretion.

    Directory of Open Access Journals (Sweden)

    Venkatesan Radhika

    Full Text Available Plants produce nectar in their flowers as a reward for their pollinators and most of our crops depend on insect pollination, but little is known on the physiological control of nectar secretion. Jasmonates are well-known for their effects on senescence, the development and opening of flowers and on plant defences such as extrafloral nectar. Their role in floral nectar secretion has, however, not been explored so far. We investigated whether jasmonates have an influence on floral nectar secretion in oil-seed rape, Brassica napus. The floral tissues of this plant produced jasmonic acid (JA endogenously, and JA concentrations peaked shortly before nectar secretion was highest. Exogenous application of JA to flowers induced nectar secretion, which was suppressed by treatment with phenidone, an inhibitor of JA synthesis. This effect could be reversed by additional application of JA. Jasmonoyl-isoleucine and its structural mimic coronalon also increased nectar secretion. Herbivory or addition of JA to the leaves did not have an effect on floral nectar secretion, demonstrating a functional separation of systemic defence signalling from reproductive nectar secretion. Jasmonates, which have been intensively studied in the context of herbivore defences and flower development, have a profound effect on floral nectar secretion and, thus, pollination efficiency in B. napus. Our results link floral nectar secretion to jasmonate signalling and thereby integrate the floral nectar secretion into the complex network of oxylipid-mediated developmental processes of plants.

  18. To share and be shared

    DEFF Research Database (Denmark)

    Winther, Ida Wentzel

    2018-01-01

    to another. To a certain degree, they share their everyday lives, things, places, memories, and past/future, but as the ones who move back and forth, they belong a little less in each place. This article is about children who are shared between their parent, households and siblings. They are shared...

  19. Rational Emotive Education

    Science.gov (United States)

    Knaus, William

    1977-01-01

    Rational Emotive Education--an outgrowth of theories developed by Albert Ellis--is a teaching design of mental health concepts and problem-solving activities designed to help students to approach and cope with their problems through experiential learning, via a structured, thematic sequence of emotive education lessons. (MJB)

  20. Self-deception as pseudo-rational regulation of belief.

    Science.gov (United States)

    Michel, Christoph; Newen, Albert

    2010-09-01

    Self-deception is a special kind of motivational dominance in belief-formation. We develop criteria which set paradigmatic self-deception apart from related phenomena of auto-manipulation such as pretense and motivational bias. In self-deception rational subjects defend or develop beliefs of high subjective importance in response to strong counter-evidence. Self-deceivers make or keep these beliefs tenable by putting prima-facie rational defense-strategies to work against their established standards of rational evaluation. In paradigmatic self-deception, target-beliefs are made tenable via reorganizations of those belief-sets that relate relevant data to target-beliefs. This manipulation of the evidential value of relevant data goes beyond phenomena of motivated perception of data. In self-deception belief-defense is pseudo-rational. Self-deceivers will typically apply a dual standard of evaluation that remains intransparent to the subject. The developed model of self-deception as pseudo-rational belief-defense is empirically anchored. So, we hope to put forward a promising candidate. Copyright © 2010 Elsevier Inc. All rights reserved.

  1. Rational-Emotive Staff Development.

    Science.gov (United States)

    Forman, Susan G.; Forman, Bruce D.

    1980-01-01

    The application of Rational-Emotive Therapy principles and techniques in in-service education for school personnel is discussed. Teacher and counselor participation in a staff development program is described. (Author)

  2. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  3. Membrane fusion proteins of type I secretion system and tripartite efflux pumps share a binding motif for TolC in gram-negative bacteria.

    Directory of Open Access Journals (Sweden)

    Minho Lee

    Full Text Available The Hly translocator complex of Escherichia coli catalyzes type I secretion of the toxin hemolysin A (HlyA. In this complex, HlyB is an inner membrane ABC (ATP Binding Cassette-type transporter, TolC is an outer membrane channel protein, and HlyD is a periplasmic adaptor anchored in the inner membrane that bridges HlyB to TolC. This tripartite organization is reminiscent of that of drug efflux systems such as AcrA-AcrB-TolC and MacA-MacB-TolC of E. coli. We have previously shown the crucial role of conserved residues located at the hairpin tip region of AcrA and MacA adaptors during assembly of their cognate systems. In this study, we investigated the role of the putative tip region of HlyD using HlyD mutants with single amino acid substitutions at the conserved positions. In vivo and in vitro data show that all mutations abolished HlyD binding to TolC and resulted in the absence of HlyA secretion. Together, our results suggest that, similarly to AcrA and MacA, HlyD interacts with TolC in a tip-to-tip manner. A general model in which these conserved interactions induce opening of TolC during drug efflux and type I secretion is discussed.

  4. Adaptive information-theoretic bounded rational decision-making with parametric priors

    OpenAIRE

    Grau-Moya, Jordi; Braun, Daniel A.

    2015-01-01

    Deviations from rational decision-making due to limited computational resources have been studied in the field of bounded rationality, originally proposed by Herbert Simon. There have been a number of different approaches to model bounded rationality ranging from optimality principles to heuristics. Here we take an information-theoretic approach to bounded rationality, where information-processing costs are measured by the relative entropy between a posterior decision strategy and a given fix...

  5. Rational Verification in Iterated Electric Boolean Games

    Directory of Open Access Journals (Sweden)

    Youssouf Oualhadj

    2016-07-01

    Full Text Available Electric boolean games are compact representations of games where the players have qualitative objectives described by LTL formulae and have limited resources. We study the complexity of several decision problems related to the analysis of rationality in electric boolean games with LTL objectives. In particular, we report that the problem of deciding whether a profile is a Nash equilibrium in an iterated electric boolean game is no harder than in iterated boolean games without resource bounds. We show that it is a PSPACE-complete problem. As a corollary, we obtain that both rational elimination and rational construction of Nash equilibria by a supervising authority are PSPACE-complete problems.

  6. Pancreatic bicarbonate secretion involves two proton pumps

    DEFF Research Database (Denmark)

    Novak, Ivana; Wang, Jing; Henriksen, Katrine L.

    2011-01-01

    Pancreas secretes fluid rich in digestive enzymes and bicarbonate. The alkaline secretion is important in buffering of acid chyme entering duodenum and for activation of enzymes. This secretion is formed in pancreatic ducts, and studies to date show that plasma membranes of duct epithelium expres...

  7. Gastric secretion elicited by conditioning in rats.

    Science.gov (United States)

    Caboclo, José Liberato Ferreira; Cury, Francico de Assis; Borin, Aldenis Albanese; Caboclo, Luís Otávio Sales Ferreira; Ribeiro, Maria Fernanda Sales Caboclo; de Freitas, Pedro José; Andersson, Sven

    2009-01-01

    To investigate whether interdigestive gastric acid secretion can be controlled by a possible memory-related cortical mechanism. To evaluate gastric secretion in rats, we used a methodology that allows gastric juice collection in rats in their habitual conditions (without any restraining) by pairing sound as the conditioning stimulus (CS) and food as the unconditioning stimulus (US). The levels of gastric acid secretion under basal conditions and under sound stimulation were recorded and the circulating gastrin levels determined. When the gastric juice was collected in the course of the conditioning procedure, the results showed that under noise stimulation a significant increase in gastric acid secretion occurred after 10 days of conditioning (p<0.01). The significance was definitively demonstrated after 13 days of conditioning (p<0.001). Basal secretions of the conditioned rats reached a significant level after 16 days of conditioning. The levels of noise-stimulated gastric acid secretion were the highest so far described in physiological experiments carried out in rats and there were no significant increases in the circulating gastrin levels. The results point to the important role played by cortical structures in the control of interdigestive gastric acid secretion in rats. If this mechanism is also present in humans, it may be involved in diseases caused by inappropriate gastric acid secretion during the interprandial periods.

  8. A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.

    Science.gov (United States)

    Lang, Jun

    2012-01-30

    In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.

  9. Does knowing that a suicide was "rational" influence grief?

    Science.gov (United States)

    Brazda, Geoffrey F; Range, Lillian M; Remley, Theodore P; White, Carolyn C

    2018-03-15

    Counseling professionals and graduate students (N = 117) recruited online read a randomly assigned one-paragraph vignette about either a non-rational or rational suicide involving an imaginary loved one. Then, they completed the Grief Experiences Questionnaire (GEQ) about how they would feel. The non-rational suicide group expected significantly more search for explanation than the rational suicide group, but were not significantly different on the other six GEQ subscales. All participants expected few distressing reactions to either vignette, suggesting a one-paragraph vignette may not be sufficient to induce the kind of grief many experience when a loved one dies by suicide.

  10. Mate choice in fruit flies is rational and adaptive.

    Science.gov (United States)

    Arbuthnott, Devin; Fedina, Tatyana Y; Pletcher, Scott D; Promislow, Daniel E L

    2017-01-17

    According to rational choice theory, beneficial preferences should lead individuals to sort available options into linear, transitive hierarchies, although the extent to which non-human animals behave rationally is unclear. Here we demonstrate that mate choice in the fruit fly Drosophila melanogaster results in the linear sorting of a set of diverse isogenic female lines, unambiguously demonstrating the hallmark of rational behaviour, transitivity. These rational choices are associated with direct benefits, enabling males to maximize offspring production. Furthermore, we demonstrate that female behaviours and cues act redundantly in mate detection and assessment, as rational mate choice largely persists when visual or chemical sensory modalities are impaired, but not when both are impaired. Transitivity in mate choice demonstrates that the quality of potential mates varies significantly among genotypes, and that males and females behave in such a way as to facilitate adaptive mate choice.

  11. Rational speculative bubbles: A critical view

    Directory of Open Access Journals (Sweden)

    Radonjić Ognjen

    2007-01-01

    Full Text Available According to the theory of rational bubbles, the bubble is present whenever asset prices progressively diverge from their fundamental value, which occurs because agents expect that asset prices will continue to grow exponentially (self-fulfilling prophecies far in the future and consistently, which promises the realization of ever larger capital gains. In our opinion, the basic shortcoming of this theory refers to the assumption that all market agents are perfectly informed and rational and, accordingly, form homogeneous expectations. The model does not explain decision-making processes or expectation formation, nor does it detect potential psychological and institutional factors that might significantly influence decision making processes and market participants’ reactions to news. Since assumptions of the model critically determine its validity, we conclude that comprehensiveness of the rational bubble model is, to put it mildly, limited.

  12. Neuroethics transformation of economic rationality: implications for decision making in business

    Directory of Open Access Journals (Sweden)

    José-Félix Lozano

    2017-02-01

    Full Text Available The economy and business field has traditionally been dominated by a conception of calculator, strategic and profit-maximizing individual rationality. This model of rationality has important theoretical limitations and practical consequences. In recent decades the results of neuroethics´ research seems open new ways for understanding the practical rationality. These new routes, representing a revaluation of emotional and intuitive dimension in cognitive ability and have great relevance for business and economic decision making. The aim of this paper is to analyse the implications of a rational dialogic-friendly (cor-cordis concept for economic and business decision-making. Our work proposes a version of the dialogic-friendly practical rationality that integrate advances in neuroethics with the discursive rationality perspective in order to overcome the strategic rationality and emotivist intuitionism.

  13. [Maintenance ration and conversion efficiency of Hyporhamphus sajori].

    Science.gov (United States)

    Guo, X; Tang, Q

    2001-04-01

    The maintenance ration and conversion efficiency of Japanese halfbeak, Hyporhamphus sajori were tested with enclosures installed in a shrimp raising pond. The results showed that there existed an evident relationship between daily ration(DR) and growth rate(GR) of the fish, GR = 140.37 DR - 24.03. The conversion efficiency was 13.96% in biomass or 16.12% in energy. The maintenance ration was 17.12% and 20.39% of body weight in terms of growth rate and specific growth rate, respectively, indicating that it could be deduced from growth rate quite differently from that from specific growth rate in the same experiment. The abnormal growth rate appeared when daily ration was below 3.30% of body weight, implied that Japanese halfbeak may get other food resources besides supplied net zooplankton.

  14. Air Force UAV’s: The Secret History

    Science.gov (United States)

    2010-07-01

    iA Mitchell Institute Study i Air Force UAVs The Secret History A Mitchell Institute Study July 2010 By Thomas P. Ehrhard Report Documentation Page...DATES COVERED 00-00-2010 to 00-00-2010 4. TITLE AND SUBTITLE Air Force UAVs The Secret History 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c... The Secret History 2 Air Force UAVs: The Secret History2 air Force uaVs: The secret history Has any airplane in the past decade captured the public

  15. Rational and moral action : a critical survey of rational choice theory

    NARCIS (Netherlands)

    de Jonge, J.P.R.

    2009-01-01

    This book is about rational choice theory from a different point of view. It is different for three reasons. First, it pays attention to the unintended consequences of intended actions. Second, it employs a non-instrumental approach to moral actions. And third, it argues that choice opportunities

  16. Economic rationality and health and lifestyle choices for people with diabetes.

    Science.gov (United States)

    Baker, Rachel Mairi

    2006-11-01

    Economic rationality is traditionally represented by goal-oriented, maximising behaviour, or 'instrumental rationality'. Such a consequentialist, instrumental model of choice is often implicit in a biomedical approach to health promotion and education. The research reported here assesses the relevance of a broader conceptual framework of rationality, which includes 'procedural' and 'expressive' rationality as complements to an instrumental model of rationality, in a health context. Q methodology was used to derive 'factors' underlying health and lifestyle choices, based on a factor analysis of the results of a card sorting procedure undertaken by 27 adult respondents with type 2 diabetes in Newcastle upon Tyne, UK. These factors were then compared with the rationality framework and the appropriateness of an extended model of economic rationality as a means of better understanding health and lifestyle choices was assessed. Taking a wider rational choice perspective, choices which are rendered irrational within a narrow-biomedical or strictly instrumental model, can be understood in terms of a coherent rationale, grounded in the accounts of respondents. The implications of these findings are discussed in terms of rational choice theory and diabetes management and research.

  17. The Role of Rationality in University Budgeting.

    Science.gov (United States)

    Chaffee, Ellen Earle

    1983-01-01

    Although empirical accounts of organizational decision making often show that the process is not a rational one, a study of budgeting at Stanford University during the 1970s, while not conclusive or comprehensive, supported the claim that the institution's process was rational and provided a procedure for testing a decision-making model. (MSE)

  18. Should Teachers Be Taught to Be Rational?

    Science.gov (United States)

    Floden, Robert E.; Feiman, Sharon

    1981-01-01

    Teacher education programs have long attempted to teach students to follow a rational mode of thinking. Recent research on teacher thinking has shown that a gap exists between how teachers think and the rational model. Such research should be used to give teacher educators insight into how their students think and learn. (JN)

  19. Heterogeneity, Bounded Rationality and Market Dysfunctionality

    OpenAIRE

    Xue-Zhong He; Lei Shi

    2008-01-01

    As the main building blocks of the modern finance theory, homogeneity and rational expectation have faced difficulty in explaining many market anomalies, stylized factors, and market inefficiency in empirical studies. As a result, heterogeneity and bounded rationality have been used as an alterative paradigm of asset price dynamics and this paradigm has been widely recognized recently in both academic and financial market practitioners. Within the framework of Chiarella, Dieci and He (2006a, ...

  20. Novel Kazal-type proteinase inhibitors from the skin secretion of the Splendid leaf frog, Cruziohyla calcarifer

    OpenAIRE

    Carolina Proaño-Bolaños; Renjie Li; Mei Zhou; Lei Wang; Xinping Xi; Elicio E. Tapia; Luis A. Coloma; Tianbao Chen; Chris Shaw

    2017-01-01

    Peptidase inhibitors have an important role controlling a variety of biological processes. Here, we employed a peptidomic approach including molecular cloning, tandem mass spectrometry and enzymatic assays to reveal 7 Kazal-type proteinase inhibitors (CCKPs) (18 variants) in the skin secretion of the unexplored frog, Cruziohyla calcarifer. All 18 proteins shared the Kazal pattern C-X(7)-C-X(6,7)-C-X(6,7)-Y-X(3)-C-X(2)-C-X(15-21)-C and 3 disulphide bridges. Based on structural comparative anal...

  1. Consumers' evaluations of ecological packaging - rational and emotional approaches

    OpenAIRE

    Koenig-Lewis, Nicole; Palmer, Adrian; Dermody, Janine; Urbye, Andreas

    2014-01-01

    Ecological marketing claims have been criticized for confusing or misleading buyers, leading to calls for more rationality in promoting and evaluating ‘green’ products. However, emotions are important drivers influencing pro-environmental purchase decisions. This study investigates consumers' emotional and rational evaluations of pro-environmental packaging. A conceptual model incorporates individuals' general environmental concerns, their rational beliefs about environmental effects of produ...

  2. Génération Y : much ado about nothing ? Le talent des jeunes

    OpenAIRE

    Wilkin, Luc

    2015-01-01

    Introduction Baby Boomers, Génération X, Génération Y, Génération du Millénaire, Génération Z, Génération Nintendo, Génération Wii, Génération Internet, Génération C, Génération Google, Génération Mobile, Génération Powerpoint, Génération couper/coller, natifs et immigrants digitaux, Homo sapiens digital ou Homo-zappiens, les vocables ne manquent pas pour désigner, séparer, opposer et segmenter les générations. Celles-ci évoluent, dans les discours, au gré des révolutions proclamées qui survi...

  3. Lying for the Greater Good: Bounded Rationality in a Team

    OpenAIRE

    Oktay Sürücü

    2014-01-01

    This paper is concerned with the interaction between fully and boundedly rational agents in situations where their interests are perfectly aligned. The cognitive limitations of the boundedly rational agent do not allow him to fully understand the market conditions and lead him to take non-optimal decisions in some situations. Using categorization to model bounded rationality, we show that the fully rational agent can nudge, i.e., he can manipulate the information he sends and decrease the exp...

  4. Bounded rationality alters the dynamics of paediatric immunization acceptance.

    Science.gov (United States)

    Oraby, Tamer; Bauch, Chris T

    2015-06-02

    Interactions between disease dynamics and vaccinating behavior have been explored in many coupled behavior-disease models. Cognitive effects such as risk perception, framing, and subjective probabilities of adverse events can be important determinants of the vaccinating behaviour, and represent departures from the pure "rational" decision model that are often described as "bounded rationality". However, the impact of such cognitive effects in the context of paediatric infectious disease vaccines has received relatively little attention. Here, we develop a disease-behavior model that accounts for bounded rationality through prospect theory. We analyze the model and compare its predictions to a reduced model that lacks bounded rationality. We find that, in general, introducing bounded rationality increases the dynamical richness of the model and makes it harder to eliminate a paediatric infectious disease. In contrast, in other cases, a low cost, highly efficacious vaccine can be refused, even when the rational decision model predicts acceptance. Injunctive social norms can prevent vaccine refusal, if vaccine acceptance is sufficiently high in the beginning of the vaccination campaign. Cognitive processes can have major impacts on the predictions of behaviour-disease models, and further study of such processes in the context of vaccination is thus warranted.

  5. Rational desires and the limitation of life-sustaining treatment.

    Science.gov (United States)

    Savulescu, Julian

    1994-07-01

    It is accepted that treatment of previously competent, now incompetent patients can be limited if that is what the patient would desire, if she were now competent. Expressed past preferences or an advance directive are often taken to constitute sufficient evidence of what a patient would now desire. I distinguish between desires and rational desires. I argue that for a desire to be an expression of a person's autonomy, it must be or satisfy that person's rational desires. A person rationally desires a course of action if that person desires it while being in possession of all available relevant facts, without committing relevant error of logic, and "vividly imagining" what its consequences would be like for her. I argue that some competent, expressed desires obstruct autonomy. I show that several psychological mechanisms operate to prevent a person rationally evaluating what future life in a disabled state would be like. Rational evaluation is difficult. However, treatment limitation, if it is to respect autonomy, must be in accord with a patient's rational desires, and not merely her expressed desires. I illustrate the implications of these arguments for the use of advance directives and for the treatment of competent patients.

  6. Development of rations for the enhanced survival of salmon

    International Nuclear Information System (INIS)

    Ewing, R.D.; Lagasse, J.P.

    1990-12-01

    The nutritional quality of feed plays an important role in determining the health and ''fitness'' of smolts. Commercial fish meal, the major source of protein in salmon rations, may be reduced in quality from poor drying techniques during manufacture. Dietary stress in the hatchery may result. This investigation tests the hypothesis that protein quality of fish rations can influence the survival of smolts and the ultimate return of adults. The test involves a comparison between performances of coho (Oncorhynchus kisutch) and chinook salmon (O. tshawytscha) reared on rations containing very high quality protein derived from vacuum dried meals and those of fish reared on commercial rations, with commercial fish meal as a source of protein. Survival and return of several brood years of test and control fish are used to measure the influence of ration on survival. This report includes recovery data from these marked fish collected 1982 through September 1990

  7. Trade secrets protection mode of nuclear power plant

    International Nuclear Information System (INIS)

    Zeng Bin

    2015-01-01

    The paper analyzes the legal environment in which nuclear power enterprises are stayed, and mainly discusses the business secret protection modes of China's nuclear power enterprises. It is expected to provide a revelation and help for these enterprises to protect their business secrets. Firstly, the paper briefly expounds the legal basis of business secret protection and China's legalization status in this regard. Then it mainly puts forward the business secret management framework and postulations for nuclear power enterprises, and key points in application and protection of nuclear power business secret. (author)

  8. Rational emotive behaviour therapy: distinctive features

    OpenAIRE

    Dryden, Windy

    2008-01-01

    Rational emotive behaviour therapy (REBT) encourages the client to focus on their emotional problems in order to understand, challenge and change the irrational beliefs that underpin these problems. REBT can help clients to strengthen conviction in their alternative rational beliefs by acting in ways that are consistent with them and thus encourage a healthier outlook.\\ud \\ud This accessible and direct guide introduces the reader to REBT while indicating how it is different from other approac...

  9. Rationally Addicted to Drinking and Smoking?

    OpenAIRE

    Bask, Mikael; Melkersson, Maria

    2001-01-01

    When modeling demand for addictive consumption goods, the most widely used framework is the rational addiction model proposed by Becker and Murphy (1988). In the present paper, we extend the rational addiction model to include two addictive consumption goods, alcohol and cigarettes. We estimate the aggregate demand for alcohol and cigarettes in Sweden, using aggregate annual time series on sales volumes for the period 1955-1999. OLS estimates are compared to GMM estimates allowing for possibl...

  10. The Emotional and Moral Basis of Rationality

    Science.gov (United States)

    Boostrom, Robert

    2013-01-01

    This chapter explores the basis of rationality, arguing that critical thinking tends to be taught in schools as a set of skills because of the failure to recognize that choosing to think critically depends on the prior development of stable sentiments or moral habits that nourish a rational self. Primary among these stable sentiments are the…

  11. Ionizing radiation in secret services' conspirative actions

    International Nuclear Information System (INIS)

    Vogel, H.; Lotz, P.; Vogel, B.

    2007-01-01

    Introduction: The death of Litvinenko has been reported by the media. It has raised the question whether this case had been unique. The fall of the wall has allowed a glimpse in the planning and comporting of a secret service. Material and method: Documents of the secret service of the former German democratic republic (GDR), books of defectors, and media reports about secret service actions with radiating substances have been analyzed. Results: Since decades, secret services have been using radioactive nuclides and radiation for their tasks. Several killings with radiation have been reported. A complicated logistic had been developed. Conclusion: Only singular cases of the employment of radiating substances have become known. It is probable that the majority rests unknown. Government support seems necessary in secret services' conspirative actions with radiating substance

  12. The two-model problem in rational decision making

    NARCIS (Netherlands)

    Boumans, Marcel

    2011-01-01

    A model of a decision problem frames that problem in three dimensions: sample space, target probability and information structure. Each specific model imposes a specific rational decision. As a result, different models may impose different, even contradictory, rational decisions, creating choice

  13. Realization and elimination in rational representations of behaviors

    NARCIS (Netherlands)

    Gottimukkala, Sasanka V.; Trentelman, Hendrikus; Fiaz, Shaik

    This article deals with the relationship between rational representations of linear differential systems and their state representations. In particular we study the relationship between rational representations on the one hand, and output nulling and driving variable representations on the other. In

  14. Nonlinear Secret Image Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Sang-Ho Shin

    2014-01-01

    efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB and 1.74tlog2⁡m bit-per-pixel (bpp, respectively.

  15. Rationality, Theory Acceptance and Decision Theory

    Directory of Open Access Journals (Sweden)

    J. Nicolas Kaufmann

    1998-06-01

    Full Text Available Following Kuhn's main thesis according to which theory revision and acceptance is always paradigm relative, I propose to outline some possible consequences of such a view. First, asking the question in what sense Bayesian decision theory could serve as the appropriate (normative theory of rationality examined from the point of view of the epistemology of theory acceptance, I argue that Bayesianism leads to a narrow conception of theory acceptance. Second, regarding the different types of theory revision, i.e. expansion, contraction, replacement and residuals shifts, I extract from Kuhn's view a series of indications showing that theory replacement cannot be rationalized within the framework of Bayesian decision theory, not even within a more sophisticated version of that model. Third, and finally, I will point to the need for a more comprehensive model of rationality than the Bayesian expected utility maximization model, the need for a model which could better deal with the different aspects of theory replacement. I will show that Kuhn's distinction between normal and revolutionary science gives us several hints for a more adequate theory of rationality in science. I will also show that Kuhn is not in a position to fully articulate his main ideas and that he well be confronted with a serious problem concerning collective choice of a paradigm.

  16. Regulation of glucagon secretion by incretins

    DEFF Research Database (Denmark)

    Holst, Jens Juul; Christensen, M; Lund, A

    2011-01-01

    Glucagon secretion plays an essential role in the regulation of hepatic glucose production, and elevated fasting and postprandial plasma glucagon concentrations in patients with type 2 diabetes (T2DM) contribute to their hyperglycaemia. The reason for the hyperglucagonaemia is unclear, but recent...... studies have shown lack of suppression after oral but preserved suppression after isoglycaemic intravenous glucose, pointing to factors from the gut. Gastrointestinal hormones that are secreted in response to oral glucose include glucagon-like peptide-1 (GLP-1) that strongly inhibits glucagon secretion......, and GLP-2 and GIP, both of which stimulate secretion. When the three hormones are given together on top of isoglycaemic intravenous glucose, glucagon suppression is delayed in a manner similar to that observed after oral glucose. Studies with the GLP-1 receptor antagonist, exendin 9-39, suggest...

  17. Rational first integrals of geodesic equations and generalised hidden symmetries

    International Nuclear Information System (INIS)

    Aoki, Arata; Houri, Tsuyoshi; Tomoda, Kentaro

    2016-01-01

    We discuss novel generalisations of Killing tensors, which are introduced by considering rational first integrals of geodesic equations. We introduce the notion of inconstructible generalised Killing tensors, which cannot be constructed from ordinary Killing tensors. Moreover, we introduce inconstructible rational first integrals, which are constructed from inconstructible generalised Killing tensors, and provide a method for checking the inconstructibility of a rational first integral. Using the method, we show that the rational first integral of the Collinson–O’Donnell solution is not inconstructible. We also provide several examples of metrics admitting an inconstructible rational first integral in two and four-dimensions, by using the Maciejewski–Przybylska system. Furthermore, we attempt to generalise other hidden symmetries such as Killing–Yano tensors. (paper)

  18. Mental health as rational autonomy.

    Science.gov (United States)

    Edwards, R B

    1981-08-01

    Rather than eliminate the terms "mental health and illness" because of the grave moral consequences of psychiatric labeling, conservative definitions are proposed and defended. Mental health is rational autonomy, and mental illness is the sustained loss of such. Key terms are explained, advantages are explored, and alternative concepts are criticized. The value and descriptive components of all such definitions are consciously acknowledged. Where rational autonomy is intact, mental hospitals and psychotherapists should not think of themselves as treating an illness. Instead, they are functioning as applied axiologists, moral educators, spiritual mentors, etc. They deal with what Szasz has called "personal, social, and ethical problems in living." But mental illness is real.

  19. Role of adipose secreted factors and kisspeptin in the metabolic control of gonadotropin secretion and puberty

    Science.gov (United States)

    Factors secreted by adipose tissue continue to be discovered. Evidence indicates a strong link between neural influences and adipocyte expression and secretion of a wide array of cytokines, neurotrophic factors, growth factors, binding proteins, and neuropeptides. These “adipokines” are linked to im...

  20. Burkholderia cenocepacia type VI secretion system mediates escape of type II secreted proteins into the cytoplasm of infected macrophages.

    Directory of Open Access Journals (Sweden)

    Roberto Rosales-Reyes

    Full Text Available Burkholderia cenocepacia is an opportunistic pathogen that survives intracellularly in macrophages and causes serious respiratory infections in patients with cystic fibrosis. We have previously shown that bacterial survival occurs in bacteria-containing membrane vacuoles (BcCVs resembling arrested autophagosomes. Intracellular bacteria stimulate IL-1β secretion in a caspase-1-dependent manner and induce dramatic changes to the actin cytoskeleton and the assembly of the NADPH oxidase complex onto the BcCV membrane. A Type 6 secretion system (T6SS is required for these phenotypes but surprisingly it is not required for the maturation arrest of the BcCV. Here, we show that macrophages infected with B. cenocepacia employ the NLRP3 inflammasome to induce IL-1β secretion and pyroptosis. Moreover, IL-1β secretion by B. cenocepacia-infected macrophages is suppressed in deletion mutants unable to produce functional Type VI, Type IV, and Type 2 secretion systems (SS. We provide evidence that the T6SS mediates the disruption of the BcCV membrane, which allows the escape of proteins secreted by the T2SS into the macrophage cytoplasm. This was demonstrated by the activity of fusion derivatives of the T2SS-secreted metalloproteases ZmpA and ZmpB with adenylcyclase. Supporting this notion, ZmpA and ZmpB are required for efficient IL-1β secretion in a T6SS dependent manner. ZmpA and ZmpB are also required for the maturation arrest of the BcCVs and bacterial intra-macrophage survival in a T6SS-independent fashion. Our results uncover a novel mechanism for inflammasome activation that involves cooperation between two bacterial secretory pathways, and an unanticipated role for T2SS-secreted proteins in intracellular bacterial survival.

  1. Design rationalization and the logic of design: a case study

    DEFF Research Database (Denmark)

    Galle, Per

    1996-01-01

    various ‘sources of credibility’ of premises, items of general background knowledge, and several (abductive and deductive) patterns of inference which suggest a possible ‘logic of design’. Rationalization of decisions is defined, and many decisions are found not to be fully rationalized, despite...... the apparent rationality of the reasoning....

  2. Visualization of glucagon secretion from pancreatic α cells by bioluminescence video microscopy: Identification of secretion sites in the intercellular contact regions

    International Nuclear Information System (INIS)

    Yokawa, Satoru; Suzuki, Takahiro; Inouye, Satoshi; Inoh, Yoshikazu; Suzuki, Ryo; Kanamori, Takao; Furuno, Tadahide; Hirashima, Naohide

    2017-01-01

    We have firstly visualized glucagon secretion using a method of video-rate bioluminescence imaging. The fusion protein of proglucagon and Gaussia luciferase (PGCG-GLase) was used as a reporter to detect glucagon secretion and was efficiently expressed in mouse pancreatic α cells (αTC1.6) using a preferred human codon-optimized gene. In the culture medium of the cells expressing PGCG-GLase, luminescence activity determined with a luminometer was increased with low glucose stimulation and KCl-induced depolarization, as observed for glucagon secretion. From immunochemical analyses, PGCG-GLase stably expressed in clonal αTC1.6 cells was correctly processed and released by secretory granules. Luminescence signals of the secreted PGCG-GLase from the stable cells were visualized by video-rate bioluminescence microscopy. The video images showed an increase in glucagon secretion from clustered cells in response to stimulation by KCl. The secretory events were observed frequently at the intercellular contact regions. Thus, the localization and frequency of glucagon secretion might be regulated by cell-cell adhesion. - Highlights: • The fused protein of proglucagon to Gaussia luciferase was used as a reporter. • The fusion protein was highly expressed using a preferred human-codon optimized gene. • Glucagon secretion stimulated by depolarization was determined by luminescence. • Glucagon secretion in α cells was visualized by bioluminescence imaging. • Glucagon secretion sites were localized in the intercellular contact regions.

  3. 29 CFR 1903.9 - Trade secrets.

    Science.gov (United States)

    2010-07-01

    ... INSPECTIONS, CITATIONS AND PROPOSED PENALTIES § 1903.9 Trade secrets. (a) Section 15 of the Act provides: “All... concerns or relates to the trade secrets, processes, operations, style of work, or apparatus, or to the...

  4. Air Force UAVs: The Secret History

    Science.gov (United States)

    2010-07-01

    iA Mitchell Institute Study i Air Force UAVs The Secret History A Mitchell Institute Study July 2010 By Thomas P. Ehrhard Report Documentation Page...DATES COVERED 00-00-2010 to 00-00-2010 4. TITLE AND SUBTITLE Air Force UAVs The Secret History 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...opening phases of Operation Enduring Freedom in Afghanistan. By Thomas P. Ehrhard a miTchEll insTiTuTE sTudy July 2010 Air Force UAVs The Secret History

  5. THE BUFFER CAPACITY OF AIRWAY EPITHELIAL SECRETIONS

    Directory of Open Access Journals (Sweden)

    Dusik eKim

    2014-06-01

    Full Text Available The pH of airway epithelial secretions influences bacterial killing and mucus properties and is reduced by acidic pollutants, gastric reflux, and respiratory diseases such as cystic fibrosis (CF. The effect of acute acid loads depends on buffer capacity, however the buffering of airway secretions has not been well characterized. In this work we develop a method for titrating micro-scale (30 µl volumes and use it to study fluid secreted by the human airway epithelial cell line Calu-3, a widely used model for submucosal gland serous cells. Microtitration curves revealed that HCO3- is the major buffer. Peak buffer capacity (β increased from 17 to 28 mM/pH during forskolin stimulation, and was reduced by >50% in fluid secreted by cystic fibrosis transmembrane conductance regulator (CFTR-deficient Calu-3 monolayers, confirming an important role of CFTR in HCO3- secretion. Back-titration with NaOH revealed non-volatile buffer capacity due to proteins synthesized and released by the epithelial cells. Lysozyme and mucin concentrations were too low to buffer Calu-3 fluid significantly, however model titrations of porcine gastric mucins at concentrations near the sol-gel transition suggest that mucins may contribute to the buffer capacity of ASL in vivo. We conclude that CFTR-dependent HCO3- secretion and epithelially-derived proteins are the predominant buffers in Calu-3 secretions.

  6. The ESX system in Bacillus subtilis mediates protein secretion.

    Directory of Open Access Journals (Sweden)

    Laura A Huppert

    Full Text Available Esat-6 protein secretion systems (ESX or Ess are required for the virulence of several human pathogens, most notably Mycobacterium tuberculosis and Staphylococcus aureus. These secretion systems are defined by a conserved FtsK/SpoIIIE family ATPase and one or more WXG100 family secreted substrates. Gene clusters coding for ESX systems have been identified amongst many organisms including the highly tractable model system, Bacillus subtilis. In this study, we demonstrate that the B. subtilis yuk/yue locus codes for a nonessential ESX secretion system. We develop a functional secretion assay to demonstrate that each of the locus gene products is specifically required for secretion of the WXG100 virulence factor homolog, YukE. We then employ an unbiased approach to search for additional secreted substrates. By quantitative profiling of culture supernatants, we find that YukE may be the sole substrate that depends on the FtsK/SpoIIIE family ATPase for secretion. We discuss potential functional implications for secretion of a unique substrate.

  7. Emergence of scale-free characteristics in socio-ecological systems with bounded rationality

    OpenAIRE

    Kasthurirathna, Dharshana; Piraveenan, Mahendra

    2015-01-01

    Socio?ecological systems are increasingly modelled by games played on complex networks. While the concept of Nash equilibrium assumes perfect rationality, in reality players display heterogeneous bounded rationality. Here we present a topological model of bounded rationality in socio-ecological systems, using the rationality parameter of the Quantal Response Equilibrium. We argue that system rationality could be measured by the average Kullback?-Leibler divergence between Nash and Quantal Res...

  8. Game interrupted: The rationality of considering the future

    Directory of Open Access Journals (Sweden)

    Brandon Almy

    2013-09-01

    Full Text Available The ``problem of points'', introduced by Paccioli in 1494 and solved by Pascal and Fermat 160 years later, inspired the modern concept of probability. Incidentally, the problem also shows that rational decision-making requires the consideration of future events. We show that naive responses to the problem of points are more future oriented and thus more rational in this sense when the problem itself is presented in a future frame instead of the canonical past frame. A simple nudge is sufficient to make decisions more rational. We consider the implications of this finding for hypothesis testing and predictions of replicability.

  9. Teaching Rational Entitlement and Responsibility: A Socratic Exercise

    Directory of Open Access Journals (Sweden)

    David Godden

    2014-02-01

    Full Text Available The paper reports on a Socratic exercise that introduces participants to the norm of rational entitlement, as distinct from political entitlement, and the attendant norm of rational responsibility. The exercise demonstrates that, because participants are not willing to exchange their own opinion at random for another differing opinion to which the owner is, by the participants’ own admission, entitled, they treat their entitlement to their own opinion differently, giving it a special status. This gives rise to rational obligations such as the obligation to provide reasons, and a willingness to risk those opinions to the force of the better reason.

  10. Rational equity bubbles

    OpenAIRE

    Zhou, Ge

    2012-01-01

    This paper discusses the existence of a bubble in the pricing of an asset that pays positive dividends. I show that rational bubbles can exist in a growing economy. The existence of bubbles depends on the relative magnitudes of risk aversion to consumption and to wealth. Furthermore, I examine how an exogenous shock in technology might trigger bubbles.

  11. Rationalization of water consumption in paper industry

    Directory of Open Access Journals (Sweden)

    Žarković Darja

    2004-01-01

    Full Text Available The subject of this paper was to consider the possibilities of economical paper production with rationalization of water consumption. In accordance with the principles of viable development. The pulp & paper industry has had to face global market needs and strict regulation concerning the environment. The basic motive was to provide consistent and high product quality, which is competitive on the market. The pulp & paper industry is one of the largest consumers and pollutants of natural resources. In that light, the rationalization of raw material, water, energy and chemicals consumption with minimization of environmental impact is essential. The European directive on environmental protection obliges producers of pulp & paper to decrease the volume of wastewater and to increase the efficiency treatment. Pulp and paper industry in Serbia and Montenegro will also be faced with the demands for environmental protection. Numerous examples of water consumption rationalization and improvement of water quality in the pulp & paper industry could be found in different literature sources. It is necessary to increase water system closure and implement up-to-date treatment methods. The possibilities for water consumption rationalization, in a real system the paperboard mill UMKA, were examined.

  12. Extrafloral nectar secretion from wounds of Solanum dulcamara.

    Science.gov (United States)

    Lortzing, Tobias; Calf, Onno W; Böhlke, Marlene; Schwachtje, Jens; Kopka, Joachim; Geuß, Daniel; Kosanke, Susanne; van Dam, Nicole M; Steppuhn, Anke

    2016-04-25

    Plants usually close wounds rapidly to prevent infections and the loss of valuable resources such as assimilates(1). However, herbivore-inflicted wounds on the bittersweet nightshade Solanum dulcamara appear not to close completely and produce sugary wound secretions visible as droplets. Many plants across the plant kingdom secrete sugary nectar from extrafloral nectaries(2) to attract natural enemies of herbivores for indirect defence(3,4). As ants forage on wound edges of S. dulcamara in the field, we hypothesized that wound secretions are a form of extrafloral nectar (EFN). We show that, unlike EFN from known nectaries, wound secretions are neither associated with any specific structure nor restricted to certain locations. However, similar to EFN, they are jasmonate-inducible and the plant controls their chemical composition. Wound secretions are attractive for ants, and application of wound secretion mimics increases ant attraction and reduces herbivory on S. dulcamara plants in a natural population. In greenhouse experiments, we reveal that ants can defend S. dulcamara from two of its native herbivores, slugs and flea beetle larvae. Since nectar is defined by its ecological function as a sugary secretion involved in interactions with animals(5), such 'plant bleeding' could be a primitive mode of nectar secretion exemplifying an evolutionary origin of structured extrafloral nectaries.

  13. Incretin hormone secretion over the day

    DEFF Research Database (Denmark)

    Ahren, B; Carr, RD; Deacon, Carolyn F.

    2010-01-01

    The two incretin hormones glucose-dependent insulinotropic polypeptide (GIP) and glucagon-like peptide-1 (GLP-1) are key factors in the regulation of islet function and glucose metabolism, and incretin-based therapy for type 2 diabetes has gained considerable interest during recent years. Regulat......The two incretin hormones glucose-dependent insulinotropic polypeptide (GIP) and glucagon-like peptide-1 (GLP-1) are key factors in the regulation of islet function and glucose metabolism, and incretin-based therapy for type 2 diabetes has gained considerable interest during recent years....... Regulation of incretin hormone secretion is less well characterized. The main stimulus for incretin hormone secretion is presence of nutrients in the intestinal lumen, and carbohydrate, fat as well as protein all have the capacity to stimulate GIP and GLP-1 secretion. More recently, it has been established...... that a diurnal regulation exists with incretin hormone secretion to an identical meal being greater when the meal is served in the morning compared to in the afternoon. Finally, whether incretin hormone secretion is altered in disease states is an area with, so far, controversial results in different studies...

  14. Exosome secretion affects social motility in Trypanosoma brucei.

    Directory of Open Access Journals (Sweden)

    Dror Eliaz

    2017-03-01

    Full Text Available Extracellular vesicles (EV secreted by pathogens function in a variety of biological processes. Here, we demonstrate that in the protozoan parasite Trypanosoma brucei, exosome secretion is induced by stress that affects trans-splicing. Following perturbations in biogenesis of spliced leader RNA, which donates its spliced leader (SL exon to all mRNAs, or after heat-shock, the SL RNA is exported to the cytoplasm and forms distinct granules, which are then secreted by exosomes. The exosomes are formed in multivesicular bodies (MVB utilizing the endosomal sorting complexes required for transport (ESCRT, through a mechanism similar to microRNA secretion in mammalian cells. Silencing of the ESCRT factor, Vps36, compromised exosome secretion but not the secretion of vesicles derived from nanotubes. The exosomes enter recipient trypanosome cells. Time-lapse microscopy demonstrated that cells secreting exosomes or purified intact exosomes affect social motility (SoMo. This study demonstrates that exosomes are delivered to trypanosome cells and can change their migration. Exosomes are used to transmit stress signals for communication between parasites.

  15. Mathematical Analysis of Vehicle Delivery Scale of Bike-Sharing Rental Nodes

    Science.gov (United States)

    Zhai, Y.; Liu, J.; Liu, L.

    2018-04-01

    Aiming at the lack of scientific and reasonable judgment of vehicles delivery scale and insufficient optimization of scheduling decision, based on features of the bike-sharing usage, this paper analyses the applicability of the discrete time and state of the Markov chain, and proves its properties to be irreducible, aperiodic and positive recurrent. Based on above analysis, the paper has reached to the conclusion that limit state (steady state) probability of the bike-sharing Markov chain only exists and is independent of the initial probability distribution. Then this paper analyses the difficulty of the transition probability matrix parameter statistics and the linear equations group solution in the traditional solving algorithm of the bike-sharing Markov chain. In order to improve the feasibility, this paper proposes a "virtual two-node vehicle scale solution" algorithm which considered the all the nodes beside the node to be solved as a virtual node, offered the transition probability matrix, steady state linear equations group and the computational methods related to the steady state scale, steady state arrival time and scheduling decision of the node to be solved. Finally, the paper evaluates the rationality and accuracy of the steady state probability of the proposed algorithm by comparing with the traditional algorithm. By solving the steady state scale of the nodes one by one, the proposed algorithm is proved to have strong feasibility because it lowers the level of computational difficulty and reduces the number of statistic, which will help the bike-sharing companies to optimize the scale and scheduling of nodes.

  16. MATHEMATICAL ANALYSIS OF VEHICLE DELIVERY SCALE OF BIKE-SHARING RENTAL NODES

    Directory of Open Access Journals (Sweden)

    Y. Zhai

    2018-04-01

    Full Text Available Aiming at the lack of scientific and reasonable judgment of vehicles delivery scale and insufficient optimization of scheduling decision, based on features of the bike-sharing usage, this paper analyses the applicability of the discrete time and state of the Markov chain, and proves its properties to be irreducible, aperiodic and positive recurrent. Based on above analysis, the paper has reached to the conclusion that limit state (steady state probability of the bike-sharing Markov chain only exists and is independent of the initial probability distribution. Then this paper analyses the difficulty of the transition probability matrix parameter statistics and the linear equations group solution in the traditional solving algorithm of the bike-sharing Markov chain. In order to improve the feasibility, this paper proposes a "virtual two-node vehicle scale solution" algorithm which considered the all the nodes beside the node to be solved as a virtual node, offered the transition probability matrix, steady state linear equations group and the computational methods related to the steady state scale, steady state arrival time and scheduling decision of the node to be solved. Finally, the paper evaluates the rationality and accuracy of the steady state probability of the proposed algorithm by comparing with the traditional algorithm. By solving the steady state scale of the nodes one by one, the proposed algorithm is proved to have strong feasibility because it lowers the level of computational difficulty and reduces the number of statistic, which will help the bike-sharing companies to optimize the scale and scheduling of nodes.

  17. Reappraisal of bicarbonate secretion by the human oesophagus

    DEFF Research Database (Denmark)

    Mertz-Nielsen, A; Hillingsø, J; Bukhave, Klaus

    1997-01-01

    BACKGROUND AND AIMS: Administration of omeprazole to healthy volunteers was recently reported to increase proximal duodenal mucosalbicarbonate secretion. As human oesophagus also secretes bicarbonate, the hypothesis was tested that omeprazole may stimulate oesophagealbicarbonate secretion and thus......: The median rates (95% confidence intervals)of intrinsic oesophageal bicarbonate secretion, corrected for contaminating salivary and gastric bicarbonate, were 89 (33-150) and 121 (63-203)mumol/h/10 cm (p > 0.5) in omeprazole and ranitidine treated subjects respectively. Salivary and gastric bicarbonate...... be overestimated. As omeprazole and ranitidine did not affect bicarbonate secretion differently there was no evidence that omeprazole acts on icarbonate secretory cells in the oesophageal mucosa....

  18. Indomethacin decreases gastroduodenal mucosal bicarbonate secretion in humans

    DEFF Research Database (Denmark)

    Mertz-Nielsen, A; Hillingsø, Jens; Bukhave, K

    1995-01-01

    BACKGROUND: Cyclooxygenase inhibitors reduce mucosal bicarbonate secretion in the duodenum, but the evidence for their effect on bicarbonate secretion in the stomach remains controversial. We have, therefore, studied how indomethacin influences gastroduodenal bicarbonate secretion and luminal...... healthy volunteers. Bicarbonate and PGE2 were measured in the gastroduodenal effluents by back-titration and radioimmunoassay, respectively. RESULTS: Vagal stimulation and duodenal luminal acidification (0.1 M HCl; 20 ml; 5 min) increased gastroduodenal bicarbonate secretion (p ... markedly inhibited both basal and stimulated gastric and duodenal mucosal bicarbonate secretion, and this reduction was similar to the degree of cyclooxygenase inhibition estimated by the luminal release of PGE2 (p

  19. [Secret drug tribulations and French legislation].

    Science.gov (United States)

    Charlot, Colette

    2002-01-01

    From an official Montpellier prefecture paper of 18th century, we are interested in a secret drug from Provence origin: the Irroë powder. This purgative will pass from "secret" drug status to "patent" drug. It's notoriety will come from its arrival to Paris. The law of 21th germinal year XI, the decret of 25 prairial year XIII and this of 18th 1810 imposed to give the drug composition to an official status; that examined and permit it's sale. This secret will be produce for half century.

  20. Imagination and the Pursuit of a Rational Rhetoric.

    Science.gov (United States)

    Foster, David E.

    The works of certain rhetorical thinkers contain strategies directed at achieving assent or cooperation. Such writings demonstrate means by which readers' rational responses can be deliberately challenged and disrupted. While people often cite Aristotle's maxim "Man is a rational animal," critics have asserted that the statement…

  1. Cassapro in broiler ration : effect of halquinol Supplementation

    Directory of Open Access Journals (Sweden)

    I.P Kompiang

    1997-10-01

    Full Text Available A trial was conducted to determine the effect of various level of cassapro (fermented cassava and halquinol supplementation on the performance of broiler chickens . Experimental rations were formulated isoprotein and isoenergy with graded level of cassapro (0, 10, 20 and 30% . The 20 and 30% cassapro ration were prepared without and with halquinol supplementation (60 ppm. Each ration was fed to 40 of three day old broilers, divided into 4 cages ( 5 males and 5 females per cage for 4 weeks. Increasing the level of cassapro significantly reduced body weight gain (P < 0.005, increased feed conversion ratio (FCR (P < 0.0005 with no effect on feed intake (P < 0.10 . Halquinol supplementation has no effect on feed intake, but significantly increased body weight gain (P <0.05 and improved the FCR (P < 0.01 . It is concluded that high level of cassapro in the ration will cause poorer performance of the birds, however it can be alleviated by halquinolsupplementation.

  2. The rational complementarity problem

    NARCIS (Netherlands)

    Heemels, W.P.M.H.; Schumacher, J.M.; Weiland, S.

    1999-01-01

    An extension of the linear complementarity problem (LCP) of mathematical programming is the so-called rational complementarity problem (RCP). This problem occurs if complementarity conditions are imposed on input and output variables of linear dynamical input/state/output systems. The resulting

  3. Consumer rationality in choice

    NARCIS (Netherlands)

    Conlon, B.J.

    2001-01-01

    The dissertation concentrates on consumer choice and the ability of current modelling approaches to capture the underlying behaviour of the individual decision-makers. The standard assumption of a rational utility maximising individual and its implications for observed behaviour are examined and

  4. Universal and Relative Rationality

    Directory of Open Access Journals (Sweden)

    Nathaniel Goldberg

    2009-01-01

    Full Text Available In this paper I illustrate how a basic kind of universal rationality can be profitably combined with undeniable instances of relativism. I do so by engaging Michael Friedman’s recent response to a challenge from Thomas Kuhn.

  5. Reelin secreted by GABAergic neurons regulates glutamate receptor homeostasis.

    Directory of Open Access Journals (Sweden)

    Cecilia Gonzalez Campo

    Full Text Available BACKGROUND: Reelin is a large secreted protein of the extracellular matrix that has been proposed to participate to the etiology of schizophrenia. During development, reelin is crucial for the correct cytoarchitecture of laminated brain structures and is produced by a subset of neurons named Cajal-Retzius. After birth, most of these cells degenerate and reelin expression persists in postnatal and adult brain. The phenotype of neurons that bind secreted reelin and whether the continuous secretion of reelin is required for physiological functions at postnatal stages remain unknown. METHODOLOGY/PRINCIPAL FINDINGS: Combining immunocytochemical and pharmacological approaches, we first report that two distinct patterns of reelin expression are present in cultured hippocampal neurons. We show that in hippocampal cultures, reelin is secreted by GABAergic neurons displaying an intense reelin immunoreactivity (IR. We demonstrate that secreted reelin binds to receptors of the lipoprotein family on neurons with a punctate reelin IR. Secondly, using calcium imaging techniques, we examined the physiological consequences of reelin secretion blockade. Blocking protein secretion rapidly and reversibly changes the subunit composition of N-methyl-D-aspartate glutamate receptors (NMDARs to a predominance of NR2B-containing NMDARs. Addition of recombinant or endogenously secreted reelin rescues the effects of protein secretion blockade and reverts the fraction of NR2B-containing NMDARs to control levels. Therefore, the continuous secretion of reelin is necessary to control the subunit composition of NMDARs in hippocampal neurons. CONCLUSIONS/SIGNIFICANCE: Our data show that the heterogeneity of reelin immunoreactivity correlates with distinct functional populations: neurons synthesizing and secreting reelin and/or neurons binding reelin. Furthermore, we show that continuous reelin secretion is a strict requirement to maintain the composition of NMDARs. We propose

  6. Melatonin Secretion Pattern in Critically Ill Patients

    DEFF Research Database (Denmark)

    Boyko, Yuliya; Holst, René; Jennum, Poul

    2017-01-01

    effect of remifentanil on melatonin secretion. We found that the risk of atypical sleep compared to normal sleep was significantly lower (p REM) sleep was only observed during the nonsedation period. We found preserved diurnal pattern of melatonin...... secretion in these patients. Remifentanil did not affect melatonin secretion but was associated with lower risk of atypical sleep pattern. REM sleep was only registered during the period of nonsedation.......Critically ill patients have abnormal circadian and sleep homeostasis. This may be associated with higher morbidity and mortality. The aims of this pilot study were (1) to describe melatonin secretion in conscious critically ill mechanically ventilated patients and (2) to describe whether melatonin...

  7. Thymidine secretion by hybridoma and myeloma cells

    International Nuclear Information System (INIS)

    Spilsberg, Bjorn; Rise, Frode; Petersen, Dirk; Nissen-Meyer, Jon

    2006-01-01

    Secretion of thymidine appeared to be a common property of hybridoma and myeloma cells, but not of other cell types, which were tested. Of three hybridoma cell lines tested, all secreted thymidine in amounts resulting in the accumulation of thymidine to concentrations of 10-20 μM in the culture medium. Also three of five myeloma cell lines that were analyzed secrete thymidine, but none of the other cell types that were studied. Thymidine was purified to homogeneity (4 mg purified from 3 l of culture medium) and identified as such by nuclear magnetic resonance spectroscopy. The cells that secreted thymidine showed high resistance to the growth inhibitory effect of thymidine

  8. Rational Emotive Education as a Short-Term Primary Prevention Technique.

    Science.gov (United States)

    Hooper, Stephen R.; Layne, C. Clinton

    1985-01-01

    Fifth- to seventh-grade students (N=586) who participated in one hour of Rational Emotive Education (a directive approach to teaching rational thinking skills) for six weeks scored higher in posttests of the Com oA Belief Inventory for Students than control Ss (N=738) who received no Rational Emotive Education. Findings suggested the utility of a…

  9. 'Ethical rationality': A subjective-objective concept of risk assessment

    International Nuclear Information System (INIS)

    Kaiser, H.

    1991-01-01

    'Ethical rationality' as a concept of risk assessment means that risks are assessed using an integrative, ethical-normative approach (taking values, world views and people's understanding of what it means to be a human being and of what makes life worth living into account). Thus risks cannot be assessed on a mathematical and statistical basis alone. It is much more important to reflect upon what makes life worth living. In order to answer this question, the rationality of probability calculus does not suffice. Instead, this form of rationality must be transformed into or replaced by ethical discourse (an open, iterative and complex process of making ethical judgement). Proposals for an ethical assessment of risk are made which are substantiated by the theoretical concept of ethical rationality comprising the following steps: - Consideration of the nature of ethics (understanding of the viewer's perspective); - A look at an ethical interpretation of the traditional mathematical concept of risk (description); - Scheme for an ethical conception of rationality (theoretical reflections); - Weighing risks from an ethical perspective in practice. (orig./HSCH) [de

  10. Cooperation, psychological game theory, and limitations of rationality in social interaction.

    Science.gov (United States)

    Colman, Andrew M

    2003-04-01

    Rational choice theory enjoys unprecedented popularity and influence in the behavioral and social sciences, but it generates intractable problems when applied to socially interactive decisions. In individual decisions, instrumental rationality is defined in terms of expected utility maximization. This becomes problematic in interactive decisions, when individuals have only partial control over the outcomes, because expected utility maximization is undefined in the absence of assumptions about how the other participants will behave. Game theory therefore incorporates not only rationality but also common knowledge assumptions, enabling players to anticipate their co-players' strategies. Under these assumptions, disparate anomalies emerge. Instrumental rationality, conventionally interpreted, fails to explain intuitively obvious features of human interaction, yields predictions starkly at variance with experimental findings, and breaks down completely in certain cases. In particular, focal point selection in pure coordination games is inexplicable, though it is easily achieved in practice; the intuitively compelling payoff-dominance principle lacks rational justification; rationality in social dilemmas is self-defeating; a key solution concept for cooperative coalition games is frequently inapplicable; and rational choice in certain sequential games generates contradictions. In experiments, human players behave more cooperatively and receive higher payoffs than strict rationality would permit. Orthodox conceptions of rationality are evidently internally deficient and inadequate for explaining human interaction. Psychological game theory, based on nonstandard assumptions, is required to solve these problems, and some suggestions along these lines have already been put forward.

  11. Intermittent subglottic secretion drainage may cause tracheal damage in patients with few oropharyngeal secretions.

    Science.gov (United States)

    Suys, E; Nieboer, K; Stiers, W; De Regt, J; Huyghens, L; Spapen, H

    2013-12-01

    Injurious prolapse of tracheal mucosa into the suction port has been reported in up to 50% of intubated patients receiving continuous aspiration of subglottic secretions. We investigated whether similar injury could be inflicted by automated intermittent aspiration. Six consecutive patients, intubated with the Mallinckrodt TaperGuard Evac™ endotracheal tube, were studied. A flow sensor was placed between the vacuum regulating system and the mucus collector. Intermittent suctioning was performed at a pressure of -125 mmHg with a 25s interval and duration of 15s. After 24h, a CT scan of the tracheal region was performed. Excessive negative suction pressure, a fast drop in aspiration flow to zero, and important "swinging" movements of secretions in the evacuation line were observed in all patients. Oral instillation of antiseptic mouthwash restored normal aspiration flow and secretion mobility. CT imaging showed marked entrapment of tracheal mucosa into the suction port in all patients. In patients with few oropharyngeal secretions, automated intermittent subglottic aspiration may result in significant and potential harmful invagination of tracheal mucosa into the suction lumen. A critical amount of fluid must be present in the oropharynx to assure adequate and safe aspiration. Copyright © 2013 Elsevier Ltd. All rights reserved.

  12. Analysis of secreted proteins from Aspergillus flavus.

    Science.gov (United States)

    Medina, Martha L; Haynes, Paul A; Breci, Linda; Francisco, Wilson A

    2005-08-01

    MS/MS techniques in proteomics make possible the identification of proteins from organisms with little or no genome sequence information available. Peptide sequences are obtained from tandem mass spectra by matching peptide mass and fragmentation information to protein sequence information from related organisms, including unannotated genome sequence data. This peptide identification data can then be grouped and reconstructed into protein data. In this study, we have used this approach to study protein secretion by Aspergillus flavus, a filamentous fungus for which very little genome sequence information is available. A. flavus is capable of degrading the flavonoid rutin (quercetin 3-O-glycoside), as the only source of carbon via an extracellular enzyme system. In this continuing study, a proteomic analysis was used to identify secreted proteins from A. flavus when grown on rutin. The growth media glucose and potato dextrose were used to identify differentially expressed secreted proteins. The secreted proteins were analyzed by 1- and 2-DE and MS/MS. A total of 51 unique A. flavus secreted proteins were identified from the three growth conditions. Ten proteins were unique to rutin-, five to glucose- and one to potato dextrose-grown A. flavus. Sixteen secreted proteins were common to all three media. Fourteen identifications were of hypothetical proteins or proteins of unknown functions. To our knowledge, this is the first extensive proteomic study conducted to identify the secreted proteins from a filamentous fungus.

  13. Secret-key rates and privacy leakage in biometric systems

    NARCIS (Netherlands)

    Ignatenko, T.

    2009-01-01

    In this thesis both the generation of secret keys from biometric data and the binding of secret keys to biometric data are investigated. These secret keys can be used to regulate access to sensitive data, services, and environments. In a biometric secrecy system a secret key is generated or chosen

  14. Rationality versus reality: the challenges of evidence-based decision making for health policy makers.

    Science.gov (United States)

    McCaughey, Deirdre; Bruning, Nealia S

    2010-05-26

    Current healthcare systems have extended the evidence-based medicine (EBM) approach to health policy and delivery decisions, such as access-to-care, healthcare funding and health program continuance, through attempts to integrate valid and reliable evidence into the decision making process. These policy decisions have major impacts on society and have high personal and financial costs associated with those decisions. Decision models such as these function under a shared assumption of rational choice and utility maximization in the decision-making process. We contend that health policy decision makers are generally unable to attain the basic goals of evidence-based decision making (EBDM) and evidence-based policy making (EBPM) because humans make decisions with their naturally limited, faulty, and biased decision-making processes. A cognitive information processing framework is presented to support this argument, and subtle cognitive processing mechanisms are introduced to support the focal thesis: health policy makers' decisions are influenced by the subjective manner in which they individually process decision-relevant information rather than on the objective merits of the evidence alone. As such, subsequent health policy decisions do not necessarily achieve the goals of evidence-based policy making, such as maximizing health outcomes for society based on valid and reliable research evidence. In this era of increasing adoption of evidence-based healthcare models, the rational choice, utility maximizing assumptions in EBDM and EBPM, must be critically evaluated to ensure effective and high-quality health policy decisions. The cognitive information processing framework presented here will aid health policy decision makers by identifying how their decisions might be subtly influenced by non-rational factors. In this paper, we identify some of the biases and potential intervention points and provide some initial suggestions about how the EBDM/EBPM process can be

  15. Rationality versus reality: the challenges of evidence-based decision making for health policy makers

    Directory of Open Access Journals (Sweden)

    Bruning Nealia S

    2010-05-01

    Full Text Available Abstract Background Current healthcare systems have extended the evidence-based medicine (EBM approach to health policy and delivery decisions, such as access-to-care, healthcare funding and health program continuance, through attempts to integrate valid and reliable evidence into the decision making process. These policy decisions have major impacts on society and have high personal and financial costs associated with those decisions. Decision models such as these function under a shared assumption of rational choice and utility maximization in the decision-making process. Discussion We contend that health policy decision makers are generally unable to attain the basic goals of evidence-based decision making (EBDM and evidence-based policy making (EBPM because humans make decisions with their naturally limited, faulty, and biased decision-making processes. A cognitive information processing framework is presented to support this argument, and subtle cognitive processing mechanisms are introduced to support the focal thesis: health policy makers' decisions are influenced by the subjective manner in which they individually process decision-relevant information rather than on the objective merits of the evidence alone. As such, subsequent health policy decisions do not necessarily achieve the goals of evidence-based policy making, such as maximizing health outcomes for society based on valid and reliable research evidence. Summary In this era of increasing adoption of evidence-based healthcare models, the rational choice, utility maximizing assumptions in EBDM and EBPM, must be critically evaluated to ensure effective and high-quality health policy decisions. The cognitive information processing framework presented here will aid health policy decision makers by identifying how their decisions might be subtly influenced by non-rational factors. In this paper, we identify some of the biases and potential intervention points and provide some initial

  16. Rationality versus reality: the challenges of evidence-based decision making for health policy makers

    Science.gov (United States)

    2010-01-01

    Background Current healthcare systems have extended the evidence-based medicine (EBM) approach to health policy and delivery decisions, such as access-to-care, healthcare funding and health program continuance, through attempts to integrate valid and reliable evidence into the decision making process. These policy decisions have major impacts on society and have high personal and financial costs associated with those decisions. Decision models such as these function under a shared assumption of rational choice and utility maximization in the decision-making process. Discussion We contend that health policy decision makers are generally unable to attain the basic goals of evidence-based decision making (EBDM) and evidence-based policy making (EBPM) because humans make decisions with their naturally limited, faulty, and biased decision-making processes. A cognitive information processing framework is presented to support this argument, and subtle cognitive processing mechanisms are introduced to support the focal thesis: health policy makers' decisions are influenced by the subjective manner in which they individually process decision-relevant information rather than on the objective merits of the evidence alone. As such, subsequent health policy decisions do not necessarily achieve the goals of evidence-based policy making, such as maximizing health outcomes for society based on valid and reliable research evidence. Summary In this era of increasing adoption of evidence-based healthcare models, the rational choice, utility maximizing assumptions in EBDM and EBPM, must be critically evaluated to ensure effective and high-quality health policy decisions. The cognitive information processing framework presented here will aid health policy decision makers by identifying how their decisions might be subtly influenced by non-rational factors. In this paper, we identify some of the biases and potential intervention points and provide some initial suggestions about how the

  17. Rationalization with ruled surfaces in architecture

    DEFF Research Database (Denmark)

    Steenstrup, Kasper Hornbak

    This thesis addresses the problems of rationalizing and segmenting large scale 3D models, and how to handle difficult production constraints in this area. The design choices when constructing large scale architecture are influenced by the budget. Therefore I strive to minimize the amount of time...... and material needed for production. This makes advanced free form architecture viable for low cost projects, allowing the architects to realize their designs. By pre-cutting building blocks using hot wire robots, the amount of milling necessary can be reduced drastically. I do this by rationalizing...

  18. Rational homotopy theory and differential forms

    CERN Document Server

    Griffiths, Phillip

    2013-01-01

    This completely revised and corrected version of the well-known Florence notes circulated by the authors together with E. Friedlander examines basic topology, emphasizing homotopy theory. Included is a discussion of Postnikov towers and rational homotopy theory. This is then followed by an in-depth look at differential forms and de Tham's theorem on simplicial complexes. In addition, Sullivan's results on computing the rational homotopy type from forms is presented.  New to the Second Edition: *Fully-revised appendices including an expanded discussion of the Hirsch lemma*Presentation of a natu

  19. Rational approximation of vertical segments

    Science.gov (United States)

    Salazar Celis, Oliver; Cuyt, Annie; Verdonk, Brigitte

    2007-08-01

    In many applications, observations are prone to imprecise measurements. When constructing a model based on such data, an approximation rather than an interpolation approach is needed. Very often a least squares approximation is used. Here we follow a different approach. A natural way for dealing with uncertainty in the data is by means of an uncertainty interval. We assume that the uncertainty in the independent variables is negligible and that for each observation an uncertainty interval can be given which contains the (unknown) exact value. To approximate such data we look for functions which intersect all uncertainty intervals. In the past this problem has been studied for polynomials, or more generally for functions which are linear in the unknown coefficients. Here we study the problem for a particular class of functions which are nonlinear in the unknown coefficients, namely rational functions. We show how to reduce the problem to a quadratic programming problem with a strictly convex objective function, yielding a unique rational function which intersects all uncertainty intervals and satisfies some additional properties. Compared to rational least squares approximation which reduces to a nonlinear optimization problem where the objective function may have many local minima, this makes the new approach attractive.

  20. Teaching Rational Decision-Making.

    Science.gov (United States)

    Woolever, Roberts

    1978-01-01

    Presented is an outline of a college course, "Education in American Society," that focused on teaching students rational decision-making skills while examining current issues in American Education. The outline is followed by student comments, reactions, and evaluations of the course. (JMD)