WorldWideScience

Sample records for signature intelligence masint

  1. Making the Most of MASINT and Advanced Geospatial Intelligence

    Science.gov (United States)

    2012-04-10

    SIGINT), human intelligence (HUMINT), open source intelligence , ( OSINT ), and measurement and signatures intelligence (MASINT). All sources progress...the underlying principles of MASINT technologies and the operators and analysts who have intelligence questions that MASINT sources may be able to...integrity, analysts should instead use these sources of MASINT in support of less time-sensitive intelligence problems. Through creative or

  2. New Perspectives on Intelligence Collection and Processing

    Science.gov (United States)

    2016-06-01

    MASINT Measurement and Signature Intelligence NPS Naval Postgraduate School OSINT Open Source Intelligence pdf Probability Density Function SIGINT...MASINT): different types of sensors • Open Source Intelligence ( OSINT ): from all open sources • Signals Intelligence (SIGINT): intercepting the

  3. Intelligence Community Spending: Trends and Issues

    Science.gov (United States)

    2016-11-08

    The Deputy Director CIA manages the CIAP. Funds CIA activities to include HUMINT and OSINT . The CIAP funds everything related to the CIA. It...Human Intelligence (HUMINT); Imagery Intelligence (IMINT); Measurement and Signature Intelligence (MASINT); Open Source Intelligence ( OSINT ); and

  4. Expanding the Use of Time/Frequency Difference of Arrival Geolocation in the Department of Defense

    Science.gov (United States)

    2012-01-01

    Intelligence Center NIB non-interference basis OSINT open - source intelligence PLLS Precision Location and...SIGINT), measurement and signature intelligence (MASINT), human intelligence (HUMINT), and open - source intelligence ( OSINT ). Geospatial intelligence is...of bearing MASINT measurement and signature intelligence MOC mission operations commander MP mission planner MSA multi- source analyst MTO

  5. Broad Area Wireless Networking Via High Altitude Platforms

    Science.gov (United States)

    2013-06-01

    Multiplexing ORS Operationally Responsive Space OSINT Open-Source Intelligence PTMP Point To Multi-Point PTP Point To Point QOS Quality Of...Intelligence (SIGINT), Measurement and Signature Intelligence (MASINT), Human Resources Intelligence (HUMINT), and Open-Source Intelligence ( OSINT ) [34

  6. Integrated Air Surveillance Concept of Operations

    Science.gov (United States)

    2011-11-01

    Intelligence (SIGINT) Human Intelligence (HUMINT) Measurement and Signature Intelligence (MASINT) Open Source Intelligence ( OSINT ) In...Office of Management and Budget OpsCon: Operational Concept OSINT : Open Source Intelligence OSTP: Office of Science & Technology Policy Pt–to-Pt...data, all- source intelligence , law enforcement information and relevant open - source data from public and private sectors,

  7. Pre-incident Analysis using Multigraphs and Faceted Ontologies

    Science.gov (United States)

    2013-08-01

    intelligence (HUMINT), 5) open - source intelligence ( OSINT ) and 6) geospatial intelligence 1 . The analyst must access, parse, and correlate each of...The information comes in a range of classification levels from open - source human terrain data to highly classified and compartmentalized, and in...many types: 1) signals intelligence (SIGINT), 2) imagery intelligence (IMINT), 3) measurement and signature intelligence (MASINT), 4) human- source

  8. Signal Corps and Military Intelligence Officer Perceptions of a Multifunctional Branch Merger

    Science.gov (United States)

    2015-06-12

    Ordnance Branch OPMS Officer Personnel Management System ORSA Operations Research—Systems Analysis OSINT Open Source Intelligence PME Primary...HUMINT), Geospatial Intelligence (GEOINT), and Open Source Intelligence ( OSINT ). The broad scope of what is expected from Military Intelligence...and assessment dimensions (SIGINT, MASINT, TECHINT, OSINT , etc.) It is recommended that the Military Intelligence Branch more accurately define which

  9. Establishing Military Utility of Non-traditional Sensing

    Science.gov (United States)

    2014-02-13

    project the amount of digital data in the world as doubling about every three years. 14 YouTube , for example, has over 800 million monthly users...Inc., 2012. Richelson, Jeffrey T. "MASINT: The New Kid in Town." International Journal of Intelligence and CounterIntelligence. Taylor and Francis

  10. Balancing Information Analysis and Decision Value: A Model to Exploit the Decision Process

    Science.gov (United States)

    2011-12-01

    technical intelli- gence e.g. signals and sensors (SIGINT and MASINT), imagery (!MINT), as well and human and open source intelligence (HUMINT and OSINT ...Clark 2006). The ability to capture large amounts of da- ta and the plenitude of modem intelligence information sources provides a rich cache of...many tech- niques for managing information collected and derived from these sources , the exploitation of intelligence assets for decision-making

  11. Development of an Intelligent Ultrasonic Signature Classification Software for Discrimination of Flaws in Weldments

    International Nuclear Information System (INIS)

    Kim, H. J.; Song, S. J.; Jeong, H. D.

    1997-01-01

    Ultrasonic pattern recognition is the most effective approach to the problem of discriminating types of flaws in weldments based on ultrasonic flaw signals. In spite of significant progress in the research on this methodology, it has not been widely used in many practical ultrasonic inspections of weldments in industry. Hence, for the convenient application of this approach in many practical situations, we develop an intelligent ultrasonic signature classification software which can discriminate types of flaws in weldments based on their ultrasonic signals using various tools in artificial intelligence such as neural networks. This software shows the excellent performance in an experimental problem where flaws in weldments are classified into two categories of cracks and non-cracks. This performance demonstrates the high possibility of this software as a practical tool for ultrasonic flaw classification in weldments

  12. Starry messages: Searching for signatures of interstellar archaeology

    Energy Technology Data Exchange (ETDEWEB)

    Carrigan, Richard A., Jr.; /Fermilab

    2009-12-01

    Searching for signatures of cosmic-scale archaeological artifacts such as Dyson spheres or Kardashev civilizations is an interesting alternative to conventional SETI. Uncovering such an artifact does not require the intentional transmission of a signal on the part of the original civilization. This type of search is called interstellar archaeology or sometimes cosmic archaeology. The detection of intelligence elsewhere in the Universe with interstellar archaeology or SETI would have broad implications for science. For example, the constraints of the anthropic principle would have to be loosened if a different type of intelligence was discovered elsewhere. A variety of interstellar archaeology signatures are discussed including non-natural planetary atmospheric constituents, stellar doping with isotopes of nuclear wastes, Dyson spheres, as well as signatures of stellar and galactic-scale engineering. The concept of a Fermi bubble due to interstellar migration is introduced in the discussion of galactic signatures. These potential interstellar archaeological signatures are classified using the Kardashev scale. A modified Drake equation is used to evaluate the relative challenges of finding various sources. With few exceptions interstellar archaeological signatures are clouded and beyond current technological capabilities. However SETI for so-called cultural transmissions and planetary atmosphere signatures are within reach.

  13. SIGNATURE: A workbench for gene expression signature analysis

    Directory of Open Access Journals (Sweden)

    Chang Jeffrey T

    2011-11-01

    Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.

  14. All-source Information Management and Integration for Improved Collective Intelligence Production

    Science.gov (United States)

    2011-06-01

    Intelligence (ELINT) • Open Source Intelligence ( OSINT ) • Technical Intelligence (TECHINT) These intelligence disciplines produce... intelligence , measurement and signature intelligence , signals intelligence , and open - source data, in the production of intelligence . All- source intelligence ...All- Source Information Integration and Management) R&D Project 3 All- Source Intelligence

  15. Modelling of Security Principles Within Car-to-Car Communications in Modern Cooperative Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Jan Durech

    2016-01-01

    Full Text Available Intelligent transportation systems (ITS bring advanced applications that provide innovative services for various transportation modes in the area of traffic control, and enable better awareness for different users. Communication connections between intelligent vehicles with the use of wireless communication standards, so called Vehicular Ad Hoc Networks (VANETs, require ensuring verification of validity of provided services as well as services related to transmission confidentiality and integrity. The goal of this paper is to analyze secure mechanisms utilised in VANET communication within Cooperative Intelligent Transportation Systems (C-ITS with a focus on safety critical applications. The practical part of the contribution is dedicated to modelling of security properties of VANET networks via OPNET Modeler tool extended by the implementation of the OpenSSL library for authentication protocol realisation based on digital signature schemes. The designed models simulate a transmission of authorised alert messages in Car-to-Car communication for several traffic scenarios with recommended Elliptic Curve Integrated Encryption Scheme (ECIES. The obtained results of the throughput and delay in the simulated network are compared for secured and no-secured communications in dependence on the selected digital signature schemes and the number of mobile nodes. The OpenSSL library has also been utilised for the comparison of time demandingness of digital signature schemes based on RSA (Rivest Shamir Adleman, DSA (Digital Signature Algorithm and ECDSA (Elliptic Curve Digital Signature Algorithm for different key-lengths suitable for real time VANET communications for safety-critical applications of C-ITS.

  16. Close ISR Support: Re-organizing the Combined Forces Air Component Commander’s Intelligence, Surveillance and Reconnaissance Processes and Agencies

    Science.gov (United States)

    2009-12-01

    Intelligence IO–Information Operations IOT –In Order To IP–Iraqi Police IPB–Intelligence Preparation of the Battlespace IR–infrared xxiii IROC... forensic backtracking highlighted potential cache sites or improvised explosive device (IED) emplacement areas which could then be better analyzed by the...target indicator (GMTI) forensic backtracking to link suspicious GMTI movements with other intelligence signatures.388 As will be discussed in

  17. Task Force Report: Assessment of Nuclear Monitoring and Verification Technologies

    Science.gov (United States)

    2014-01-01

    o Make  explicit  the  requirements  for,  and  improvements  needed  in,  HUMINT,  SIGINT, cyber,  OSINT , etc., to support monitoring and...environments.                                                             23 The potential for  OSINT  (open source intelligence) as a focusing step is...various  intelligence  collection  capabilities  (HUMINT,  IMINT,  MASINT,  OSINT ,  SIGINT, etc.) have historically played a  strong  role  in  the

  18. An intelligent software approach to ultrasonic flaw classification in weldments

    International Nuclear Information System (INIS)

    Song, Sung Jin; Kim, Hak Joon; Lee, Hyun

    1997-01-01

    Ultrasonic pattern recognition is the most effective approach to the problem of discriminating types of flaws in weldments based on ultrasonic flaw signals. In spite of significant progress on this methodology, it has not been widely used in practical ultrasonic inspection of weldments in industry. Hence, for the convenient application of this approach in many practical situations, we develop an intelligent ultrasonic signature classification software which can discriminate types of flaws in weldments using various tools in artificial intelligence such as neural networks. This software shows excellent performances in an experimental problem where flaws in weldments are classified into two categories of cracks and non-cracks.

  19. Development of an intelligent ultrasonic welding defect classification software

    International Nuclear Information System (INIS)

    Song, Sung Jin; Kim, Hak Joon; Jeong, Hee Don

    1997-01-01

    Ultrasonic pattern recognition is the most effective approach to the problem of discriminating types of flaws in weldments based on ultrasonic flaw signals. In spite of significant progress in the research on this methodology, it has not been widely used in many practical ultrasonic inspections of weldments in industry. Hence, for the convenient application of this approach in many practical situations, we develop an intelligent ultrasonic signature classification software which can discriminate types of flaws in weldments based on their ultrasonic signals using various tools in artificial intelligence such as neural networks. This software shows the excellent performance in an experimental problem where flaws in weldments are classified into two categories of cracks and non-cracks. This performance demonstrates the high possibility of this software as a practical tool for ultrasonic flaw classification in weldments.

  20. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things

    Science.gov (United States)

    Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne

    2017-01-01

    Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons. PMID:28468313

  1. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things

    Directory of Open Access Journals (Sweden)

    Kuo-Hui Yeh

    2017-05-01

    Full Text Available Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015 and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons.

  2. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.

    Science.gov (United States)

    Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne

    2017-05-01

    Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons.

  3. Intelligence in Artificial Intelligence

    OpenAIRE

    Datta, Shoumen Palit Austin

    2016-01-01

    The elusive quest for intelligence in artificial intelligence prompts us to consider that instituting human-level intelligence in systems may be (still) in the realm of utopia. In about a quarter century, we have witnessed the winter of AI (1990) being transformed and transported to the zenith of tabloid fodder about AI (2015). The discussion at hand is about the elements that constitute the canonical idea of intelligence. The delivery of intelligence as a pay-per-use-service, popping out of ...

  4. Signature-based User Authentication

    OpenAIRE

    Hámorník, Juraj

    2015-01-01

    This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...

  5. Real Traceable Signatures

    Science.gov (United States)

    Chow, Sherman S. M.

    Traceable signature scheme extends a group signature scheme with an enhanced anonymity management mechanism. The group manager can compute a tracing trapdoor which enables anyone to test if a signature is signed by a given misbehaving user, while the only way to do so for group signatures requires revealing the signer of all signatures. Nevertheless, it is not tracing in a strict sense. For all existing schemes, T tracing agents need to recollect all N' signatures ever produced and perform RN' “checks” for R revoked users. This involves a high volume of transfer and computations. Increasing T increases the degree of parallelism for tracing but also the probability of “missing” some signatures in case some of the agents are dishonest.

  6. Artificial Intelligence and Moral intelligence

    OpenAIRE

    Laura Pana

    2008-01-01

    We discuss the thesis that the implementation of a moral code in the behaviour of artificial intelligent systems needs a specific form of human and artificial intelligence, not just an abstract intelligence. We present intelligence as a system with an internal structure and the structural levels of the moral system, as well as certain characteristics of artificial intelligent agents which can/must be treated as 1- individual entities (with a complex, specialized, autonomous or selfdetermined,...

  7. Signature Balancing

    NARCIS (Netherlands)

    Noordkamp, H.W.; Brink, M. van den

    2006-01-01

    Signatures are an important part of the design of a ship. In an ideal situation, signatures must be as low as possible. However, due to budget constraints it is most unlikely to reach this ideal situation. The arising question is which levels of signatures are optimal given the different scenarios

  8. Intelligence Naturelle et Intelligence Artificielle

    OpenAIRE

    Dubois, Daniel

    2011-01-01

    Cet article présente une approche systémique du concept d’intelligence naturelle en ayant pour objectif de créer une intelligence artificielle. Ainsi, l’intelligence naturelle, humaine et animale non-humaine, est une fonction composée de facultés permettant de connaître et de comprendre. De plus, l'intelligence naturelle reste indissociable de la structure, à savoir les organes du cerveau et du corps. La tentation est grande de doter les systèmes informatiques d’une intelligence artificielle ...

  9. Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups

    OpenAIRE

    Lal, Sunder; Verma, Vandani

    2009-01-01

    Braids groups provide an alternative to number theoretic public cryptography and can be implemented quite efficiently. The paper proposes five signature schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier, Designated Verifier Proxy Signature And Bi-Designated Verifier Proxy Signature scheme based on braid groups. We also discuss the security aspects of each of the proposed schemes.

  10. Inimloetav ja masinloetav : mõistete analüüs / Priit Parmakson

    Index Scriptorium Estoniae

    Parmakson, Priit

    2011-01-01

    Infoühiskonnas on iseloomulik struktuuristatud, masintöötlemisele orienteeritud teabe osakaalu kasv, mille ilming on ka Eesti avalikus sektoris mitmes valdkonnas käsil olev sellesuunaline IT töö

  11. Unconditionally Secure Quantum Signatures

    Directory of Open Access Journals (Sweden)

    Ryan Amiri

    2015-08-01

    Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  12. A New Dimension of Business Intelligence: Location-based Intelligence

    OpenAIRE

    Zeljko Panian

    2012-01-01

    Through the course of this paper we define Locationbased Intelligence (LBI) which is outgrowing from process of amalgamation of geolocation and Business Intelligence. Amalgamating geolocation with traditional Business Intelligence (BI) results in a new dimension of BI named Location-based Intelligence. LBI is defined as leveraging unified location information for business intelligence. Collectively, enterprises can transform location data into business intelligence applic...

  13. Intelligence analysis – the royal discipline of Competitive Intelligence

    Directory of Open Access Journals (Sweden)

    František Bartes

    2011-01-01

    Full Text Available The aim of this article is to propose work methodology for Competitive Intelligence teams in one of the intelligence cycle’s specific area, in the so-called “Intelligence Analysis”. Intelligence Analysis is one of the stages of the Intelligence Cycle in which data from both the primary and secondary research are analyzed. The main result of the effort is the creation of added value for the information collected. Company Competiitve Intelligence, correctly understood and implemented in business practice, is the “forecasting of the future”. That is forecasting about the future, which forms the basis for strategic decisions made by the company’s top management. To implement that requirement in corporate practice, the author perceives Competitive Intelligence as a systemic application discipline. This approach allows him to propose a “Work Plan” for Competitive Intelligence as a fundamental standardized document to steer Competitive Intelligence team activities. The author divides the Competitive Intelligence team work plan into five basic parts. Those parts are derived from the five-stage model of the intelligence cycle, which, in the author’s opinion, is more appropriate for complicated cases of Competitive Intelligence.

  14. Radiation signatures

    International Nuclear Information System (INIS)

    McGlynn, S.P.; Varma, M.N.

    1992-01-01

    A new concept for modelling radiation risk is proposed. This concept is based on the proposal that the spectrum of molecular lesions, which we dub ''the radiation signature'', can be used to identify the quality of the causal radiation. If the proposal concerning radiation signatures can be established then, in principle, both prospective and retrospective risk determination can be assessed on an individual basis. A major goal of biophysical modelling is to relate physical events such as ionization, excitation, etc. to the production of radiation carcinogenesis. A description of the physical events is provided by track structure. The track structure is determined by radiation quality, and it can be considered to be the ''physical signature'' of the radiation. Unfortunately, the uniqueness characteristics of this signature are dissipated in biological systems in ∼10 -9 s. Nonetheless, it is our contention that this physical disturbance of the biological system eventuates later, at ∼10 0 s, in molecular lesion spectra which also characterize the causal radiation. (author)

  15. Spiritual Intelligence, Emotional Intelligence and Auditor’s Performance

    OpenAIRE

    Hanafi, Rustam

    2010-01-01

    The objective of this research was to investigate empirical evidence about influence audi-tor spiritual intelligence on the performance with emotional intelligence as a mediator variable. Linear regression models are developed to examine the hypothesis and path analysis. The de-pendent variable of each model is auditor performance, whereas the independent variable of model 1 is spiritual intelligence, of model 2 are emotional intelligence and spiritual intelligence. The parameters were estima...

  16. Intelligence analysis – the royal discipline of Competitive Intelligence

    OpenAIRE

    František Bartes

    2011-01-01

    The aim of this article is to propose work methodology for Competitive Intelligence teams in one of the intelligence cycle’s specific area, in the so-called “Intelligence Analysis”. Intelligence Analysis is one of the stages of the Intelligence Cycle in which data from both the primary and secondary research are analyzed. The main result of the effort is the creation of added value for the information collected. Company Competiitve Intelligence, correctly understood and implemented in busines...

  17. Electronic Signature Policy

    Science.gov (United States)

    Establishes the United States Environmental Protection Agency's approach to adopting electronic signature technology and best practices to ensure electronic signatures applied to official Agency documents are legally valid and enforceable

  18. Blinding for unanticipated signatures

    NARCIS (Netherlands)

    D. Chaum (David)

    1987-01-01

    textabstractPreviously known blind signature systems require an amount of computation at least proportional to the number of signature types, and also that the number of such types be fixed in advance. These requirements are not practical in some applications. Here, a new blind signature technique

  19. 1 CFR 18.7 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Signature. 18.7 Section 18.7 General Provisions... PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.7 Signature. The original and each duplicate original... stamped beneath the signature. Initialed or impressed signatures will not be accepted. Documents submitted...

  20. Attribute-Based Digital Signature System

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, Muhammad; Petkovic, M.

    2011-01-01

    An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation unit (1) is arranged for combining the user secret

  1. Web Intelligence and Artificial Intelligence in Education

    Science.gov (United States)

    Devedzic, Vladan

    2004-01-01

    This paper surveys important aspects of Web Intelligence (WI) in the context of Artificial Intelligence in Education (AIED) research. WI explores the fundamental roles as well as practical impacts of Artificial Intelligence (AI) and advanced Information Technology (IT) on the next generation of Web-related products, systems, services, and…

  2. Artificial Intelligence and Moral intelligence

    Directory of Open Access Journals (Sweden)

    Laura Pana

    2008-07-01

    Full Text Available We discuss the thesis that the implementation of a moral code in the behaviour of artificial intelligent systems needs a specific form of human and artificial intelligence, not just an abstract intelligence. We present intelligence as a system with an internal structure and the structural levels of the moral system, as well as certain characteristics of artificial intelligent agents which can/must be treated as 1- individual entities (with a complex, specialized, autonomous or selfdetermined, even unpredictable conduct, 2- entities endowed with diverse or even multiple intelligence forms, like moral intelligence, 3- open and, even, free-conduct performing systems (with specific, flexible and heuristic mechanisms and procedures of decision, 4 – systems which are open to education, not just to instruction, 5- entities with “lifegraphy”, not just “stategraphy”, 6- equipped not just with automatisms but with beliefs (cognitive and affective complexes, 7- capable even of reflection (“moral life” is a form of spiritual, not just of conscious activity, 8 – elements/members of some real (corporal or virtual community, 9 – cultural beings: free conduct gives cultural value to the action of a ”natural” or artificial being. Implementation of such characteristics does not necessarily suppose efforts to design, construct and educate machines like human beings. The human moral code is irremediably imperfect: it is a morality of preference, of accountability (not of responsibility and a morality of non-liberty, which cannot be remedied by the invention of ethical systems, by the circulation of ideal values and by ethical (even computing education. But such an imperfect morality needs perfect instruments for its implementation: applications of special logic fields; efficient psychological (theoretical and technical attainments to endow the machine not just with intelligence, but with conscience and even spirit; comprehensive technical

  3. Intelligible Artificial Intelligence

    OpenAIRE

    Weld, Daniel S.; Bansal, Gagan

    2018-01-01

    Since Artificial Intelligence (AI) software uses techniques like deep lookahead search and stochastic optimization of huge neural networks to fit mammoth datasets, it often results in complex behavior that is difficult for people to understand. Yet organizations are deploying AI algorithms in many mission-critical settings. In order to trust their behavior, we must make it intelligible --- either by using inherently interpretable models or by developing methods for explaining otherwise overwh...

  4. Fair quantum blind signatures

    International Nuclear Information System (INIS)

    Tian-Yin, Wang; Qiao-Yan, Wen

    2010-01-01

    We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed. (general)

  5. Monitoring osseointegration and developing intelligent systems (Conference Presentation)

    Science.gov (United States)

    Salvino, Liming W.

    2017-05-01

    Effective monitoring of structural and biological systems is an extremely important research area that enables technology development for future intelligent devices, platforms, and systems. This presentation provides an overview of research efforts funded by the Office of Naval Research (ONR) to establish structural health monitoring (SHM) methodologies in the human domain. Basic science efforts are needed to utilize SHM sensing, data analysis, modeling, and algorithms to obtain the relevant physiological and biological information for human-specific health and performance conditions. This overview of current research efforts is based on the Monitoring Osseointegrated Prosthesis (MOIP) program. MOIP develops implantable and intelligent prosthetics that are directly anchored to the bone of residual limbs. Through real-time monitoring, sensing, and responding to osseointegration of bones and implants as well as interface conditions and environment, our research program aims to obtain individualized actionable information for implant failure identification, load estimation, infection mitigation and treatment, as well as healing assessment. Looking ahead to achieve ultimate goals of SHM, we seek to expand our research areas to cover monitoring human, biological and engineered systems, as well as human-machine interfaces. Examples of such include 1) brainwave monitoring and neurological control, 2) detecting and evaluating brain injuries, 3) monitoring and maximizing human-technological object teaming, and 4) closed-loop setups in which actions can be triggered automatically based on sensors, actuators, and data signatures. Finally, some ongoing and future collaborations across different disciplines for the development of knowledge automation and intelligent systems will be discussed.

  6. Five Guidelines for Selecting Hydrological Signatures

    Science.gov (United States)

    McMillan, H. K.; Westerberg, I.; Branger, F.

    2017-12-01

    Hydrological signatures are index values derived from observed or modeled series of hydrological data such as rainfall, flow or soil moisture. They are designed to extract relevant information about hydrological behavior, such as to identify dominant processes, and to determine the strength, speed and spatiotemporal variability of the rainfall-runoff response. Hydrological signatures play an important role in model evaluation. They allow us to test whether particular model structures or parameter sets accurately reproduce the runoff generation processes within the watershed of interest. Most modeling studies use a selection of different signatures to capture different aspects of the catchment response, for example evaluating overall flow distribution as well as high and low flow extremes and flow timing. Such studies often choose their own set of signatures, or may borrow subsets of signatures used in multiple other works. The link between signature values and hydrological processes is not always straightforward, leading to uncertainty and variability in hydrologists' signature choices. In this presentation, we aim to encourage a more rigorous approach to hydrological signature selection, which considers the ability of signatures to represent hydrological behavior and underlying processes for the catchment and application in question. To this end, we propose a set of guidelines for selecting hydrological signatures. We describe five criteria that any hydrological signature should conform to: Identifiability, Robustness, Consistency, Representativeness, and Discriminatory Power. We describe an example of the design process for a signature, assessing possible signature designs against the guidelines above. Due to their ubiquity, we chose a signature related to the Flow Duration Curve, selecting the FDC mid-section slope as a proposed signature to quantify catchment overall behavior and flashiness. We demonstrate how assessment against each guideline could be used to

  7. Naturalist Intelligence Among the Other Multiple Intelligences [In Bulgarian

    Directory of Open Access Journals (Sweden)

    R. Genkov

    2007-09-01

    Full Text Available The theory of multiple intelligences was presented by Gardner in 1983. The theory was revised later (1999 and among the other intelligences a naturalist intelligence was added. The criteria for distinguishing of the different types of intelligences are considered. While Gardner restricted the analysis of the naturalist intelligence with examples from the living nature only, the present paper considered this problem on wider background including objects and persons of the natural sciences.

  8. Artificial intelligence

    CERN Document Server

    Hunt, Earl B

    1975-01-01

    Artificial Intelligence provides information pertinent to the fundamental aspects of artificial intelligence. This book presents the basic mathematical and computational approaches to problems in the artificial intelligence field.Organized into four parts encompassing 16 chapters, this book begins with an overview of the various fields of artificial intelligence. This text then attempts to connect artificial intelligence problems to some of the notions of computability and abstract computing devices. Other chapters consider the general notion of computability, with focus on the interaction bet

  9. Intelligence Ethics:

    DEFF Research Database (Denmark)

    Rønn, Kira Vrist

    2016-01-01

    Questions concerning what constitutes a morally justified conduct of intelligence activities have received increased attention in recent decades. However, intelligence ethics is not yet homogeneous or embedded as a solid research field. The aim of this article is to sketch the state of the art...... of intelligence ethics and point out subjects for further scrutiny in future research. The review clusters the literature on intelligence ethics into two groups: respectively, contributions on external topics (i.e., the accountability of and the public trust in intelligence agencies) and internal topics (i.......e., the search for an ideal ethical framework for intelligence actions). The article concludes that there are many holes to fill for future studies on intelligence ethics both in external and internal discussions. Thus, the article is an invitation – especially, to moral philosophers and political theorists...

  10. #%Applications of artificial intelligence in intelligent manufacturing: a review

    Institute of Scientific and Technical Information of China (English)

    #

    2017-01-01

    #%Based on research into the applications of artificial intelligence (AI) technology in the manufacturing industry in recent years, we analyze the rapid development of core technologies in the new era of 'Internet plus AI', which is triggering a great change in the models, means, and ecosystems of the manufacturing industry, as well as in the development of AI. We then propose new models, means, and forms of intelligent manufacturing, intelligent manufacturing system architecture, and intelligent man-ufacturing technology system, based on the integration of AI technology with information communications, manufacturing, and related product technology. Moreover, from the perspectives of intelligent manufacturing application technology, industry, and application demonstration, the current development in intelligent manufacturing is discussed. Finally, suggestions for the appli-cation of AI in intelligent manufacturing in China are presented.

  11. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  12. Social intelligence, human intelligence and niche construction.

    Science.gov (United States)

    Sterelny, Kim

    2007-04-29

    This paper is about the evolution of hominin intelligence. I agree with defenders of the social intelligence hypothesis in thinking that externalist models of hominin intelligence are not plausible: such models cannot explain the unique cognition and cooperation explosion in our lineage, for changes in the external environment (e.g. increasing environmental unpredictability) affect many lineages. Both the social intelligence hypothesis and the social intelligence-ecological complexity hybrid I outline here are niche construction models. Hominin evolution is hominin response to selective environments that earlier hominins have made. In contrast to social intelligence models, I argue that hominins have both created and responded to a unique foraging mode; a mode that is both social in itself and which has further effects on hominin social environments. In contrast to some social intelligence models, on this view, hominin encounters with their ecological environments continue to have profound selective effects. However, though the ecological environment selects, it does not select on its own. Accidents and their consequences, differential success and failure, result from the combination of the ecological environment an agent faces and the social features that enhance some opportunities and suppress others and that exacerbate some dangers and lessen others. Individuals do not face the ecological filters on their environment alone, but with others, and with the technology, information and misinformation that their social world provides.

  13. Trends in ambient intelligent systems the role of computational intelligence

    CERN Document Server

    Khan, Mohammad; Abraham, Ajith

    2016-01-01

    This book demonstrates the success of Ambient Intelligence in providing possible solutions for the daily needs of humans. The book addresses implications of ambient intelligence in areas of domestic living, elderly care, robotics, communication, philosophy and others. The objective of this edited volume is to show that Ambient Intelligence is a boon to humanity with conceptual, philosophical, methodical and applicative understanding. The book also aims to schematically demonstrate developments in the direction of augmented sensors, embedded systems and behavioral intelligence towards Ambient Intelligent Networks or Smart Living Technology. It contains chapters in the field of Ambient Intelligent Networks, which received highly positive feedback during the review process. The book contains research work, with in-depth state of the art from augmented sensors, embedded technology and artificial intelligence along with cutting-edge research and development of technologies and applications of Ambient Intelligent N...

  14. Uncertainty in hydrological signatures

    Science.gov (United States)

    McMillan, Hilary; Westerberg, Ida

    2015-04-01

    Information that summarises the hydrological behaviour or flow regime of a catchment is essential for comparing responses of different catchments to understand catchment organisation and similarity, and for many other modelling and water-management applications. Such information types derived as an index value from observed data are known as hydrological signatures, and can include descriptors of high flows (e.g. mean annual flood), low flows (e.g. mean annual low flow, recession shape), the flow variability, flow duration curve, and runoff ratio. Because the hydrological signatures are calculated from observed data such as rainfall and flow records, they are affected by uncertainty in those data. Subjective choices in the method used to calculate the signatures create a further source of uncertainty. Uncertainties in the signatures may affect our ability to compare different locations, to detect changes, or to compare future water resource management scenarios. The aim of this study was to contribute to the hydrological community's awareness and knowledge of data uncertainty in hydrological signatures, including typical sources, magnitude and methods for its assessment. We proposed a generally applicable method to calculate these uncertainties based on Monte Carlo sampling and demonstrated it for a variety of commonly used signatures. The study was made for two data rich catchments, the 50 km2 Mahurangi catchment in New Zealand and the 135 km2 Brue catchment in the UK. For rainfall data the uncertainty sources included point measurement uncertainty, the number of gauges used in calculation of the catchment spatial average, and uncertainties relating to lack of quality control. For flow data the uncertainty sources included uncertainties in stage/discharge measurement and in the approximation of the true stage-discharge relation by a rating curve. The resulting uncertainties were compared across the different signatures and catchments, to quantify uncertainty

  15. Advanced intelligent systems

    CERN Document Server

    Ryoo, Young; Jang, Moon-soo; Bae, Young-Chul

    2014-01-01

    Intelligent systems have been initiated with the attempt to imitate the human brain. People wish to let machines perform intelligent works. Many techniques of intelligent systems are based on artificial intelligence. According to changing and novel requirements, the advanced intelligent systems cover a wide spectrum: big data processing, intelligent control, advanced robotics, artificial intelligence and machine learning. This book focuses on coordinating intelligent systems with highly integrated and foundationally functional components. The book consists of 19 contributions that features social network-based recommender systems, application of fuzzy enforcement, energy visualization, ultrasonic muscular thickness measurement, regional analysis and predictive modeling, analysis of 3D polygon data, blood pressure estimation system, fuzzy human model, fuzzy ultrasonic imaging method, ultrasonic mobile smart technology, pseudo-normal image synthesis, subspace classifier, mobile object tracking, standing-up moti...

  16. Competitive Intelligence.

    Science.gov (United States)

    Bergeron, Pierrette; Hiller, Christine A.

    2002-01-01

    Reviews the evolution of competitive intelligence since 1994, including terminology and definitions and analytical techniques. Addresses the issue of ethics; explores how information technology supports the competitive intelligence process; and discusses education and training opportunities for competitive intelligence, including core competencies…

  17. 76 FR 30542 - Adult Signature Services

    Science.gov (United States)

    2011-05-26

    ... POSTAL SERVICE 39 CFR Part 111 Adult Signature Services AGENCY: Postal Service\\TM\\. ACTION: Final..., Domestic Mail Manual (DMM[supreg]) 503.8, to add a new extra service called Adult Signature. This new service has two available options: Adult Signature Required and Adult Signature Restricted Delivery. DATES...

  18. Modelling traffic flows with intelligent cars and intelligent roads

    NARCIS (Netherlands)

    van Arem, Bart; Tampere, Chris M.J.; Malone, Kerry

    2003-01-01

    This paper addresses the modeling of traffic flows with intelligent cars and intelligent roads. It will describe the modeling approach MIXIC and review the results for different ADA systems: Adaptive Cruise Control, a special lane for Intelligent Vehicles, cooperative following and external speed

  19. Lesson 6: Signature Validation

    Science.gov (United States)

    Checklist items 13 through 17 are grouped under the Signature Validation Process, and represent CROMERR requirements that the system must satisfy as part of ensuring that electronic signatures it receives are valid.

  20. 21 CFR 11.50 - Signature manifestations.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature manifestations. 11.50 Section 11.50 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic...: (1) The printed name of the signer; (2) The date and time when the signature was executed; and (3...

  1. Intelligence.

    Science.gov (United States)

    Sternberg, Robert J

    2012-03-01

    Intelligence is the ability to learn from experience and to adapt to, shape, and select environments. Intelligence as measured by (raw scores on) conventional standardized tests varies across the lifespan, and also across generations. Intelligence can be understood in part in terms of the biology of the brain-especially with regard to the functioning in the prefrontal cortex-and also correlates with brain size, at least within humans. Studies of the effects of genes and environment suggest that the heritability coefficient (ratio of genetic to phenotypic variation) is between .4 and .8, although heritability varies as a function of socioeconomic status and other factors. Racial differences in measured intelligence have been observed, but race is a socially constructed rather than biological variable, so such differences are difficult to interpret.

  2. Intelligence

    Science.gov (United States)

    Sternberg, Robert J.

    2012-01-01

    Intelligence is the ability to learn from experience and to adapt to, shape, and select environments. Intelligence as measured by (raw scores on) conventional standardized tests varies across the lifespan, and also across generations. Intelligence can be understood in part in terms of the biology of the brain—especially with regard to the functioning in the prefrontal cortex—and also correlates with brain size, at least within humans. Studies of the effects of genes and environment suggest that the heritability coefficient (ratio of genetic to phenotypic variation) is between .4 and .8, although heritability varies as a function of socioeconomic status and other factors. Racial differences in measured intelligence have been observed, but race is a socially constructed rather than biological variable, so such differences are difficult to interpret. PMID:22577301

  3. 21 CFR 11.70 - Signature/record linking.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature/record linking. 11.70 Section 11.70 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective...

  4. Expressiveness considerations of XML signatures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher

    2011-01-01

    XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...

  5. Combined Intelligent Control (CIC an Intelligent Decision Making Algorithm

    Directory of Open Access Journals (Sweden)

    Moteaal Asadi Shirzi

    2007-03-01

    Full Text Available The focus of this research is to introduce the concept of combined intelligent control (CIC as an effective architecture for decision-making and control of intelligent agents and multi-robot sets. Basically, the CIC is a combination of various architectures and methods from fields such as artificial intelligence, Distributed Artificial Intelligence (DAI, control and biological computing. Although any intelligent architecture may be very effective for some specific applications, it could be less for others. Therefore, CIC combines and arranges them in a way that the strengths of any approach cover the weaknesses of others. In this paper first, we introduce some intelligent architectures from a new aspect. Afterward, we offer the CIC by combining them. CIC has been executed in a multi-agent set. In this set, robots must cooperate to perform some various tasks in a complex and nondeterministic environment with a low sensory feedback and relationship. In order to investigate, improve, and correct the combined intelligent control method, simulation software has been designed which will be presented and considered. To show the ability of the CIC algorithm as a distributed architecture, a central algorithm is designed and compared with the CIC.

  6. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  7. 17 CFR 12.12 - Signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Signature. 12.12 Section 12.12... General Information and Preliminary Consideration of Pleadings § 12.12 Signature. (a) By whom. All... document on behalf of another person. (b) Effect. The signature on any document of any person acting either...

  8. High-speed high-security signatures

    NARCIS (Netherlands)

    Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.Y.

    2011-01-01

    This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures

  9. Intelligence and negotiating

    International Nuclear Information System (INIS)

    George, D.G.

    1990-01-01

    This paper discusses the role of US intelligence during arms control negotiations between 1982 and 1987. It also covers : the orchestration of intelligence projects; an evaluation of the performance of intelligence activities; the effect intelligence work had on actual arms negotiations; and suggestions for improvements in the future

  10. Intelligence and childlessness.

    Science.gov (United States)

    Kanazawa, Satoshi

    2014-11-01

    Demographers debate why people have children in advanced industrial societies where children are net economic costs. From an evolutionary perspective, however, the important question is why some individuals choose not to have children. Recent theoretical developments in evolutionary psychology suggest that more intelligent individuals may be more likely to prefer to remain childless than less intelligent individuals. Analyses of the National Child Development Study show that more intelligent men and women express preference to remain childless early in their reproductive careers, but only more intelligent women (not more intelligent men) are more likely to remain childless by the end of their reproductive careers. Controlling for education and earnings does not at all attenuate the association between childhood general intelligence and lifetime childlessness among women. One-standard-deviation increase in childhood general intelligence (15 IQ points) decreases women's odds of parenthood by 21-25%. Because women have a greater impact on the average intelligence of future generations, the dysgenic fertility among women is predicted to lead to a decline in the average intelligence of the population in advanced industrial nations. Copyright © 2014 Elsevier Inc. All rights reserved.

  11. Perceived intelligence is associated with measured intelligence in men but not women.

    Science.gov (United States)

    Kleisner, Karel; Chvátalová, Veronika; Flegr, Jaroslav

    2014-01-01

    The ability to accurately assess the intelligence of other persons finds its place in everyday social interaction and should have important evolutionary consequences. We used static facial photographs of 40 men and 40 women to test the relationship between measured IQ, perceived intelligence, and facial shape. Both men and women were able to accurately evaluate the intelligence of men by viewing facial photographs. In addition to general intelligence, figural and fluid intelligence showed a significant relationship with perceived intelligence, but again, only in men. No relationship between perceived intelligence and IQ was found for women. We used geometric morphometrics to determine which facial traits are associated with the perception of intelligence, as well as with intelligence as measured by IQ testing. Faces that are perceived as highly intelligent are rather prolonged with a broader distance between the eyes, a larger nose, a slight upturn to the corners of the mouth, and a sharper, pointing, less rounded chin. By contrast, the perception of lower intelligence is associated with broader, more rounded faces with eyes closer to each other, a shorter nose, declining corners of the mouth, and a rounded and massive chin. By contrast, we found no correlation between morphological traits and real intelligence measured with IQ test, either in men or women. These results suggest that a perceiver can accurately gauge the real intelligence of men, but not women, by viewing their faces in photographs; however, this estimation is possibly not based on facial shape. Our study revealed no relation between intelligence and either attractiveness or face shape.

  12. A systematic profile/feature-based intelligence for spectral sensors

    International Nuclear Information System (INIS)

    Vogt, M.C.

    2000-01-01

    Argonne National Laboratory (ANL) has been creating a special-purpose software-engineering tool to support research and development of spectrum-output-type [chemical] sensors. The modular software system is called SAGE, the Sensor Algorithm Generation Environment and includes general-purpose signal conditioning algorithms (GP/SAGE) as well as intelligent classifiers, pattern recognizes, response accelerators, and sensitivity analyzers. GP/SAGE is an implementation of an approach for delivering a level of encapsulated intelligence to a wide range of sensors and instruments. It capitalizes on the genene classification and analysis needed to process most profile-type data. The GP/SAGE native data format is a generalized one-dimensional vector, signature, or spectrum. GP/SAGE modules form a computer-aided software engineering (CASE) workbench where users can experiment with various conditioning, filtering, and pattern recognition stages, then automatically generate final algorithm source code for data acquisition and analysis systems. SAGE was designed to free the [chemical] sensor developer from the signal processing allowing them to focus on understanding and improving the basic sensing mechanisms. The SAGE system's strength is its creative application of advanced neural computing techniques to response-vector and response-surface data, affording new insight and perspectives with regard to phenomena being studied for sensor development

  13. Artificial Intelligence.

    Science.gov (United States)

    Information Technology Quarterly, 1985

    1985-01-01

    This issue of "Information Technology Quarterly" is devoted to the theme of "Artificial Intelligence." It contains two major articles: (1) Artificial Intelligence and Law" (D. Peter O'Neill and George D. Wood); (2) "Artificial Intelligence: A Long and Winding Road" (John J. Simon, Jr.). In addition, it contains two sidebars: (1) "Calculating and…

  14. Self-Assessing of the Emotional Intelligence and Organizational Intelligence in Schools

    Science.gov (United States)

    Dagiene, Valentina; Juškeviciene, Anita; Carneiro, Roberto; Child, Camilla; Cullen, Joe

    2015-01-01

    The paper presents the results of an evaluation of the Emotional Intelligence (EI) and Organisational Intelligence (OI) competences self-assessment tools developed and applied by the IGUANA project. In the paper Emotional Intelligence and Organisational Intelligence competences are discussed, their use in action research experiments to assess and…

  15. Perceived Intelligence Is Associated with Measured Intelligence in Men but Not Women

    Science.gov (United States)

    Kleisner, Karel; Chvátalová, Veronika; Flegr, Jaroslav

    2014-01-01

    Background The ability to accurately assess the intelligence of other persons finds its place in everyday social interaction and should have important evolutionary consequences. Methodology/Principal Findings We used static facial photographs of 40 men and 40 women to test the relationship between measured IQ, perceived intelligence, and facial shape. Both men and women were able to accurately evaluate the intelligence of men by viewing facial photographs. In addition to general intelligence, figural and fluid intelligence showed a significant relationship with perceived intelligence, but again, only in men. No relationship between perceived intelligence and IQ was found for women. We used geometric morphometrics to determine which facial traits are associated with the perception of intelligence, as well as with intelligence as measured by IQ testing. Faces that are perceived as highly intelligent are rather prolonged with a broader distance between the eyes, a larger nose, a slight upturn to the corners of the mouth, and a sharper, pointing, less rounded chin. By contrast, the perception of lower intelligence is associated with broader, more rounded faces with eyes closer to each other, a shorter nose, declining corners of the mouth, and a rounded and massive chin. By contrast, we found no correlation between morphological traits and real intelligence measured with IQ test, either in men or women. Conclusions These results suggest that a perceiver can accurately gauge the real intelligence of men, but not women, by viewing their faces in photographs; however, this estimation is possibly not based on facial shape. Our study revealed no relation between intelligence and either attractiveness or face shape. PMID:24651120

  16. The effects of extrinsic motivation on signature authorship opinions in forensic signature blind trials.

    Science.gov (United States)

    Dewhurst, Tahnee N; Found, Bryan; Ballantyne, Kaye N; Rogers, Doug

    2014-03-01

    Expertise studies in forensic handwriting examination involve comparisons of Forensic Handwriting Examiners' (FHEs) opinions with lay-persons on blind tests. All published studies of this type have reported real and demonstrable skill differences between the specialist and lay groups. However, critics have proposed that any difference shown may be indicative of a lack of motivation on the part of lay participants, rather than a real difference in skill. It has been suggested that qualified FHEs would be inherently more motivated to succeed in blinded validation trials, as their professional reputations could be at risk, should they perform poorly on the task provided. Furthermore, critics suggest that lay-persons would be unlikely to be highly motivated to succeed, as they would have no fear of negative consequences should they perform badly. In an effort to investigate this concern, a blind signature trial was designed and administered to forty lay-persons. Participants were required to compare known (exemplar) signatures of an individual to questioned signatures and asked to express an opinion regarding whether the writer of the known signatures wrote each of the questioned signatures. The questioned signatures comprised a mixture of genuine, disguised and simulated signatures. The forty participants were divided into two separate groupings. Group 'A' were requested to complete the trial as directed and were advised that for each correct answer they would be financially rewarded, for each incorrect answer they would be financially penalized, and for each inconclusive opinion they would receive neither penalty nor reward. Group 'B' was requested to complete the trial as directed, with no mention of financial recompense or penalty. The results of this study do not support the proposition that motivation rather than skill difference is the source of the statistical difference in opinions between individuals' results in blinded signature proficiency trials. Crown

  17. Nexus between Intelligence Education and Intelligence Training: A South African Perspective

    Directory of Open Access Journals (Sweden)

    M. A. van den Berg

    2015-10-01

    Full Text Available This paper examines the nexus of intelligence education and training from a South African perspective with the focus on current practices in light of the country’s transition towards democracy. A brief overview is provided on the history and development of the South African intelligence community with specific focus on the civilian intelligence services from the period prior 1994 to date (2015. The main focus, however, is on intelligence education that is currently available from training institutions and universities in South Africa as registered with the Department of Higher Education as well as private training institutions on the one hand, and the intelligence training practices within the statutory intelligence environment on the other. To this extent, the relations between academic institutions and the intelligence structures in terms of education and training within South Africa are perused against other practices within the African continent and internationally. The approaches to the study of intelligence are also addressed within this paper. Likewise, the how, what as well as to whom – pertaining to intelligence education and training availability and accessibility to students and practitioners within South Africa, is reviewed and analysed with the focus on making recommendations for the enhancement and improvement thereof to enable a focus on preparing the next generation of professional intelligence officers.

  18. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  19. Exotic signatures from supersymmetry

    International Nuclear Information System (INIS)

    Hall, L.J.

    1989-08-01

    Minor changes to the standard supersymmetric model, such as soft flavor violation and R parity violation, cause large changes in the signatures. The origin of these changes and the resulting signatures are discussed. 15 refs., 7 figs., 2 tabs

  20. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  1. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  2. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  3. The relationship of Emotional Intelligence with Academic Intelligence and the Big Five

    NARCIS (Netherlands)

    Van der Zee, K.I.; Thijs, Melanie; Schakel, Lolle

    The present study examines the relationship of self- and other ratings of emotional intelligence with academic intelligence and personality, as well as the incremental validity of emotional intelligence beyond academic intelligence and personality in predicting academic and social success. A sample

  4. The relationship of emotional intelligence with academic intelligence and the Big Five

    NARCIS (Netherlands)

    van der Zee, K; Thijs, M; Schakel, L

    2002-01-01

    The present study examines the relationship of self- and other ratings of emotional intelligence with academic intelligence and personality, as well as the incremental validity of emotional intelligence beyond academic intelligence and personality in predicting academic and social success. A sample

  5. On reliable discovery of molecular signatures

    Directory of Open Access Journals (Sweden)

    Björkegren Johan

    2009-01-01

    Full Text Available Abstract Background Molecular signatures are sets of genes, proteins, genetic variants or other variables that can be used as markers for a particular phenotype. Reliable signature discovery methods could yield valuable insight into cell biology and mechanisms of human disease. However, it is currently not clear how to control error rates such as the false discovery rate (FDR in signature discovery. Moreover, signatures for cancer gene expression have been shown to be unstable, that is, difficult to replicate in independent studies, casting doubts on their reliability. Results We demonstrate that with modern prediction methods, signatures that yield accurate predictions may still have a high FDR. Further, we show that even signatures with low FDR may fail to replicate in independent studies due to limited statistical power. Thus, neither stability nor predictive accuracy are relevant when FDR control is the primary goal. We therefore develop a general statistical hypothesis testing framework that for the first time provides FDR control for signature discovery. Our method is demonstrated to be correct in simulation studies. When applied to five cancer data sets, the method was able to discover molecular signatures with 5% FDR in three cases, while two data sets yielded no significant findings. Conclusion Our approach enables reliable discovery of molecular signatures from genome-wide data with current sample sizes. The statistical framework developed herein is potentially applicable to a wide range of prediction problems in bioinformatics.

  6. Artificial Intelligence Project

    Science.gov (United States)

    1990-01-01

    Symposium on Aritificial Intelligence and Software Engineering Working Notes, March 1989. Blumenthal, Brad, "An Architecture for Automating...Artificial Intelligence Project Final Technical Report ARO Contract: DAAG29-84-K-OGO Artificial Intelligence LaboratO"ry The University of Texas at...Austin N>.. ~ ~ JA 1/I 1991 n~~~ Austin, Texas 78712 ________k A,.tificial Intelligence Project i Final Technical Report ARO Contract: DAAG29-84-K-0060

  7. Real time gamma-ray signature identifier

    Science.gov (United States)

    Rowland, Mark [Alamo, CA; Gosnell, Tom B [Moraga, CA; Ham, Cheryl [Livermore, CA; Perkins, Dwight [Livermore, CA; Wong, James [Dublin, CA

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  8. Routledge companion to intelligence studies

    CERN Document Server

    Dover, Robert; Hillebrand, Claudia

    2013-01-01

    The Routledge Companion to Intelligence Studies provides a broad overview of the growing field of intelligence studies. The recent growth of interest in intelligence and security studies has led to an increased demand for popular depictions of intelligence and reference works to explain the architecture and underpinnings of intelligence activity. Divided into five comprehensive sections, this Companion provides a strong survey of the cutting-edge research in the field of intelligence studies: Part I: The evolution of intelligence studies; Part II: Abstract approaches to intelligence; Part III: Historical approaches to intelligence; Part IV: Systems of intelligence; Part V: Contemporary challenges. With a broad focus on the origins, practices and nature of intelligence, the book not only addresses classical issues, but also examines topics of recent interest in security studies. The overarching aim is to reveal the rich tapestry of intelligence studies in both a sophisticated and accessible way. This Companion...

  9. 78 FR 90 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2013-01-02

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: National Intelligence University, Defense Intelligence... hereby given that a closed meeting of the National Intelligence University Board of Visitors has been...

  10. DNA Methylation Signatures of Early Childhood Malnutrition Associated With Impairments in Attention and Cognition.

    Science.gov (United States)

    Peter, Cyril J; Fischer, Laura K; Kundakovic, Marija; Garg, Paras; Jakovcevski, Mira; Dincer, Aslihan; Amaral, Ana C; Ginns, Edward I; Galdzicka, Marzena; Bryce, Cyralene P; Ratner, Chana; Waber, Deborah P; Mokler, David; Medford, Gayle; Champagne, Frances A; Rosene, Douglas L; McGaughy, Jill A; Sharp, Andrew J; Galler, Janina R; Akbarian, Schahram

    2016-11-15

    Early childhood malnutrition affects 113 million children worldwide, impacting health and increasing vulnerability for cognitive and behavioral disorders later in life. Molecular signatures after childhood malnutrition, including the potential for intergenerational transmission, remain unexplored. We surveyed blood DNA methylomes (~483,000 individual CpG sites) in 168 subjects across two generations, including 50 generation 1 individuals hospitalized during the first year of life for moderate to severe protein-energy malnutrition, then followed up to 48 years in the Barbados Nutrition Study. Attention deficits and cognitive performance were evaluated with the Connors Adult Attention Rating Scale and Wechsler Abbreviated Scale of Intelligence. Expression of nutrition-sensitive genes was explored by quantitative reverse transcriptase polymerase chain reaction in rat prefrontal cortex. We identified 134 nutrition-sensitive, differentially methylated genomic regions, with most (87%) specific for generation 1. Multiple neuropsychiatric risk genes, including COMT, IFNG, MIR200B, SYNGAP1, and VIPR2 showed associations of specific methyl-CpGs with attention and IQ. IFNG expression was decreased in prefrontal cortex of rats showing attention deficits after developmental malnutrition. Early childhood malnutrition entails long-lasting epigenetic signatures associated with liability for attention and cognition, and limited potential for intergenerational transmission. Copyright © 2016 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.

  11. 42 CFR 424.36 - Signature requirements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Signature requirements. 424.36 Section 424.36... (CONTINUED) MEDICARE PROGRAM CONDITIONS FOR MEDICARE PAYMENT Claims for Payment § 424.36 Signature requirements. (a) General rule. The beneficiary's own signature is required on the claim unless the beneficiary...

  12. Unsupervised signature extraction from forensic logs

    NARCIS (Netherlands)

    Thaler, S.M.; Menkovski, V.; Petkovic, M.; Altun, Y.; Das, K.; Mielikäinen, T.; Malerba, D.; Stefanowski, J.; Read, J.; Žitnik, M.; Ceci, M.

    2017-01-01

    Signature extraction is a key part of forensic log analysis. It involves recognizing patterns in log lines such that log lines that originated from the same line of code are grouped together. A log signature consists of immutable parts and mutable parts. The immutable parts define the signature, and

  13. Intelligent products : A survey

    NARCIS (Netherlands)

    Meyer, G.G.; Främling, K.; Holmström, J.

    This paper presents an overview of the field of Intelligent Products. As Intelligent Products have many facets, this paper is mainly focused on the concept behind Intelligent Products, the technical foundations, and the achievable practical goals of Intelligent Products. A novel classification of

  14. Benefits of collective intelligence: Swarm intelligent foraging, an ethnographic research

    Directory of Open Access Journals (Sweden)

    Sivave Mashingaidze

    2014-12-01

    Full Text Available Wisdom of crowds; bees, colonies of ants, schools of fish, flocks of birds, and fireflies flashing synchronously are all examples of highly coordinated behaviors that emerge from collective, decentralized intelligence. This article is an ethnographic study of swarm intelligence foraging of swarms and the benefits derived from collective decision making. The author used using secondary data analysis to look at the benefits of swarm intelligence in decision making to achieve intended goals. Concepts like combined decision making and consensus were discussed and four principles of swarm intelligence were also discussed viz; coordination, cooperation, deliberation and collaboration. The research found out that collective decision making in swarms is the touchstone of achieving their goals. The research further recommended corporate to adopt collective intelligence for business sustainability.

  15. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  16. Intelligence: Real or artificial?

    OpenAIRE

    Schlinger, Henry D.

    1992-01-01

    Throughout the history of the artificial intelligence movement, researchers have strived to create computers that could simulate general human intelligence. This paper argues that workers in artificial intelligence have failed to achieve this goal because they adopted the wrong model of human behavior and intelligence, namely a cognitive essentialist model with origins in the traditional philosophies of natural intelligence. An analysis of the word “intelligence” suggests that it originally r...

  17. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  18. 7 CFR 718.9 - Signature requirements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Signature requirements. 718.9 Section 718.9... MULTIPLE PROGRAMS General Provisions § 718.9 Signature requirements. (a) When a program authorized by this chapter or Chapter XIV of this title requires the signature of a producer; landowner; landlord; or tenant...

  19. 27 CFR 17.6 - Signature authority.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Signature authority. 17.6... PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond, tax return, or other required... other proper notification of signature authority has been filed with the TTB office where the required...

  20. Online Signature Verification on MOBISIG Finger-Drawn Signature Corpus

    Directory of Open Access Journals (Sweden)

    Margit Antal

    2018-01-01

    Full Text Available We present MOBISIG, a pseudosignature dataset containing finger-drawn signatures from 83 users captured with a capacitive touchscreen-based mobile device. The database was captured in three sessions resulting in 45 genuine signatures and 20 skilled forgeries for each user. The database was evaluated by two state-of-the-art methods: a function-based system using local features and a feature-based system using global features. Two types of equal error rate computations are performed: one using a global threshold and the other using user-specific thresholds. The lowest equal error rate was 0.01% against random forgeries and 5.81% against skilled forgeries using user-specific thresholds that were computed a posteriori. However, these equal error rates were significantly raised to 1.68% (random forgeries case and 14.31% (skilled forgeries case using global thresholds. The same evaluation protocol was performed on the DooDB publicly available dataset. Besides verification performance evaluations conducted on the two finger-drawn datasets, we evaluated the quality of the samples and the users of the two datasets using basic quality measures. The results show that finger-drawn signatures can be used by biometric systems with reasonable accuracy.

  1. 48 CFR 804.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... signature. 804.101 Section 804.101 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL ADMINISTRATIVE MATTERS Contract Execution 804.101 Contracting officer's signature. (a) If a... signature. ...

  2. Quality control of intelligence research

    International Nuclear Information System (INIS)

    Lu Yan; Xin Pingping; Wu Jian

    2014-01-01

    Quality control of intelligence research is the core issue of intelligence management, is a problem in study of information science This paper focuses on the performance of intelligence to explain the significance of intelligence research quality control. In summing up the results of the study on the basis of the analysis, discusses quality control methods in intelligence research, introduces the experience of foreign intelligence research quality control, proposes some recommendations to improve quality control in intelligence research. (authors)

  3. Perancangan Aplikasi Undeniable Digital Signature Dengan Algoritma Chaum’s Blind Signature

    OpenAIRE

    Simanjuntak, Martin Dennain

    2012-01-01

    Desperaty need a securiry system in the exchange of information via computer media, so that information can not be accessed by unauthorized parties. One of the security system is to use a system of digital signatures as a means of authenticating the authenticity of digital document that are exchanged. By using a digital a digital signature system is undeniable, the security system can be generated digital document exchange, where the system is free from the from of rejection...

  4. Intelligence Issues for Congress

    Science.gov (United States)

    2013-04-23

    open source information— osint (newspapers...by user agencies. Section 1052 of the Intelligence Reform Act expressed the sense of Congress that there should be an open source intelligence ...center to coordinate the collection, analysis, production, and dissemination of open source intelligence to other intelligence agencies. An Open Source

  5. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  6. 25 CFR 213.10 - Lessor's signature.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Lessor's signature. 213.10 Section 213.10 Indians BUREAU... MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature... thumbprint which shall be designated as “right” or “left” thumbmark. Such signatures must be witnessed by two...

  7. Orchestrating Multiple Intelligences

    Science.gov (United States)

    Moran, Seana; Kornhaber, Mindy; Gardner, Howard

    2006-01-01

    Education policymakers often go astray when they attempt to integrate multiple intelligences theory into schools, according to the originator of the theory, Howard Gardner, and his colleagues. The greatest potential of a multiple intelligences approach to education grows from the concept of a profile of intelligences. Each learner's intelligence…

  8. Initial Semantics for Strengthened Signatures

    Directory of Open Access Journals (Sweden)

    André Hirschowitz

    2012-02-01

    Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.

  9. Spectral signature selection for mapping unvegetated soils

    Science.gov (United States)

    May, G. A.; Petersen, G. W.

    1975-01-01

    Airborne multispectral scanner data covering the wavelength interval from 0.40-2.60 microns were collected at an altitude of 1000 m above the terrain in southeastern Pennsylvania. Uniform training areas were selected within three sites from this flightline. Soil samples were collected from each site and a procedure developed to allow assignment of scan line and element number from the multispectral scanner data to each sampling location. These soil samples were analyzed on a spectrophotometer and laboratory spectral signatures were derived. After correcting for solar radiation and atmospheric attenuation, the laboratory signatures were compared to the spectral signatures derived from these same soils using multispectral scanner data. Both signatures were used in supervised and unsupervised classification routines. Computer-generated maps using the laboratory and multispectral scanner derived signatures resulted in maps that were similar to maps resulting from field surveys. Approximately 90% agreement was obtained between classification maps produced using multispectral scanner derived signatures and laboratory derived signatures.

  10. Time Series Based for Online Signature Verification

    Directory of Open Access Journals (Sweden)

    I Ketut Gede Darma Putra

    2013-11-01

    Full Text Available Signature verification system is to match the tested signature with a claimed signature. This paper proposes time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,44897959% at threshold 44 with rejection errors (FNMR is 5,2% and acceptance errors (FMR is 4,35102%, when with imposters system accuracy is 80,1361% at threshold 27 with error rejection (FNMR is 15,6% and acceptance errors (average FMR is 4,263946%, with details as follows: acceptance errors is 0,391837%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.

  11. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures.

    Science.gov (United States)

    Pride, David T; Schoenfeld, Thomas

    2008-09-17

    Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC), where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of the Octopus and Bear Paw metagenomic contigs

  12. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  13. Semantic Business Intelligence - a New Generation of Business Intelligence

    Directory of Open Access Journals (Sweden)

    Dinu AIRINEI

    2012-01-01

    Full Text Available Business Intelligence Solutions represents applications used by companies to manage process and analyze data to provide substantiated decision. In the context of Semantic Web develop-ment trend is to integrate semantic unstructured data, making business intelligence solutions to be redesigned in such a manner that can analyze, process and synthesize, in addition to traditional data and data integrated with semantic another form and structure. This invariably leads appearance of new BI solution, called Semantic Business Intelligence.

  14. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  15. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  16. Research of Classical and Intelligent Information System Solutions for Criminal Intelligence Analysis

    OpenAIRE

    Šimović, Vladimir

    2001-01-01

    The objective of this study is to present research on classical and intelligent information system solutions used in criminal intelligence analysis in Croatian security system theory. The study analyses objective and classical methods of information science, including artificial intelligence and other scientific methods. The intelligence and classical software solutions researched, proposed, and presented in this study were used in developing the integrated information system for the Croatian...

  17. Artificial Consciousness or Artificial Intelligence

    OpenAIRE

    Spanache Florin

    2017-01-01

    Artificial intelligence is a tool designed by people for the gratification of their own creative ego, so we can not confuse conscience with intelligence and not even intelligence in its human representation with conscience. They are all different concepts and they have different uses. Philosophically, there are differences between autonomous people and automatic artificial intelligence. This is the difference between intelligence and artificial intelligence, autonomous versus a...

  18. Maximizing biomarker discovery by minimizing gene signatures

    Directory of Open Access Journals (Sweden)

    Chang Chang

    2011-12-01

    Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the

  19. Intelligent mechatronics; Intelligent mechatronics

    Energy Technology Data Exchange (ETDEWEB)

    Hashimoto, H. [The University of Tokyo, Tokyo (Japan). Institute of Industrial Science

    1995-10-01

    Intelligent mechatronics (IM) was explained as follows: a study of IM essentially targets realization of a robot namely, but in the present stage the target is a creation of new values by intellectualization of machine, that is, a combination of the information infrastructure and the intelligent machine system. IM is also thought to be constituted of computers positively used and micromechatronics. The paper next introduces examples of IM study, mainly those the author is concerned with as shown below: sensor gloves, robot hands, robot eyes, tele operation, three-dimensional object recognition, mobile robot, magnetic bearing, construction of remote controlled unmanned dam, robot network, sensitivity communication using neuro baby, etc. 27 figs.

  20. Brain Intelligence: Go Beyond Artificial Intelligence

    OpenAIRE

    Lu, Huimin; Li, Yujie; Chen, Min; Kim, Hyoungseop; Serikawa, Seiichi

    2017-01-01

    Artificial intelligence (AI) is an important technology that supports daily social life and economic activities. It contributes greatly to the sustainable growth of Japan's economy and solves various social problems. In recent years, AI has attracted attention as a key for growth in developed countries such as Europe and the United States and developing countries such as China and India. The attention has been focused mainly on developing new artificial intelligence information communication ...

  1. Business Intelligence Systems

    Directory of Open Access Journals (Sweden)

    Bogdan NEDELCU

    2014-02-01

    Full Text Available The aim of this article is to show the importance of business intelligence and its growing influence. It also shows when the concept of business intelligence was used for the first time and how it evolved over time. The paper discusses the utility of a business intelligence system in any organization and its contribution to daily activities. Furthermore, we highlight the role and the objectives of business intelligence systems inside an organization and the needs to grow the incomes and reduce the costs, to manage the complexity of the business environment and to cut IT costs so that the organization survives in the current competitive climate. The article contains information about architectural principles of a business intelligence system and how such a system can be achieved.

  2. Lattice-Based Revocable Certificateless Signature

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-10-01

    Full Text Available Certificateless signatures (CLS are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS scheme over lattices. Based on the short integer solution (SIS assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.

  3. Professionalizing Intelligence Analysis

    Directory of Open Access Journals (Sweden)

    James B. Bruce

    2015-09-01

    Full Text Available This article examines the current state of professionalism in national security intelligence analysis in the U.S. Government. Since the introduction of major intelligence reforms directed by the Intelligence Reform and Terrorism Prevention Act (IRTPA in December, 2004, we have seen notable strides in many aspects of intelligence professionalization, including in analysis. But progress is halting, uneven, and by no means permanent. To consolidate its gains, and if it is to continue improving, the U.S. intelligence community (IC should commit itself to accomplishing a new program of further professionalization of analysis to ensure that it will develop an analytic cadre that is fully prepared to deal with the complexities of an emerging multipolar and highly dynamic world that the IC itself is forecasting. Some recent reforms in intelligence analysis can be assessed against established standards of more fully developed professions; these may well fall short of moving the IC closer to the more fully professionalized analytical capability required for producing the kind of analysis needed now by the United States.

  4. General Conversion for Obtaining Strongly Existentially Unforgeable Signatures

    Science.gov (United States)

    Teranishi, Isamu; Oyama, Takuro; Ogata, Wakaha

    We say that a signature scheme is strongly existentially unforgeable (SEU) if no adversary, given message/signature pairs adaptively, can generate a signature on a new message or a new signature on a previously signed message. We propose a general and efficient conversion in the standard model that transforms a secure signature scheme to SEU signature scheme. In order to construct that conversion, we use a chameleon commitment scheme. Here a chameleon commitment scheme is a variant of commitment scheme such that one can change the committed value after publishing the commitment if one knows the secret key. We define the chosen message security notion for the chameleon commitment scheme, and show that the signature scheme transformed by our proposed conversion satisfies the SEU property if the chameleon commitment scheme is chosen message secure. By modifying the proposed conversion, we also give a general and efficient conversion in the random oracle model, that transforms a secure signature scheme into a SEU signature scheme. This second conversion also uses a chameleon commitment scheme but only requires the key only attack security for it.

  5. Revolutionary Intelligence: The Expanding Intelligence Role of the Iranian Revolutionary Guard Corps

    Directory of Open Access Journals (Sweden)

    Udit Banerjea

    2015-09-01

    Full Text Available The Iranian Revolutionary Guard Corps (IRGC is a military and paramilitary organization that is meant to defend the ideals of the Iranian Islamic Revolution in 1979. Since its formation, the IRGC has grown in influence and its intelligence role has expanded. This paper examines the role of the IRGC in Iran’s intelligence system through a comprehensive analysis of the organization of the IRGC’s intelligence arm, along with its operations and capabilities. In doing so, the scope, objectives, resources, customers, and sponsors of the IRGC’s intelligence activities are also analyzed. Additionally, this paper explores how the IRGC interacts with the government of Iran, the Ministry of Intelligence and Security (MOIS, other key internal stakeholders, and foreign client organizations. A key focus of this analysis is the evolution of the relationship between the IRGC and the MOIS and the growing influence of the IRGC in Iran’s intelligence community over the last decade. The paper concludes that the IRGC has now eclipsed the MOIS within Iran’s intelligence community and is one of the most powerful institutions in Iranian politics today, using its intelligence activities as its key means of maintaining power and influence within the country.

  6. 77 FR 32952 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2012-06-04

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: Department of Defense, Defense Intelligence Agency, National Intelligence University. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of...

  7. Intelligent playgrounds

    DEFF Research Database (Denmark)

    Larsen, Lasse Juel

    2009-01-01

    This paper examines play, gaming and learning in regard to intelligent playware developed for outdoor use. The key questions are how does these novel artefacts influence the concept of play, gaming and learning. Up until now play and game have been understood as different activities. This paper...... examines if the sharp differentiation between the two can be uphold in regard to intelligent playware for outdoor use. Play and game activities will be analysed and viewed in conjunction with learning contexts. This paper will stipulate that intelligent playware facilitates rapid shifts in contexts...

  8. Artificial intelligence

    CERN Document Server

    Ennals, J R

    1987-01-01

    Artificial Intelligence: State of the Art Report is a two-part report consisting of the invited papers and the analysis. The editor first gives an introduction to the invited papers before presenting each paper and the analysis, and then concludes with the list of references related to the study. The invited papers explore the various aspects of artificial intelligence. The analysis part assesses the major advances in artificial intelligence and provides a balanced analysis of the state of the art in this field. The Bibliography compiles the most important published material on the subject of

  9. Radar micro-doppler signatures processing and applications

    CERN Document Server

    Chen, Victor C; Miceli, William J

    2014-01-01

    Radar Micro-Doppler Signatures: Processing and applications concentrates on the processing and application of radar micro-Doppler signatures in real world situations, providing readers with a good working knowledge on a variety of applications of radar micro-Doppler signatures.

  10. Advanced intelligence and mechanism approach

    Institute of Scientific and Technical Information of China (English)

    ZHONG Yixin

    2007-01-01

    Advanced intelligence will feature the intelligence research in next 50 years.An understanding of the concept of advanced intelligence as well as its importance will be provided first,and detailed analysis on an approach,the mechanism approach.suitable to the advanced intelligence research will then be flolowed.And the mutual relationship among mechanism approach,traditional approaches existed in artificial intelligence research,and the cognitive informatics will be discussed.It is interesting to discover that mechanism approach is a good one to the Advanced Intelligence research and a tmified form of the existed approaches to artificial intelligence.

  11. Computational Intelligence in Intelligent Data Analysis

    CERN Document Server

    Nürnberger, Andreas

    2013-01-01

    Complex systems and their phenomena are ubiquitous as they can be found in biology, finance, the humanities, management sciences, medicine, physics and similar fields. For many problems in these fields, there are no conventional ways to mathematically or analytically solve them completely at low cost. On the other hand, nature already solved many optimization problems efficiently. Computational intelligence attempts to mimic nature-inspired problem-solving strategies and methods. These strategies can be used to study, model and analyze complex systems such that it becomes feasible to handle them. Key areas of computational intelligence are artificial neural networks, evolutionary computation and fuzzy systems. As only a few researchers in that field, Rudolf Kruse has contributed in many important ways to the understanding, modeling and application of computational intelligence methods. On occasion of his 60th birthday, a collection of original papers of leading researchers in the field of computational intell...

  12. Physics Signatures at CLIC

    CERN Document Server

    Battaglia, Marco

    2001-01-01

    A set of signatures for physics processes of potential interests for the CLIC programme at = 1 - 5 TeV are discussed. These signatures, that may correspond to the manifestation of different scenarios of new physics as well as to Standard Model precision tests, are proposed as benchmarks for the optimisation of the CLIC accelerator parameters and for a first definition of the required detector response.

  13. Before and Beyond Anticipatory Intelligence: Assessing the Potential for Crowdsourcing and Intelligence Studies

    Directory of Open Access Journals (Sweden)

    Alexander Halman

    2015-10-01

    Full Text Available Crowdsourcing is a new tool for businesses, academics, and now intelligence analysts. Enabled by recent technology, crowdsourcing allows researchers to harness the wisdom of crowds and provide recommendations and insight into complex problems. This paper examines the potential benefits and limitations of crowdsourcing for intelligence analysis and the intelligence community beyond its primary use: anticipatory intelligence. The author constructs a model and compares it to existing crowdsourcing theories in business, information science, and public policy. Finally, he offers advice for intelligence analysis and public policy.

  14. 2015 Chinese Intelligent Systems Conference

    CERN Document Server

    Du, Junping; Li, Hongbo; Zhang, Weicun; CISC’15

    2016-01-01

    This book presents selected research papers from the 2015 Chinese Intelligent Systems Conference (CISC’15), held in Yangzhou, China. The topics covered include multi-agent systems, evolutionary computation, artificial intelligence, complex systems, computation intelligence and soft computing, intelligent control, advanced control technology, robotics and applications, intelligent information processing, iterative learning control, and machine learning. Engineers and researchers from academia, industry and the government can gain valuable insights into solutions combining ideas from multiple disciplines in the field of intelligent systems.

  15. Intelligence and the machinery of government: conceptualizing the intelligence community

    OpenAIRE

    Davies, PHJ

    2010-01-01

    This article argues that the failure to address intelligence agencies as public organizations part and parcel with the overt machinery of government constitutes a significant lacuna both in the specialist study of intelligence and the broader discipline of public administration studies. The role and status of intelligence institutions as aspects of the machinery of central government is examined, along with the prospects of certain key paradigms in the field for understanding those institutio...

  16. Secular gains in fluid intelligence: evidence from the Culture-Fair intelligence test.

    Science.gov (United States)

    Colom, Roberto; García-López, Oscar

    2003-01-01

    There is no doubt about the reality of the secular increase in cognitive test scores. However, there is disagreement about a key issue: does the observed increase reflect a genuine upward trend in intelligence? Evidence from the Raven test is clear, although there are some doubts about its adequacy as a fine-grained measure of fluid intelligence. Evidence from the so-called 'method of correlated vectors' is much less clear. When a crystallized battery is considered, the results leave little doubt: the increase does not reflect gains in general intelligence. However, when a fluid battery is analysed, the increase does reflect gains in general intelligence. The present study uses one of the best available measures of fluid intelligence (the Culture-Fair intelligence test) to provide new evidence for the secular increase in fluid intelligence, beyond the findings from the Raven test and the method of correlated vectors. A total of 4498 Spanish high school students and high school graduates were tested within a time interval of 20 and 23 years, respectively. The results show that there is a clear upward trend in intelligence. Moreover, students show an average increase equivalent to 6 IQ points, while graduates show an average increase of 4 IQ points. Therefore, more selected people (graduates) show a smaller increase than less selected people (students). Some implications are discussed.

  17. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures

    Directory of Open Access Journals (Sweden)

    Pride David T

    2008-09-01

    Full Text Available Abstract Background Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC, where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. Results From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of

  18. 48 CFR 204.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Contracting officer's signature. 204.101 Section 204.101 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... officer's signature. Follow the procedures at PGI 204.101 for signature of contract documents. [71 FR 9268...

  19. Scholastic Success: Fluid Intelligence, Personality, and Emotional Intelligence

    Science.gov (United States)

    Downey, Luke A.; Lomas, Justine; Billings, Clare; Hansen, Karen; Stough, Con

    2014-01-01

    The aim of the current study was to examine the role of fluid intelligence, personality traits, and emotional intelligence (EI) in predicting female Year 9 students' grade point average (GPA) and to determine whether any differences in scholastic performance were related to differences in EI or Personality. Two-hundred and forty-three female…

  20. Perceived emotional intelligence, general intelligence and early professional success: predictive and incremental validity

    Directory of Open Access Journals (Sweden)

    José-Manuel de Haro

    2014-05-01

    Full Text Available Although the study of factors affecting career success has shown connections between biographical and other aspects related to ability, knowledge and personality, few studies have examined the relationship between emotional intelligence and professional success at the initial career stage. When these studies were carried out, the results showed significant relationships between the dimensions of emotional intelligence (emotional self-awareness, self-regulation, social awareness or social skills and the level of professional competence. In this paper, we analyze the relationship between perceived emotional intelligence, measured by the Trait Meta-Mood Scale (TMMS-24 questionnaire, general intelligence assessed by the Cattell factor "g" test, scale 3, and extrinsic indicators of career success, in a sample of 130 graduates at the beginning of their careers. Results from hierarchical regression analysis indicate that emotional intelligence makes a specific contribution to the prediction of salary, after controlling the general intelligence effect. The perceived emotional intelligence dimensions of TMMS repair, TMMS attention and sex show a higher correlation and make a greater contribution to professional success than general intelligence. The implications of these results for the development of socio-emotional skills among University graduates are discussed.

  1. Complementary Machine Intelligence and Human Intelligence in Virtual Teaching Assistant for Tutoring Program Tracing

    Science.gov (United States)

    Chou, Chih-Yueh; Huang, Bau-Hung; Lin, Chi-Jen

    2011-01-01

    This study proposes a virtual teaching assistant (VTA) to share teacher tutoring tasks in helping students practice program tracing and proposes two mechanisms of complementing machine intelligence and human intelligence to develop the VTA. The first mechanism applies machine intelligence to extend human intelligence (teacher answers) to evaluate…

  2. Can specific transcriptional regulators assemble a universal cancer signature?

    Science.gov (United States)

    Roy, Janine; Isik, Zerrin; Pilarsky, Christian; Schroeder, Michael

    2013-10-01

    Recently, there is a lot of interest in using biomarker signatures derived from gene expression data to predict cancer progression. We assembled signatures of 25 published datasets covering 13 types of cancers. How do these signatures compare with each other? On one hand signatures answering the same biological question should overlap, whereas signatures predicting different cancer types should differ. On the other hand, there could also be a Universal Cancer Signature that is predictive independently of the cancer type. Initially, we generate signatures for all datasets using classical approaches such as t-test and fold change and then, we explore signatures resulting from a network-based method, that applies the random surfer model of Google's PageRank algorithm. We show that the signatures as published by the authors and the signatures generated with classical methods do not overlap - not even for the same cancer type - whereas the network-based signatures strongly overlap. Selecting 10 out of 37 universal cancer genes gives the optimal prediction for all cancers thus taking a first step towards a Universal Cancer Signature. We furthermore analyze and discuss the involved genes in terms of the Hallmarks of cancer and in particular single out SP1, JUN/FOS and NFKB1 and examine their specific role in cancer progression.

  3. A Belief-Space Approach to Integrated Intelligence - Research Area 10.3: Intelligent Networks

    Science.gov (United States)

    2017-12-05

    A Belief-Space Approach to Integrated Intelligence- Research Area 10.3: Intelligent Networks The views, opinions and/or findings contained in this...Technology (MIT) Title: A Belief-Space Approach to Integrated Intelligence- Research Area 10.3: Intelligent Networks Report Term: 0-Other Email: tlp...students presented progress and received feedback from the research group . o wrote papers on their research and submitted them to leading conferences

  4. Artificial Intelligence

    CERN Document Server

    Warwick, Kevin

    2011-01-01

    if AI is outside your field, or you know something of the subject and would like to know more then Artificial Intelligence: The Basics is a brilliant primer.' - Nick Smith, Engineering and Technology Magazine November 2011 Artificial Intelligence: The Basics is a concise and cutting-edge introduction to the fast moving world of AI. The author Kevin Warwick, a pioneer in the field, examines issues of what it means to be man or machine and looks at advances in robotics which have blurred the boundaries. Topics covered include: how intelligence can be defined whether machines can 'think' sensory

  5. Intelligence of programs

    Energy Technology Data Exchange (ETDEWEB)

    Novak, D

    1982-01-01

    A general discussion about the level of artificial intelligence in computer programs is presented. The suitability of various languages for the development of complex, intelligent programs is discussed, considering fourth-generation language as well as the well established structured COBOL language. It is concluded that the success of automation in many administrative fields depends to a large extent on the development of intelligent programs.

  6. 36 CFR 1150.22 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Signature of documents. 1150.22 Section 1150.22 Parks, Forests, and Public Property ARCHITECTURAL AND TRANSPORTATION BARRIERS... Documents for Proceedings on Citations § 1150.22 Signature of documents. The signature of a party...

  7. Relationships between the Kaufman Brief Intelligence Test and the Wechsler Adult Intelligence Scale-Third Edition.

    Science.gov (United States)

    Walters, Steven O; Weaver, Kenneth A

    2003-06-01

    The Kaufman Brief Intelligence Test detects learning problems of young students and is a screen for whether a more comprehensive test of intelligence is needed. A study to assess whether this test was valid as an adult intelligence test was conducted with 20 undergraduate psychology majors. The correlations between the Kaufman Brief Intelligence Test's Composite, Vocabulary, and Matrices test scores and their corresponding Wechsler Adult Intelligence Scale-Third Edition test scores, the Full Scale (r=.88), Verbal (r=.77), and Performance scores (r=.87), indicated very strong relationships. In addition, no significant differences were obtained between the Composite, Vocabulary, and Matrices means of the Kaufman Brief Intelligence Test and the Full Scale, Verbal, and Performance means of the WAIS-III. The Kaufman Brief Intelligence Test appears to be a valid test of intelligence for adults.

  8. Fluid intelligence: A brief history.

    Science.gov (United States)

    Kent, Phillip

    2017-01-01

    The concept of fluid and crystallized intelligence was introduced to the psychological community approximately 75 years ago by Raymond B. Cattell, and it continues to be an area of active research and controversy. The purpose of this paper is to provide a brief overview of the origin of the concept, early efforts to define intelligence and uses of intelligence tests to address pressing social issues, and the ongoing controversies associated with fluid intelligence and the structure of intelligence. The putative neuropsychological underpinnings and neurological substrates of fluid intelligence are discussed.

  9. Educational Programs for Intelligence Professionals.

    Science.gov (United States)

    Miller, Jerry P.

    1994-01-01

    Discusses the need for education programs for competitive intelligence professionals. Highlights include definitions of intelligence functions, focusing on business intelligence; information utilization by decision makers; information sources; competencies for intelligence professionals; and the development of formal education programs. (38…

  10. A Statistical Model for Generating a Population of Unclassified Objects and Radiation Signatures Spanning Nuclear Threats

    International Nuclear Information System (INIS)

    Nelson, K.; Sokkappa, P.

    2008-01-01

    This report describes an approach for generating a simulated population of plausible nuclear threat radiation signatures spanning a range of variability that could be encountered by radiation detection systems. In this approach, we develop a statistical model for generating random instances of smuggled nuclear material. The model is based on physics principles and bounding cases rather than on intelligence information or actual threat device designs. For this initial stage of work, we focus on random models using fissile material and do not address scenarios using non-fissile materials. The model has several uses. It may be used as a component in a radiation detection system performance simulation to generate threat samples for injection studies. It may also be used to generate a threat population to be used for training classification algorithms. In addition, we intend to use this model to generate an unclassified 'benchmark' threat population that can be openly shared with other organizations, including vendors, for use in radiation detection systems performance studies and algorithm development and evaluation activities. We assume that a quantity of fissile material is being smuggled into the country for final assembly and that shielding may have been placed around the fissile material. In terms of radiation signature, a nuclear weapon is basically a quantity of fissile material surrounded by various layers of shielding. Thus, our model of smuggled material is expected to span the space of potential nuclear weapon signatures as well. For computational efficiency, we use a generic 1-dimensional spherical model consisting of a fissile material core surrounded by various layers of shielding. The shielding layers and their configuration are defined such that the model can represent the potential range of attenuation and scattering that might occur. The materials in each layer and the associated parameters are selected from probability distributions that span the

  11. 17 CFR 201.65 - Identity and signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Identity and signature. 201.65... of 1934 § 201.65 Identity and signature. Applications pursuant to this subpart may omit the identity, mailing address, and signature of the applicant; provided, that such identity, mailing address and...

  12. 15 CFR 908.16 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Signature. 908.16 Section 908.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) NATIONAL OCEANIC... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National...

  13. Harmonizing intelligence terminologies in business: Literature review

    Directory of Open Access Journals (Sweden)

    Sivave Mashingaidze

    2014-11-01

    Full Text Available The principal objective of this article is to do a literature review of different intelligence terminology with the aim of establishing the common attributes and differences, and to propose a universal and comprehensive definition of intelligence for common understanding amongst users. The findings showed that Competitive Intelligence has the broadest scope of intelligence activities covering the whole external operating environment of the company and targeting all levels of decision-making for instance; strategic intelligence, tactical intelligence and operative intelligence. Another terminology was found called Cyber IntelligenceTM which encompasses competitor intelligence, strategic intelligence, market intelligence and counterintelligence. In conclusion although CI has the broadest scope of intelligence and umbrella to many intelligence concepts, still Business Intelligence, and Corporate Intelligence are often used interchangeably as CI

  14. Business Intelligence using Software Agents

    OpenAIRE

    Ana-Ramona BOLOGA; Razvan BOLOGA

    2011-01-01

    This paper presents some ideas about business intelligence today and the importance of developing real time business solutions. The authors make an exploration of links between business intelligence and artificial intelligence and focuses specifically on the implementation of software agents-based systems in business intelligence. There are briefly presented some of the few solutions proposed so far that use software agents properties for the benefit of business intelligence. The authors then...

  15. 78 FR 32241 - Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed...

    Science.gov (United States)

    2013-05-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed Meeting AGENCY: National Intelligence University, Defense Intelligence Agency, Department of Defense. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the...

  16. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  17. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  18. 34 CFR 101.32 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Signature of documents. 101.32 Section 101.32 Education Regulations of the Offices of the Department of Education OFFICE FOR CIVIL RIGHTS, DEPARTMENT OF EDUCATION... Documents § 101.32 Signature of documents. The signature of a party, authorized officer, employee or...

  19. 29 CFR 102.116 - Signature of orders.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Signature of orders. 102.116 Section 102.116 Labor Regulations Relating to Labor NATIONAL LABOR RELATIONS BOARD RULES AND REGULATIONS, SERIES 8 Certification and Signature of Documents § 102.116 Signature of orders. The executive secretary or the associate executive...

  20. Open source intelligence, open social intelligence and privacy by design

    OpenAIRE

    Casanovas, Pompeu; Royal Melbourne Institute of Technology (Austràlia). Centre for Applied Social Research

    2014-01-01

    Ponència presentada a European Conference on Social Intelligence (ECSI-2014) OSINT stands for Open Source Intelligence, (O)SI for (Open) Social Intelligence, PbD for Privacy by Design. The CAPER project has built an OSINT solution oriented to the prevention of organized crime. How to balance freedom and security? This position paper describes a way to embed the legal and ethical issues raised by the General Data Reform Package (GDRP) in Europe into this kind of surveillance platforms. It f...

  1. Beyond AI: Multi-Intelligence (MI) Combining Natural and Artificial Intelligences in Hybrid Beings and Systems

    OpenAIRE

    Stephen Fox

    2017-01-01

    Framing strongly influences actions among technology proponents and end-users. Underlying much debate about artificial intelligence (AI) are several fundamental shortcomings in its framing. First, discussion of AI is atheoretical, and therefore has limited potential for addressing the complexity of causation. Second, intelligence is considered from an anthropocentric perspective that sees human intelligence, and intelligence developed by humans, as superior to all other intelligences. Thus, t...

  2. Artificial Intelligence.

    Science.gov (United States)

    Wash, Darrel Patrick

    1989-01-01

    Making a machine seem intelligent is not easy. As a consequence, demand has been rising for computer professionals skilled in artificial intelligence and is likely to continue to go up. These workers develop expert systems and solve the mysteries of machine vision, natural language processing, and neural networks. (Editor)

  3. On signature change in p-adic space-times

    International Nuclear Information System (INIS)

    Dragovic, B.G.

    1991-01-01

    Change of signature by linear coordinate transformations in p-adic space-times is considered. In this paper it is shown that there exists arbitrary change of trivial signature in Q p n for all n ≥ 1 if p ≡ 1 (mod 4). In other cases it is possible to change only even number of the signs of the signature. The authors suggest new concept of signature with respect to distinct quadratic extensions, of Q p . If space-time dimension is restricted to four there is no signature change

  4. Estimation of the Intelligence Quotient Using Wechsler Intelligence Scales in Children and Adolescents with Asperger Syndrome

    Science.gov (United States)

    Merchan-Naranjo, Jessica; Mayoral, Maria; Rapado-Castro, Marta; Llorente, Cloe; Boada, Leticia; Arango, Celso; Parellada, Mara

    2012-01-01

    Asperger syndrome (AS) patients show heterogeneous intelligence profiles and the validity of short forms for estimating intelligence has rarely been studied in this population. We analyzed the validity of Wechsler Intelligence Scale (WIS) short forms for estimating full-scale intelligence quotient (FSIQ) and assessing intelligence profiles in 29…

  5. Business Intelligence using Software Agents

    Directory of Open Access Journals (Sweden)

    Ana-Ramona BOLOGA

    2011-12-01

    Full Text Available This paper presents some ideas about business intelligence today and the importance of developing real time business solutions. The authors make an exploration of links between business intelligence and artificial intelligence and focuses specifically on the implementation of software agents-based systems in business intelligence. There are briefly presented some of the few solutions proposed so far that use software agents properties for the benefit of business intelligence. The authors then propose some basic ideas for developing real-time agent-based software system for business intelligence in supply chain management, using Case Base Reasoning Agents.

  6. Signature Curves Statistics of DNA Supercoils

    OpenAIRE

    Shakiban, Cheri; Lloyd, Peter

    2004-01-01

    In this paper we describe the Euclidean signature curves for two dimensional closed curves in the plane and their generalization to closed space curves. The focus will be on discrete numerical methods for approximating such curves. Further we will apply these numerical methods to plot the signature curves related to three-dimensional simulated DNA supercoils. Our primary focus will be on statistical analysis of the data generated for the signature curves of the supercoils. We will try to esta...

  7. Generative Artificial Intelligence : Philosophy and Theory of Artificial Intelligence

    NARCIS (Netherlands)

    van der Zant, Tijn; Kouw, Matthijs; Schomaker, Lambertus; Mueller, Vincent C.

    2013-01-01

    The closed systems of contemporary Artificial Intelligence do not seem to lead to intelligent machines in the near future. What is needed are open-ended systems with non-linear properties in order to create interesting properties for the scaffolding of an artificial mind. Using post-structuralistic

  8. 45 CFR 81.32 - Signature of documents.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Signature of documents. 81.32 Section 81.32 Public... UNDER PART 80 OF THIS TITLE Form, Execution, Service and Filing of Documents § 81.32 Signature of documents. The signature of a party, authorized officer, employee or attorney constitutes a certificate that...

  9. Progress and Challenge of Artificial Intelligence

    Institute of Scientific and Technical Information of China (English)

    Zhong-Zhi Shi; Nan-Ning Zheng

    2006-01-01

    Artificial Intelligence (AI) is generally considered to be a subfield of computer science, that is concerned to attempt simulation, extension and expansion of human intelligence. Artificial intelligence has enjoyed tremendous success over the last fifty years. In this paper we only focus on visual perception, granular computing, agent computing, semantic grid. Human-level intelligence is the long-term goal of artificial intelligence. We should do joint research on basic theory and technology of intelligence by brain science, cognitive science, artificial intelligence and others. A new cross discipline intelligence science is undergoing a rapid development. Future challenges are given in final section.

  10. Modeling the lexical morphology of Western handwritten signatures.

    Directory of Open Access Journals (Sweden)

    Moises Diaz-Cabrera

    Full Text Available A handwritten signature is the final response to a complex cognitive and neuromuscular process which is the result of the learning process. Because of the many factors involved in signing, it is possible to study the signature from many points of view: graphologists, forensic experts, neurologists and computer vision experts have all examined them. Researchers study written signatures for psychiatric, penal, health and automatic verification purposes. As a potentially useful, multi-purpose study, this paper is focused on the lexical morphology of handwritten signatures. This we understand to mean the identification, analysis, and description of the signature structures of a given signer. In this work we analyze different public datasets involving 1533 signers from different Western geographical areas. Some relevant characteristics of signature lexical morphology have been selected, examined in terms of their probability distribution functions and modeled through a General Extreme Value distribution. This study suggests some useful models for multi-disciplinary sciences which depend on handwriting signatures.

  11. Signature molecular descriptor : advanced applications.

    Energy Technology Data Exchange (ETDEWEB)

    Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report

  12. Ship Signature Management System : Functionality

    NARCIS (Netherlands)

    Arciszewski, H.F.R.; Lier, L. van; Meijer, Y.G.S.; Noordkamp, H.W.; Wassenaar, A.S.

    2010-01-01

    A signature of a platform is the manner in which the platform manifests itself to a certain type of sensor and how observable it is when such a sensor is used to detect the platform. Because many military platforms use sensors in different media, it is the total of its different signatures that

  13. Intelligence and treaty ratification

    International Nuclear Information System (INIS)

    Sojka, G.L.

    1990-01-01

    What did the intelligence community and the Intelligence Committee di poorly in regard to the treaty ratification process for arms control? We failed to solve the compartmentalization problem/ This is a second-order problem, and, in general, analysts try to be very open; but there are problems nevertheless. There are very few, if any, people within the intelligence community who are cleared for everything relevant to our monitoring capability emdash short of probably the Director of Central Intelligence and the president emdash and this is a major problem. The formal monitoring estimates are drawn up by individuals who do not have access to all the information to make the monitoring judgements. This paper reports that the intelligence community did not present a formal document on either Soviet incentives of disincentives to cheat or on the possibility of cheating scenarios, and that was a mistake. However, the intelligence community was very responsive in producing those types of estimates, and, ultimately, the evidence behind them in response to questions. Nevertheless, the author thinks the intelligence community would do well to address this issue up front before a treaty is submitted to the Senate for advice and consent

  14. Rural architecture between artificial intelligence and natural intelligence

    Energy Technology Data Exchange (ETDEWEB)

    Cennamo, M.; Palma, P. di; Ricciardelli, A. [University of Naples Frederico II (Italy). Dept. of Configurazione e Attuazione dell Architettra

    2000-02-01

    Following the field of research carried out and reported in the Second International Conference for Teachers of Architecture held in Florence on October 16, 17 and 18, 1997, which stated the central position of Architectural project in relation to Human Intelligence, Natural Intelligence and Artificial Intelligence, the present paper suggests a phase of application of the theoretical assumptions to spacial models paradigmatic of the complexity of projects and building technique, as well as of the relationship between man-made environment and natural one. Among the different typologies in architecture, this research focuses on the rural buildings in Campania, mainly on the ones in the Vesuvius area, as those are the most suitable to be studied and salvaged with the help of biology, mathematics and high engineering. (author)

  15. Algorithms in ambient intelligence

    NARCIS (Netherlands)

    Aarts, E.H.L.; Korst, J.H.M.; Verhaegh, W.F.J.; Weber, W.; Rabaey, J.M.; Aarts, E.

    2005-01-01

    We briefly review the concept of ambient intelligence and discuss its relation with the domain of intelligent algorithms. By means of four examples of ambient intelligent systems, we argue that new computing methods and quantification measures are needed to bridge the gap between the class of

  16. Artificial Intelligence Research at the Artificial Intelligence Laboratory, Massachusetts Institute of Technology

    OpenAIRE

    Winston, Patrick H.

    1983-01-01

    The primary goal of the Artificial Intelligence Laboratory is to understand how computers can be made to exhibit intelligence. Two corollary goals are to make computers more useful and to understand certain aspects of human intelligence. Current research includes work on computer robotics and vision, expert systems, learning and commonsense reasoning, natural language understanding, and computer architecture.

  17. Moral Intelligence in the Schools

    Science.gov (United States)

    Clarken, Rodney H.

    2009-01-01

    Moral intelligence is newer and less studied than the more established cognitive, emotional and social intelligences, but has great potential to improve our understanding of learning and behavior. Moral intelligence refers to the ability to apply ethical principles to personal goals, values and actions. The construct of moral intelligence consists…

  18. Modelling intelligent behavior

    Science.gov (United States)

    Green, H. S.; Triffet, T.

    1993-01-01

    An introductory discussion of the related concepts of intelligence and consciousness suggests criteria to be met in the modeling of intelligence and the development of intelligent materials. Methods for the modeling of actual structure and activity of the animal cortex have been found, based on present knowledge of the ionic and cellular constitution of the nervous system. These have led to the development of a realistic neural network model, which has been used to study the formation of memory and the process of learning. An account is given of experiments with simple materials which exhibit almost all properties of biological synapses and suggest the possibility of a new type of computer architecture to implement an advanced type of artificial intelligence.

  19. Multiple intelligences: Can they be measured?

    OpenAIRE

    Kirsi Tirri; Petri Nokelainen; Erkki Komulainen

    2013-01-01

    This paper is about issues relating to the assessment of multiple intelligences. The first section introduces the authors’ work on building measures of multiple intelligences and moral sensitivities. It also provides a conceptual definition of multiple intelligences based on Multiple Intelligences theory by Howard Gardner (1983). The second section discusses the context specificity of intelligences and alternative approaches to measuring multiple intelligences. The third section analyses the ...

  20. Cell short circuit, preshort signature

    Science.gov (United States)

    Lurie, C.

    1980-01-01

    Short-circuit events observed in ground test simulations of DSCS-3 battery in-orbit operations are analyzed. Voltage signatures appearing in the data preceding the short-circuit event are evaluated. The ground test simulation is briefly described along with performance during reconditioning discharges. Results suggest that a characteristic signature develops prior to a shorting event.

  1. Reflection on robotic intelligence

    NARCIS (Netherlands)

    Bartneck, C.

    2006-01-01

    This paper reflects on the development or robots, both their physical shape as well as their intelligence. The later strongly depends on the progress made in the artificial intelligence (AI) community which does not yet provide the models and tools necessary to create intelligent robots. It is time

  2. Multiple Intelligences and quotient spaces

    OpenAIRE

    Malatesta, Mike; Quintana, Yamilet

    2006-01-01

    The Multiple Intelligence Theory (MI) is one of the models that study and describe the cognitive abilities of an individual. In [7] is presented a referential system which allows to identify the Multiple Intelligences of the students of a course and to classify the level of development of such Intelligences. Following this tendency, the purpose of this paper is to describe the model of Multiple Intelligences as a quotient space, and also to study the Multiple Intelligences of an individual in...

  3. The electronic identification, signature and security of information systems

    Directory of Open Access Journals (Sweden)

    Horovèák Pavel

    2002-12-01

    Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.

  4. Intelligent Decision Technologies : Proceedings of the 4th International Conference on Intelligent Decision Technologies

    CERN Document Server

    Watanabe, Toyohide; Phillips-Wren, Gloria; Howlett, Robert; Jain, Lakhmi

    2012-01-01

    The Intelligent Decision Technologies (IDT) International Conference encourages an interchange of research on intelligent systems and intelligent technologies that enhance or improve decision making. The focus of IDT is interdisciplinary and includes research on all aspects of intelligent decision technologies, from fundamental development to real applications. IDT has the potential to expand their support of decision making in such areas as finance, accounting, marketing, healthcare, medical and diagnostic systems, military decisions, production and operation, networks, traffic management, crisis response, human-machine interfaces, financial and stock market monitoring and prediction, and robotics. Intelligent decision systems implement advances in intelligent agents, fuzzy logic, multi-agent systems, artificial neural networks, and genetic algorithms, among others.  Emerging areas of active research include virtual decision environments, social networking, 3D human-machine interfaces, cognitive interfaces,...

  5. COMPUTER-IMPLEMENTED METHOD OF PERFORMING A SEARCH USING SIGNATURES

    DEFF Research Database (Denmark)

    2017-01-01

    A computer-implemented method of processing a query vector and a data vector), comprising: generating a set of masks and a first set of multiple signatures and a second set of multiple signatures by applying the set of masks to the query vector and the data vector, respectively, and generating...... candidate pairs, of a first signature and a second signature, by identifying matches of a first signature and a second signature. The set of masks comprises a configuration of the elements that is a Hadamard code; a permutation of a Hadamard code; or a code that deviates from a Hadamard code...

  6. Signature effects in 2-qp rotational bands

    International Nuclear Information System (INIS)

    Jain, A.K.; Goel, A.

    1992-01-01

    The authors briefly review the progress in understanding the 2-qp rotational bands in odd-odd nuclei. Signature effects and the phenomenon of signature inversion are discussed. The Coriolis coupling appears to have all the ingredients to explain the inversion. Some recent work on signature dependence in 2-qp bands of even-even nuclei is also discussed; interesting features are pointed out

  7. The Epistemic Status of Intelligence

    DEFF Research Database (Denmark)

    Rønn, Kira Vrist; Høffding, Simon

    2012-01-01

    We argue that the majority of intelligence definitions fail to recognize that the normative epistemic status of intelligence is knowledge and not an inferior alternative. We refute the counter-arguments that intelligence ought not to be seen as knowledge because of 1) its action-oriented scope...... and robustness of claims to intelligence-knowledge can be assessed....

  8. Time-dependent delayed signatures from energetic photon interrogations

    International Nuclear Information System (INIS)

    Norman, Daren R.; Jones, James L.; Blackburn, Brandon W.; Haskell, Kevin J.; Johnson, James T.; Watson, Scott M.; Hunt, Alan W.; Spaulding, Randy; Harmon, Frank

    2007-01-01

    Pulsed photonuclear interrogation environments generated by 8-24 MeV electron linac are rich with time-dependent, material-specific, radiation signatures. Nitrogen-based explosives and nuclear materials can be detected by exploiting these signatures in different delayed-time regions. Numerical and experimental results presented in this paper show the unique time and energy dependence of these signatures. It is shown that appropriate delayed-time windows are essential to acquire material-specific signatures in pulsed photonuclear assessment environments. These developments demonstrate that pulsed, high-energy, photon-inspection environments can be exploited for time-dependent, material-specific signatures through the proper operation of specialized detectors and detection methods

  9. Multiple Intelligences: Current Trends in Assessment

    Science.gov (United States)

    Harman, Marsha J.; Kordinak, S. Thomas; Bruce, A. Jerry

    2009-01-01

    With his theory of multiple intelligences, Howard Gardner challenged the presumption that intelligence is a single innate entity. He maintained that multiple intelligences exist and are related to specific brain areas and symbol systems. Each of the intelligences has its merits and limits, but by using a multiple intelligences approach, more…

  10. Peripheral blood signatures of lead exposure.

    Directory of Open Access Journals (Sweden)

    Heather G LaBreche

    Full Text Available BACKGROUND: Current evidence indicates that even low-level lead (Pb exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. METHODOLOGY/PRINCIPAL FINDING: Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. CONCLUSIONS/SIGNIFICANCE: The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway.

  11. Designing with computational intelligence

    CERN Document Server

    Lopes, Heitor; Mourelle, Luiza

    2017-01-01

    This book discusses a number of real-world applications of computational intelligence approaches. Using various examples, it demonstrates that computational intelligence has become a consolidated methodology for automatically creating new competitive solutions to complex real-world problems. It also presents a concise and efficient synthesis of different systems using computationally intelligent techniques.

  12. Magnetic signature surveillance of nuclear fuel

    International Nuclear Information System (INIS)

    Bernatowicz, H.; Schoenig, F.C.

    1981-01-01

    Typical nuclear fuel material contains tramp ferromagnetic particles of random size and distribution. Also, selected amounts of paramagnetic or ferromagnetic material can be added at random or at known positions in the fuel material. The fuel material in its non-magnetic container is scanned along its length by magnetic susceptibility detecting apparatus whereby susceptibility changes along its length are obtained and provide a unique signal waveform of the container of fuel material as a signature thereof. The output signature is stored. At subsequent times in its life the container is again scanned and respective signatures obtained which are compared with the initially obtained signature, any differences indicating alteration or tampering with the fuel material. If the fuel material includes a paramagnetic additive by taking two measurements along the container the effects thereof can be cancelled out. (author)

  13. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  14. Alzheimer's disease and intelligence.

    Science.gov (United States)

    Yeo, R A; Arden, R; Jung, R E

    2011-06-01

    A significant body of evidence has accumulated suggesting that individual variation in intellectual ability, whether assessed directly by intelligence tests or indirectly through proxy measures, is related to risk of developing Alzheimer's disease (AD) in later life. Important questions remain unanswered, however, such as the specificity of risk for AD vs. other forms of dementia, and the specific links between premorbid intelligence and development of the neuropathology characteristic of AD. Lower premorbid intelligence has also emerged as a risk factor for greater mortality across myriad health and mental health diagnoses. Genetic covariance contributes importantly to these associations, and pleiotropic genetic effects may impact diverse organ systems through similar processes, including inefficient design and oxidative stress. Through such processes, the genetic underpinnings of intelligence, specifically, mutation load, may also increase the risk of developing AD. We discuss how specific neurobiologic features of relatively lower premorbid intelligence, including reduced metabolic efficiency, may facilitate the development of AD neuropathology. The cognitive reserve hypothesis, the most widely accepted account of the intelligence-AD association, is reviewed in the context of this larger literature.

  15. Signature-based store checking buffer

    Science.gov (United States)

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  16. Neutral signature Walker-VSI metrics

    International Nuclear Information System (INIS)

    Coley, A; McNutt, D; Musoke, N; Brooks, D; Hervik, S

    2014-01-01

    We will construct explicit examples of four-dimensional neutral signature Walker (but not necessarily degenerate Kundt) spaces for which all of the polynomial scalar curvature invariants vanish. We then investigate the properties of some particular subclasses of Ricci flat spaces. We also briefly describe some four-dimensional neutral signature Einstein spaces for which all of the polynomial scalar curvature invariants are constant. (paper)

  17. An interpretation of signature inversion

    International Nuclear Information System (INIS)

    Onishi, Naoki; Tajima, Naoki

    1988-01-01

    An interpretation in terms of the cranking model is presented to explain why signature inversion occurs for positive γ of the axially asymmetric deformation parameter and emerges into specific orbitals. By introducing a continuous variable, the eigenvalue equation can be reduced to a one dimensional Schroedinger equation by means of which one can easily understand the cause of signature inversion. (author)

  18. Acoustic Signature Monitoring and Management of Naval Platforms

    NARCIS (Netherlands)

    Basten, T.G.H.; Jong, C.A.F. de; Graafland, F.; Hof, J. van 't

    2015-01-01

    Acoustic signatures make naval platforms susceptible to detection by threat sensors. The variable operational conditions and lifespan of a platform cause variations in the acoustic signature. To deal with these variations, a real time signature monitoring capability is being developed, with advisory

  19. Is Intelligence Artificial?

    OpenAIRE

    Greer, Kieran

    2014-01-01

    Our understanding of intelligence is directed primarily at the level of human beings. This paper attempts to give a more unifying definition that can be applied to the natural world in general. The definition would be used more to verify a degree of intelligence, not to quantify it and might help when making judgements on the matter. A version of an accepted test for AI is then put forward as the 'acid test' for Artificial Intelligence itself. It might be what a free-thinking program or robot...

  20. Beyond AI: Multi-Intelligence (MI Combining Natural and Artificial Intelligences in Hybrid Beings and Systems

    Directory of Open Access Journals (Sweden)

    Stephen Fox

    2017-06-01

    Full Text Available Framing strongly influences actions among technology proponents and end-users. Underlying much debate about artificial intelligence (AI are several fundamental shortcomings in its framing. First, discussion of AI is atheoretical, and therefore has limited potential for addressing the complexity of causation. Second, intelligence is considered from an anthropocentric perspective that sees human intelligence, and intelligence developed by humans, as superior to all other intelligences. Thus, the extensive post-anthropocentric research into intelligence is not given sufficient consideration. Third, AI is discussed often in reductionist mechanistic terms. Rather than in organicist emergentist terms as a contributor to multi-intelligence (MI hybrid beings and/or systems. Thus, current framing of AI can be a self-validating reduction within which AI development is focused upon AI becoming the single-variable mechanism causing future effects. In this paper, AI is reframed as a contributor to MI.

  1. Artificial Consciousness or Artificial Intelligence

    Directory of Open Access Journals (Sweden)

    Spanache Florin

    2017-05-01

    Full Text Available Artificial intelligence is a tool designed by people for the gratification of their own creative ego, so we can not confuse conscience with intelligence and not even intelligence in its human representation with conscience. They are all different concepts and they have different uses. Philosophically, there are differences between autonomous people and automatic artificial intelligence. This is the difference between intelligence and artificial intelligence, autonomous versus automatic. But conscience is above these differences because it is neither conditioned by the self-preservation of autonomy, because a conscience is something that you use to help your neighbor, nor automatic, because one’s conscience is tested by situations which are not similar or subject to routine. So, artificial intelligence is only in science-fiction literature similar to an autonomous conscience-endowed being. In real life, religion with its notions of redemption, sin, expiation, confession and communion will not have any meaning for a machine which cannot make a mistake on its own.

  2. Intelligent Design

    DEFF Research Database (Denmark)

    Hjorth, Poul G.

    2005-01-01

    Forestillingen om at naturen er designet af en guddommelig 'intelligens' er et smukt filosofisk princip. Teorier om Intelligent Design som en naturvidenskabeligt baseret teori er derimod helt forfærdelig.......Forestillingen om at naturen er designet af en guddommelig 'intelligens' er et smukt filosofisk princip. Teorier om Intelligent Design som en naturvidenskabeligt baseret teori er derimod helt forfærdelig....

  3. The Coast Guard Intelligence Program Enters the Intelligence Community. A Case Study of Congressional Influence on Intelligence Community Evolution

    National Research Council Canada - National Science Library

    Wirth, Kevin E

    2007-01-01

    .... Although the United States Coast Guard has utilized intelligence capabilities since the service's inception in 1790, the Coast Guard was not included as a formal member of the Intelligence Community until December 2002. Mr...

  4. Artificial Intelligence for Controlling Robotic Aircraft

    Science.gov (United States)

    Krishnakumar, Kalmanje

    2005-01-01

    A document consisting mostly of lecture slides presents overviews of artificial-intelligence-based control methods now under development for application to robotic aircraft [called Unmanned Aerial Vehicles (UAVs) in the paper] and spacecraft and to the next generation of flight controllers for piloted aircraft. Following brief introductory remarks, the paper presents background information on intelligent control, including basic characteristics defining intelligent systems and intelligent control and the concept of levels of intelligent control. Next, the paper addresses several concepts in intelligent flight control. The document ends with some concluding remarks, including statements to the effect that (1) intelligent control architectures can guarantee stability of inner control loops and (2) for UAVs, intelligent control provides a robust way to accommodate an outer-loop control architecture for planning and/or related purposes.

  5. Toward New-Generation Intelligent Manufacturing

    Directory of Open Access Journals (Sweden)

    Ji Zhou

    2018-02-01

    Full Text Available Intelligent manufacturing is a general concept that is under continuous development. It can be categorized into three basic paradigms: digital manufacturing, digital-networked manufacturing, and new-generation intelligent manufacturing. New-generation intelligent manufacturing represents an in-depth integration of new-generation artificial intelligence (AI technology and advanced manufacturing technology. It runs through every link in the full life-cycle of design, production, product, and service. The concept also relates to the optimization and integration of corresponding systems; the continuous improvement of enterprises’ product quality, performance, and service levels; and reduction in resources consumption. New-generation intelligent manufacturing acts as the core driving force of the new industrial revolution and will continue to be the main pathway for the transformation and upgrading of the manufacturing industry in the decades to come. Human-cyber-physical systems (HCPSs reveal the technological mechanisms of new-generation intelligent manufacturing and can effectively guide related theoretical research and engineering practice. Given the sequential development, cross interaction, and iterative upgrading characteristics of the three basic paradigms of intelligent manufacturing, a technology roadmap for “parallel promotion and integrated development” should be developed in order to drive forward the intelligent transformation of the manufacturing industry in China. Keywords: Advanced manufacturing, New-generation intelligent manufacturing, Human-cyber-physical system, New-generation AI, Basic paradigms, Parallel promotion, Integrated development

  6. 48 CFR 4.102 - Contractor's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contractor's signature. 4.102 Section 4.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with an...

  7. Intelligence and Prosocial Behavior

    DEFF Research Database (Denmark)

    Han, Ru; Shi, Jiannong; Yong, W.

    2012-01-01

    Results of prev ious studies of the relationship between prosocial behav ior and intelligence hav e been inconsistent. This study attempts to distinguish the dif f erences between sev eral prosocial tasks, and explores the way s in which cognitiv e ability inf luences prosocial behav ior. In Study...... One and Two, we reexamined the relationship between prosocial behav ior and intelligence by employ ing a costly signaling theory with f our games. The results rev ealed that the prosocial lev el of smarter children is higher than that of other children in more complicated tasks but not so in simple...... tasks. In Study Three, we tested the moderation ef f ect of the av erage intelligence across classes, and the results did not show any group intelligence ef f ect on the relationship between intelligence and prosocial behav ior....

  8. DIGITAL SIGNATURE IN THE WAY OF LAW

    Directory of Open Access Journals (Sweden)

    Ruya Samlı

    2013-01-01

    Full Text Available Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can become beholden, donate his/her whole wealth, commits offences or do some judicial operations. Today, because many operations can be done with digital environments and internet, signature operation that provides identity validation must also be carried to digital environment. In this paper digital signature concept that is approved for this reason and its situation in international areas and Turkish laws are investigated.

  9. Signature change events: a challenge for quantum gravity?

    International Nuclear Information System (INIS)

    White, Angela; Weinfurtner, Silke; Visser, Matt

    2010-01-01

    Within the framework of either Euclidean (functional integral) quantum gravity or canonical general relativity the signature of the manifold is a priori unconstrained. Furthermore, recent developments in the emergent spacetime programme have led to a physically feasible implementation of (analogue) signature change events. This suggests that it is time to revisit the sometimes controversial topic of signature change in general relativity. Specifically, we shall focus on the behaviour of a quantum field defined on a manifold containing regions of different signature. We emphasize that regardless of the underlying classical theory, there are severe problems associated with any quantum field theory residing on a signature-changing background. (Such as the production of what is naively an infinite number of particles, with an infinite energy density.) We show how the problem of quantum fields exposed to finite regions of Euclidean-signature (Riemannian) geometry has similarities with the quantum barrier penetration problem. Finally we raise the question as to whether signature change transitions could be fully understood and dynamically generated within (modified) classical general relativity, or whether they require the knowledge of a theory of quantum gravity.

  10. Signature Pedagogies in Support of Teachers' Professional Learning

    Science.gov (United States)

    Parker, Melissa; Patton, Kevin; O'Sullivan, Mary

    2016-01-01

    Signature pedagogies [Shulman, L. 2005. "Signature pedagogies in the professions." "Daedalus" 134 (3): 52--59.] are a focus of teacher educators seeking to improve teaching and teacher education. The purpose of this paper is to present a preliminary common language of signature pedagogies for teacher professional development…

  11. Plant intelligence

    Science.gov (United States)

    Lipavská, Helena; Žárský, Viktor

    2009-01-01

    The concept of plant intelligence, as proposed by Anthony Trewavas, has raised considerable discussion. However, plant intelligence remains loosely defined; often it is either perceived as practically synonymous to Darwinian fitness, or reduced to a mere decorative metaphor. A more strict view can be taken, emphasizing necessary prerequisites such as memory and learning, which requires clarifying the definition of memory itself. To qualify as memories, traces of past events have to be not only stored, but also actively accessed. We propose a criterion for eliminating false candidates of possible plant intelligence phenomena in this stricter sense: an “intelligent” behavior must involve a component that can be approximated by a plausible algorithmic model involving recourse to stored information about past states of the individual or its environment. Re-evaluation of previously presented examples of plant intelligence shows that only some of them pass our test. “You were hurt?” Kumiko said, looking at the scar. Sally looked down. “Yeah.” “Why didn't you have it removed?” “Sometimes it's good to remember.” “Being hurt?” “Being stupid.”—(W. Gibson: Mona Lisa Overdrive) PMID:19816094

  12. Characteristics and Validation Techniques for PCA-Based Gene-Expression Signatures

    Directory of Open Access Journals (Sweden)

    Anders E. Berglund

    2017-01-01

    Full Text Available Background. Many gene-expression signatures exist for describing the biological state of profiled tumors. Principal Component Analysis (PCA can be used to summarize a gene signature into a single score. Our hypothesis is that gene signatures can be validated when applied to new datasets, using inherent properties of PCA. Results. This validation is based on four key concepts. Coherence: elements of a gene signature should be correlated beyond chance. Uniqueness: the general direction of the data being examined can drive most of the observed signal. Robustness: if a gene signature is designed to measure a single biological effect, then this signal should be sufficiently strong and distinct compared to other signals within the signature. Transferability: the derived PCA gene signature score should describe the same biology in the target dataset as it does in the training dataset. Conclusions. The proposed validation procedure ensures that PCA-based gene signatures perform as expected when applied to datasets other than those that the signatures were trained upon. Complex signatures, describing multiple independent biological components, are also easily identified.

  13. Quantum blind dual-signature scheme without arbitrator

    International Nuclear Information System (INIS)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-01-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology. (paper)

  14. Quantum blind dual-signature scheme without arbitrator

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-03-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.

  15. Infrared ship signature analysis and optimisation

    NARCIS (Netherlands)

    Neele, F.P.

    2005-01-01

    The last decade has seen an increase in the awareness of the infrared signature of naval ships. New ship designs show that infrared signature reduction measures are being incorporated, such as exhaust gas cooling systems, relocation of the exhausts and surface cooling systems. Hull and

  16. Fine-Grained Forward-Secure Signature Schemes without Random Oracles

    DEFF Research Database (Denmark)

    Camenisch, Jan; Koprowski, Maciej

    2006-01-01

    We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide nonrepudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the current time period...... remain valid when revoking the public key. This is an important advantage if the signer produces many signatures per time period as otherwise the signer would have to re-issue those signatures (and possibly re-negotiate the respective messages) with a new key.Apart from a formal model for fine......-grained forward-secure signature schemes, we present practical schemes and prove them secure under the strong RSA assumption only, i.e., we do not resort to the random oracle model to prove security. As a side-result, we provide an ordinary forward-secure scheme whose key-update time is significantly smaller than...

  17. A Signature Comparing Android Mobile Application Utilizing Feature Extracting Algorithms

    Directory of Open Access Journals (Sweden)

    Paul Grafilon

    2017-08-01

    Full Text Available The paper presented one of the application that can be done using smartphones camera. Nowadays forgery is one of the most undetected crimes. With the forensic technology used today it is still difficult for authorities to compare and define what a real signature is and what a forged signature is. A signature is a legal representation of a person. All transactions are based on a signature. Forgers may use a signature to sign illegal contracts and withdraw from bank accounts undetected. A signature can also be forged during election periods for repeated voting. Addressing the issues a signature should always be secure. Signature verification is a reduced problem that still poses a real challenge for researchers. The literature on signature verification is quite extensive and shows two main areas of research off-line and on-line systems. Off-line systems deal with a static image of the signature i.e. the result of the action of signing while on-line systems work on the dynamic process of generating the signature i.e. the action of signing itself. The researchers have found a way to resolve the concerns. A mobile application that integrates the camera to take a picture of a signature analyzes it and compares it to other signatures for verification. It will exist to help citizens to be more cautious and aware with issues regarding the signatures. This might also be relevant to help organizations and institutions such as banks and insurance companies in verifying signatures that may avoid unwanted transactions and identity theft. Furthermore this might help the authorities in the never ending battle against crime especially against forgers and thieves. The project aimed to design and develop a mobile application that integrates the smartphone camera for verifying and comparing signatures for security using the best algorithm possible. As the result of the development the said smartphone camera application is functional and reliable.

  18. Elementary epistemological features of machine intelligence

    OpenAIRE

    Horvat, Marko

    2008-01-01

    Theoretical analysis of machine intelligence (MI) is useful for defining a common platform in both theoretical and applied artificial intelligence (AI). The goal of this paper is to set canonical definitions that can assist pragmatic research in both strong and weak AI. Described epistemological features of machine intelligence include relationship between intelligent behavior, intelligent and unintelligent machine characteristics, observable and unobservable entities and classification of in...

  19. GABA predicts visual intelligence.

    Science.gov (United States)

    Cook, Emily; Hammett, Stephen T; Larsson, Jonas

    2016-10-06

    Early psychological researchers proposed a link between intelligence and low-level perceptual performance. It was recently suggested that this link is driven by individual variations in the ability to suppress irrelevant information, evidenced by the observation of strong correlations between perceptual surround suppression and cognitive performance. However, the neural mechanisms underlying such a link remain unclear. A candidate mechanism is neural inhibition by gamma-aminobutyric acid (GABA), but direct experimental support for GABA-mediated inhibition underlying suppression is inconsistent. Here we report evidence consistent with a global suppressive mechanism involving GABA underlying the link between sensory performance and intelligence. We measured visual cortical GABA concentration, visuo-spatial intelligence and visual surround suppression in a group of healthy adults. Levels of GABA were strongly predictive of both intelligence and surround suppression, with higher levels of intelligence associated with higher levels of GABA and stronger surround suppression. These results indicate that GABA-mediated neural inhibition may be a key factor determining cognitive performance and suggests a physiological mechanism linking surround suppression and intelligence. Copyright © 2016 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  20. The First Workshop on Artificial Intelligence Techniques for Ambient Intelligence (AITAmI '06)

    OpenAIRE

    Augusto, Juan Carlos; Shapiro, Daniel

    2007-01-01

    The first annual workshop on the role of AI in ambient intelligence was held in Riva de Garda, Italy, on August 29, 2006. The workshop was colocated with the European Conference on Artificial Intelligence (ECAI 2006). It provided an opportunity for researchers in a variety of AI subfields together with representatives of commercial interests to explore ambient intelligence technology and applications.

  1. 21 CFR 1309.32 - Application forms; contents; signature.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Application forms; contents; signature. 1309.32... Application forms; contents; signature. (a) Any person who is required to be registered pursuant to § 1309.21... this paragraph and shall contain the signature of the individual being authorized to sign the...

  2. 38 CFR 18b.21 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Signature of documents. 18b.21 Section 18b.21 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS... Documents § 18b.21 Signature of documents. The signature of a party, authorized officer, employee, or...

  3. Detection of chemical explosives using multiple photon signatures

    International Nuclear Information System (INIS)

    Loschke, K.W.; Dunn, W.L.

    2008-01-01

    Full text: A template-matching procedure to aid in rapid detection of improvised explosive devices (IEDs) is being investigated. Multiple photon-scattered and photon-induced positron annihilation radiation responses are being used as part of a photon-neutron signature-based radiation scanning (SBRS) approach (see companion reference for description of the neutron component), in an attempt to detect chemical explosives at safe standoff distances. Many past and present photon interrogation methods are based on imaging. Imaging techniques seek to determine at high special resolution the internal structure of a target of interest. Our technique simply seeks to determine if an unknown target contains a detectable amount of chemical explosives by comparing multiple responses (signatures) that depend on both density and composition of portions of a target. In the photon component, beams of photons are used to create back-streaming signatures, which are dependent on the density and composition of part of the target being interrogated. These signatures are compared to templates, which are collections of the same signatures if the interrogated volume contained a significant amount of explosives. The signature analysis produces a figure-of-merit and a standard deviation of the figure-of-merit. These two metrics are used to filter safe from dangerous targets. Experiments have been conducted that show that explosive surrogates (fertilizers) can be distinguished from several inert materials using these photon signatures, demonstrating that these signatures can be used effectively to help IEDs

  4. Intelligent editor/printer enhancements

    Science.gov (United States)

    Woodfill, M. C.; Pheanis, D. C.

    1983-01-01

    Microprocessor support hardware, software, and cross assemblers relating to the Motorola 6800 and 6809 process systems were developed. Pinter controller and intelligent CRT development are discussed. The user's manual, design specifications for the MC6809 version of the intelligent printer controller card, and a 132-character by 64-line intelligent CRT display system using a Motorola 6809 MPU, and a one-line assembler and disassembler are provided.

  5. Predictive Estimates of Employees’ Intelligence at Workplace with Special Reference to Emotional and Spiritual Intelligence

    OpenAIRE

    B. K. Punia; Priyanka Yadav

    2015-01-01

    The piece of writing investigates the relationship between employees’ emotional and Spiritual intelligence. A conversation of spirituality and emotions within the workplace can be an unthinkable topic. However, emotional intelligence and spiritual intelligence are, at present, more widely acknowledged. Drawing a research connected with these construct we suggest that emotional intelligence within the employees in organisations may provide employees with a medium to better understand and mix s...

  6. Artificial Intelligence and Economic Theories

    OpenAIRE

    Marwala, Tshilidzi; Hurwitz, Evan

    2017-01-01

    The advent of artificial intelligence has changed many disciplines such as engineering, social science and economics. Artificial intelligence is a computational technique which is inspired by natural intelligence such as the swarming of birds, the working of the brain and the pathfinding of the ants. These techniques have impact on economic theories. This book studies the impact of artificial intelligence on economic theories, a subject that has not been extensively studied. The theories that...

  7. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  8. Improved discrete swarm intelligence algorithms for endmember extraction from hyperspectral remote sensing images

    Science.gov (United States)

    Su, Yuanchao; Sun, Xu; Gao, Lianru; Li, Jun; Zhang, Bing

    2016-10-01

    Endmember extraction is a key step in hyperspectral unmixing. A new endmember extraction framework is proposed for hyperspectral endmember extraction. The proposed approach is based on the swarm intelligence (SI) algorithm, where discretization is used to solve the SI algorithm because pixels in a hyperspectral image are naturally defined within a discrete space. Moreover, a "distance" factor is introduced into the objective function to limit the endmember numbers which is generally limited in real scenarios, while traditional SI algorithms likely produce superabundant spectral signatures, which generally belong to the same classes. Three endmember extraction methods are proposed based on the artificial bee colony, ant colony optimization, and particle swarm optimization algorithms. Experiments with both simulated and real hyperspectral images indicate that the proposed framework can improve the accuracy of endmember extraction.

  9. Intelligence by consent

    DEFF Research Database (Denmark)

    Diderichsen, Adam; Rønn, Kira Vrist

    2017-01-01

    This article contributes to the current discussions concerning an adequate framework for intelligence ethics. The first part critically scrutinises the use of Just War Theory in intelligence ethics with specific focus on the just cause criterion. We argue that using self-defence as justifying cau...

  10. FIR signature verification system characterizing dynamics of handwriting features

    Science.gov (United States)

    Thumwarin, Pitak; Pernwong, Jitawat; Matsuura, Takenobu

    2013-12-01

    This paper proposes an online signature verification method based on the finite impulse response (FIR) system characterizing time-frequency characteristics of dynamic handwriting features. First, the barycenter determined from both the center point of signature and two adjacent pen-point positions in the signing process, instead of one pen-point position, is used to reduce the fluctuation of handwriting motion. In this paper, among the available dynamic handwriting features, motion pressure and area pressure are employed to investigate handwriting behavior. Thus, the stable dynamic handwriting features can be described by the relation of the time-frequency characteristics of the dynamic handwriting features. In this study, the aforesaid relation can be represented by the FIR system with the wavelet coefficients of the dynamic handwriting features as both input and output of the system. The impulse response of the FIR system is used as the individual feature for a particular signature. In short, the signature can be verified by evaluating the difference between the impulse responses of the FIR systems for a reference signature and the signature to be verified. The signature verification experiments in this paper were conducted using the SUBCORPUS MCYT-100 signature database consisting of 5,000 signatures from 100 signers. The proposed method yielded equal error rate (EER) of 3.21% on skilled forgeries.

  11. Quantum signature scheme based on a quantum search algorithm

    International Nuclear Information System (INIS)

    Yoon, Chun Seok; Kang, Min Sung; Lim, Jong In; Yang, Hyung Jin

    2015-01-01

    We present a quantum signature scheme based on a two-qubit quantum search algorithm. For secure transmission of signatures, we use a quantum search algorithm that has not been used in previous quantum signature schemes. A two-step protocol secures the quantum channel, and a trusted center guarantees non-repudiation that is similar to other quantum signature schemes. We discuss the security of our protocol. (paper)

  12. Position Paper on Intelligent Supply Chains

    DEFF Research Database (Denmark)

    Møller, Charles

    This paper is intended to present and to analyze the concept of the Intelligent Supply Chain (ISC). The purpose of the paper is to: 1) Clarify the concept of the intelligent supply chain; 2) Identify emerging research opportunities; and 3) Specify a research engagement model for further explorati...... of intelligent supply chains. It is concluded that information management is critical to intelligent supply chains and a research agenda is outlined.......This paper is intended to present and to analyze the concept of the Intelligent Supply Chain (ISC). The purpose of the paper is to: 1) Clarify the concept of the intelligent supply chain; 2) Identify emerging research opportunities; and 3) Specify a research engagement model for further exploration...... the concept of Intelligent Supply Chain and to establish an overall perspective based on information management. The claim made here is that the notion of the intelligent enterprise contributes with a new perspective on supply chain management that addresses the current challenges in an industrial supply...

  13. What Is Artificial Intelligence Anyway?

    Science.gov (United States)

    Kurzweil, Raymond

    1985-01-01

    Examines the past, present, and future status of Artificial Intelligence (AI). Acknowledges the limitations of AI but proposes possible areas of application and further development. Urges a concentration on the unique strengths of machine intelligence rather than a copying of human intelligence. (ML)

  14. Competitive Intelligence and Social Advantage.

    Science.gov (United States)

    Davenport, Elisabeth; Cronin, Blaise

    1994-01-01

    Presents an overview of issues concerning civilian competitive intelligence (CI). Topics discussed include competitive advantage in academic and research environments; public domain information and libraries; covert and overt competitive intelligence; data diversity; use of the Internet; cooperative intelligence; and implications for library and…

  15. Soft computing in artificial intelligence

    CERN Document Server

    Matson, Eric

    2014-01-01

    This book explores the concept of artificial intelligence based on knowledge-based algorithms. Given the current hardware and software technologies and artificial intelligence theories, we can think of how efficient to provide a solution, how best to implement a model and how successful to achieve it. This edition provides readers with the most recent progress and novel solutions in artificial intelligence. This book aims at presenting the research results and solutions of applications in relevance with artificial intelligence technologies. We propose to researchers and practitioners some methods to advance the intelligent systems and apply artificial intelligence to specific or general purpose. This book consists of 13 contributions that feature fuzzy (r, s)-minimal pre- and β-open sets, handling big coocurrence matrices, Xie-Beni-type fuzzy cluster validation, fuzzy c-regression models, combination of genetic algorithm and ant colony optimization, building expert system, fuzzy logic and neural network, ind...

  16. Molecular signatures of thyroid follicular neoplasia

    DEFF Research Database (Denmark)

    Borup, R.; Rossing, M.; Henao, Ricardo

    2010-01-01

    The molecular pathways leading to thyroid follicular neoplasia are incompletely understood, and the diagnosis of follicular tumors is a clinical challenge. To provide leads to the pathogenesis and diagnosis of the tumors, we examined the global transcriptome signatures of follicular thyroid...... a mechanism for cancer progression, which is why we exploited the results in order to generate a molecular classifier that could identify 95% of all carcinomas. Validation employing public domain and cross-platform data demonstrated that the signature was robust and could diagnose follicular nodules...... and robust genetic signature for the diagnosis of FA and FC. Endocrine-Related Cancer (2010) 17 691-708...

  17. Motif signatures of transcribed enhancers

    KAUST Repository

    Kleftogiannis, Dimitrios

    2017-09-14

    In mammalian cells, transcribed enhancers (TrEn) play important roles in the initiation of gene expression and maintenance of gene expression levels in spatiotemporal manner. One of the most challenging questions in biology today is how the genomic characteristics of enhancers relate to enhancer activities. This is particularly critical, as several recent studies have linked enhancer sequence motifs to specific functional roles. To date, only a limited number of enhancer sequence characteristics have been investigated, leaving space for exploring the enhancers genomic code in a more systematic way. To address this problem, we developed a novel computational method, TELS, aimed at identifying predictive cell type/tissue specific motif signatures. We used TELS to compile a comprehensive catalog of motif signatures for all known TrEn identified by the FANTOM5 consortium across 112 human primary cells and tissues. Our results confirm that distinct cell type/tissue specific motif signatures characterize TrEn. These signatures allow discriminating successfully a) TrEn from random controls, proxy of non-enhancer activity, and b) cell type/tissue specific TrEn from enhancers expressed and transcribed in different cell types/tissues. TELS codes and datasets are publicly available at http://www.cbrc.kaust.edu.sa/TELS.

  18. Relationship between Emotional Intelligence and

    Directory of Open Access Journals (Sweden)

    Vahid Rafieyan

    2014-07-01

    Full Text Available Language learners’ awareness of target language pragmatic features is influenced by individual difference variables, the least explored one being emotional intelligence. To investigate the relationship between emotional intelligence and pragmatic awareness, the current study was conducted over 120 Iranian senior undergraduates of English as a Foreign Language at a university in Iran. Pragmatic awareness was measured through a 12-scenario contextualized pragmatic judgment task. Emotional intelligence was also measured through the EQ-i. The results of the Pearson correlation revealed a strong positive relationship between emotional intelligence and pragmatic awareness. The pedagogical implications of the findings suggested incorporation of emotion-driven authentic materials in English language classes to invoke emotional intelligence in language learners.

  19. Emotional intelligence of mental health nurses.

    Science.gov (United States)

    van Dusseldorp, Loes R L C; van Meijel, Berno K G; Derksen, Jan J L

    2011-02-01

    The aim of this study is to gain insight into the level of emotional intelligence of mental health nurses in the Netherlands. The focus in research on emotional intelligence to date has been on a variety of professionals. However, little is known about emotional intelligence in mental health nurses. The emotional intelligence of 98 Dutch nurses caring for psychiatric patients is reported. Data were collected with the Bar-On Emotional Quotient Inventory within a cross-sectional research design. The mean level of emotional intelligence of this sample of professionals is statistically significant higher than the emotional intelligence of the general population. Female nurses score significantly higher than men on the subscales Empathy, Social Responsibility, Interpersonal Relationship, Emotional Self-awareness, Self-Actualisation and Assertiveness. No correlations are found between years of experience and age on the one hand and emotional intelligence on the other hand. The results of this study show that nurses in psychiatric care indeed score above average in the emotional intelligence required to cope with the amount of emotional labour involved in daily mental health practice. The ascertained large range in emotional intelligence scores among the mental health nurses challenges us to investigate possible implications which higher or lower emotional intelligence levels may have on the quality of care. For instance, a possible relation between the level of emotional intelligence and the quality of the therapeutic nurse-patient relationship or the relation between the level of emotional intelligence and the manner of coping with situations characterised by a great amount of emotional labour (such as caring for patients who self-harm or are suicidal). © 2010 The Authors. Journal compilation © 2010 Blackwell Publishing Ltd.

  20. Intelligent Environmental Nanomaterials

    KAUST Repository

    Chang, Jian

    2018-01-30

    Due to the inherent complexity of environmental problems, especially water and air pollution, the utility of single-function environmental nanomaterials used in conventional and unconventional environmental treatment technologies are gradually reaching their limits. Intelligent nanomaterials with environmentally-responsive functionalities have shown potential to improve the performance of existing and new environmental technologies. By rational design of their structures and functionalities, intelligent nanomaterials can perform different tasks in response to varying application scenarios for the purpose of achieving the best performance. This review offers a critical analysis of the design concepts and latest progresses on the intelligent environmental nanomaterials in filtration membranes with responsive gates, materials with switchable wettability for selective and on-demand oil/water separation, environmental materials with self-healing capability, and emerging nanofibrous air filters for PM2.5 removal. We hope that this review will inspire further research efforts to develop intelligent environmental nanomaterials for the enhancement of the overall quality of environmental or human health.

  1. Intelligent Environmental Nanomaterials

    KAUST Repository

    Chang, Jian; Zhang, Lianbin; Wang, Peng

    2018-01-01

    Due to the inherent complexity of environmental problems, especially water and air pollution, the utility of single-function environmental nanomaterials used in conventional and unconventional environmental treatment technologies are gradually reaching their limits. Intelligent nanomaterials with environmentally-responsive functionalities have shown potential to improve the performance of existing and new environmental technologies. By rational design of their structures and functionalities, intelligent nanomaterials can perform different tasks in response to varying application scenarios for the purpose of achieving the best performance. This review offers a critical analysis of the design concepts and latest progresses on the intelligent environmental nanomaterials in filtration membranes with responsive gates, materials with switchable wettability for selective and on-demand oil/water separation, environmental materials with self-healing capability, and emerging nanofibrous air filters for PM2.5 removal. We hope that this review will inspire further research efforts to develop intelligent environmental nanomaterials for the enhancement of the overall quality of environmental or human health.

  2. Inadequate Evidence for Multiple Intelligences, Mozart Effect, and Emotional Intelligence Theories

    Science.gov (United States)

    Waterhouse, Lynn

    2006-01-01

    I (Waterhouse, 2006) argued that, because multiple intelligences, the Mozart effect, and emotional intelligence theories have inadequate empirical support and are not consistent with cognitive neuroscience findings, these theories should not be applied in education. Proponents countered that their theories had sufficient empirical support, were…

  3. Understanding the Globalization of Intelligence

    DEFF Research Database (Denmark)

    Svendsen, Adam David Morgan

    "This book provides an introduction to the complexities of contemporary Western Intelligence and its dynamics during an era of globalization. Towards an understanding of the globalization of intelligence process, Svendsen focuses on the secretive phenomenon of international or foreign intelligence...... cooperation ('liaison'), as it occurs in both theory and practice. Reflecting a complex coexistence plurality of several different and overlapping concepts in action, the challenging process of the globalization of intelligence emerges as essential for complex issue management purposes during a globalized era...

  4. Reliability and Validity of the New Tanaka B Intelligence Scale Scores: A Group Intelligence Test

    OpenAIRE

    Uno, Yota; Mizukami, Hitomi; Ando, Masahiko; Yukihiro, Ryoji; Iwasaki, Yoko; Ozaki, Norio

    2014-01-01

    OBJECTIVE: The present study evaluated the reliability and concurrent validity of the new Tanaka B Intelligence Scale, which is an intelligence test that can be administered on groups within a short period of time. METHODS: The new Tanaka B Intelligence Scale and Wechsler Intelligence Scale for Children-Third Edition were administered to 81 subjects (mean age ± SD 15.2 ± 0.7 years) residing in a juvenile detention home; reliability was assessed using Cronbach's alpha coefficient, and concurre...

  5. Hybrid-augmented intelligence:collaboration and cognition

    Institute of Scientific and Technical Information of China (English)

    Nan-ning ZHENG; Zi-yi LIU; Peng-ju REN; Yong-qiang MA; Shi-tao CHEN; Si-yu YU; Jian-ru XUE

    2017-01-01

    The long-term goal of artificial intelligence (AI) is to make machines learn and think like human beings. Due to the high levels of uncertainty and vulnerability in human life and the open-ended nature of problems that humans are facing, no matter how intelligent machines are, they are unable to completely replace humans. Therefore, it is necessary to introduce human cognitive capabilities or human-like cognitive models into AI systems to develop a new form of AI, that is, hybrid-augmented intelligence. This form of AI or machine intelligence is a feasible and important developing model. Hybrid-augmented intelligence can be divided into two basic models:one is human-in-the-loop augmented intelligence with human-computer collaboration, and the other is cognitive computing based augmented intelligence, in which a cognitive model is embedded in the machine learning system. This survey describes a basic framework for human-computer collaborative hybrid-augmented intelligence, and the basic elements of hybrid-augmented intelligence based on cognitive computing. These elements include intuitive reasoning, causal models, evolution of memory and knowledge, especially the role and basic principles of intuitive reasoning for complex problem solving, and the cognitive learning framework for visual scene understanding based on memory and reasoning. Several typical applications of hybrid-augmented intelligence in related fields are given.

  6. Intelligent indexing

    International Nuclear Information System (INIS)

    Farkas, J.

    1992-01-01

    In this paper we discuss the relevance of artificial intelligence to the automatic indexing of natural language text. We describe the use of domain-specific semantically-based thesauruses and address the problem of creating adequate knowledge bases for intelligent indexing systems. We also discuss the relevance of the Hilbert space ι 2 to the compact representation of documents and to the definition of the similarity of natural language texts. (author). 17 refs., 2 figs

  7. Intelligent indexing

    Energy Technology Data Exchange (ETDEWEB)

    Farkas, J

    1993-12-31

    In this paper we discuss the relevance of artificial intelligence to the automatic indexing of natural language text. We describe the use of domain-specific semantically-based thesauruses and address the problem of creating adequate knowledge bases for intelligent indexing systems. We also discuss the relevance of the Hilbert space {iota}{sup 2} to the compact representation of documents and to the definition of the similarity of natural language texts. (author). 17 refs., 2 figs.

  8. How to Improve Artificial Intelligence through Web

    OpenAIRE

    Adrian Lupasc

    2005-01-01

    Intelligent agents, intelligent software applications and artificial intelligent applications from artificial intelligence service providers may make their way onto the Web in greater number as adaptive software, dynamic programming languages and Learning Algorithms are introduced into Web Services. The evolution of Web architecture may allow intelligent applications to run directly on the Web by introducing XML, RDF and logic layer. The Intelligent Wireless Web’s significant potential for ra...

  9. Artificial Intelligence--Applications in Education.

    Science.gov (United States)

    Poirot, James L.; Norris, Cathleen A.

    1987-01-01

    This first in a projected series of five articles discusses artificial intelligence and its impact on education. Highlights include the history of artificial intelligence and the impact of microcomputers; learning processes; human factors and interfaces; computer assisted instruction and intelligent tutoring systems; logic programing; and expert…

  10. Political Orientations, Intelligence and Education

    Science.gov (United States)

    Rindermann, Heiner; Flores-Mendoza, Carmen; Woodley, Michael A.

    2012-01-01

    The social sciences have traditionally assumed that education is a major determinant of citizens' political orientations and behavior. Several studies have also shown that intelligence has an impact. According to a theory that conceptualizes intelligence as a "burgher" (middle-class, civil) phenomenon--intelligence should promote civil…

  11. Gender, "g", and Fixed versus Growth Intelligence Mindsets as Predictors of Self-Estimated Domain Masculine Intelligence (DMIQ)

    Science.gov (United States)

    Storek, Josephine; Furnham, Adrian

    2013-01-01

    Over 120 participants completed three timed intelligence tests, a self-estimated Domain Masculine (DMIQ) Intelligence scale, and a mindset "beliefs about intelligence" measure (Dweck, 2012) to examine correlates of the Hubris-Humility Effect (HHE) which shows males believe they are more intelligent than females. As predicted males gave…

  12. Quo Vadis, Artificial Intelligence?

    OpenAIRE

    Berrar, Daniel; Sato, Naoyuki; Schuster, Alfons

    2010-01-01

    Since its conception in the mid 1950s, artificial intelligence with its great ambition to understand and emulate intelligence in natural and artificial environments alike is now a truly multidisciplinary field that reaches out and is inspired by a great diversity of other fields. Rapid advances in research and technology in various fields have created environments into which artificial intelligence could embed itself naturally and comfortably. Neuroscience with its desire to understand nervou...

  13. Methodology, Birth Order, Intelligence, and Personality.

    Science.gov (United States)

    Michalski, Richard L.; Shackelford, Todd K.

    2001-01-01

    Critiques recent research on the effects of birth order on intelligence and personality, which found that the between-family design revealed that birth order negatively related to intelligence, while the within-family design revealed that birth order was unrelated to intelligence. Suggests that it may not be intelligence that co-varies with birth…

  14. Challenging problems and solutions in intelligent systems

    CERN Document Server

    Grzegorzewski, Przemysław; Kacprzyk, Janusz; Owsiński, Jan; Penczek, Wojciech; Zadrożny, Sławomir

    2016-01-01

    This volume presents recent research, challenging problems and solutions in Intelligent Systems– covering the following disciplines: artificial and computational intelligence, fuzzy logic and other non-classic logics, intelligent database systems, information retrieval, information fusion, intelligent search (engines), data mining, cluster analysis, unsupervised learning, machine learning, intelligent data analysis, (group) decision support systems, intelligent agents and multi-agent systems, knowledge-based systems, imprecision and uncertainty handling, electronic commerce, distributed systems, etc. The book defines a common ground for sometimes seemingly disparate problems and addresses them by using the paradigm of broadly perceived intelligent systems. It presents a broad panorama of a multitude of theoretical and practical problems which have been successfully dealt with using the paradigm of intelligent computing.

  15. Intelligent Tutoring System: A Tool for Testing the Research Curiosities of Artificial Intelligence Researchers

    Science.gov (United States)

    Yaratan, Huseyin

    2003-01-01

    An ITS (Intelligent Tutoring System) is a teaching-learning medium that uses artificial intelligence (AI) technology for instruction. Roberts and Park (1983) defines AI as the attempt to get computers to perform tasks that if performed by a human-being, intelligence would be required to perform the task. The design of an ITS comprises two distinct…

  16. Traditional Enterprise Business Intelligence Software Compared to Software as a Service Business Intelligence

    Directory of Open Access Journals (Sweden)

    Marian Pompiliu CRISTESCU

    2016-01-01

    Full Text Available The focus of this paper is on the one hand on the importance of business intelligence in large and medium-sized businesses and on the other side on the evaluation and implementation of Business Intelligence. It shows how companies make better and faster decisions regarding their customers, partners and operations by converting data into valuable business information. The paper describes how to bring business intelligence information, people and technology together to help to create a successful business strategy. The conclusion of the paper is the assessment of the possibility of business intelligence to develop projects in large and medium-sized companies and the discussion of the possible alternatives with respect to the different functions.

  17. Intelligence Campaign Planning: An Opportunity for the Army in Defense Intelligence Synchronization

    National Research Council Canada - National Science Library

    McAninch, Kevin A

    2007-01-01

    ...) Intelligence Community (IC) implementation and execution of Intelligence Campaign Planning (ICP). ICP is emerging as a new procedure for the DoD IC to centrally plan ISR Synchronization in support of regional combatant commander operation plans...

  18. The Construction of Intelligent English Teaching Model Based on Artificial Intelligence

    Directory of Open Access Journals (Sweden)

    Xiaoguang Li

    2017-12-01

    Full Text Available In order to build a modernized tool platform that can help students improve their English learning efficiency according to their mastery of knowledge and personality, this paper develops an online intelligent English learning system that uses Java and artificial intelligence language Prolog as the software system. This system is a creative reflection of the thoughts of expert system in artificial intelligence. Established on the Struts Spring Hibernate lightweight JavaEE framework, the system modules are coupled with each other in a much lower degree, which is convenient to future function extension. Combined with the idea of expert system in artificial intelligence, the system developed appropriate learning strategies to help students double the learning effect with half the effort; Finally, the system takes into account the forgetting curve of memory, on which basis the knowledge that has been learned will be tested periodically, intending to spare students’ efforts to do a sea of exercises and obtain better learning results.

  19. General Intelligence, Emotional Intelligence and Academic Knowledge as Predictors of Creativity Domains: A Study of Gifted Students

    Science.gov (United States)

    Sahin, Feyzullah

    2016-01-01

    Creativity of the individual is dependent on numerous factors, such as knowledge, general intelligence and emotional intelligence. The general purpose of this study is to investigate the effect of general intelligence, emotional intelligence and academic knowledge on the emerging of domain-specific creativity. The study was conducted on 178…

  20. Intelligent environmental sensing

    CERN Document Server

    Mukhopadhyay, Subhas

    2015-01-01

    Developing environmental sensing and monitoring technologies become essential especially for industries that may cause severe contamination. Intelligent environmental sensing uses novel sensor techniques, intelligent signal and data processing algorithms, and wireless sensor networks to enhance environmental sensing and monitoring. It finds applications in many environmental problems such as oil and gas, water quality, and agriculture. This book addresses issues related to three main approaches to intelligent environmental sensing and discusses their latest technological developments. Key contents of the book include:   Agricultural monitoring Classification, detection, and estimation Data fusion Geological monitoring Motor monitoring Multi-sensor systems Oil reservoirs monitoring Sensor motes Water quality monitoring Wireless sensor network protocol  

  1. 12 CFR 269b.731 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CHARGES OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be...

  2. Computer automation and artificial intelligence

    International Nuclear Information System (INIS)

    Hasnain, S.B.

    1992-01-01

    Rapid advances in computing, resulting from micro chip revolution has increased its application manifold particularly for computer automation. Yet the level of automation available, has limited its application to more complex and dynamic systems which require an intelligent computer control. In this paper a review of Artificial intelligence techniques used to augment automation is presented. The current sequential processing approach usually adopted in artificial intelligence has succeeded in emulating the symbolic processing part of intelligence, but the processing power required to get more elusive aspects of intelligence leads towards parallel processing. An overview of parallel processing with emphasis on transputer is also provided. A Fuzzy knowledge based controller for amination drug delivery in muscle relaxant anesthesia on transputer is described. 4 figs. (author)

  3. Artificial intelligence and the future.

    Science.gov (United States)

    Clocksin, William F

    2003-08-15

    We consider some of the ideas influencing current artificial-intelligence research and outline an alternative conceptual framework that gives priority to social relationships as a key component and constructor of intelligent behaviour. The framework starts from Weizenbaum's observation that intelligence manifests itself only relative to specific social and cultural contexts. This is in contrast to a prevailing view, which sees intelligence as an abstract capability of the individual mind based on a mechanism for rational thought. The new approach is not based on the conventional idea that the mind is a rational processor of symbolic information, nor does it require the idea that thought is a kind of abstract problem solving with a semantics that is independent of its embodiment. Instead, priority is given to affective and social responses that serve to engage the whole agent in the life of the communities in which it participates. Intelligence is seen not as the deployment of capabilities for problem solving, but as constructed by the continual, ever-changing and unfinished engagement with the social group within the environment. The construction of the identity of the intelligent agent involves the appropriation or 'taking up' of positions within the conversations and narratives in which it participates. Thus, the new approach argues that the intelligent agent is shaped by the meaning ascribed to experience, by its situation in the social matrix, and by practices of self and of relationship into which intelligent life is recruited. This has implications for the technology of the future, as, for example, classic artificial intelligence models such as goal-directed problem solving are seen as special cases of narrative practices instead of as ontological foundations.

  4. Reduction of a Ship's Magnetic Field Signatures

    CERN Document Server

    Holmes, John

    2008-01-01

    Decreasing the magnetic field signature of a naval vessel will reduce its susceptibility to detonating naval influence mines and the probability of a submarine being detected by underwater barriers and maritime patrol aircraft. Both passive and active techniques for reducing the magnetic signatures produced by a vessel's ferromagnetism, roll-induced eddy currents, corrosion-related sources, and stray fields are presented. Mathematical models of simple hull shapes are used to predict the levels of signature reduction that might be achieved through the use of alternate construction materials. Al

  5. Intelligent Mission Controller Node

    National Research Council Canada - National Science Library

    Perme, David

    2002-01-01

    The goal of the Intelligent Mission Controller Node (IMCN) project was to improve the process of translating mission taskings between real-world Command, Control, Communications, Computers, and Intelligence (C41...

  6. Foundations of Intelligent Systems : Proceedings of the Sixth International Conference on Intelligent Systems and Knowledge Engineering

    CERN Document Server

    Li, Tianrui

    2012-01-01

    Proceedings of The Sixth International Conference on Intelligent System and Knowledge Engineering presents selected papers from the conference ISKE 2011, held December 15-17 in Shanghai, China. This proceedings doesn’t only examine original research and approaches in the broad areas of intelligent systems and knowledge engineering, but also present new methodologies and practices in intelligent computing paradigms. The book introduces the current scientific and technical advances in the fields of artificial intelligence, machine learning, pattern recognition, data mining, information retrieval, knowledge-based systems, knowledge representation and reasoning, multi-agent systems, natural-language processing, etc. Furthermore, new computing methodologies are presented, including cloud computing, service computing and pervasive computing with traditional intelligent methods. The proceedings will be beneficial for both researchers and practitioners who want to utilize intelligent methods in their specific resea...

  7. Emotional Intelligence: Requiring Attention

    Directory of Open Access Journals (Sweden)

    Monica Tudor

    2016-01-01

    Full Text Available This article aims to highlight the need for emotional intelligence. Two methods of measurementare presented in this research, in order to better understand the necessity of a correct result. Theresults of research can lead to recommendations for improving levels of emotional intelligence andare useful for obtaining data to better compare past and present result. The papers presented inthis research are significant for future study of this subject. The first paper presents the evolutionof emotional intelligence in the past two years, more specifically its decrease concerning certaincharacteristics. The second one presents a research on the differences between generations. Thethird one shows a difference in emotional intelligence levels of children from rural versus urbanenvironments and the obstacles that they encounter in their own development.

  8. Towards Intelligent Supply Chains

    DEFF Research Database (Denmark)

    Siurdyban, Artur; Møller, Charles

    2012-01-01

    applied to the context of organizational processes can increase the success rate of business operations. The framework is created using a set of theoretical based constructs grounded in a discussion across several streams of research including psychology, pedagogy, artificial intelligence, learning...... of deploying inapt operations leading to deterioration of profits. To address this problem, we propose a unified business process design framework based on the paradigm of intelligence. Intelligence allows humans and human-designed systems cope with environmental volatility, and we argue that its principles......, business process management and supply chain management. It outlines a number of system tasks combined in four integrated management perspectives: build, execute, grow and innovate, put forward as business process design propositions for Intelligent Supply Chains....

  9. Multiple Intelligences, the Mozart Effect, and Emotional Intelligence: A Critical Review

    Science.gov (United States)

    Waterhouse, Lynn

    2006-01-01

    This article reviews evidence for multiple intelligences theory, the Mozart effect theory, and emotional intelligence theory and argues that despite their wide currency in education these theories lack adequate empirical support and should not be the basis for educational practice. Each theory is compared to theory counterparts in cognitive…

  10. Semantic Business Intelligence - a New Generation of Business Intelligence

    OpenAIRE

    Dinu AIRINEI; Dora-Anca BERTA

    2012-01-01

    Business Intelligence Solutions represents applications used by companies to manage process and analyze data to provide substantiated decision. In the context of Semantic Web develop-ment trend is to integrate semantic unstructured data, making business intelligence solutions to be redesigned in such a manner that can analyze, process and synthesize, in addition to traditional data and data integrated with semantic another form and structure. This invariably leads appearance of new BI solutio...

  11. Cooperation and the evolution of intelligence.

    Science.gov (United States)

    McNally, Luke; Brown, Sam P; Jackson, Andrew L

    2012-08-07

    The high levels of intelligence seen in humans, other primates, certain cetaceans and birds remain a major puzzle for evolutionary biologists, anthropologists and psychologists. It has long been held that social interactions provide the selection pressures necessary for the evolution of advanced cognitive abilities (the 'social intelligence hypothesis'), and in recent years decision-making in the context of cooperative social interactions has been conjectured to be of particular importance. Here we use an artificial neural network model to show that selection for efficient decision-making in cooperative dilemmas can give rise to selection pressures for greater cognitive abilities, and that intelligent strategies can themselves select for greater intelligence, leading to a Machiavellian arms race. Our results provide mechanistic support for the social intelligence hypothesis, highlight the potential importance of cooperative behaviour in the evolution of intelligence and may help us to explain the distribution of cooperation with intelligence across taxa.

  12. Recent Advances on Hybrid Intelligent Systems

    CERN Document Server

    Melin, Patricia; Kacprzyk, Janusz

    2013-01-01

    This book presents recent advances on hybrid intelligent systems using soft computing techniques for intelligent control and robotics, pattern recognition, time series prediction and optimization of complex problems. Soft Computing (SC) consists of several intelligent computing paradigms, including fuzzy logic, neural networks, and bio-inspired optimization algorithms, which can be used to produce powerful hybrid intelligent systems. The book is organized in five main parts, which contain groups of papers around a similar subject. The first part consists of papers with the main theme of hybrid intelligent systems for control and robotics, which are basically state of the art papers that propose new models and concepts, which can be the basis for achieving intelligent control and mobile robotics. The second part contains papers with the main theme of hybrid intelligent systems for pattern recognition and time series prediction, which are basically papers using nature-inspired techniques, like evolutionary algo...

  13. Does Twitter trigger bursts in signature collections?

    Science.gov (United States)

    Yamaguchi, Rui; Imoto, Seiya; Kami, Masahiro; Watanabe, Kenji; Miyano, Satoru; Yuji, Koichiro

    2013-01-01

    The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78%) of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26%) was smaller than the Forum effect (52%) in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore information hidden in social phenomena.

  14. Does Twitter trigger bursts in signature collections?

    Directory of Open Access Journals (Sweden)

    Rui Yamaguchi

    Full Text Available INTRODUCTION: The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. METHODS AND FINDINGS: In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78% of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26% was smaller than the Forum effect (52% in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. CONCLUSIONS: The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore

  15. BUSINESS INTELLIGENCE

    OpenAIRE

    Bogdan Mohor Dumitrita

    2011-01-01

    The purpose of this work is to present business intelligence systems. These systems can be extremely complex and important in modern market competition. Its effectiveness also reflects in price, so we have to exlore their financial potential before investment. The systems have 20 years long history and during that time many of such tools have been developed, but they are rarely still in use. Business intelligence system consists of three main areas: Data Warehouse, ETL tools and tools f...

  16. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  17. Putting Emotional Intelligence To Work

    CERN Document Server

    Ryback, David

    2012-01-01

    Putting Emotional Intelligence to Work offers a new paradigm of communication for the 21st-century workplace. Beginning with the thoughts of communication pioneer Carl Rogers, this book covers the origins and history of emotional intelligence, why it is essential at this point in the changing marketplace, how to delegate and negotiate more effectively, and how to change yourself to become a more effective player. An EQ (Emotional Quotient) survey helps you determine where you are on the scale of executive intelligence. Putting Emotional Intelligence to Work leaves you with a greater understand

  18. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  19. Evolving Military Intelligence: The Effect of the Military Intelligence Service (MIS) and the Military Intelligence Organization (MIO) During the Korean and Vietnam Wars

    Science.gov (United States)

    2017-06-09

    Doctrine Publication (ADP) 2-0, Intelligence (Washington, DC: Government Printing Office, 2012), 1. 2 Scott D. Berrier, “ILE Branch Day” (Lecture, Command...Combat Intelligence (Washington, DC: Government Printing Office, 1951), 11-15. 6 groups of MI specialist teams within a larger tactical unit; allowing...Department of the Army, TOE 30- 115T, Combat Electronic Warfare Intelligence Battalion, Division (Washington, DC: Government Printing Office, 1976

  20. Students’ logical-mathematical intelligence profile

    Science.gov (United States)

    Arum, D. P.; Kusmayadi, T. A.; Pramudya, I.

    2018-04-01

    One of students’ characteristics which play an important role in learning mathematics is logical-mathematical intelligence. This present study aims to identify profile of students’ logical-mathematical intelligence in general and specifically in each indicator. It is also analyzed and described based on students’ sex. This research used qualitative method with case study strategy. The subjects involve 29 students of 9th grade that were selected by purposive sampling. Data in this research involve students’ logical-mathematical intelligence result and interview. The results show that students’ logical-mathematical intelligence was identified in the moderate level with the average score is 11.17 and 51.7% students in the range of the level. In addition, the level of both male and female students are also mostly in the moderate level. On the other hand, both male and female students’ logical-mathematical intelligence is strongly influenced by the indicator of ability to classify and understand patterns and relationships. Furthermore, the ability of comparison is the weakest indicator. It seems that students’ logical-mathematical intelligence is still not optimal because more than 50% students are identified in moderate and low level. Therefore, teachers need to design a lesson that can improve students’ logical-mathematical intelligence level, both in general and on each indicator.

  1. The foundations of plant intelligence.

    Science.gov (United States)

    Trewavas, Anthony

    2017-06-06

    Intelligence is defined for wild plants and its role in fitness identified. Intelligent behaviour exhibited by single cells and systems similarity between the interactome and connectome indicates neural systems are not necessary for intelligent capabilities. Plants sense and respond to many environmental signals that are assessed to competitively optimize acquisition of patchily distributed resources. Situations of choice engender motivational states in goal-directed plant behaviour; consequent intelligent decisions enable efficient gain of energy over expenditure. Comparison of swarm intelligence and plant behaviour indicates the origins of plant intelligence lie in complex communication and is exemplified by cambial control of branch function. Error correction in behaviours indicates both awareness and intention as does the ability to count to five. Volatile organic compounds are used as signals in numerous plant interactions. Being complex in composition and often species and individual specific, they may represent the plant language and account for self and alien recognition between individual plants. Game theory has been used to understand competitive and cooperative interactions between plants and microbes. Some unexpected cooperative behaviour between individuals and potential aliens has emerged. Behaviour profiting from experience, another simple definition of intelligence, requires both learning and memory and is indicated in the priming of herbivory, disease and abiotic stresses.

  2. Dental ethics and emotional intelligence.

    Science.gov (United States)

    Rosenblum, Alvin B; Wolf, Steve

    2014-01-01

    Dental ethics is often taught, viewed, and conducted as an intell enterprise, uninformed by other noncognitive factors. Emotional intelligence (EQ) is defined distinguished from the cognitive intelligence measured by Intelligence Quotient (IQ). This essay recommends more inclusion of emotional, noncognitive input to the ethical decision process in dental education and dental practice.

  3. Modeling ground vehicle acoustic signatures for analysis and synthesis

    International Nuclear Information System (INIS)

    Haschke, G.; Stanfield, R.

    1995-01-01

    Security and weapon systems use acoustic sensor signals to classify and identify moving ground vehicles. Developing robust signal processing algorithms for this is expensive, particularly in presence of acoustic clutter or countermeasures. This paper proposes a parametric ground vehicle acoustic signature model to aid the system designer in understanding which signature features are important, developing corresponding feature extraction algorithms and generating low-cost, high-fidelity synthetic signatures for testing. The authors have proposed computer-generated acoustic signatures of armored, tracked ground vehicles to deceive acoustic-sensored smart munitions. They have developed quantitative measures of how accurately a synthetic acoustic signature matches those produced by actual vehicles. This paper describes parameters of the model used to generate these synthetic signatures and suggests methods for extracting these parameters from signatures of valid vehicle encounters. The model incorporates wide-bandwidth and narrow- bandwidth components that are modulated in a pseudo-random fashion to mimic the time dynamics of valid vehicle signatures. Narrow- bandwidth feature extraction techniques estimate frequency, amplitude and phase information contained in a single set of narrow frequency- band harmonics. Wide-bandwidth feature extraction techniques estimate parameters of a correlated-noise-floor model. Finally, the authors propose a method of modeling the time dynamics of the harmonic amplitudes as a means adding necessary time-varying features to the narrow-bandwidth signal components. The authors present results of applying this modeling technique to acoustic signatures recorded during encounters with one armored, tracked vehicle. Similar modeling techniques can be applied to security systems

  4. DIGITAL SIGNATURE IN THE WAY OF LAW

    OpenAIRE

    Ruya Samlı

    2013-01-01

    Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can be...

  5. An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice

    Directory of Open Access Journals (Sweden)

    Zhengjun Jing

    2014-01-01

    Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.

  6. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  7. Intelligence Is What the Intelligence Test Measures. Seriously

    Directory of Open Access Journals (Sweden)

    Han L. J. van der Maas

    2014-02-01

    Full Text Available The mutualism model, an alternative for the g-factor model of intelligence, implies a formative measurement model in which “g” is an index variable without a causal role. If this model is accurate, the search for a genetic of brain instantiation of “g” is deemed useless. This also implies that the (weighted sum score of items of an intelligence test is just what it is: a weighted sum score. Preference for one index above the other is a pragmatic issue that rests mainly on predictive value.

  8. Artificial Intelligence in Civil Engineering

    Directory of Open Access Journals (Sweden)

    Pengzhen Lu

    2012-01-01

    Full Text Available Artificial intelligence is a branch of computer science, involved in the research, design, and application of intelligent computer. Traditional methods for modeling and optimizing complex structure systems require huge amounts of computing resources, and artificial-intelligence-based solutions can often provide valuable alternatives for efficiently solving problems in the civil engineering. This paper summarizes recently developed methods and theories in the developing direction for applications of artificial intelligence in civil engineering, including evolutionary computation, neural networks, fuzzy systems, expert system, reasoning, classification, and learning, as well as others like chaos theory, cuckoo search, firefly algorithm, knowledge-based engineering, and simulated annealing. The main research trends are also pointed out in the end. The paper provides an overview of the advances of artificial intelligence applied in civil engineering.

  9. Applying Multiple Intelligences

    Science.gov (United States)

    Christodoulou, Joanna A.

    2009-01-01

    The ideas of multiple intelligences introduced by Howard Gardner of Harvard University more than 25 years ago have taken form in many ways, both in schools and in other sometimes-surprising settings. The silver anniversary of Gardner's learning theory provides an opportunity to reflect on the ways multiple intelligences theory has taken form and…

  10. Signature detection and matching for document image retrieval.

    Science.gov (United States)

    Zhu, Guangyu; Zheng, Yefeng; Doermann, David; Jaeger, Stefan

    2009-11-01

    As one of the most pervasive methods of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effective document image processing and retrieval in a broad range of applications. However, detection and segmentation of free-form objects such as signatures from clustered background is currently an open document analysis problem. In this paper, we focus on two fundamental problems in signature-based document image retrieval. First, we propose a novel multiscale approach to jointly detecting and segmenting signatures from document images. Rather than focusing on local features that typically have large variations, our approach captures the structural saliency using a signature production model and computes the dynamic curvature of 2D contour fragments over multiple scales. This detection framework is general and computationally tractable. Second, we treat the problem of signature retrieval in the unconstrained setting of translation, scale, and rotation invariant nonrigid shape matching. We propose two novel measures of shape dissimilarity based on anisotropic scaling and registration residual error and present a supervised learning framework for combining complementary shape information from different dissimilarity metrics using LDA. We quantitatively study state-of-the-art shape representations, shape matching algorithms, measures of dissimilarity, and the use of multiple instances as query in document image retrieval. We further demonstrate our matching techniques in offline signature verification. Extensive experiments using large real-world collections of English and Arabic machine-printed and handwritten documents demonstrate the excellent performance of our approaches.

  11. Principles of artificial intelligence

    CERN Document Server

    Nilsson, Nils J

    1980-01-01

    A classic introduction to artificial intelligence intended to bridge the gap between theory and practice, Principles of Artificial Intelligence describes fundamental AI ideas that underlie applications such as natural language processing, automatic programming, robotics, machine vision, automatic theorem proving, and intelligent data retrieval. Rather than focusing on the subject matter of the applications, the book is organized around general computational concepts involving the kinds of data structures used, the types of operations performed on the data structures, and the properties of th

  12. Server-Aided Verification Signature with Privacy for Mobile Computing

    Directory of Open Access Journals (Sweden)

    Lingling Xu

    2015-01-01

    Full Text Available With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

  13. The brain triuno and the ethical intelligence: fundamental counterfoil of the multifocal intelligence

    Directory of Open Access Journals (Sweden)

    C. Seijo

    2013-10-01

    Full Text Available This study has for aim offer an analysis as for the brain triuno and the ethical intelligence: fundamental Counterfoil of the multifocal intelligence, taking in tells one of the theories that it sustains her like they are the different types of multiple intelligences established by Beauport and Cury (2004. The theoretical sustenance, it is based on the contents of Martin (2005, Belohlavek (2007, Galicians (2002, Beauport and Cury (2004, between others, being realized under a symbolic interpretive approach, across a qualitative methodology, type descriptive and not experimental design, by means of a documentary analysis. In this regard, it is found that the ethical intelligence is a mental mechanism that constructs the structural preconceptos and the rules of game with which an individual approaches the reality, that is to say, it is the capacity of the general formation, predicting the behavior for the achievement of aims organizacionales. As for the final considerations they focused in obtaining the most wide knowledge inside the organizations, allowing to reflect before the weaknesses that they present thinking about the brain triuno applying the multifocal intelligence, fundamental counterfoil of the ethical intelligence and of what way the rationing visualizes the strengths, nevertheless of the weaknesses that they present. 

  14. Real Time News Analysis for Improved Social Relationship Discovery

    National Research Council Canada - National Science Library

    Forester, Joan; O'May, Janet

    2007-01-01

    .... Intelligence Analysts must be able to gather traditional information "signal, human, and measurement and signature intelligence" and nontraditional data "financial and social context" to form actionable intelligence...

  15. Assessing Cognitive Abilities: Intelligence and More

    Directory of Open Access Journals (Sweden)

    Keith E. Stanovich

    2014-02-01

    Full Text Available In modern cognitive science, rationality and intelligence are measured using different tasks and operations. Furthermore, in several contemporary dual process theories of cognition, rationality is a more encompassing construct than intelligence. Researchers need to continue to develop measures of rational thought without regard to empirical correlations with intelligence. The measurement of individual differences in rationality should not be subsumed by the intelligence concept.

  16. Intelligent Distributed Computing VI : Proceedings of the 6th International Symposium on Intelligent Distributed Computing

    CERN Document Server

    Badica, Costin; Malgeri, Michele; Unland, Rainer

    2013-01-01

    This book represents the combined peer-reviewed proceedings of the Sixth International Symposium on Intelligent Distributed Computing -- IDC~2012, of the International Workshop on Agents for Cloud -- A4C~2012 and of the Fourth International Workshop on Multi-Agent Systems Technology and Semantics -- MASTS~2012. All the events were held in Calabria, Italy during September 24-26, 2012. The 37 contributions published in this book address many topics related to theory and applications of intelligent distributed computing and multi-agent systems, including: adaptive and autonomous distributed systems, agent programming, ambient assisted living systems, business process modeling and verification, cloud computing, coalition formation, decision support systems, distributed optimization and constraint satisfaction, gesture recognition, intelligent energy management in WSNs, intelligent logistics, machine learning, mobile agents, parallel and distributed computational intelligence, parallel evolutionary computing, trus...

  17. 48 CFR 4.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contracting officer's signature. 4.101 Section 4.101 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.101 Contracting officer's signature. Only contracting officers shall...

  18. Intelligence-Augmented Rat Cyborgs in Maze Solving.

    Directory of Open Access Journals (Sweden)

    Yipeng Yu

    Full Text Available Cyborg intelligence is an emerging kind of intelligence paradigm. It aims to deeply integrate machine intelligence with biological intelligence by connecting machines and living beings via neural interfaces, enhancing strength by combining the biological cognition capability with the machine computational capability. Cyborg intelligence is considered to be a new way to augment living beings with machine intelligence. In this paper, we build rat cyborgs to demonstrate how they can expedite the maze escape task with integration of machine intelligence. We compare the performance of maze solving by computer, by individual rats, and by computer-aided rats (i.e. rat cyborgs. They were asked to find their way from a constant entrance to a constant exit in fourteen diverse mazes. Performance of maze solving was measured by steps, coverage rates, and time spent. The experimental results with six rats and their intelligence-augmented rat cyborgs show that rat cyborgs have the best performance in escaping from mazes. These results provide a proof-of-principle demonstration for cyborg intelligence. In addition, our novel cyborg intelligent system (rat cyborg has great potential in various applications, such as search and rescue in complex terrains.

  19. Intelligence-Augmented Rat Cyborgs in Maze Solving.

    Science.gov (United States)

    Yu, Yipeng; Pan, Gang; Gong, Yongyue; Xu, Kedi; Zheng, Nenggan; Hua, Weidong; Zheng, Xiaoxiang; Wu, Zhaohui

    2016-01-01

    Cyborg intelligence is an emerging kind of intelligence paradigm. It aims to deeply integrate machine intelligence with biological intelligence by connecting machines and living beings via neural interfaces, enhancing strength by combining the biological cognition capability with the machine computational capability. Cyborg intelligence is considered to be a new way to augment living beings with machine intelligence. In this paper, we build rat cyborgs to demonstrate how they can expedite the maze escape task with integration of machine intelligence. We compare the performance of maze solving by computer, by individual rats, and by computer-aided rats (i.e. rat cyborgs). They were asked to find their way from a constant entrance to a constant exit in fourteen diverse mazes. Performance of maze solving was measured by steps, coverage rates, and time spent. The experimental results with six rats and their intelligence-augmented rat cyborgs show that rat cyborgs have the best performance in escaping from mazes. These results provide a proof-of-principle demonstration for cyborg intelligence. In addition, our novel cyborg intelligent system (rat cyborg) has great potential in various applications, such as search and rescue in complex terrains.

  20. Reliability and validity of the new Tanaka B Intelligence Scale scores: a group intelligence test.

    Directory of Open Access Journals (Sweden)

    Yota Uno

    Full Text Available OBJECTIVE: The present study evaluated the reliability and concurrent validity of the new Tanaka B Intelligence Scale, which is an intelligence test that can be administered on groups within a short period of time. METHODS: The new Tanaka B Intelligence Scale and Wechsler Intelligence Scale for Children-Third Edition were administered to 81 subjects (mean age ± SD 15.2 ± 0.7 years residing in a juvenile detention home; reliability was assessed using Cronbach's alpha coefficient, and concurrent validity was assessed using the one-way analysis of variance intraclass correlation coefficient. Moreover, receiver operating characteristic analysis for screening for individuals who have a deficit in intellectual function (an FIQ<70 was performed. In addition, stratum-specific likelihood ratios for detection of intellectual disability were calculated. RESULTS: The Cronbach's alpha for the new Tanaka B Intelligence Scale IQ (BIQ was 0.86, and the intraclass correlation coefficient with FIQ was 0.83. Receiver operating characteristic analysis demonstrated an area under the curve of 0.89 (95% CI: 0.85-0.96. In addition, the stratum-specific likelihood ratio for the BIQ≤65 stratum was 13.8 (95% CI: 3.9-48.9, and the stratum-specific likelihood ratio for the BIQ≥76 stratum was 0.1 (95% CI: 0.03-0.4. Thus, intellectual disability could be ruled out or determined. CONCLUSION: The present results demonstrated that the new Tanaka B Intelligence Scale score had high reliability and concurrent validity with the Wechsler Intelligence Scale for Children-Third Edition score. Moreover, the post-test probability for the BIQ could be calculated when screening for individuals who have a deficit in intellectual function. The new Tanaka B Intelligence Test is convenient and can be administered within a variety of settings. This enables evaluation of intellectual development even in settings where performing intelligence tests have previously been difficult.

  1. 37 CFR 2.74 - Form and signature of amendment.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Form and signature of... signature of amendment. (a) Form of Amendment. Amendments should be set forth clearly and completely... record. (b) Signature. A request for amendment of an application must be signed by the applicant, someone...

  2. 21 CFR 11.200 - Electronic signature components and controls.

    Science.gov (United States)

    2010-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1) Employ at least two distinct identification components such as an identification code and password. (i... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than...

  3. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  4. International Conference on Computational Intelligence 2015

    CERN Document Server

    Saha, Sujan

    2017-01-01

    This volume comprises the proceedings of the International Conference on Computational Intelligence 2015 (ICCI15). This book aims to bring together work from leading academicians, scientists, researchers and research scholars from across the globe on all aspects of computational intelligence. The work is composed mainly of original and unpublished results of conceptual, constructive, empirical, experimental, or theoretical work in all areas of computational intelligence. Specifically, the major topics covered include classical computational intelligence models and artificial intelligence, neural networks and deep learning, evolutionary swarm and particle algorithms, hybrid systems optimization, constraint programming, human-machine interaction, computational intelligence for the web analytics, robotics, computational neurosciences, neurodynamics, bioinspired and biomorphic algorithms, cross disciplinary topics and applications. The contents of this volume will be of use to researchers and professionals alike....

  5. THE ELECTRONIC SIGNATURE

    Directory of Open Access Journals (Sweden)

    Voiculescu Madalina Irena

    2009-05-01

    Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

  6. Intelligent Design and Intelligent Failure

    Science.gov (United States)

    Jerman, Gregory

    2015-01-01

    Good Evening, my name is Greg Jerman and for nearly a quarter century I have been performing failure analysis on NASA's aerospace hardware. During that time I had the distinct privilege of keeping the Space Shuttle flying for two thirds of its history. I have analyzed a wide variety of failed hardware from simple electrical cables to cryogenic fuel tanks to high temperature turbine blades. During this time I have found that for all the time we spend intelligently designing things, we need to be equally intelligent about understanding why things fail. The NASA Flight Director for Apollo 13, Gene Kranz, is best known for the expression "Failure is not an option." However, NASA history is filled with failures both large and small, so it might be more accurate to say failure is inevitable. It is how we react and learn from our failures that makes the difference.

  7. Staggering in signature partners of A∼190 mass region of superdeformed rotational bands

    International Nuclear Information System (INIS)

    Uma, V.S.; Goel, Alpana; Yadav, Archana

    2014-01-01

    This paper discuss about ΔI=1 signature splitting in signature partner pairs of A∼190 mass region. Around twenty signature partner pairs (usually called as two bands, each with a fixed signature) have been reported in this mass region. For these signature pairs, band head moment of inertia (J 0 ) and intrinsic structure of each pair of signature partners have been found as almost identical. Also, these signature partner pairs showed large amplitude signature splitting. As each of the two signature partner forms a regular spin sequence and signature bands are not equivalent in terms of energies. This difference in energies results in signature splitting

  8. Algorithms in ambient intelligence

    NARCIS (Netherlands)

    Aarts, E.H.L.; Korst, J.H.M.; Verhaegh, W.F.J.; Verhaegh, W.F.J.; Aarts, E.H.L.; Korst, J.H.M.

    2004-01-01

    In this chapter, we discuss the new paradigm for user-centered computing known as ambient intelligence and its relation with methods and techniques from the field of computational intelligence, including problem solving, machine learning, and expert systems.

  9. Neuronal factors determining high intelligence.

    Science.gov (United States)

    Dicke, Ursula; Roth, Gerhard

    2016-01-05

    Many attempts have been made to correlate degrees of both animal and human intelligence with brain properties. With respect to mammals, a much-discussed trait concerns absolute and relative brain size, either uncorrected or corrected for body size. However, the correlation of both with degrees of intelligence yields large inconsistencies, because although they are regarded as the most intelligent mammals, monkeys and apes, including humans, have neither the absolutely nor the relatively largest brains. The best fit between brain traits and degrees of intelligence among mammals is reached by a combination of the number of cortical neurons, neuron packing density, interneuronal distance and axonal conduction velocity--factors that determine general information processing capacity (IPC), as reflected by general intelligence. The highest IPC is found in humans, followed by the great apes, Old World and New World monkeys. The IPC of cetaceans and elephants is much lower because of a thin cortex, low neuron packing density and low axonal conduction velocity. By contrast, corvid and psittacid birds have very small and densely packed pallial neurons and relatively many neurons, which, despite very small brain volumes, might explain their high intelligence. The evolution of a syntactical and grammatical language in humans most probably has served as an additional intelligence amplifier, which may have happened in songbirds and psittacids in a convergent manner. © 2015 The Author(s).

  10. The subject to emotional intelligence training of changes of emotional intelligence research, and adolescence of Japan seen from overseas literature

    OpenAIRE

    中島, 正世; Nakajima, Masayo

    2015-01-01

    In this paper, the author have revealed the transition about the concept of emotional intelligence from overseas literature, and have tried to clarify the subject to the definition of emotional intelligence, the difference from similar concepts, the measuring method of emotional intelligence, the related element of emotional intelligence, and emotional intelligence training for the man-power development to current adolescence. As a result, the base element which constitutes emotional intellig...

  11. 22 CFR 92.28 - Signature of affiant on affidavit.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Signature of affiant on affidavit. 92.28 Section 92.28 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES NOTARIAL AND RELATED SERVICES Specific Notarial Acts § 92.28 Signature of affiant on affidavit. The signature of the affiant is...

  12. DARHT Multi-intelligence Seismic and Acoustic Data Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Stevens, Garrison Nicole [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Van Buren, Kendra Lu [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Hemez, Francois M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-07-21

    The purpose of this report is to document the analysis of seismic and acoustic data collected at the Dual-Axis Radiographic Hydrodynamic Test (DARHT) facility at Los Alamos National Laboratory for robust, multi-intelligence decision making. The data utilized herein is obtained from two tri-axial seismic sensors and three acoustic sensors, resulting in a total of nine data channels. The goal of this analysis is to develop a generalized, automated framework to determine internal operations at DARHT using informative features extracted from measurements collected external of the facility. Our framework involves four components: (1) feature extraction, (2) data fusion, (3) classification, and finally (4) robustness analysis. Two approaches are taken for extracting features from the data. The first of these, generic feature extraction, involves extraction of statistical features from the nine data channels. The second approach, event detection, identifies specific events relevant to traffic entering and leaving the facility as well as explosive activities at DARHT and nearby explosive testing sites. Event detection is completed using a two stage method, first utilizing signatures in the frequency domain to identify outliers and second extracting short duration events of interest among these outliers by evaluating residuals of an autoregressive exogenous time series model. Features extracted from each data set are then fused to perform analysis with a multi-intelligence paradigm, where information from multiple data sets are combined to generate more information than available through analysis of each independently. The fused feature set is used to train a statistical classifier and predict the state of operations to inform a decision maker. We demonstrate this classification using both generic statistical features and event detection and provide a comparison of the two methods. Finally, the concept of decision robustness is presented through a preliminary analysis where

  13. 10th International Symposium on Intelligent Distributed Computing

    CERN Document Server

    Seghrouchni, Amal; Beynier, Aurélie; Camacho, David; Herpson, Cédric; Hindriks, Koen; Novais, Paulo

    2017-01-01

    This book presents the combined peer-reviewed proceedings of the tenth International Symposium on Intelligent Distributed Computing (IDC’2016), which was held in Paris, France from October 10th to 12th, 2016. The 23 contributions address a range of topics related to theory and application of intelligent distributed computing, including: Intelligent Distributed Agent-Based Systems, Ambient Intelligence and Social Networks, Computational Sustainability, Intelligent Distributed Knowledge Representation and Processing, Smart Networks, Networked Intelligence and Intelligent Distributed Applications, amongst others.

  14. Induced Temporal Signatures for Point-Source Detection

    International Nuclear Information System (INIS)

    Stephens, Daniel L.; Runkle, Robert C.; Carlson, Deborah K.; Peurrung, Anthony J.; Seifert, Allen; Wyatt, Cory R.

    2005-01-01

    Detection of radioactive point-sized sources is inherently divided into two regimes encompassing stationary and moving detectors. The two cases differ in their treatment of background radiation and its influence on detection sensitivity. In the stationary detector case the statistical fluctuation of the background determines the minimum detectable quantity. In the moving detector case the detector may be subjected to widely and irregularly varying background radiation, as a result of geographical and environmental variation. This significant systematic variation, in conjunction with the statistical variation of the background, requires a conservative threshold to be selected to yield the same false-positive rate as the stationary detection case. This results in lost detection sensitivity for real sources. This work focuses on a simple and practical modification of the detector geometry that increase point-source recognition via a distinctive temporal signature. A key part of this effort is the integrated development of both detector geometries that induce a highly distinctive signature for point sources and the development of statistical algorithms able to optimize detection of this signature amidst varying background. The identification of temporal signatures for point sources has been demonstrated and compared with the canonical method showing good results. This work demonstrates that temporal signatures are efficient at increasing point-source discrimination in a moving detector system

  15. Social Representations of Intelligence

    Directory of Open Access Journals (Sweden)

    Elena Zubieta

    2016-02-01

    Full Text Available The article stresses the relationship between Explicit and Implicit theories of Intelligence. Following the line of common sense epistemology and the theory of Social Representations, a study was carried out in order to analyze naive’s explanations about Intelligence Definitions. Based on Mugny & Carugati (1989 research, a self-administered questionnaire was designed and filled in by 286 subjects. Results are congruent with the main hyphotesis postulated: A general overlap between explicit and implicit theories showed up. According to the results Intelligence appears as both, a social attribute related to social adaptation and as a concept defined in relation with contextual variables similar to expert’s current discourses. Nevertheless, conceptions based on “gifted ideology” still are present stressing the main axes of Intelligence debate: biological and sociological determinism. In the same sense, unfamiliarity and social identity are reaffirmed as organizing principles of social representation. The distance with the object -measured as the belief in intelligence differences as a solve/non solve problem- and the level of implication with the topic -teachers/no teachers- appear as discriminating elements at the moment of supporting specific dimensions. 

  16. Artificial intelligence

    International Nuclear Information System (INIS)

    Perret-Galix, D.

    1992-01-01

    A vivid example of the growing need for frontier physics experiments to make use of frontier technology is in the field of artificial intelligence and related themes. This was reflected in the second international workshop on 'Software Engineering, Artificial Intelligence and Expert Systems in High Energy and Nuclear Physics' which took place from 13-18 January at France Telecom's Agelonde site at La Londe des Maures, Provence. It was the second in a series, the first having been held at Lyon in 1990

  17. Report on {open_quotes}inspection of human subject research in intelligence and intelligence-related projects{close_quotes}

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-01-16

    Executive Order 12333, {open_quotes}United States Intelligence Activities,{close_quotes} (1) designates the Department`s intelligence element as a member of the Intelligence Community, and (2) states that no agency within the Intelligence community shall sponsor, contract for or conduct research on human subjects except in accordance with guidelines issued by the Department of Health and Human Services. The Federal policy for the Protection of Human Subjects, which was based on Department of Health and Human Services regulations, was promulgated in Title 10 Code of Federal Regulations Part 745 by the Department of Energy. The purpose of this inspection was to review the internal control procedures used by the Office of Nonproliferation and National Security to manage selected intelligence and intelligence-related projects that involve human subject research.

  18. Practical Applications of Intelligent Systems : Proceedings of the Sixth International Conference on Intelligent Systems and Knowledge Engineering

    CERN Document Server

    Li, Tianrui

    2012-01-01

    Proceedings of The Sixth International Conference on Intelligent System and Knowledge Engineering presents selected papers from the conference ISKE 2011, held December 15-17 in Shanghai, China. This proceedings doesn’t only examine original research and approaches in the broad areas of intelligent systems and knowledge engineering, but also present new methodologies and practices in intelligent computing paradigms. The book introduces the current scientific and technical advances in the fields of artificial intelligence, machine learning, pattern recognition, data mining, information retrieval, knowledge-based systems, knowledge representation and reasoning, multi-agent systems, natural-language processing, etc. Furthermore, new computing methodologies are presented, including cloud computing, service computing and pervasive computing with traditional intelligent methods. The proceedings will be beneficial for both researchers and practitioners who want to utilize intelligent methods in their specific res...

  19. Quo vadis, Intelligent Machine?

    Directory of Open Access Journals (Sweden)

    Rosemarie Velik

    2010-09-01

    Full Text Available Artificial Intelligence (AI is a branch of computer science concerned with making computers behave like humans. At least this was the original idea. However, it turned out that this is no task easy to be solved. This article aims to give a comprehensible review on the last 60 years of artificial intelligence taking a philosophical viewpoint. It is outlined what happened so far in AI, what is currently going on in this research area, and what can be expected in future. The goal is to mediate an understanding for the developments and changes in thinking in course of time about how to achieve machine intelligence. The clear message is that AI has to join forces with neuroscience and other brain disciplines in order to make a step towards the development of truly intelligent machines.

  20. Influence of the signer's psychophysiological state on the results of his identification using handwritten pattern by natural and artificial intelligence

    Directory of Open Access Journals (Sweden)

    Alexey E. Sulavko

    2017-11-01

    Full Text Available At present, while various mechanisms to ensure information security are actively being improved, particular attention is paid to prevent unauthorized access to information resources.  The human factor and process of identification still remain the most problematic, as well as user authentication. A progress in the technology of information resources protection from internal security threats paves its way towards biometric systems of hidden identification of computer users and their psychophysiological state. A change in psychophysiological state results in the person's handwriting. The influence of the signer’s state of fatigue and excitation on the results of its identification both by a person and by pattern recognition methods on reproduced signatures are studied. Capabilities of human and artificial intelligence are compared in equal conditions. When the state of the signer changes, the probability of erroneous recognition by artificial intelligence increases by factor 3.3 to 3.7. A person identifies a handwritten image with fewer errors in case when the signer is agitated, and with higher error rate if the signer is tired.

  1. A Framework for Intelligent Instructional Systems: An Artificial Intelligence Machine Learning Approach.

    Science.gov (United States)

    Becker, Lee A.

    1987-01-01

    Presents and develops a general model of the nature of a learning system and a classification for learning systems. Highlights include the relationship between artificial intelligence and cognitive psychology; computer-based instructional systems; intelligent instructional systems; and the role of the learner's knowledge base in an intelligent…

  2. Investigating the effect of emotional intelligence education on baccalaureate nursing students' emotional intelligence scores.

    Science.gov (United States)

    Orak, Roohangiz Jamshidi; Farahani, Mansoureh Ashghali; Kelishami, Fatemeh Ghofrani; Seyedfatemi, Naima; Banihashemi, Sara; Havaei, Farinaz

    2016-09-01

    Nursing students, particularly at the time of entering clinical education, experience a great deal of stress and emotion typically related to their educational and clinical competence. Emotional intelligence is known to be one of the required skills to effectively cope with such feelings. The aim of this study was to investigate the effect of training on first-year nursing students' levels of emotional intelligence. This was a quasi-experiment study in which 69 first-year nursing students affiliated with Tehran University of Medical Sciences were assigned to either the control or the experimental groups. The study intervention included of an emotional intelligence educational program offered in eight two-hour sessions for eight subsequent weeks. In total, 66 students completed the study. The study groups did not differ significantly in terms of emotional intelligence scores before and after educational program. Although the educational program did not have an effect on students' emotional intelligence scores, this study finding can be explained. Limited time for exercising the acquired knowledge and skills may explain the non-significant findings. Moreover, our participants were exclusively first-year students who had no clinical experience and hence, might have felt no real need to learn emotional intelligence skills. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. Optical/Infrared Signatures for Space-Based Remote Sensing

    National Research Council Canada - National Science Library

    Picard, R. H; Dewan, E. M; Winick, J. R; O'Neil, R. R

    2007-01-01

    This report describes work carried out under the Air Force Research Laboratory's basic research task in optical remote-sensing signatures, entitled Optical / Infrared Signatures for Space-Based Remote Sensing...

  4. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  5. Seventh International Conference on Intelligent Systems and Knowledge Engineering - Foundations and Applications of Intelligent Systems

    CERN Document Server

    Li, Tianrui; Li, Hongbo

    2014-01-01

    These proceedings present technical papers selected from the 2012 International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2012), held on December 15-17 in Beijing. The aim of this conference is to bring together experts from different fields of expertise to discuss the state-of-the-art in Intelligent Systems and Knowledge Engineering, and to present new findings and perspectives on future developments. The proceedings introduce current scientific and technical advances in the fields of artificial intelligence, machine learning, pattern recognition, data mining, knowledge engineering, information retrieval, information theory, knowledge-based systems, knowledge representation and reasoning, multi-agent systems, and natural-language processing, etc. Furthermore they include papers on new intelligent computing paradigms, which combine new computing methodologies, e.g., cloud computing, service computing and pervasive computing with traditional intelligent methods. By presenting new method...

  6. Intelligent distributed computing

    CERN Document Server

    Thampi, Sabu

    2015-01-01

    This book contains a selection of refereed and revised papers of the Intelligent Distributed Computing Track originally presented at the third International Symposium on Intelligent Informatics (ISI-2014), September 24-27, 2014, Delhi, India.  The papers selected for this Track cover several Distributed Computing and related topics including Peer-to-Peer Networks, Cloud Computing, Mobile Clouds, Wireless Sensor Networks, and their applications.

  7. Model Pembelajaran Berbasis Penstimulasian Multiple Intelligences Siswa

    Directory of Open Access Journals (Sweden)

    Edy Legowo

    2017-03-01

    Full Text Available Tulisan ini membahas mengenai penerapan teori multiple intelligences dalam pembelajaran di sekolah. Pembahasan diawali dengan menguraikan perkembangan konsep inteligensi dan multiple intelligences. Diikuti dengan menjelaskan dampak teori multiple intelligences dalam bidang pendidikan dan pembelajaran di sekolah. Bagian selanjutnya menguraikan tentang implementasi teori multiple intelligences dalam praktik pembelajaran di kelas yaitu bagaimana pemberian pengalaman belajar siswa yang difasilitasi guru dapat menstimulasi multiple intelligences siswa. Evaluasi hasil belajar siswa dari pandangan penerapan teori multiple intelligences seharusnya dilakukan menggunakan authentic assessment dan portofolio yang lebih memfasilitasi para siswa mengungkapkan atau mengaktualisasikan hasil belajarnya melalui berbagai cara sesuai dengan kekuatan jenis inteligensinya.

  8. ECONOMIC INTELLIGENCE - THEORETICAL AND PRACTICAL ASPECTS

    Directory of Open Access Journals (Sweden)

    VIRGIL - ION POPOVICI

    2014-12-01

    Full Text Available Economic Intelligence (EI may be a solution in knowledge management as involves collecting, evaluating, processing, analysis and dissemination of economic data within organizations. The ultimate goal of economic intelligence (EI is to take advantage of this opportunity to develop and improve methods for identifying relevant information sources, analysis of information collected and manipulation, to give the user all the necessary decisions. Scope of the Economic Intelligence focused on information available outside the organization, covering wide areas from technology to market or legal issues. Economic Intelligence (EI is closely related to other approaches to information management, and knowledge management and business intelligence, excelling in the use of software tools.

  9. Intelligibility of clear speech: effect of instruction.

    Science.gov (United States)

    Lam, Jennifer; Tjaden, Kris

    2013-10-01

    The authors investigated how clear speech instructions influence sentence intelligibility. Twelve speakers produced sentences in habitual, clear, hearing impaired, and overenunciate conditions. Stimuli were amplitude normalized and mixed with multitalker babble for orthographic transcription by 40 listeners. The main analysis investigated percentage-correct intelligibility scores as a function of the 4 conditions and speaker sex. Additional analyses included listener response variability, individual speaker trends, and an alternate intelligibility measure: proportion of content words correct. Relative to the habitual condition, the overenunciate condition was associated with the greatest intelligibility benefit, followed by the hearing impaired and clear conditions. Ten speakers followed this trend. The results indicated different patterns of clear speech benefit for male and female speakers. Greater listener variability was observed for speakers with inherently low habitual intelligibility compared to speakers with inherently high habitual intelligibility. Stable proportions of content words were observed across conditions. Clear speech instructions affected the magnitude of the intelligibility benefit. The instruction to overenunciate may be most effective in clear speech training programs. The findings may help explain the range of clear speech intelligibility benefit previously reported. Listener variability analyses suggested the importance of obtaining multiple listener judgments of intelligibility, especially for speakers with inherently low habitual intelligibility.

  10. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  11. Emotional Intelligence in medical practice

    Directory of Open Access Journals (Sweden)

    Abu Hasan Sarkar

    2016-08-01

    Full Text Available Emotional Intelligence is the ability to perceive, express, understand and regulate one’s inner emotions and the emotions of others. It is considered to be a ‘must have’ competence in the workplace. Several scientific studies have proven that the application of emotional intelligence is effective in improving the teaching-learning process and that it leads to organizational growth; however, only limited work has been carried out to assess its effectiveness in the practice of medicine, especially in India. Various scales have been developed to measure emotional intelligence but they are not universally applicable because emotional intelligence depends upon culture and personal background among other factors. In recent years in India, conflicts between patients and doctors have had serious, sometimes fatal, consequences for the physician. Behavior, when faced with a potential conflict-like situation, depends to a great extent on the emotional intelligence of the physician. Emotional intelligence of medical students and medical professionals can be honed through exposure to the medical humanities which are known to promote patient-centered care. Building better physician-patient relationships might help in averting doctor-patient conflict.

  12. Fire auto alarm system intelligent trend

    International Nuclear Information System (INIS)

    Du Chengbao

    1997-01-01

    The author gives the course and trend of the fire alarm system going to more computerized and more intelligent. It is described that only the system applied artificial intelligent and confusion control is the true intelligent fire alarm system. The author gives the detailed analysis on the signal treatment of artificial intelligent applied to analogue fire alarm system as well as the alarm system controlled by confusion technology and artificial nervous net

  13. Economic intelligence of the modern state

    OpenAIRE

    Levytskyi, Valentyn

    2001-01-01

    The goal of the thesis is to explore economic intelligence. The work includes the analysis of open sources. Tile approach to the issue of economic intelligence is based on the analysis of the state's economic security. The research presents the views of politicians, intelligence professionals, and scientists. It proposes possible objectives and missions of economic intelligence. Additionally, the research investigates the usefulness and reliability of open sources of economic analysis. The se...

  14. Intelligence and Personality as Predictors of Divergent Thinking: The Role of General, Fluid and Crystallised Intelligence

    Science.gov (United States)

    Batey, Mark; Chamorro-Premuzic, Tomas; Furnham, Adrian

    2009-01-01

    Two studies examined the relationships between measures of intelligence, personality and divergent thinking (DT) in student samples. Study one investigated the incremental validity of measures of IQ and fluid intelligence with the Big Five Personality Inventory with regards to DT. Significant relationships of DT to fluid intelligence, Extraversion…

  15. Molecular Signature in HCV-Positive Lymphomas

    Directory of Open Access Journals (Sweden)

    Valli De Re

    2012-01-01

    Full Text Available Hepatitis C virus (HCV is a positive, single-stranded RNA virus, which has been associated to different subtypes of B-cell non-Hodgkin lymphoma (B-NHL. Cumulative evidence suggests an HCV-related antigen driven process in the B-NHL development. The underlying molecular signature associated to HCV-related B-NHL has to date remained obscure. In this review, we discuss the recent developments in this field with a special mention to different sets of genes whose expression is associated with BCR coupled to Blys signaling which in turn was found to be linked to B-cell maturation stages and NF-κb transcription factor. Even if recent progress on HCV-B-NHL signature has been made, the precise relationship between HCV and lymphoma development and phenotype signature remain to be clarified.

  16. Affective Computing and Intelligent Interaction

    CERN Document Server

    2012-01-01

    2012 International Conference on Affective Computing and Intelligent Interaction (ICACII 2012) was the most comprehensive conference focused on the various aspects of advances in Affective Computing and Intelligent Interaction. The conference provided a rare opportunity to bring together worldwide academic researchers and practitioners for exchanging the latest developments and applications in this field such as Intelligent Computing, Affective Computing, Machine Learning, Business Intelligence and HCI.   This volume is a collection of 119 papers selected from 410 submissions from universities and industries all over the world, based on their quality and relevancy to the conference. All of the papers have been peer-reviewed by selected experts.  

  17. 32 CFR 842.6 - Signature on the claim form.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Signature on the claim form. 842.6 Section 842.6... ADMINISTRATIVE CLAIMS General Information § 842.6 Signature on the claim form. The claimant or authorized agent... authorized agent signing for a claimant shows, after the signature, the title or capacity and attaches...

  18. Artificial Intelligence in Civil Engineering

    OpenAIRE

    Lu, Pengzhen; Chen, Shengyong; Zheng, Yujun

    2012-01-01

    Artificial intelligence is a branch of computer science, involved in the research, design, and application of intelligent computer. Traditional methods for modeling and optimizing complex structure systems require huge amounts of computing resources, and artificial-intelligence-based solutions can often provide valuable alternatives for efficiently solving problems in the civil engineering. This paper summarizes recently developed methods and theories in the developing direction for applicati...

  19. Thermal signature measurements for ammonium nitrate/fuel mixtures by laser heating

    International Nuclear Information System (INIS)

    Nazarian, Ashot; Presser, Cary

    2016-01-01

    Highlights: • LDTR is a useful diagnostic for characterizing AN/fuel mixture thermochemical behavior. • Each AN/fuel mixture thermal signature was different. • AN/fuel mixture signature features were defined by the individual constituents. • Baseline signatures changed after an experiment. - Abstract: Measurements were carried out to obtain thermal signatures of several ammonium nitrate/fuel (ANF) mixtures, using a laser-heating technique referred to as the laser-driven thermal reactor (LDTR). The mixtures were ammonium nitrate (AN)/kerosene, AN/ethylene glycol, AN/paraffin wax, AN/petroleum jelly, AN/confectioner's sugar, AN/cellulose (tissue paper), nitromethane/cellulose, nitrobenzene/cellulose, AN/cellulose/nitromethane, AN/cellulose/nitrobenzene. These mixtures were also compared with AN/nitromethane and AN/diesel fuel oil, obtained from an earlier investigation. Thermograms for the mixtures, as well as individual constituents, were compared to better understand how sample thermal signature changes with mixture composition. This is the first step in development of a thermal-signature database, to be used along with other signature databases, to improve identification of energetic substances of unknown composition. The results indicated that each individual thermal signature was associated unambiguously with a particular mixture composition. The signature features of a particular mixture were shaped by the individual constituent signatures. It was also uncovered that the baseline signature was modified after an experiment due to coating of unreacted residue on the substrate surface and a change in the reactor sphere oxide layer. Thus, care was required to pre-oxidize the sphere prior to an experiment. A minimum sample mass (which was dependent on composition) was required to detect the signature characteristics. Increased laser power served to magnify signal strength while preserving the signature features. For the mixtures examined, the thermal

  20. Cubic Bezier Curve Approach for Automated Offline Signature Verification with Intrusion Identification

    Directory of Open Access Journals (Sweden)

    Arun Vijayaragavan

    2014-01-01

    Full Text Available Authentication is a process of identifying person’s rights over a system. Many authentication types are used in various systems, wherein biometrics authentication systems are of a special concern. Signature verification is a basic biometric authentication technique used widely. The signature matching algorithm uses image correlation and graph matching technique which provides false rejection or acceptance. We proposed a model to compare knowledge from signature. Intrusion in the signature repository system results in copy of the signature that leads to false acceptance. Our approach uses a Bezier curve algorithm to identify the curve points and uses the behaviors of the signature for verification. An analyzing mobile agent is used to identify the input signature parameters and compare them with reference signature repository. It identifies duplication of signature over intrusion and rejects it. Experiments are conducted on a database with thousands of signature images from various sources and the results are favorable.

  1. Intelligent systems

    CERN Document Server

    Irwin, J David

    2011-01-01

    Technology has now progressed to the point that intelligent systems are replacing humans in the decision making processes as well as aiding in the solution of very complex problems. In many cases intelligent systems are already outperforming human activities. Artificial neural networks are not only capable of learning how to classify patterns, such images or sequence of events, but they can also effectively model complex nonlinear systems. Their ability to classify sequences of events is probably more popular in industrial applications where there is an inherent need to model nonlinear system

  2. Intelligent Universe

    Energy Technology Data Exchange (ETDEWEB)

    Hoyle, F

    1983-01-01

    The subject is covered in chapters, entitled: chance and the universe (synthesis of proteins; the primordial soup); the gospel according to Darwin (discussion of Darwin theory of evolution); life did not originate on earth (fossils from space; life in space); the interstellar connection (living dust between the stars; bacteria in space falling to the earth; interplanetary dust); evolution by cosmic control (microorganisms; genetics); why aren't the others here (a cosmic origin of life); after the big bang (big bang and steady state); the information rich universe; what is intelligence up to; the intelligent universe.

  3. A User-Centric View of Intelligent Environments: User Expectations, User Experience and User Role in Building Intelligent Environments

    Directory of Open Access Journals (Sweden)

    Eija Kaasinen

    2012-12-01

    Full Text Available Our everyday environments are gradually becoming intelligent, facilitated both by technological development and user activities. Although large-scale intelligent environments are still rare in actual everyday use, they have been studied for quite a long time, and several user studies have been carried out. In this paper, we present a user-centric view of intelligent environments based on published research results and our own experiences from user studies with concepts and prototypes. We analyze user acceptance and users’ expectations that affect users’ willingness to start using intelligent environments and to continue using them. We discuss user experience of interacting with intelligent environments where physical and virtual elements are intertwined. Finally, we touch on the role of users in shaping their own intelligent environments instead of just using ready-made environments. People are not merely “using” the intelligent environments but they live in them, and they experience the environments via embedded services and new interaction tools as well as the physical and social environment. Intelligent environments should provide emotional as well as instrumental value to the people who live in them, and the environments should be trustworthy and controllable both by regular users and occasional visitors. Understanding user expectations and user experience in intelligent environments, and providing users with tools to influence the environments can help to shape the vision of intelligent environments into meaningful, acceptable and appealing service entities for all those who live and act in them.

  4. 27 CFR 70.52 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Signature presumed authentic. 70.52 Section 70.52 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE... Collection of Excise and Special (Occupational) Tax Collection-General Provisions § 70.52 Signature presumed...

  5. 13 CFR 134.209 - Requirement of signature.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Requirement of signature. 134.209 Section 134.209 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION RULES OF PROCEDURE GOVERNING... of signature. Every written submission to OHA, other than evidence, must be signed by the party...

  6. Electronic Signature (eSig)

    Data.gov (United States)

    Department of Veterans Affairs — Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable...

  7. Radar Signature Calculation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The calculation, analysis, and visualization of the spatially extended radar signatures of complex objects such as ships in a sea multipath environment and...

  8. Extraordinary intelligence and the care of infants

    Science.gov (United States)

    Piantadosi, Steven T.; Kidd, Celeste

    2016-01-01

    We present evidence that pressures for early childcare may have been one of the driving factors of human evolution. We show through an evolutionary model that runaway selection for high intelligence may occur when (i) altricial neonates require intelligent parents, (ii) intelligent parents must have large brains, and (iii) large brains necessitate having even more altricial offspring. We test a prediction of this account by showing across primate genera that the helplessness of infants is a particularly strong predictor of the adults’ intelligence. We discuss related implications, including this account’s ability to explain why human-level intelligence evolved specifically in mammals. This theory complements prior hypotheses that link human intelligence to social reasoning and reproductive pressures and explains how human intelligence may have become so distinctive compared with our closest evolutionary relatives. PMID:27217560

  9. Do Perceptions of Gifted Intelligence and Normal Intelligence Participants Differ about Social Science and Social Scientists?

    Science.gov (United States)

    Selvi, Sezgin; Demir, Selçuk Besir

    2017-01-01

    This qualitative study was conducted to compare the perceptions of students with gifted intelligence and students with those of normal intelligence about social science and social scientists. The data obtained from 23 gifted intelligent and 23 normal participants within the same age group was analysed using content analysis and results were…

  10. Reliability and validity of the new Tanaka B Intelligence Scale scores: a group intelligence test.

    Science.gov (United States)

    Uno, Yota; Mizukami, Hitomi; Ando, Masahiko; Yukihiro, Ryoji; Iwasaki, Yoko; Ozaki, Norio

    2014-01-01

    The present study evaluated the reliability and concurrent validity of the new Tanaka B Intelligence Scale, which is an intelligence test that can be administered on groups within a short period of time. The new Tanaka B Intelligence Scale and Wechsler Intelligence Scale for Children-Third Edition were administered to 81 subjects (mean age ± SD 15.2 ± 0.7 years) residing in a juvenile detention home; reliability was assessed using Cronbach's alpha coefficient, and concurrent validity was assessed using the one-way analysis of variance intraclass correlation coefficient. Moreover, receiver operating characteristic analysis for screening for individuals who have a deficit in intellectual function (an FIQIntelligence Scale IQ (BIQ) was 0.86, and the intraclass correlation coefficient with FIQ was 0.83. Receiver operating characteristic analysis demonstrated an area under the curve of 0.89 (95% CI: 0.85-0.96). In addition, the stratum-specific likelihood ratio for the BIQ≤65 stratum was 13.8 (95% CI: 3.9-48.9), and the stratum-specific likelihood ratio for the BIQ≥76 stratum was 0.1 (95% CI: 0.03-0.4). Thus, intellectual disability could be ruled out or determined. The present results demonstrated that the new Tanaka B Intelligence Scale score had high reliability and concurrent validity with the Wechsler Intelligence Scale for Children-Third Edition score. Moreover, the post-test probability for the BIQ could be calculated when screening for individuals who have a deficit in intellectual function. The new Tanaka B Intelligence Test is convenient and can be administered within a variety of settings. This enables evaluation of intellectual development even in settings where performing intelligence tests have previously been difficult.

  11. Multiple Intelligences in Action.

    Science.gov (United States)

    Campbell, Bruce

    1992-01-01

    Describes the investigation of the effects of a four-step model program used with third through fifth grade students to implement Gardener's concepts of seven human intelligences--linguistic, logical/mathematical, visual/spatial, musical, kinesthetic, intrapersonal, and interpersonal intelligence--into daily learning. (BB)

  12. Intelligence and treaty ratification

    International Nuclear Information System (INIS)

    Cahn, A.H.

    1990-01-01

    This paper reports that there are two sets of questions applicable to the ratification phase: what is the role of intelligence in the ratification process? What effect did intelligence have on that process. The author attempts to answer these and other questions

  13. Uncertainty in hydrological signatures for gauged and ungauged catchments

    Science.gov (United States)

    Westerberg, Ida K.; Wagener, Thorsten; Coxon, Gemma; McMillan, Hilary K.; Castellarin, Attilio; Montanari, Alberto; Freer, Jim

    2016-03-01

    Reliable information about hydrological behavior is needed for water-resource management and scientific investigations. Hydrological signatures quantify catchment behavior as index values, and can be predicted for ungauged catchments using a regionalization procedure. The prediction reliability is affected by data uncertainties for the gauged catchments used in prediction and by uncertainties in the regionalization procedure. We quantified signature uncertainty stemming from discharge data uncertainty for 43 UK catchments and propagated these uncertainties in signature regionalization, while accounting for regionalization uncertainty with a weighted-pooling-group approach. Discharge uncertainty was estimated using Monte Carlo sampling of multiple feasible rating curves. For each sampled rating curve, a discharge time series was calculated and used in deriving the gauged signature uncertainty distribution. We found that the gauged uncertainty varied with signature type, local measurement conditions and catchment behavior, with the highest uncertainties (median relative uncertainty ±30-40% across all catchments) for signatures measuring high- and low-flow magnitude and dynamics. Our regionalization method allowed assessing the role and relative magnitudes of the gauged and regionalized uncertainty sources in shaping the signature uncertainty distributions predicted for catchments treated as ungauged. We found that (1) if the gauged uncertainties were neglected there was a clear risk of overconditioning the regionalization inference, e.g., by attributing catchment differences resulting from gauged uncertainty to differences in catchment behavior, and (2) uncertainty in the regionalization results was lower for signatures measuring flow distribution (e.g., mean flow) than flow dynamics (e.g., autocorrelation), and for average flows (and then high flows) compared to low flows.

  14. Emotional intelligence is a second-stratum factor of intelligence: evidence from hierarchical and bifactor models.

    Science.gov (United States)

    MacCann, Carolyn; Joseph, Dana L; Newman, Daniel A; Roberts, Richard D

    2014-04-01

    This article examines the status of emotional intelligence (EI) within the structure of human cognitive abilities. To evaluate whether EI is a 2nd-stratum factor of intelligence, data were fit to a series of structural models involving 3 indicators each for fluid intelligence, crystallized intelligence, quantitative reasoning, visual processing, and broad retrieval ability, as well as 2 indicators each for emotion perception, emotion understanding, and emotion management. Unidimensional, multidimensional, hierarchical, and bifactor solutions were estimated in a sample of 688 college and community college students. Results suggest adequate fit for 2 models: (a) an oblique 8-factor model (with 5 traditional cognitive ability factors and 3 EI factors) and (b) a hierarchical solution (with cognitive g at the highest level and EI representing a 2nd-stratum factor that loads onto g at λ = .80). The acceptable relative fit of the hierarchical model confirms the notion that EI is a group factor of cognitive ability, marking the expression of intelligence in the emotion domain. The discussion proposes a possible expansion of Cattell-Horn-Carroll theory to include EI as a 2nd-stratum factor of similar standing to factors such as fluid intelligence and visual processing.

  15. The Role of Intelligence in Social Learning.

    Science.gov (United States)

    Vostroknutov, Alexander; Polonio, Luca; Coricelli, Giorgio

    2018-05-02

    Studies in cultural evolution have uncovered many types of social learning strategies that are adaptive in certain environments. The efficiency of these strategies also depends on the individual characteristics of both the observer and the demonstrator. We investigate the relationship between intelligence and the ways social and individual information is utilised to make decisions in an uncertain environment. We measure fluid intelligence and study experimentally how individuals learn from observing the choices of a demonstrator in a 2-armed bandit problem with changing probabilities of a reward. Participants observe a demonstrator with high or low fluid intelligence. In some treatments they are aware of the intelligence score of the demonstrator and in others they are not. Low fluid intelligence individuals imitate the demonstrator more when her fluid intelligence is known than when it is not. Conversely, individuals with high fluid intelligence adjust their use of social information, as the observed behaviour changes, independently of the knowledge of the intelligence of the demonstrator. We provide evidence that intelligence determines how social and individual information is integrated in order to make choices in a changing uncertain environment.

  16. ADAGE signature analysis: differential expression analysis with data-defined gene sets.

    Science.gov (United States)

    Tan, Jie; Huyck, Matthew; Hu, Dongbo; Zelaya, René A; Hogan, Deborah A; Greene, Casey S

    2017-11-22

    Gene set enrichment analysis and overrepresentation analyses are commonly used methods to determine the biological processes affected by a differential expression experiment. This approach requires biologically relevant gene sets, which are currently curated manually, limiting their availability and accuracy in many organisms without extensively curated resources. New feature learning approaches can now be paired with existing data collections to directly extract functional gene sets from big data. Here we introduce a method to identify perturbed processes. In contrast with methods that use curated gene sets, this approach uses signatures extracted from public expression data. We first extract expression signatures from public data using ADAGE, a neural network-based feature extraction approach. We next identify signatures that are differentially active under a given treatment. Our results demonstrate that these signatures represent biological processes that are perturbed by the experiment. Because these signatures are directly learned from data without supervision, they can identify uncurated or novel biological processes. We implemented ADAGE signature analysis for the bacterial pathogen Pseudomonas aeruginosa. For the convenience of different user groups, we implemented both an R package (ADAGEpath) and a web server ( http://adage.greenelab.com ) to run these analyses. Both are open-source to allow easy expansion to other organisms or signature generation methods. We applied ADAGE signature analysis to an example dataset in which wild-type and ∆anr mutant cells were grown as biofilms on the Cystic Fibrosis genotype bronchial epithelial cells. We mapped active signatures in the dataset to KEGG pathways and compared with pathways identified using GSEA. The two approaches generally return consistent results; however, ADAGE signature analysis also identified a signature that revealed the molecularly supported link between the MexT regulon and Anr. We designed

  17. Understanding US National Intelligence

    DEFF Research Database (Denmark)

    Leander, Anna

    2014-01-01

    In July 2010, the Washington Post (WP) published the results of a project on “Top Secret America” on which twenty investigative journalists had been working for two years. The project drew attention to the change and growth in National Intelligence following 9/11 (Washington Post 2010a......). The initial idea had been to work on intelligence generally, but given that this proved overwhelming, the team narrowed down to focus only on intelligence qualified as “top secret.” Even so, the growth in this intelligence activity is remarkable. This public is returning, or in this case expanding...... at an impressive speed confirming the general contention of this volume. Between 2001 and 2010 the budget had increased by 250 percent, reaching $75 billion (the GDP of the Czech Republic). Thirty-three building complexes for top secret work had been or were under construction in the Washington area; 1...

  18. Handbook of Intelligent Vehicles

    CERN Document Server

    2012-01-01

    The Handbook of Intelligent Vehicles provides a complete coverage of the fundamentals, new technologies, and sub-areas essential to the development of intelligent vehicles; it also includes advances made to date, challenges, and future trends. Significant strides in the field have been made to date; however, so far there has been no single book or volume which captures these advances in a comprehensive format, addressing all essential components and subspecialties of intelligent vehicles, as this book does. Since the intended users are engineering practitioners, as well as researchers and graduate students, the book chapters do not only cover fundamentals, methods, and algorithms but also include how software/hardware are implemented, and demonstrate the advances along with their present challenges. Research at both component and systems levels are required to advance the functionality of intelligent vehicles. This volume covers both of these aspects in addition to the fundamentals listed above.

  19. Education for All: Gardner's Multiple Intelligences Theory

    Directory of Open Access Journals (Sweden)

    Gisela Emst-Slavit

    2001-12-01

    Full Text Available In the last years the Theory of the Multiple Intelligences developed by Howard Gardner has had a tremendous impact in elementary and secondary classrooms in the United States. Gardner(1983 defines intelligence as the ability to solve a problem or fashion a product that is valued in one or more cultural settings. His definition expands our understanding of "intelligence" beyond the familiar linguistic and Logical-mathematical intelligences, to include the spatial, musical,bodily-kinesthetic, naturalist. interpersonal, and intrapersonal intelligences. This new wayof conceptualizing human intelligence has profound implications for educators whose task needs to include the identification and nourishment of the different talents brought by al students.

  20. Intelligent Systems For Aerospace Engineering: An Overview

    Science.gov (United States)

    KrishnaKumar, K.

    2003-01-01

    Intelligent systems are nature-inspired, mathematically sound, computationally intensive problem solving tools and methodologies that have become extremely important for advancing the current trends in information technology. Artificially intelligent systems currently utilize computers to emulate various faculties of human intelligence and biological metaphors. They use a combination of symbolic and sub-symbolic systems capable of evolving human cognitive skills and intelligence, not just systems capable of doing things humans do not do well. Intelligent systems are ideally suited for tasks such as search and optimization, pattern recognition and matching, planning, uncertainty management, control, and adaptation. In this paper, the intelligent system technologies and their application potential are highlighted via several examples.

  1. Identifying the Multiple Intelligences of Your Students

    Science.gov (United States)

    McClellan, Joyce A.; Conti, Gary J.

    2008-01-01

    One way of addressing individual differences among adult learners is to identify the Multiple Intelligences of the learner. Multiple Intelligences refers to the concept developed by Howard Gardner that challenges the traditional view of intelligence and explains the presence of nine different Multiple Intelligences. The purpose of this study was…

  2. Intelligent type sodium instrumentations for LMFR

    International Nuclear Information System (INIS)

    Daolong Chen

    1996-01-01

    The constructions and their performances of a lot of newly developed intelligent type sodium instrumentations that consist of the intelligent type sodium flowmeter, the intelligent type immersed sodium flowmeter, the intelligent type sodium manometer and the intelligent type sodium level gauge are described. The graduation characteristic equations for corresponding transducer using the medium temperature as the parameter are given. Because the operating temperature limit of measured medium (sodium) is wide, so the on-line compensation of the temperature effect of their graduation characteristics much be considered. The tests show that these intelligent type sodium instrumentations possess of good linearity. The accurate sodium process parameter (flowrate, pressure and level) measurement data can be obtained by means of their on-line compensation function of the temperature effect. Moreover, these intelligent type sodium instrumentations possess of the self-inspection, the electric shutoff protection, the setting of full-scale, the setting of alarm limits (two upper limits and two lower limits alarms), the thermocouple breaking alarm, each other isolative the 0-10V direct-current analogue output and CENTRONICS standard digital output, and the alarm relay contact output. These intelligent type sodium instrumentations are suitable particularly for the instrument, control and protective systems of LMFR by means of these excellent functions based on microprocessor. The basic error of the intelligent type sodium flowmeter, immersed sodium flowmeter, sodium manometer and sodium level gauge is respectively ±2%, ±2.3%, ±0.3% and ±1.9% of measuring range. (author). 4 refs, 9 figs

  3. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  4. Classification of Children Intelligence with Fuzzy Logic Method

    Science.gov (United States)

    Syahminan; ika Hidayati, Permata

    2018-04-01

    Intelligence of children s An Important Thing To Know The Parents Early on. Typing Can be done With a Child’s intelligence Grouping Dominant Characteristics Of each Type of Intelligence. To Make it easier for Parents in Determining The type of Children’s intelligence And How to Overcome them, for It Created A Classification System Intelligence Grouping Children By Using Fuzzy logic method For determination Of a Child’s degree of intelligence type. From the analysis We concluded that The presence of Intelligence Classification systems Pendulum Children With Fuzzy Logic Method Of determining The type of The Child’s intelligence Can be Done in a way That is easier And The results More accurate Conclusions Than Manual tests.

  5. 25 CFR 117.33 - Signature of illiterates.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Signature of illiterates. 117.33 Section 117.33 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES DEPOSIT AND EXPENDITURE OF... Signature of illiterates. An Indian who cannot write shall be required to endorse checks payable to his...

  6. 12 CFR 350.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Signature and attestation. 350.6 Section 350.6 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY FDIC-INSURED STATE NONMEMBER BANKS § 350.6 Signature and...

  7. Quantum dual signature scheme based on coherent states with entanglement swapping

    International Nuclear Information System (INIS)

    Liu Jia-Li; Shi Rong-Hua; Shi Jin-Jing; Lv Ge-Li; Guo Ying

    2016-01-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. (paper)

  8. Indirect Self-Destructiveness and Emotional Intelligence.

    Science.gov (United States)

    Tsirigotis, Konstantinos

    2016-06-01

    While emotional intelligence may have a favourable influence on the life and psychological and social functioning of the individual, indirect self-destructiveness exerts a rather negative influence. The aim of this study has been to explore possible relations between indirect self-destructiveness and emotional intelligence. A population of 260 individuals (130 females and 130 males) aged 20-30 (mean age of 24.5) was studied by using the Polish version of the chronic self-destructiveness scale and INTE, i.e., the Polish version of the assessing emotions scale. Indirect self-destructiveness has significant correlations with all variables of INTE (overall score, factor I, factor II), and these correlations are negative. The intensity of indirect self-destructiveness differentiates significantly the height of the emotional intelligence and vice versa: the height of the emotional intelligence differentiates significantly the intensity of indirect self-destructiveness. Indirect self-destructiveness has negative correlations with emotional intelligence as well as its components: the ability to recognize emotions and the ability to utilize emotions. The height of emotional intelligence differentiates the intensity of indirect self-destructiveness, and vice versa: the intensity of indirect self-destructiveness differentiates the height of emotional intelligence. It seems advisable to use emotional intelligence in the prophylactic and therapeutic work with persons with various types of disorders, especially with the syndrome of indirect self-destructiveness.

  9. Real-Time Capable Micro-Doppler Signature Decomposition of Walking Human Limbs

    OpenAIRE

    Abdulatif, Sherif; Aziz, Fady; Kleiner, Bernhard; Schneider, Urs

    2017-01-01

    Unique micro-Doppler signature ($\\boldsymbol{\\mu}$-D) of a human body motion can be analyzed as the superposition of different body parts $\\boldsymbol{\\mu}$-D signatures. Extraction of human limbs $\\boldsymbol{\\mu}$-D signatures in real-time can be used to detect, classify and track human motion especially for safety application. In this paper, two methods are combined to simulate $\\boldsymbol{\\mu}$-D signatures of a walking human. Furthermore, a novel limbs $\\mu$-D signature time independent...

  10. Intelligence as Trait—and State?

    Directory of Open Access Journals (Sweden)

    Robert J. Sternberg

    2014-02-01

    Full Text Available We tend to think of intelligence as trait-like. However, with increasing use of psychoactive drugs that enhance performance on psychometric tests of intelligence, investigators need to think of intelligence also as having state-like properties. Questions of the ethics of such drug use will need to be faced in the field of high-stakes psychometric testing as they now are being faced in professional athletics.

  11. Research on Signature Verification Method Based on Discrete Fréchet Distance

    Science.gov (United States)

    Fang, J. L.; Wu, W.

    2018-05-01

    This paper proposes a multi-feature signature template based on discrete Fréchet distance, which breaks through the limitation of traditional signature authentication using a single signature feature. It solves the online handwritten signature authentication signature global feature template extraction calculation workload, signature feature selection unreasonable problem. In this experiment, the false recognition rate (FAR) and false rejection rate (FRR) of the statistical signature are calculated and the average equal error rate (AEER) is calculated. The feasibility of the combined template scheme is verified by comparing the average equal error rate of the combination template and the original template.

  12. 17 CFR 201.153 - Filing of papers: Signature requirement and effect.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Filing of papers: Signature... COMMISSION RULES OF PRACTICE Rules of Practice General Rules § 201.153 Filing of papers: Signature... telephone number on every filing. (b) Effect of signature. (1) The signature of a counsel or party shall...

  13. Nap sleep spindle correlates of intelligence.

    Science.gov (United States)

    Ujma, Péter P; Bódizs, Róbert; Gombos, Ferenc; Stintzing, Johannes; Konrad, Boris N; Genzel, Lisa; Steiger, Axel; Dresler, Martin

    2015-11-26

    Sleep spindles are thalamocortical oscillations in non-rapid eye movement (NREM) sleep, that play an important role in sleep-related neuroplasticity and offline information processing. Several studies with full-night sleep recordings have reported a positive association between sleep spindles and fluid intelligence scores, however more recently it has been shown that only few sleep spindle measures correlate with intelligence in females, and none in males. Sleep spindle regulation underlies a circadian rhythm, however the association between spindles and intelligence has not been investigated in daytime nap sleep so far. In a sample of 86 healthy male human subjects, we investigated the correlation between fluid intelligence and sleep spindle parameters in an afternoon nap of 100 minutes. Mean sleep spindle length, amplitude and density were computed for each subject and for each derivation for both slow and fast spindles. A positive association was found between intelligence and slow spindle duration, but not any other sleep spindle parameter. As a positive correlation between intelligence and slow sleep spindle duration in full-night polysomnography has only been reported in females but not males, our results suggest that the association between intelligence and sleep spindles is more complex than previously assumed.

  14. Intelligence and Nuclear Proliferation: Lessons Learned

    International Nuclear Information System (INIS)

    Hansen, Keith A.

    2011-09-01

    Intelligence agencies play a fundamental role in the prevention of nuclear proliferation, as they help to understand other countries' intentions and assess their technical capabilities and the nature of their nuclear activities. The challenges in this area remain, however, formidable. Past experiences and the discoveries of Iraq's WMD programs, of North Korean nuclear weapon program, and of Iranian activities, have put into question the ability of intelligence to monitor small, clandestine proliferation activities from either states or non-state entities. This Proliferation Paper analyzes the complex challenges intelligence faces and the various roles it plays in supporting national and international nuclear non-proliferation efforts, and reviews its track record. In an effort to shed light on the role and contribution of intelligence in national and international efforts to halt, if not prevent, further nuclear weapon proliferation, this paper first analyzes the challenges intelligence faces in monitoring small, clandestine proliferation activities and the role it plays in supporting non-proliferation efforts. It then reviews the intelligence track record in monitoring proliferation including the lessons learned from Iraq. Finally, it addresses whether it is possible for intelligence to accurately monitor future clandestine proliferation efforts. (author)

  15. Students’ thinking level based on intrapersonal intelligence

    Science.gov (United States)

    Sholikhati, Rahadian; Mardiyana; Retno Sari Saputro, Dewi

    2017-12-01

    This research aims to determine the students’ thinking level based on bloom taxonomy guidance and reviewed from students' Intrapersonal Intelligence. Taxonomy bloom is a taxonomy that classifies the students' thinking level into six, ie the remembering, understanding, applying, analyzing, creating, and evaluating levels. Students' Intrapersonal Intelligence is the intelligence associated with awareness and knowledge of oneself. The type of this research is descriptive research with qualitative approach. The research subject were taken by one student in each Intrapersonal Intelligence category (high, moderate, and low) which then given the problem solving test and the result was triangulated by interview. From this research, it is found that high Intrapersonal Intelligence students can achieve analyzing thinking level, subject with moderate Intrapersonal Intelligence being able to reach the level of applying thinking, and subject with low Intrapersonal Intelligence able to reach understanding level.

  16. Intelligence, creativity, and cognitive control: The common and differential involvement of executive functions in intelligence and creativity

    Science.gov (United States)

    Benedek, Mathias; Jauk, Emanuel; Sommer, Markus; Arendasy, Martin; Neubauer, Aljoscha C.

    2014-01-01

    Intelligence and creativity are known to be correlated constructs suggesting that they share a common cognitive basis. The present study assessed three specific executive abilities – updating, shifting, and inhibition – and examined their common and differential relations to fluid intelligence and creativity (i.e., divergent thinking ability) within a latent variable model approach. Additionally, it was tested whether the correlation of fluid intelligence and creativity can be explained by a common executive involvement. As expected, fluid intelligence was strongly predicted by updating, but not by shifting or inhibition. Creativity was predicted by updating and inhibition, but not by shifting. Moreover, updating (and the personality factor openness) was found to explain a relevant part of the shared variance between intelligence and creativity. The findings provide direct support for the executive involvement in creative thought and shed further light on the functional relationship between intelligence and creativity. PMID:25278640

  17. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  18. Emotional intelligence as an aspect of general intelligence: what would David Wechsler say?

    Science.gov (United States)

    Kaufman, A S; Kaufman, J C

    2001-09-01

    R. D. Roberts, M. Zeidner, and G. Matthews (2001) have carefully examined the controversial issue of whether emotional intelligence (EI) should be classified as an intelligence and whether EI's constructs meet the same psychometric standards as general intelligence's constructs. This article casts their efforts into the framework of both historical and modern IQ-testing theory and research. It details David Wechsler's attempts to integrate EI into his tests and how his conception of a good clinician would be that of an emotionally intelligent clinician. Current theories and research on IQ also have a role in EI beyond what Roberts et al. described, including J. L. Horn's (1989) expanded model and A. R. Luria's (1966) neuropsychological research, and better criteria than the Armed Services Vocational Aptitude Battery should be used in future EI studies. The authors look forward to more research being conducted on EI, particularly in future performance-based assessments.

  19. Are Prospective English Teachers Linguistically Intelligent?

    Science.gov (United States)

    Tezel, Kadir Vefa

    2017-01-01

    Language is normally associated with linguistic capabilities of individuals. In the theory of multiple intelligences, language is considered to be related primarily to linguistic intelligence. Using the theory of Multiple Intelligences as its starting point, this descriptive survey study investigated to what extent prospective English teachers'…

  20. 32 CFR 637.17 - Police Intelligence.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Police Intelligence. 637.17 Section 637.17... CRIMINAL INVESTIGATIONS MILITARY POLICE INVESTIGATION Investigations § 637.17 Police Intelligence. (a) The purpose of gathering police intelligence is to identify individuals or groups of individuals in an effort...

  1. ANALYSIS OF DIGITAL SIGNATURE RULE IN THE ELECTRONIC COMMERCE LAW OF INDONESIA

    Directory of Open Access Journals (Sweden)

    Irna Nurhayati

    2015-02-01

    Full Text Available The Indonesian legislature has enacted the Information and Electronic Transaction Bill (the Bill in 2003, in which digital signature as a technology specific electronic (e commerce has been promoted. The promotion of digital signature is still problematic, since there is an uncertainty whether Indonesia can develop well a required viable technology of digital signature. Moreover, there is a gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will discuss the reason of the Indonesian legislature promotes digital signature. It will then analyse the gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will finally argue whether the promotion of digital signature of the Bill is useful for the growth of e-commerce in Indonesia.

  2. 12 CFR 18.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Signature and attestation. 18.6 Section 18.6 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY NATIONAL BANKS § 18.6 Signature and attestation. A duly authorized officer of the...

  3. Does Social Work Have a Signature Pedagogy?

    Science.gov (United States)

    Earls Larrison, Tara; Korr, Wynne S.

    2013-01-01

    This article contributes to discourse on signature pedagogy by reconceptualizing how our pedagogies are understood and defined for social work education. We critique the view that field education is social work's signature pedagogy and consider what pedagogies are distinct about the teaching and learning of social work. Using Shulman's…

  4. Intelligent neuroprocessors for in-situ launch vehicle propulsion systems health management

    Science.gov (United States)

    Gulati, S.; Tawel, R.; Thakoor, A. P.

    1993-01-01

    Efficacy of existing on-board propulsion systems health management systems (HMS) are severely impacted by computational limitations (e.g., low sampling rates); paradigmatic limitations (e.g., low-fidelity logic/parameter redlining only, false alarms due to noisy/corrupted sensor signatures, preprogrammed diagnostics only); and telemetry bandwidth limitations on space/ground interactions. Ultra-compact/light, adaptive neural networks with massively parallel, asynchronous, fast reconfigurable and fault-tolerant information processing properties have already demonstrated significant potential for inflight diagnostic analyses and resource allocation with reduced ground dependence. In particular, they can automatically exploit correlation effects across multiple sensor streams (plume analyzer, flow meters, vibration detectors, etc.) so as to detect anomaly signatures that cannot be determined from the exploitation of single sensor. Furthermore, neural networks have already demonstrated the potential for impacting real-time fault recovery in vehicle subsystems by adaptively regulating combustion mixture/power subsystems and optimizing resource utilization under degraded conditions. A class of high-performance neuroprocessors, developed at JPL, that have demonstrated potential for next-generation HMS for a family of space transportation vehicles envisioned for the next few decades, including HLLV, NLS, and space shuttle is presented. Of fundamental interest are intelligent neuroprocessors for real-time plume analysis, optimizing combustion mixture-ratio, and feedback to hydraulic, pneumatic control systems. This class includes concurrently asynchronous reprogrammable, nonvolatile, analog neural processors with high speed, high bandwidth electronic/optical I/O interfaced, with special emphasis on NASA's unique requirements in terms of performance, reliability, ultra-high density ultra-compactness, ultra-light weight devices, radiation hardened devices, power stringency

  5. Genes, evolution and intelligence.

    Science.gov (United States)

    Bouchard, Thomas J

    2014-11-01

    I argue that the g factor meets the fundamental criteria of a scientific construct more fully than any other conception of intelligence. I briefly discuss the evidence regarding the relationship of brain size to intelligence. A review of a large body of evidence demonstrates that there is a g factor in a wide range of species and that, in the species studied, it relates to brain size and is heritable. These findings suggest that many species have evolved a general-purpose mechanism (a general biological intelligence) for dealing with the environments in which they evolved. In spite of numerous studies with considerable statistical power, we know of very few genes that influence g and the effects are very small. Nevertheless, g appears to be highly polygenic. Given the complexity of the human brain, it is not surprising that that one of its primary faculties-intelligence-is best explained by the near infinitesimal model of quantitative genetics.

  6. A measurement model of multiple intelligence profiles of management graduates

    Science.gov (United States)

    Krishnan, Heamalatha; Awang, Siti Rahmah

    2017-05-01

    In this study, developing a fit measurement model and identifying the best fitting items to represent Howard Gardner's nine intelligences namely, musical intelligence, bodily-kinaesthetic intelligence, mathematical/logical intelligence, visual/spatial intelligence, verbal/linguistic intelligence, interpersonal intelligence, intrapersonal intelligence, naturalist intelligence and spiritual intelligence are the main interest in order to enhance the opportunities of the management graduates for employability. In order to develop a fit measurement model, Structural Equation Modeling (SEM) was applied. A psychometric test which is the Ability Test in Employment (ATIEm) was used as the instrument to measure the existence of nine types of intelligence of 137 University Teknikal Malaysia Melaka (UTeM) management graduates for job placement purposes. The initial measurement model contains nine unobserved variables and each unobserved variable is measured by ten observed variables. Finally, the modified measurement model deemed to improve the Normed chi-square (NC) = 1.331; Incremental Fit Index (IFI) = 0.940 and Root Mean Square of Approximation (RMSEA) = 0.049 was developed. The findings showed that the UTeM management graduates possessed all nine intelligences either high or low. Musical intelligence, mathematical/logical intelligence, naturalist intelligence and spiritual intelligence contributed highest loadings on certain items. However, most of the intelligences such as bodily kinaesthetic intelligence, visual/spatial intelligence, verbal/linguistic intelligence interpersonal intelligence and intrapersonal intelligence possessed by UTeM management graduates are just at the borderline.

  7. Improvement of a Quantum Proxy Blind Signature Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  8. Model Pembelajaran Berbasis Penstimulasian Multiple Intelligences Siswa

    OpenAIRE

    Edy Legowo

    2017-01-01

    Tulisan ini membahas mengenai penerapan teori multiple intelligences dalam pembelajaran di sekolah. Pembahasan diawali dengan menguraikan perkembangan konsep inteligensi dan multiple intelligences. Diikuti dengan menjelaskan dampak teori multiple intelligences dalam bidang pendidikan dan pembelajaran di sekolah. Bagian selanjutnya menguraikan tentang implementasi teori multiple intelligences dalam praktik pembelajaran di kelas yaitu bagaimana pemberian pengalaman belajar siswa yang difasilita...

  9. Artificial Intelligence and Its Importance in Education.

    Science.gov (United States)

    Tilmann, Martha J.

    Artificial intelligence, or the study of ideas that enable computers to be intelligent, is discussed in terms of what it is, what it has done, what it can do, and how it may affect the teaching of tomorrow. An extensive overview of artificial intelligence examines its goals and applications and types of artificial intelligence including (1) expert…

  10. The evolution of intelligence in mammalian carnivores.

    Science.gov (United States)

    Holekamp, Kay E; Benson-Amram, Sarah

    2017-06-06

    Although intelligence should theoretically evolve to help animals solve specific types of problems posed by the environment, it is unclear which environmental challenges favour enhanced cognition, or how general intelligence evolves along with domain-specific cognitive abilities. The social intelligence hypothesis posits that big brains and great intelligence have evolved to cope with the labile behaviour of group mates. We have exploited the remarkable convergence in social complexity between cercopithecine primates and spotted hyaenas to test predictions of the social intelligence hypothesis in regard to both cognition and brain size. Behavioural data indicate that there has been considerable convergence between primates and hyaenas with respect to their social cognitive abilities. Moreover, compared with other hyaena species, spotted hyaenas have larger brains and expanded frontal cortex, as predicted by the social intelligence hypothesis. However, broader comparative study suggests that domain-general intelligence in carnivores probably did not evolve in response to selection pressures imposed specifically in the social domain. The cognitive buffer hypothesis, which suggests that general intelligence evolves to help animals cope with novel or changing environments, appears to offer a more robust explanation for general intelligence in carnivores than any hypothesis invoking selection pressures imposed strictly by sociality or foraging demands.

  11. Emotional intelligence of mental health nurses

    NARCIS (Netherlands)

    Jan Derksen; prof Berno van Meijel; Loes van Dusseldorp

    2011-01-01

    Aims. The aim of this study is to gain insight into the level of emotional intelligence of mental health nurses in the Netherlands. Background. The focus in research on emotional intelligence to date has been on a variety of professionals. However, little is known about emotional intelligence in

  12. 2015 Chinese Intelligent Automation Conference

    CERN Document Server

    Li, Hongbo

    2015-01-01

    Proceedings of the 2015 Chinese Intelligent Automation Conference presents selected research papers from the CIAC’15, held in Fuzhou, China. The topics include adaptive control, fuzzy control, neural network based control, knowledge based control, hybrid intelligent control, learning control, evolutionary mechanism based control, multi-sensor integration, failure diagnosis, reconfigurable control, etc. Engineers and researchers from academia, industry and the government can gain valuable insights into interdisciplinary solutions in the field of intelligent automation.

  13. Artificial intelligence in robot control systems

    Science.gov (United States)

    Korikov, A.

    2018-05-01

    This paper analyzes modern concepts of artificial intelligence and known definitions of the term "level of intelligence". In robotics artificial intelligence system is defined as a system that works intelligently and optimally. The author proposes to use optimization methods for the design of intelligent robot control systems. The article provides the formalization of problems of robotic control system design, as a class of extremum problems with constraints. Solving these problems is rather complicated due to the high dimensionality, polymodality and a priori uncertainty. Decomposition of the extremum problems according to the method, suggested by the author, allows reducing them into a sequence of simpler problems, that can be successfully solved by modern computing technology. Several possible approaches to solving such problems are considered in the article.

  14. The role of soft computing in intelligent machines.

    Science.gov (United States)

    de Silva, Clarence W

    2003-08-15

    An intelligent machine relies on computational intelligence in generating its intelligent behaviour. This requires a knowledge system in which representation and processing of knowledge are central functions. Approximation is a 'soft' concept, and the capability to approximate for the purposes of comparison, pattern recognition, reasoning, and decision making is a manifestation of intelligence. This paper examines the use of soft computing in intelligent machines. Soft computing is an important branch of computational intelligence, where fuzzy logic, probability theory, neural networks, and genetic algorithms are synergistically used to mimic the reasoning and decision making of a human. This paper explores several important characteristics and capabilities of machines that exhibit intelligent behaviour. Approaches that are useful in the development of an intelligent machine are introduced. The paper presents a general structure for an intelligent machine, giving particular emphasis to its primary components, such as sensors, actuators, controllers, and the communication backbone, and their interaction. The role of soft computing within the overall system is discussed. Common techniques and approaches that will be useful in the development of an intelligent machine are introduced, and the main steps in the development of an intelligent machine for practical use are given. An industrial machine, which employs the concepts of soft computing in its operation, is presented, and one aspect of intelligent tuning, which is incorporated into the machine, is illustrated.

  15. The Pedagogic Signature of the Teaching Profession

    Science.gov (United States)

    Kiel, Ewald; Lerche, Thomas; Kollmannsberger, Markus; Oubaid, Viktor; Weiss, Sabine

    2016-01-01

    Lee S. Shulman deplores that the field of education as a profession does not have a pedagogic signature, which he characterizes as a synthesis of cognitive, practical and moral apprenticeship. In this context, the following study has three goals: 1) In the first theoretical part, the basic problems of constructing a pedagogic signature are…

  16. Efficient Fair Exchange from Identity-Based Signature

    Science.gov (United States)

    Yum, Dae Hyun; Lee, Pil Joong

    A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services without allowing either party to gain advantages by quitting prematurely or otherwise misbehaving. To this end, modern cryptographic solutions use a semi-trusted arbitrator who involves only in cases where one party attempts to cheat or simply crashes. We call such a fair exchange scheme optimistic. When no registration is required between the signer and the arbitrator, we say that the fair exchange scheme is setup free. To date, the setup-free optimist fair exchange scheme under the standard RSA assumption was only possible from the generic construction of [12], which uses ring signatures. In this paper, we introduce a new setup-free optimistic fair exchange scheme under the standard RSA assumption. Our scheme uses the GQ identity-based signature and is more efficient than [12]. The construction can also be generalized by using various identity-based signature schemes. Our main technique is to allow each user to choose his (or her) own “random” public key in the identitybased signature scheme.

  17. Basic study on intelligent materialization of glass; Glass no intelligent ko zairyoka ni kansuru kenkyu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-10-31

    This is the report No. 98 issued by the Inorganic Material Research Institute. An intelligent material is a substance and/or material which responds intelligently to environmental conditions and exhibits functions. One of the features of amorphous materials including amorphous glass is a large freedom in chemical composition. These materials maintain order in short distance, but have as a whole the turbulent and specific atom orientation. Therefore, high tolerability in selecting the composition, and diverse synthesizing methods are available. A wide range of utilization may be conceived, such as introduction of the state of electrons having different valences in a structure, and the diverse chemical combinations. Patterns of existence of polyhedrons having different orientations, and how they are connected correlate closely with an external environment. Intelligent materials have high freedom against change in the external environment and are suitable to exhibit intelligent functions. Setting heat and light as the external conditions, attempts have been made on search and creation of intelligent materials based on state change induced by interactions between the two factors. Fundamental studies have been made on synthesis of different environment responding glasses and films, and on factors and phenomena for exhibition of the intelligence. 62 refs., 91 figs., 8 tabs.

  18. Analysis of Non-contact Acousto Thermal Signature Data (Postprint)

    Science.gov (United States)

    2016-02-01

    AFRL-RX-WP-JA-2016-0321 ANALYSIS OF NON-CONTACT ACOUSTO-THERMAL SIGNATURE DATA (POSTPRINT) Amanda K. Criner AFRL/RX...October 2014 – 16 September 2015 4. TITLE AND SUBTITLE ANALYSIS OF NON-CONTACT ACOUSTO-THERMAL SIGNATURE DATA (POSTPRINT) 5a. CONTRACT NUMBER...words) The non-contact acousto-thermal signature (NCATS) is a nondestructive evaluation technique with potential to detect fatigue in materials such as

  19. Automated defect spatial signature analysis for semiconductor manufacturing process

    Science.gov (United States)

    Tobin, Jr., Kenneth W.; Gleason, Shaun S.; Karnowski, Thomas P.; Sari-Sarraf, Hamed

    1999-01-01

    An apparatus and method for performing automated defect spatial signature alysis on a data set representing defect coordinates and wafer processing information includes categorizing data from the data set into a plurality of high level categories, classifying the categorized data contained in each high level category into user-labeled signature events, and correlating the categorized, classified signature events to a present or incipient anomalous process condition.

  20. Intelligent design som videnskab?

    DEFF Research Database (Denmark)

    Klausen, Søren Harnow

    2007-01-01

    Diskuterer hvorvidt intelligent design kan betegnes som videnskab; argumenterer for at dette grundet fraværet af klare demarkationskriterier næppe kan afvises.......Diskuterer hvorvidt intelligent design kan betegnes som videnskab; argumenterer for at dette grundet fraværet af klare demarkationskriterier næppe kan afvises....

  1. The Reproduction of Intelligence

    Science.gov (United States)

    Meisenberg, Gerhard

    2010-01-01

    Although a negative relationship between fertility and education has been described consistently in most countries of the world, less is known about the relationship between intelligence and reproductive outcomes. Also the paths through which intelligence influences reproductive outcomes are uncertain. The present study uses the NLSY79 to analyze…

  2. Pro SharePoint 2010 Business Intelligence Solutions

    CERN Document Server

    Malik, Sahil; Wright, Steve

    2010-01-01

    What differentiates good organizations from bad? The good ones are those that take advantage of the data they already have and use the feedback that business intelligence gives them to improve their processes. SharePoint is now the delivery platform of choice for Microsoft's business intelligence products, and in this book we reveal how to get the most from developing business intelligence solutions on SharePoint 2010. To understand the various business intelligence offerings in SharePoint 2010, you need to understand the core SQL Server business intelligence concepts, and the first part of th

  3. Schooling Built on the Multiple Intelligences

    Science.gov (United States)

    Kunkel, Christine D.

    2009-01-01

    This article features a school built on multiple intelligences. As the first multiple intelligences school in the world, the Key Learning Community shapes its students' days to include significant time in the musical, spatial and bodily-kinesthetic intelligences, as well as the more traditional areas of logical-mathematical and linguistics. In…

  4. Intelligent control of dynamic LED lighting; Intelligent styring af dynamisk LED belysning. Slutrapport

    Energy Technology Data Exchange (ETDEWEB)

    Thorseth, A.; Corell, D.; Hansen, Soeren S.; Dam-Hansen, C.; Petersen, Paul Michael

    2013-01-15

    The project has resulted in a prototype of a new intelligent lighting control system. The control system enables the end user to control his or her own local lighting environment (lighting zone) according to individual preferences and needs. The report provides a description of how the developed intelligent lighting system is composed and functions. The system is designed as a work lamp that enables dynamic change of the light color scheme according to a number of light control algorithms. It is specifically designed in relation to user tests of the intelligent lighting system, which is carried out in the final part of the project. An intelligent and advanced control of LED lighting was developed, which enables optimization of the user's light conditions in a given situation. Based on a number of known parameters, the system can control lighting so that at any time optimal light conditions are created, using a minimum of electric power. (LN)

  5. 37 CFR 1.4 - Nature of correspondence and signature requirements.

    Science.gov (United States)

    2010-07-01

    ... signature requirements. 1.4 Section 1.4 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND... General Information and Correspondence § 1.4 Nature of correspondence and signature requirements. (a...) Handwritten signature. Each piece of correspondence, except as provided in paragraphs (d)(2), (d)(3), (e) and...

  6. Emotional Intelligence and Nurse Recruitment: Rasch and confirmatory factor analysis of the trait emotional intelligence questionnaire short form.

    Science.gov (United States)

    Snowden, Austyn; Watson, Roger; Stenhouse, Rosie; Hale, Claire

    2015-12-01

    To examine the construct validity of the Trait Emotional Intelligence Questionnaire Short form. Emotional intelligence involves the identification and regulation of our own emotions and the emotions of others. It is therefore a potentially useful construct in the investigation of recruitment and retention in nursing and many questionnaires have been constructed to measure it. Secondary analysis of existing dataset of responses to Trait Emotional Intelligence Questionnaire Short form using concurrent application of Rasch analysis and confirmatory factor analysis. First year undergraduate nursing and computing students completed Trait Emotional Intelligence Questionnaire-Short Form in September 2013. Responses were analysed by synthesising results of Rasch analysis and confirmatory factor analysis. Participants (N = 938) completed Trait Emotional Intelligence Questionnaire Short form. Rasch analysis showed the majority of the Trait Emotional Intelligence Questionnaire-Short Form items made a unique contribution to the latent trait of emotional intelligence. Five items did not fit the model and differential item functioning (gender) accounted for this misfit. Confirmatory factor analysis revealed a four-factor structure consisting of: self-confidence, empathy, uncertainty and social connection. All five misfitting items from the Rasch analysis belonged to the 'social connection' factor. The concurrent use of Rasch and factor analysis allowed for novel interpretation of Trait Emotional Intelligence Questionnaire Short form. Much of the response variation in Trait Emotional Intelligence Questionnaire Short form can be accounted for by the social connection factor. Implications for practice are discussed. © 2015 John Wiley & Sons Ltd.

  7. Defense Intelligence: Additional Steps Could Better Integrate Intelligence Input into DODs Acquisition of Major Weapon Systems

    Science.gov (United States)

    2016-11-01

    into its acquisitions; and (3) efforts to develop tools to integrate intelligence into its acquisitions. GAO compared certification and training to...conduct their business , and that the centers currently were not prioritizing, verifying, or balancing the work related to producing intelligence mission...Force, and we observed briefings from the task force to the Acquisition Intelligence Requirements Executive Steering Group. We also compared the

  8. Searches with long-lived or unusual signatures

    CERN Document Server

    Haug, S; The ATLAS collaboration

    2013-01-01

    We present recent ATLAS and CMS results from searches with long-lived and unusual signatures. They are based on analysis of LHC proton-proton collisions at center of mass energies at 7 and 8 TeV. Long-lived and heavy particles may cause peculiar signatures in the detectors, but are in several Standard Model extensions well motivated.

  9. The handbook of artificial intelligence

    CERN Document Server

    Barr, Avron

    1982-01-01

    The Handbook of Artificial Intelligence, Volume II focuses on the improvements in artificial intelligence (AI) and its increasing applications, including programming languages, intelligent CAI systems, and the employment of AI in medicine, science, and education. The book first elaborates on programming languages for AI research and applications-oriented AI research. Discussions cover scientific applications, teiresias, applications in chemistry, dependencies and assumptions, AI programming-language features, and LISP. The manuscript then examines applications-oriented AI research in medicine

  10. The Professionalization of Intelligence Cooperation

    DEFF Research Database (Denmark)

    Svendsen, Adam David Morgan

    "Providing an in-depth insight into the subject of intelligence cooperation (officially known as liason), this book explores the complexities of this process. Towards facilitating a general understanding of the professionalization of intelligence cooperation, Svendsen's analysis includes risk...... management and encourages the realisation of greater resilience. Svendsen discusses the controversial, mixed and uneven characterisations of the process of the professionalization of intelligence cooperation and argues for a degree of 'fashioning method out of mayhem' through greater operational...

  11. Multivariate Associations of Fluid Intelligence and NAA.

    Science.gov (United States)

    Nikolaidis, Aki; Baniqued, Pauline L; Kranz, Michael B; Scavuzzo, Claire J; Barbey, Aron K; Kramer, Arthur F; Larsen, Ryan J

    2017-04-01

    Understanding the neural and metabolic correlates of fluid intelligence not only aids scientists in characterizing cognitive processes involved in intelligence, but it also offers insight into intervention methods to improve fluid intelligence. Here we use magnetic resonance spectroscopic imaging (MRSI) to measure N-acetyl aspartate (NAA), a biochemical marker of neural energy production and efficiency. We use principal components analysis (PCA) to examine how the distribution of NAA in the frontal and parietal lobes relates to fluid intelligence. We find that a left lateralized frontal-parietal component predicts fluid intelligence, and it does so independently of brain size, another significant predictor of fluid intelligence. These results suggest that the left motor regions play a key role in the visualization and planning necessary for spatial cognition and reasoning, and we discuss these findings in the context of the Parieto-Frontal Integration Theory of intelligence. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  12. Intelligence and Physical Attractiveness

    Science.gov (United States)

    Kanazawa, Satoshi

    2011-01-01

    This brief research note aims to estimate the magnitude of the association between general intelligence and physical attractiveness with large nationally representative samples from two nations. In the United Kingdom, attractive children are more intelligent by 12.4 IQ points (r=0.381), whereas in the United States, the correlation between…

  13. Next generation Emotional Intelligence

    Science.gov (United States)

    J. Saveland

    2012-01-01

    Emotional Intelligence has been a hot topic in leadership training since Dan Goleman published his book on the subject in 1995. Emotional intelligence competencies are typically focused on recognition and regulation of emotions in one's self and social situations, yielding four categories: self-awareness, self-management, social awareness and relationship...

  14. Studies in Intelligence. Volume 53, Number 2 (Summer Supplement 2009). Intelligence in Contemporary Media: Views of Intelligence Officers

    Science.gov (United States)

    2009-07-01

    success of the quintessential espionage genre with his teen spy thriller Storm- breaker. Like any good thriller , the book begins with a hook: “When the...Valerie P. Rogue’s March 19 James M. Burridge INTELLIGENCE IN BOOK AND FILM The Hunt for Red October: The Techno-espionage Prototype? 23 Bill Hadley The...Kite Runner 27 Elizabeth Darcy INTELLIGENCE IN FILM AND TELEVISION One Day in September and Munich: Enduring Questions, Indelible Images 31 Dr. Daniel

  15. A Methodology for Calculating Radiation Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Klasky, Marc Louis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wilcox, Trevor [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bathke, Charles G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); James, Michael R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-01

    A rigorous formalism is presented for calculating radiation signatures from both Special Nuclear Material (SNM) as well as radiological sources. The use of MCNP6 in conjunction with CINDER/ORIGEN is described to allow for the determination of both neutron and photon leakages from objects of interest. In addition, a description of the use of MCNP6 to properly model the background neutron and photon sources is also presented. Examinations of the physics issues encountered in the modeling are investigated so as to allow for guidance in the user discerning the relevant physics to incorporate into general radiation signature calculations. Furthermore, examples are provided to assist in delineating the pertinent physics that must be accounted for. Finally, examples of detector modeling utilizing MCNP are provided along with a discussion on the generation of Receiver Operating Curves, which are the suggested means by which to determine detectability radiation signatures emanating from objects.

  16. Selection signatures in worldwide sheep populations.

    Science.gov (United States)

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; San Cristobal, Magali; Boitard, Simon

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep populations, (ii) make use of linkage disequilibrium information and (iii) focus specifically on either recent or older selection signatures. We show that this allows pinpointing several new selection signatures in the sheep genome and distinguishing those related to modern breeding objectives and to earlier post-domestication constraints. The newly identified regions, together with the ones previously identified, reveal the extensive genome response to selection on morphology, color and adaptation to new environments.

  17. 2nd International Conference on Intelligent Computing, Communication & Devices

    CERN Document Server

    Popentiu-Vladicescu, Florin

    2017-01-01

    The book presents high quality papers presented at 2nd International Conference on Intelligent Computing, Communication & Devices (ICCD 2016) organized by Interscience Institute of Management and Technology (IIMT), Bhubaneswar, Odisha, India, during 13 and 14 August, 2016. The book covers all dimensions of intelligent sciences in its three tracks, namely, intelligent computing, intelligent communication and intelligent devices. intelligent computing track covers areas such as intelligent and distributed computing, intelligent grid and cloud computing, internet of things, soft computing and engineering applications, data mining and knowledge discovery, semantic and web technology, hybrid systems, agent computing, bioinformatics, and recommendation systems. Intelligent communication covers communication and network technologies, including mobile broadband and all optical networks that are the key to groundbreaking inventions of intelligent communication technologies. This covers communication hardware, soft...

  18. Treatment-independent miRNA signature in blood of wilms tumor patients

    Directory of Open Access Journals (Sweden)

    Schmitt Jana

    2012-08-01

    Full Text Available Abstract Background Blood-born miRNA signatures have recently been reported for various tumor diseases. Here, we compared the miRNA signature in Wilms tumor patients prior and after preoperative chemotherapy according to SIOP protocol 2001. Results We did not find a significant difference between miRNA signature of both groups. However both, Wilms tumor patients prior and after chemotherapy showed a miRNA signature different from healthy controls. The signature of Wilms tumor patients prior to chemotherapy showed an accuracy of 97.5% and of patients after chemotherapy an accuracy of 97.0%, each as compared to healthy controls. Conclusion Our results provide evidence for a blood-born Wilms tumor miRNA signature largely independent of four weeks preoperative chemotherapy treatment.

  19. Calculated NWIS signatures for enriched uranium metal

    International Nuclear Information System (INIS)

    Valentine, T.E.; Mihalczo, J.T.; Koehler, P.E.

    1995-01-01

    Nuclear Weapons Identification System (NWIS) signatures have been calculated using a Monte Carlo transport code for measurement configurations of a 252 Cf source, detectors, and a uranium metal casting. NWIS signatures consist of a wide variety of time-and frequency-analysis signatures such as the time distribution of neutrons after californium fission, the time distribution of counts in a detector after a previous count, the number of times n pulses occur in a time interval, and various frequency-analysis signatures, such as auto-power and cross-power spectral densities, coherences, and a ratio of spectral densities. This ratio is independent of detection efficiency. The analysis presented here, using the MCNP-DSP code, evaluates the applicability of this method for measurement of the 235 U content of 19-kg castings of depleted uranium and uranium with enrichments of 20, 40, 60, 80, 90, and 93.2 wt % 235 U. The dependence of the wide variety of NWIS signatures on 235 U content and possible configurations of a measurement system are presented. These preliminary calculations indicate short measurement times. Additional calculations are being performed to optimize the source-detector-moderator-casting configuration for the shortest measurement time. Although the NWIS method was developed for nuclear weapons identification, the development of a small processor now allows it to be also applied in a practical way to subcriticality measurements, nuclear fuel process monitoring and qualitative nondestructive assay of special nuclear material

  20. 46 CFR 2.01-30 - Delegation of OCMI signature authority.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Delegation of OCMI signature authority. 2.01-30 Section... VESSEL INSPECTIONS Inspecting and Certificating of Vessels § 2.01-30 Delegation of OCMI signature authority. The Officer in Charge, Marine Inspection, may redelegate signature authority for documents issued...

  1. 9th International Symposium on Intelligent Distributed Computing

    CERN Document Server

    Camacho, David; Analide, Cesar; Seghrouchni, Amal; Badica, Costin

    2016-01-01

    This book represents the combined peer-reviewed proceedings of the ninth International Symposium on Intelligent Distributed Computing – IDC’2015, of the Workshop on Cyber Security and Resilience of Large-Scale Systems – WSRL’2015, and of the International Workshop on Future Internet and Smart Networks – FI&SN’2015. All the events were held in Guimarães, Portugal during October 7th-9th, 2015. The 46 contributions published in this book address many topics related to theory and applications of intelligent distributed computing, including: Intelligent Distributed Agent-Based Systems, Ambient Intelligence and Social Networks, Computational Sustainability, Intelligent Distributed Knowledge Representation and Processing, Smart Networks, Networked Intelligence and Intelligent Distributed Applications, amongst others.

  2. Key Success Factors in Business Intelligence

    Directory of Open Access Journals (Sweden)

    Szymon Adamala

    2011-12-01

    Full Text Available Business Intelligence can bring critical capabilities to an organization, but the implementation of such capabilities is often plagued with problems. Why is it that certain projects fail, while others succeed? The aim of this article is to identify the factors that are present in successful Business Intelligence projects and to organize them into a framework of critical success factors. A survey was conducted during the spring of 2011 to collect primary data on Business Intelligence projects. Findings confirm that Business Intelligence projects are wrestling with both technological and non-technological problems, but the non-technological problems are found to be harder to solve as well as more time consuming than their counterparts. The study also shows that critical success factors for Business Intelligence projects are different from success factors for Information Systems projects in general. Business Intelligences projects have critical success factors that are unique to the subject matter. Major differences can be found primarily among non-technological factors, such as the presence of a specific business need and a clear vision to guide the project. Success depends on types of project funding, the business value provided by each iteration in the project and the alignment of the project to a strategic vision for Business Intelligence at large. Furthermore, the study provides a framework for critical success factors that, explains sixty-one percent of variability of success for projects. Areas which should be given special attention include making sure that the Business Intelligence solution is built with the end users in mind, that the Business Intelligence solution is closely tied to the company’s strategic vision and that the project is properly scoped and prioritized to concentrate on the best opportunities first.

  3. Intelligence Community Programs, Management, and Enduring Issues

    Science.gov (United States)

    2016-11-08

    books, journal papers, conference presentations, working papers, and other electronic and print publications. Intelligence Community Programs... Intelligence Community Programs, Management, and Enduring Issues Anne Daugherty Miles Analyst in Intelligence and National Security Policy...

  4. Brain anatomical network and intelligence.

    Directory of Open Access Journals (Sweden)

    Yonghui Li

    2009-05-01

    Full Text Available Intuitively, higher intelligence might be assumed to correspond to more efficient information transfer in the brain, but no direct evidence has been reported from the perspective of brain networks. In this study, we performed extensive analyses to test the hypothesis that individual differences in intelligence are associated with brain structural organization, and in particular that higher scores on intelligence tests are related to greater global efficiency of the brain anatomical network. We constructed binary and weighted brain anatomical networks in each of 79 healthy young adults utilizing diffusion tensor tractography and calculated topological properties of the networks using a graph theoretical method. Based on their IQ test scores, all subjects were divided into general and high intelligence groups and significantly higher global efficiencies were found in the networks of the latter group. Moreover, we showed significant correlations between IQ scores and network properties across all subjects while controlling for age and gender. Specifically, higher intelligence scores corresponded to a shorter characteristic path length and a higher global efficiency of the networks, indicating a more efficient parallel information transfer in the brain. The results were consistently observed not only in the binary but also in the weighted networks, which together provide convergent evidence for our hypothesis. Our findings suggest that the efficiency of brain structural organization may be an important biological basis for intelligence.

  5. "Intelligences That Plants Can Pass On": Play Dough, Fun and Teaching Strategies with Insights to Multiple Intelligences

    Science.gov (United States)

    Laughlin, Kevin; Foley, Andi

    2012-01-01

    The "Intelligences That Plants Can Pass On" is an activity that involves several of Gardner's Multiple Intelligences and was designed for demonstrating the practical use of Multiple Intelligences in delivering education programs to all ages of learners. Instructions are provided for how to implement this activity, and the activity is linked to…

  6. Distributed intelligence in CAMAC

    International Nuclear Information System (INIS)

    Kunz, P.F.

    1977-01-01

    A simple extension of the CAMAC standard is described which allows distributed intelligence at the crate level. By distributed intelligence is meant that there is more than one source of control in a system. This standard is just now emerging from the NIM Dataway Working Group and its European counterpart. 1 figure

  7. Can everyone become highly intelligent? Cultural differences in and societal consequences of beliefs about the universal potential for intelligence.

    Science.gov (United States)

    Rattan, Aneeta; Savani, Krishna; Naidu, N V R; Dweck, Carol S

    2012-11-01

    We identify a novel dimension of people's beliefs about intelligence: beliefs about the potential to become highly intelligent. Studies 1-3 found that in U.S. American contexts, people tend to believe that only some people have the potential to become highly intelligent. In contrast, in South Asian Indian contexts, people tend to believe that most people have the potential to become highly intelligent. To examine the implications of these beliefs, Studies 4-6 measured and manipulated Americans' beliefs about the potential for intelligence and found that the belief that everyone can become highly intelligent predicted increased support for policies that distribute resources more equally across advantaged and disadvantaged social groups. These findings suggest that the belief that only some people have the potential to become highly intelligent is a culturally shaped belief, and one that can lead people to oppose policies aimed at redressing social inequality. (c) 2012 APA, all rights reserved.

  8. 7 CFR 1956.68 - Compromise or adjustment without debtor's signature.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Compromise or adjustment without debtor's signature... Loan Programs and Multi-Family Housing § 1956.68 Compromise or adjustment without debtor's signature... made to obtain the debtor's signature and the date(s) of such effort. (c) The specific reasons why it...

  9. Quantum dual signature scheme based on coherent states with entanglement swapping

    Science.gov (United States)

    Liu, Jia-Li; Shi, Rong-Hua; Shi, Jin-Jing; Lv, Ge-Li; Guo, Ying

    2016-08-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519) and the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012).

  10. Intelligent Integrated System Health Management

    Science.gov (United States)

    Figueroa, Fernando

    2012-01-01

    Intelligent Integrated System Health Management (ISHM) is the management of data, information, and knowledge (DIaK) with the purposeful objective of determining the health of a system (Management: storage, distribution, sharing, maintenance, processing, reasoning, and presentation). Presentation discusses: (1) ISHM Capability Development. (1a) ISHM Knowledge Model. (1b) Standards for ISHM Implementation. (1c) ISHM Domain Models (ISHM-DM's). (1d) Intelligent Sensors and Components. (2) ISHM in Systems Design, Engineering, and Integration. (3) Intelligent Control for ISHM-Enabled Systems

  11. Computational Intelligence for Engineering Systems

    CERN Document Server

    Madureira, A; Vale, Zita

    2011-01-01

    "Computational Intelligence for Engineering Systems" provides an overview and original analysis of new developments and advances in several areas of computational intelligence. Computational Intelligence have become the road-map for engineers to develop and analyze novel techniques to solve problems in basic sciences (such as physics, chemistry and biology) and engineering, environmental, life and social sciences. The contributions are written by international experts, who provide up-to-date aspects of the topics discussed and present recent, original insights into their own experien

  12. The Literature of Competitive Intelligence.

    Science.gov (United States)

    Walker, Thomas D.

    1994-01-01

    Describes competitive intelligence (CI) literature in terms of its location, quantity, authorship, length, and problems of bibliographic access. Highlights include subject access; competitive intelligence research; espionage and security; monographs; and journals. (21 references) (LRW)

  13. Methyl-CpG island-associated genome signature tags

    Science.gov (United States)

    Dunn, John J

    2014-05-20

    Disclosed is a method for analyzing the organismic complexity of a sample through analysis of the nucleic acid in the sample. In the disclosed method, through a series of steps, including digestion with a type II restriction enzyme, ligation of capture adapters and linkers and digestion with a type IIS restriction enzyme, genome signature tags are produced. The sequences of a statistically significant number of the signature tags are determined and the sequences are used to identify and quantify the organisms in the sample. Various embodiments of the invention described herein include methods for using single point genome signature tags to analyze the related families present in a sample, methods for analyzing sequences associated with hyper- and hypo-methylated CpG islands, methods for visualizing organismic complexity change in a sampling location over time and methods for generating the genome signature tag profile of a sample of fragmented DNA.

  14. System for intelligent teleoperation research

    International Nuclear Information System (INIS)

    Orlando, N.E.

    1983-01-01

    The Automation Technology Branch of NASA Langley Research Center is developing a research capability in the field of artificial intelligence, particularly as applicable in teleoperator/robotics development for remote space operations. As a testbed for experimentation in these areas, a system concept has been developed and is being implemented. This system, termed DAISIE (Distributed Artificially Intelligent System for Interacting with the Environment), interfaces the key processes of perception, reasoning, and manipulation by linking hardware sensors and manipulators to a modular artificial intelligence (AI) software system in a hierarchical control structure. Verification experiments have been performed: one experiment used a blocksworld database and planner embedded in the DAISIE system to intelligently manipulate a simple physical environment; the other experiment implemented a joint-space collision avoidance algorithm. Continued system development is planned

  15. Intelligent instrumentation principles and applications

    CERN Document Server

    Bhuyan, Manabendra

    2011-01-01

    With the advent of microprocessors and digital-processing technologies as catalyst, classical sensors capable of simple signal conditioning operations have evolved rapidly to take on higher and more specialized functions including validation, compensation, and classification. This new category of sensor expands the scope of incorporating intelligence into instrumentation systems, yet with such rapid changes, there has developed no universal standard for design, definition, or requirement with which to unify intelligent instrumentation. Explaining the underlying design methodologies of intelligent instrumentation, Intelligent Instrumentation: Principles and Applications provides a comprehensive and authoritative resource on the scientific foundations from which to coordinate and advance the field. Employing a textbook-like language, this book translates methodologies to more than 80 numerical examples, and provides applications in 14 case studies for a complete and working understanding of the material. Beginn...

  16. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  17. [Intelligence and irritable bowel syndrome].

    Science.gov (United States)

    Díaz-Rubio García, Manuel

    2006-01-01

    The Syndrome of Irritable Intestine (SII) is a chronic functional dysfunction that it is characterized by abdominal pain and changes of intestinal rhythm without demonstrable organic alteration. It is avery prevelent dysfunction in the developed countries, there being involved in its physiopathology, among other, the psychosocial factors (illness behavior, social situation, stress, vital events, neuroticism, anxiety and somatization). However no study has been carried out on the Rational Intelligence and Experiential Intelligence or Constructive Thought in patient with SII in spite of knowing that the cognitive processes participate in its genesis. On the hypothesis that the patients with SII would have an experiencial intelligence smaller that the fellows controls, 100 cases of SII and 100 controls have been studied, being excluded of both patients groups with intellectual deficit or psychiatric illness in the last year. The cases of SII were distributed in two groups, one of 50 cases that habitually consulted with the doctor and other 50 that didn't make it. All the participants completed specific tests to evaluate all the psychological factors and Rational Intelligence and the Constructive Thought. The results show an alteration of the psychological factors in the SII, expressed by the antecedents of vital events, m even significant of anxiety feature and anxiety and a neuroticism statistically significant. As for Rational Intelligence and Experiential Intelligence in the SII, it was observed that to Rational Intelligence is same in the patients with SII that in the controls. Only in the group of SII that habitually consulted with the doctor a slightly significant decrease of the intellectual coefficient it was observed. As for the Experiential Intelligence a significant decrease of the Constructive Thought was observed in the patients with SII in comparison with the group control. Of their components a decrease of the emotionality exists and of the

  18. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  19. Biomarker Gene Signature Discovery Integrating Network Knowledge

    Directory of Open Access Journals (Sweden)

    Holger Fröhlich

    2012-02-01

    Full Text Available Discovery of prognostic and diagnostic biomarker gene signatures for diseases, such as cancer, is seen as a major step towards a better personalized medicine. During the last decade various methods, mainly coming from the machine learning or statistical domain, have been proposed for that purpose. However, one important obstacle for making gene signatures a standard tool in clinical diagnosis is the typical low reproducibility of these signatures combined with the difficulty to achieve a clear biological interpretation. For that purpose in the last years there has been a growing interest in approaches that try to integrate information from molecular interaction networks. Here we review the current state of research in this field by giving an overview about so-far proposed approaches.

  20. Evaluating and Improving Online Intelligence Courses

    Directory of Open Access Journals (Sweden)

    Dr. Alexandra Luce

    2013-08-01

    Full Text Available Civilian, military and government institutions offer a wide range of courses on intelligence and are increasingly doing so online. While evaluation and improvement are critical to ensuring quality training and education, there is little research about how to evaluate and improve online intelligence courses. Based on the author’s experience developing and teaching such courses, this article offers four suggestions to those involved in online intelligence training and education: (1 conduct a key assumptions check; (2 ensure the course presentation embodies the principles of intelligence communication; (3 encourage creative freedom; and (4 build in mechanisms for feedback throughout the course.

  1. A study on the Web intelligence

    Institute of Scientific and Technical Information of China (English)

    Sang-Geun Kim

    2004-01-01

    This paper surveys important aspects of Web Intelligence (WI). WI explores the fundamental roles as well as practical impacts of Artificial Intelligence (AI) and advanced Information Technology (IT) on the next generation of Web - related products, systens, and activities. As a direction for scientific research and devlopment, WI can be extremely beneficial for the field of Artificial Intelligence in Education (AIED). This paper covers these issues only very briefly. It focuses more on other issues in WI, such as intelligent Web services, and semantic web, and proposes how to use them as basis for tackling new and challenging research problems in AIED.

  2. An Efficient Identity-Based Proxy Blind Signature for Semioffline Services

    Directory of Open Access Journals (Sweden)

    Hongfei Zhu

    2018-01-01

    Full Text Available Fog computing extends the cloud computing to the network edge and allows deploying a new type of semioffline services, which can provide real-time transactions between two entities, while the central cloud server is offline and network edge devices are online. For an e-payment system and e-voting with such feature, proxy blind signature is a cornerstone to protect users’ privacy. However, the signature based on number theorem, such as hard mathematical problems on factoring problem, discrete logarithm problem, and bilinear pairings, cannot defeat quantum computers attack. Meanwhile, these schemes need to depend on complex public key infrastructure. Thus, we construct an identity-based proxy blind signature scheme based on number theorem research unit lattice, which can defeat quantum computers attack and does not need to depend on public key infrastructure. The security of the proposed scheme is dependent on Ring-Small Integer Solution problem over number theorem research unit lattice. The proposed scheme meets the properties of blind signature and proxy signature. Then we compare the proposed scheme with other existing proxy blind signature schemes; the result shows that the proposed scheme outperforms ZM scheme except in proxy signer’s signature size and can be more secure than TA scheme and MMHP scheme.

  3. Forged Signature Distinction Using Convolutional Neural Network for Feature Extraction

    Directory of Open Access Journals (Sweden)

    Seungsoo Nam

    2018-01-01

    Full Text Available This paper proposes a dynamic verification scheme for finger-drawn signatures in smartphones. As a dynamic feature, the movement of a smartphone is recorded with accelerometer sensors in the smartphone, in addition to the moving coordinates of the signature. To extract high-level longitudinal and topological features, the proposed scheme uses a convolution neural network (CNN for feature extraction, and not as a conventional classifier. We assume that a CNN trained with forged signatures can extract effective features (called S-vector, which are common in forging activities such as hesitation and delay before drawing the complicated part. The proposed scheme also exploits an autoencoder (AE as a classifier, and the S-vector is used as the input vector to the AE. An AE has high accuracy for the one-class distinction problem such as signature verification, and is also greatly dependent on the accuracy of input data. S-vector is valuable as the input of AE, and, consequently, could lead to improved verification accuracy especially for distinguishing forged signatures. Compared to the previous work, i.e., the MLP-based finger-drawn signature verification scheme, the proposed scheme decreases the equal error rate by 13.7%, specifically, from 18.1% to 4.4%, for discriminating forged signatures.

  4. Signature Pedagogies for E-Learning in Higher Education and Beyond

    Science.gov (United States)

    Eaton, Sarah Elaine; Brown, Barbara; Schroeder, Meadow; Lock, Jennifer; Jacobsen, Michele

    2017-01-01

    Purpose: This report explores the notion of signature pedagogies within the field of e-learning for higher education. Methodology: We build on previous work that examined signature pedagogies in education, linking the concepts of signature pedagogies, the profession of education and e-learning as a means to help educators develop their practice…

  5. Provably Secure and Subliminal-Free Variant of Schnorr Signature

    OpenAIRE

    Zhang , Yinghui; Li , Hui; Li , Xiaoqing; Zhu , Hui

    2013-01-01

    Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES); International audience; Subliminal channels present a severe challenge to information security. Currently, subliminal channels still exist in Schnorr signature. In this paper, we propose a subliminal-free variant of Schnorr signature. In the proposed scheme, an honest-but-curious warden is introduced to help the signer to generate a signature on a given message, but it is disallowed to sign messages independently. ...

  6. Intelligence, Race, and Genetics

    Science.gov (United States)

    Sternberg, Robert J.; Grigorenko, Elena L.; Kidd, Kenneth K.

    2005-01-01

    In this article, the authors argue that the overwhelming portion of the literature on intelligence, race, and genetics is based on folk taxonomies rather than scientific analysis. They suggest that because theorists of intelligence disagree as to what it is, any consideration of its relationships to other constructs must be tentative at best. They…

  7. Intelligent computing systems emerging application areas

    CERN Document Server

    Virvou, Maria; Jain, Lakhmi

    2016-01-01

    This book at hand explores emerging scientific and technological areas in which Intelligent Computing Systems provide efficient solutions and, thus, may play a role in the years to come. It demonstrates how Intelligent Computing Systems make use of computational methodologies that mimic nature-inspired processes to address real world problems of high complexity for which exact mathematical solutions, based on physical and statistical modelling, are intractable. Common intelligent computational methodologies are presented including artificial neural networks, evolutionary computation, genetic algorithms, artificial immune systems, fuzzy logic, swarm intelligence, artificial life, virtual worlds and hybrid methodologies based on combinations of the previous. The book will be useful to researchers, practitioners and graduate students dealing with mathematically-intractable problems. It is intended for both the expert/researcher in the field of Intelligent Computing Systems, as well as for the general reader in t...

  8. Inteligência social e inteligência competitivaSocial intelligence and competitive intelligence

    Directory of Open Access Journals (Sweden)

    Kira Tarapanoff

    2004-01-01

    Full Text Available Coloca os conceitos de inteligência social e coletiva no contexto da Sociedade da informação e do Conhecimento. Traça o desenvolvimento da inteligência econômica nos países e a aplicação da inteligência competitiva nas organizações. Defende que a ação conjunta do processo de gestão da informação e gestão do conhecimento, ambas em apoio às estratégia e missão organizacional, apresentam para o processo de tomada de decisão uma propriedade emergente que é a inteligência institucional.The concepts of social and collective intelligence are placed within the context of the Information and Knowledge Society. The development of the economic intelligence is given as well as its application and development in organizations as competitive intelligence. The thesis defended is that the joint action of the information and knowledge management processes, both in support to strategies and organization’s mission , have na emerging property for the decision making process – that is the institutional intelligence.

  9. Dorsolateral Prefrontal Contributions to Human Intelligence

    Science.gov (United States)

    Barbey, Aron K.; Colom, Roberto; Grafman, Jordan

    2012-01-01

    Although cognitive neuroscience has made remarkable progress in understanding the involvement of the prefrontal cortex in executive control functions for human intelligence, the necessity of the dorsolateral prefrontal cortex (dlPFC) for key competencies of general intelligence and executive function remains to be well established. Here we studied human brain lesion patients with dlPFC lesions to investigate whether this region is computationally necessary for performance on neuropsychological tests of general intelligence and executive function, administering the Wechsler Adult Intelligence Scale (WAIS) and subtests of the Delis Kaplan Executive Function System (D-KEFS) to three groups: dlPFC lesions (n = 19), non-dlPFC lesions (n = 152), and no brain lesions (n = 55). The key results indicate that: (1) patients with focal dlPFC damage exhibit lower scores, at the latent variable level, than controls in general intelligence (g) and executive function; (2) dlPFC patients demonstrate lower scores than controls in several executive measures; and (3) these latter differences are no longer significant when the pervasive influence of the general factor of intelligence (g) is statistically removed. The observed findings support a central role for the dlPFC in general intelligence and make specific recommendations for the interpretation and application of the WAIS and D-KEFS to the study of high-level cognition in health and disease. PMID:22634247

  10. Secure Mobile Agent from Leakage-Resilient Proxy Signatures

    Directory of Open Access Journals (Sweden)

    Fei Tang

    2015-01-01

    Full Text Available A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator to delegate its signing right to another entity (proxy to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.

  11. Digital signature feasibility study

    Science.gov (United States)

    2008-06-01

    The purpose of this study was to assess the advantages and disadvantages of using digital signatures to assist the Arizona Department of Transportation in conducting business. The Department is evaluating the potential of performing more electronic t...

  12. Tumor Microenvironment Gene Signature as a Prognostic Classifier and Therapeutic Target

    Science.gov (United States)

    2016-06-01

    AWARD NUMBER: W81XWH-14-1-0107 TITLE: Tumor Microenvironment Gene Signature as a Prognostic Classifier and Therapeutic Target PRINCIPAL...AND SUBTITLE Tumor Microenvironment Gene Signature as a 5a. CONTRACT NUMBER W81XWH-14-1-0107 Prognostic Classifier and Therapeutic Target 5b...gene signature that correlates with poor survival in ovarian cancer patients. We are refining this gene signature to develop biomarkers for the

  13. Thinking positively: The genetics of high intelligence

    Science.gov (United States)

    Shakeshaft, Nicholas G.; Trzaskowski, Maciej; McMillan, Andrew; Krapohl, Eva; Simpson, Michael A.; Reichenberg, Avi; Cederlöf, Martin; Larsson, Henrik; Lichtenstein, Paul; Plomin, Robert

    2015-01-01

    High intelligence (general cognitive ability) is fundamental to the human capital that drives societies in the information age. Understanding the origins of this intellectual capital is important for government policy, for neuroscience, and for genetics. For genetics, a key question is whether the genetic causes of high intelligence are qualitatively or quantitatively different from the normal distribution of intelligence. We report results from a sibling and twin study of high intelligence and its links with the normal distribution. We identified 360,000 sibling pairs and 9000 twin pairs from 3 million 18-year-old males with cognitive assessments administered as part of conscription to military service in Sweden between 1968 and 2010. We found that high intelligence is familial, heritable, and caused by the same genetic and environmental factors responsible for the normal distribution of intelligence. High intelligence is a good candidate for “positive genetics” — going beyond the negative effects of DNA sequence variation on disease and disorders to consider the positive end of the distribution of genetic effects. PMID:25593376

  14. Procreative Beneficence, Intelligence, and the Optimization Problem.

    Science.gov (United States)

    Saunders, Ben

    2015-12-01

    According to the Principle of Procreative Beneficence, reproducers should choose the child, of those available to them, expected to have the best life. Savulescu argues reproducers are therefore morally obligated to select for nondisease traits, such as intelligence. Carter and Gordon recently challenged this implication, arguing that Savulescu fails to establish that intelligence promotes well-being. This paper develops two responses. First, I argue that higher intelligence is likely to contribute to well-being on most plausible accounts. Second, I argue that, even if it does not, one can only resist the conclusion that reproducers should select on the basis of intelligence if its expected net effect is neutral. If intelligence reduces expected well-being, then reproducers should select offspring of low intelligence. More likely, the effect of increased intelligence on expected well-being varies at different levels, which makes identifying an optimum for well-being more complex than hitherto appreciated. © The Author 2015. Published by Oxford University Press, on behalf of the Journal of Medicine and Philosophy Inc. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  15. Multiple Intelligences and Perfectionism in Middle School Gifted Students

    Directory of Open Access Journals (Sweden)

    Süleyman KAHRAMAN

    2016-12-01

    Full Text Available In this study, the perfectionism levels of 181 sixth, seventh, and eighth grade gifted students’ were investigated in terms of multiple intelligences. In the study a relational screening model, Survey of Positive and Negative Perfectionism, developed by Kırdök (2004, was used to assess the level of the students’ positive and negative perfectionism. The Multiple Intelligences Inventory, developed by Saban (2001, was used to determine the students’ multiple intelligences, and a personal information form was implemented to obtain socio-demographic data. The results of the study showed that [verbal-linguistic intelligence, mathematical-logical intelligence, and intrapersonal intelligence] [intrapersonal intelligence, mathematical-logical intelligence, and verbal-linguistic intelligence] predicted 34% of the students’ perfectionism levels (p<.001. The explanatory power of the scores in multiple intelligences over negative perfectionism was not found to be statistically significant for any of the sub-dimensions. In order to develop gifted students’ positive perfectionism qualifications, assuming that multiple intelligences can be used as a tool, some suggestions were presented for researchers, counselors, and teachers.

  16. Considerations on Accounting Intelligent Systems Importance

    Directory of Open Access Journals (Sweden)

    2007-01-01

    Full Text Available Managers begin to realize the importance of artificial intelligence technologies for their organizations. Knowledge is today seen as the main organizational resource and that is what intelligent systems are about: manipulating knowledge. In this paper we highlight the main reasons that an accountant can bring to his managers to emphasize this idea: intelligent systems are really needful in modern accounting.

  17. Are Humans the Most Intelligent Species?

    Directory of Open Access Journals (Sweden)

    Robert P. Erickson

    2014-09-01

    Full Text Available Hunt and Jaeggi [1] nicely summarize the point that within the academic field of intelligence, we do not have a commonly understandable definition of what intelligence is. Still the term is used extensively and with consensus to the effect that humans are the most intelligent species. An example is given of this problem, and a definition and solution are suggested.

  18. Methods and apparatus for multi-parameter acoustic signature inspection

    Energy Technology Data Exchange (ETDEWEB)

    Diaz, Aaron A [Richland, WA; Samuel, Todd J [Pasco, WA; Valencia, Juan D [Kennewick, WA; Gervais, Kevin L [Richland, WA; Tucker, Brian J [Pasco, WA; Kirihara, Leslie J [Richland, WA; Skorpik, James R [Kennewick, WA; Reid, Larry D [Benton City, WA; Munley, John T [Benton City, WA; Pappas, Richard A [Richland, WA; Wright, Bob W [West Richland, WA; Panetta, Paul D [Richland, WA; Thompson, Jason S [Richland, WA

    2007-07-24

    A multiparameter acoustic signature inspection device and method are described for non-invasive inspection of containers. Dual acoustic signatures discriminate between various fluids and materials for identification of the same.

  19. The new competitive intelligence agents: "Programming" competitive intelligence ethics into corporate cultures

    OpenAIRE

    Betsy Van der Veer Martens; Emilie Steele Giustozzi

    2011-01-01

    This article examines some of the ethical issues involved in competitive intelligence activities on the Internet. We discuss the importance of an ethical framework for the performance of competitive intelligence, especially the Code of Ethics of SCIP (the leading professional association for strategic and competitive professionals), in the context of today's networked global environment. The virtual borderlines separating national economic and military territories online are becoming increasi...

  20. Data transfer based on intelligent ethernet card

    International Nuclear Information System (INIS)

    Zhu Haitao; Chinese Academy of Sciences, Beijing; Chu Yuanping; Zhao Jingwei

    2007-01-01

    Intelligent Ethernet Cards are widely used in systems where the network throughout is very large, such as the DAQ systems for modern high energy physics experiments, web service. With the example of a commercial intelligent Ethernet card, this paper introduces the architecture, the principle and the process of intelligent Ethernet cards. In addition, the results of several experiments showing the differences between intelligent Ethernet cards and general ones are also presented. (authors)

  1. Insights on the Nature of Intelligence from Ordinary Discourse.

    Science.gov (United States)

    Derr, Richard L.

    1989-01-01

    The use of "intelligence" in ordinary discourse is analyzed to glean hypotheses that may resolve the debate among psychologists regarding the nature of intelligence. Intelligence is conceived as an innate intellectual capacity, and a sharp conceptual distinction is made between intelligence and intelligent behavior. (Author/TJH)

  2. Thermal Signature Measurements for Ammonium Nitrate/Fuel Mixtures by Laser Heating.

    Science.gov (United States)

    Nazarian, Ashot; Presser, Cary

    2016-01-10

    Measurements were carried out to obtain thermal signatures of several ammonium nitrate/fuel (ANF) mixtures, using a laser-heating technique referred to as the laser-driven thermal reactor (LDTR). The mixtures were ammonium nitrate (AN)/kerosene, AN/ethylene glycol, AN/paraffin wax, AN/petroleum jelly, AN/confectioner's sugar, AN/cellulose (tissue paper), nitromethane/cellulose, nitrobenzene/cellulose, AN/cellulose/nitromethane, AN/cellulose/nitrobenzene. These mixtures were also compared with AN/nitromethane and AN/diesel fuel oil, obtained from an earlier investigation. Thermograms for the mixtures, as well as individual constituents, were compared to better understand how the sample thermal signature changes with mixture composition. This is the first step in development of a thermal-signature database, to be used along with other signature databases, to improve identification of energetic substances of unknown composition. The results indicated that each individual thermal signature was associated unambiguously with a particular mixture composition. The signature features of a particular mixture were shaped by the individual constituent signatures. It was also uncovered that the baseline signature was modified after an experiment due to coating of unreacted residue on the substrate surface and a change in the reactor sphere oxide layer. Thus, care was required to pre-oxidize the sphere prior to an experiment. A minimum sample mass (which was dependent on composition) was required to detect the signature characteristics. Increased laser power served to magnify signal strength while preserving the signature features. For the mixtures examined, the thermal response of each ANF mixture was found to be different, which was based on the mixture composition and the thermal behavior of each mixture constituent.

  3. 26 CFR 301.6064-1 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Signature presumed authentic. 301.6064-1 Section 301.6064-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED....6064-1 Signature presumed authentic. An individual's name signed to a return, statement, or other...

  4. Impact of Artificial Intelligence on Economic Theory

    OpenAIRE

    Tshilidzi Marwala

    2015-01-01

    Artificial intelligence has impacted many aspects of human life. This paper studies the impact of artificial intelligence on economic theory. In particular we study the impact of artificial intelligence on the theory of bounded rationality, efficient market hypothesis and prospect theory.

  5. Molecular signatures for the Crenarchaeota and the Thaumarchaeota.

    Science.gov (United States)

    Gupta, Radhey S; Shami, Ali

    2011-02-01

    Crenarchaeotes found in mesophilic marine environments were recently placed into a new phylum of Archaea called the Thaumarchaeota. However, very few molecular characteristics of this new phylum are currently known which can be used to distinguish them from the Crenarchaeota. In addition, their relationships to deep-branching archaeal lineages are unclear. We report here detailed analyses of protein sequences from Crenarchaeota and Thaumarchaeota that have identified many conserved signature indels (CSIs) and signature proteins (SPs) (i.e., proteins for which all significant blast hits are from these groups) that are specific for these archaeal groups. Of the identified signatures 6 CSIs and 13 SPs are specific for the Crenarchaeota phylum; 6 CSIs and >250 SPs are uniquely found in various Thaumarchaeota (viz. Cenarchaeum symbiosum, Nitrosopumilus maritimus and a number of uncultured marine crenarchaeotes) and 3 CSIs and ~10 SPs are found in both Thaumarchaeota and Crenarchaeota species. Some of the molecular signatures are also present in Korarchaeum cryptofilum, which forms the independent phylum Korarchaeota. Although some of these molecular signatures suggest a distant shared ancestry between Thaumarchaeota and Crenarchaeota, our identification of large numbers of Thaumarchaeota-specific proteins and their deep branching between the Crenarchaeota and Euryarchaeota phyla in phylogenetic trees shows that they are distinct from both Crenarchaeota and Euryarchaeota in both genetic and phylogenetic terms. These observations support the placement of marine mesophilic archaea into the separate phylum Thaumarchaeota. Additionally, many CSIs and SPs have been found that are specific for different orders within Crenarchaeota (viz. Sulfolobales-3 CSIs and 169 SPs, Thermoproteales-5 CSIs and 25 SPs, Desulfurococcales-4 SPs, and Sulfolobales and Desulfurococcales-2 CSIs and 18 SPs). The signatures described here provide novel means for distinguishing the Crenarchaeota and

  6. Early signatures of regime shifts in gene expression dynamics

    Science.gov (United States)

    Pal, Mainak; Pal, Amit Kumar; Ghosh, Sayantari; Bose, Indrani

    2013-06-01

    Recently, a large number of studies have been carried out on the early signatures of sudden regime shifts in systems as diverse as ecosystems, financial markets, population biology and complex diseases. The signatures of regime shifts in gene expression dynamics are less systematically investigated. In this paper, we consider sudden regime shifts in the gene expression dynamics described by a fold-bifurcation model involving bistability and hysteresis. We consider two alternative models, models 1 and 2, of competence development in the bacterial population B. subtilis and determine some early signatures of the regime shifts between competence and noncompetence. We use both deterministic and stochastic formalisms for the purpose of our study. The early signatures studied include the critical slowing down as a transition point is approached, rising variance and the lag-1 autocorrelation function, skewness and a ratio of two mean first passage times. Some of the signatures could provide the experimental basis for distinguishing between bistability and excitability as the correct mechanism for the development of competence.

  7. Spatially Resolved Isotopic Source Signatures of Wetland Methane Emissions

    Science.gov (United States)

    Ganesan, A. L.; Stell, A. C.; Gedney, N.; Comyn-Platt, E.; Hayman, G.; Rigby, M.; Poulter, B.; Hornibrook, E. R. C.

    2018-04-01

    We present the first spatially resolved wetland δ13C(CH4) source signature map based on data characterizing wetland ecosystems and demonstrate good agreement with wetland signatures derived from atmospheric observations. The source signature map resolves a latitudinal difference of 10‰ between northern high-latitude (mean -67.8‰) and tropical (mean -56.7‰) wetlands and shows significant regional variations on top of the latitudinal gradient. We assess the errors in inverse modeling studies aiming to separate CH4 sources and sinks by comparing atmospheric δ13C(CH4) derived using our spatially resolved map against the common assumption of globally uniform wetland δ13C(CH4) signature. We find a larger interhemispheric gradient, a larger high-latitude seasonal cycle, and smaller trend over the period 2000-2012. The implication is that erroneous CH4 fluxes would be derived to compensate for the biases imposed by not utilizing spatially resolved signatures for the largest source of CH4 emissions. These biases are significant when compared to the size of observed signals.

  8. Early signatures of regime shifts in gene expression dynamics

    International Nuclear Information System (INIS)

    Pal, Mainak; Pal, Amit Kumar; Ghosh, Sayantari; Bose, Indrani

    2013-01-01

    Recently, a large number of studies have been carried out on the early signatures of sudden regime shifts in systems as diverse as ecosystems, financial markets, population biology and complex diseases. The signatures of regime shifts in gene expression dynamics are less systematically investigated. In this paper, we consider sudden regime shifts in the gene expression dynamics described by a fold-bifurcation model involving bistability and hysteresis. We consider two alternative models, models 1 and 2, of competence development in the bacterial population B. subtilis and determine some early signatures of the regime shifts between competence and noncompetence. We use both deterministic and stochastic formalisms for the purpose of our study. The early signatures studied include the critical slowing down as a transition point is approached, rising variance and the lag-1 autocorrelation function, skewness and a ratio of two mean first passage times. Some of the signatures could provide the experimental basis for distinguishing between bistability and excitability as the correct mechanism for the development of competence. (paper)

  9. Energy transparency by business intelligence; Energietransparenz durch Business Intelligence

    Energy Technology Data Exchange (ETDEWEB)

    Flieder, Karl [Academia Nova, Schwechat (Austria). Business Process Management and Engineering

    2012-10-15

    The efficiency of energy is one of several key performance parameters, when it comes to the questions how innovative and economical a plant operates compared to its competitors. However, in order to evaluate energy saving potentials in the industry, we need transparency first: A clear picture of the energy consumption based on products and processes. This transparency can be accomplished through business intelligence (BI). This term encompasses analytical processes and tools that can help to transform enterprise data and information into applied knowledge. In this article, we focus on transparency of the energy consumption through a targeted analysis by making use of business intelligence.

  10. New trends in computational collective intelligence

    CERN Document Server

    Kim, Sang-Wook; Trawiński, Bogdan

    2015-01-01

    This book consists of 20 chapters in which the authors deal with different theoretical and practical aspects of new trends in Collective Computational Intelligence techniques. Computational Collective Intelligence methods and algorithms are one the current trending research topics from areas related to Artificial Intelligence, Soft Computing or Data Mining among others. Computational Collective Intelligence is a rapidly growing field that is most often understood as an AI sub-field dealing with soft computing methods which enable making group decisions and processing knowledge among autonomous units acting in distributed environments. Web-based Systems, Social Networks, and Multi-Agent Systems very often need these tools for working out consistent knowledge states, resolving conflicts and making decisions. The chapters included in this volume cover a selection of topics and new trends in several domains related to Collective Computational Intelligence: Language and Knowledge Processing, Data Mining Methods an...

  11. Computational Foundations of Natural Intelligence.

    Science.gov (United States)

    van Gerven, Marcel

    2017-01-01

    New developments in AI and neuroscience are revitalizing the quest to understanding natural intelligence, offering insight about how to equip machines with human-like capabilities. This paper reviews some of the computational principles relevant for understanding natural intelligence and, ultimately, achieving strong AI. After reviewing basic principles, a variety of computational modeling approaches is discussed. Subsequently, I concentrate on the use of artificial neural networks as a framework for modeling cognitive processes. This paper ends by outlining some of the challenges that remain to fulfill the promise of machines that show human-like intelligence.

  12. Novel applications of intelligent systems

    CERN Document Server

    Kasabov, Nikola; Filev, Dimitar; Jotsov, Vladimir

    2016-01-01

    In this carefully edited book some selected results of theoretical and applied research in the field of broadly perceived intelligent systems are presented. The problems vary from industrial to web and problem independent applications. All this is united under the slogan: "Intelligent systems conquer the world”. The book brings together innovation projects with analytical research, invention, retrieval and processing of knowledge and logical applications in technology. This book is aiming to a wide circle of readers and particularly to the young generation of IT/ICT experts who will build the next generations of intelligent systems.

  13. Artificial Intelligence Applied to the Command, Control, Communications, and Intelligence of the U.S. Central Command.

    Science.gov (United States)

    1983-06-06

    these components will be presented. 4.17 °°,. CHAPTER III FOOTNOTES 1. Arron Barr and Edward A. Feigenbaum, eds., Te Handbook gf Artificial Inteligence ol...RD-R137 205 ARTIFICIAL INTELLIGENCE APPLIED TO THE COMIMAND CONTROL i/i COMMUNICATIONS RND..(U) ARMY WAR COLL CARLISLE BARRACKS U PA J N ENVART 06...appropriate mlitary servic or *swesmment aency. ARTIFICIAL INTELLIGENCE APPLIED TO THE COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE OF THE U.S. CENTRAL

  14. Intelligent Testing: Integrating Psychological Theory and Clinical Practice

    Science.gov (United States)

    Kaufman, James C., Ed.

    2009-01-01

    The field of intelligence testing has been revolutionized by Alan S. Kaufman. He developed the Wechsler Intelligence Scale for Children-Revised (WISC-R) with David Wechsler, and his best-selling book, Intelligent Testing with the WISC-R, introduced the phrase "intelligent testing." Kaufman, with his wife, Nadeen, then created his own…

  15. Signature scheme for the microscopic description of nuclear collective excitations

    International Nuclear Information System (INIS)

    Ogawa, K.

    1980-04-01

    The symmetries between the proton and neutron systems in a nucleus are described in terms of the signatures. Three kinds of signatures (i.e. the pn-, p anti n- and p anti p- (or n anti n-) signatures) are introduced and they are related to the appearance of various collective motions such as rotations or vibrations. It is shown that the pn-signature scheme provides a band-like structure of deformed nuclei, while the features associated with the quadrupole vibration are obtained in the p anti n- and p anti p-signature scheme. From the detail investigation of the p anti n-symmetric wave functions, it is concluded that the reguralities provided by the present shell model are more analogous to those of the γ-unstable surface vibration model (Wilets-Jean model) than to those of harmonic phonon model. (author)

  16. Business Intelligence & Analytical Intelligence: hou het zakelijk

    OpenAIRE

    Van Nieuwenhuyse, Dries

    2013-01-01

    Technologie democratiseert, de markt consolideert, terwijl de hoeveelheid data explodeert. Het lijkt een ideale voedingsbodem voor projecten rond business intelligence en analytics. “Hoe minder de technologie het verschil zal maken, hoe prominenter de business aanwezig zal zijn.”

  17. Student Modeling in an Intelligent Tutoring System

    Science.gov (United States)

    1996-12-17

    Multi-Agent Architecture." Advances in Artificial Intelligence : Proceedings of the 12 th Brazilian Symposium on Aritificial Intelligence , edited by...STUDENT MODELING IN AN INTELLIGENT TUTORING SYSTEM THESIS Jeremy E. Thompson Captain, USAF AFIT/GCS/ENG/96D-27 DIMTVMON* fCKAJWINT A Appr"v*d t=i...Air Force Base, Ohio AFIT/GCS/ENG/96D-27 STUDENT MODELING IN AN INTELLIGENT TUTORING SYSTEM THESIS Jeremy E. Thompson Captain, USAF AFIT/GCS/ENG/96D

  18. Intelligent Multi-Media Integrated Interface Project

    Science.gov (United States)

    1990-06-01

    been devoted to the application of aritificial intelligence technology to the development of human -computer interface technology that integrates speech...RADC-TR-90-128 Final Technical Report June 1090 AD-A225 973 INTELLIGENT MULTI-MEDIA INTEGRATED INTERFACE PROJECT Calspan-University of Buffalo...contractual obligations or notices on a specific document require that it be returned. INTELLIGENT MULTI-MEDIA INTEGRATED INTERFACE PROJECT J. G. Neal J. M

  19. Inter-cooperative collective intelligence techniques and applications

    CERN Document Server

    Bessis, Nik

    2014-01-01

    This book covers the latest advances in the rapid growing field of inter-cooperative collective intelligence aiming the integration and cooperation of various computational resources, networks and intelligent processing paradigms to collectively build intelligence and advanced decision support and interfaces for end-users. The book brings a comprehensive view of the state-of-the-art in the field of integration of sensor networks, IoT and Cloud computing, massive and intelligent querying and processing of data. As a result, the book presents lessons learned so far and identifies new research issues, challenges and opportunities for further research and development agendas. Emerging areas of applications are also identified and usefulness of inter-cooperative collective intelligence is envisaged.   Researchers, software developers, practitioners and students interested in the field of inter-cooperative collective intelligence will find the comprehensive coverage of this book useful for their research, academic...

  20. 1st International Conference on Robot Intelligence Technology and Applications

    CERN Document Server

    Matson, Eric; Myung, Hyun; Xu, Peter

    2013-01-01

    In recent years, robots have been built based on cognitive architecture which has been developed to model human cognitive ability. The cognitive architecture can be a basis for intelligence technology to generate robot intelligence. In this edited book the robot intelligence is classified into six categories: cognitive intelligence, social intelligence, behavioral intelligence, ambient intelligence, collective intelligence and genetic intelligence. This classification categorizes the intelligence of robots based on the different aspects of awareness and the ability to act deliberately as a result of such awareness. This book aims at serving researchers and practitioners with a timely dissemination of the recent progress on robot intelligence technology and its applications, based on a collection of papers presented at the 1st International Conference on Robot Intelligence Technology and Applications (RiTA), held in Gwangju, Korea, December 16-18, 2012. For a better readability, this edition has the total 101 ...

  1. Genetics and intelligence differences: five special findings

    Science.gov (United States)

    Plomin, R; Deary, I J

    2015-01-01

    Intelligence is a core construct in differential psychology and behavioural genetics, and should be so in cognitive neuroscience. It is one of the best predictors of important life outcomes such as education, occupation, mental and physical health and illness, and mortality. Intelligence is one of the most heritable behavioural traits. Here, we highlight five genetic findings that are special to intelligence differences and that have important implications for its genetic architecture and for gene-hunting expeditions. (i) The heritability of intelligence increases from about 20% in infancy to perhaps 80% in later adulthood. (ii) Intelligence captures genetic effects on diverse cognitive and learning abilities, which correlate phenotypically about 0.30 on average but correlate genetically about 0.60 or higher. (iii) Assortative mating is greater for intelligence (spouse correlations ~0.40) than for other behavioural traits such as personality and psychopathology (~0.10) or physical traits such as height and weight (~0.20). Assortative mating pumps additive genetic variance into the population every generation, contributing to the high narrow heritability (additive genetic variance) of intelligence. (iv) Unlike psychiatric disorders, intelligence is normally distributed with a positive end of exceptional performance that is a model for ‘positive genetics'. (v) Intelligence is associated with education and social class and broadens the causal perspectives on how these three inter-correlated variables contribute to social mobility, and health, illness and mortality differences. These five findings arose primarily from twin studies. They are being confirmed by the first new quantitative genetic technique in a century—Genome-wide Complex Trait Analysis (GCTA)—which estimates genetic influence using genome-wide genotypes in large samples of unrelated individuals. Comparing GCTA results to the results of twin studies reveals important insights into the genetic

  2. An Intelligent Gear Fault Diagnosis Methodology Using a Complex Wavelet Enhanced Convolutional Neural Network.

    Science.gov (United States)

    Sun, Weifang; Yao, Bin; Zeng, Nianyin; Chen, Binqiang; He, Yuchao; Cao, Xincheng; He, Wangpeng

    2017-07-12

    As a typical example of large and complex mechanical systems, rotating machinery is prone to diversified sorts of mechanical faults. Among these faults, one of the prominent causes of malfunction is generated in gear transmission chains. Although they can be collected via vibration signals, the fault signatures are always submerged in overwhelming interfering contents. Therefore, identifying the critical fault's characteristic signal is far from an easy task. In order to improve the recognition accuracy of a fault's characteristic signal, a novel intelligent fault diagnosis method is presented. In this method, a dual-tree complex wavelet transform (DTCWT) is employed to acquire the multiscale signal's features. In addition, a convolutional neural network (CNN) approach is utilized to automatically recognise a fault feature from the multiscale signal features. The experiment results of the recognition for gear faults show the feasibility and effectiveness of the proposed method, especially in the gear's weak fault features.

  3. Hyperspectral signature analysis of skin parameters

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Garza, Luis; Kang, Sewon; Burlina, Philippe

    2013-02-01

    The temporal analysis of changes in biological skin parameters, including melanosome concentration, collagen concentration and blood oxygenation, may serve as a valuable tool in diagnosing the progression of malignant skin cancers and in understanding the pathophysiology of cancerous tumors. Quantitative knowledge of these parameters can also be useful in applications such as wound assessment, and point-of-care diagnostics, amongst others. We propose an approach to estimate in vivo skin parameters using a forward computational model based on Kubelka-Munk theory and the Fresnel Equations. We use this model to map the skin parameters to their corresponding hyperspectral signature. We then use machine learning based regression to develop an inverse map from hyperspectral signatures to skin parameters. In particular, we employ support vector machine based regression to estimate the in vivo skin parameters given their corresponding hyperspectral signature. We build on our work from SPIE 2012, and validate our methodology on an in vivo dataset. This dataset consists of 241 signatures collected from in vivo hyperspectral imaging of patients of both genders and Caucasian, Asian and African American ethnicities. In addition, we also extend our methodology past the visible region and through the short-wave infrared region of the electromagnetic spectrum. We find promising results when comparing the estimated skin parameters to the ground truth, demonstrating good agreement with well-established physiological precepts. This methodology can have potential use in non-invasive skin anomaly detection and for developing minimally invasive pre-screening tools.

  4. The Theory of Multiple Intelligences.

    Science.gov (United States)

    Gardner, Howard

    1987-01-01

    The multiple intelligence theory is based on cultural contexts, biological analysis, developmental theories, and a vertical theory of faculties. Seven intelligences are identified: linguistic, logical mathematical, musical, spatial, bodily kinesthetic, interpersonal, and intrapersonal. The theory's educational implications are described,…

  5. Efficacy in Teaching through "Multiple Intelligence" Instructional Strategies

    Science.gov (United States)

    Tamilselvi, B.; Geetha, D.

    2015-01-01

    Multiple intelligence is the theory that "people are smart in more ways than one has immense implication for educators". Howard Gardner proposed a new view of intelligence that is rapidly being incorporated in school curricula. In his theory of Multiple Intelligences, Gardner expanded the concept of intelligence with such areas as music,…

  6. Outsmarting IQ: The Emerging Science of Learnable Intelligence.

    Science.gov (United States)

    Perkins, David

    Pychologists, educators, and others have challenged the idea of a fixed IQ. This book uses recent research and earlier discoveries to argue that intelligence is not genetically set. Noting that the idea of learnable intelligence reflects the belief that intelligence can be taught, the book outlines a theory of learnable intelligence, including…

  7. Computational Intelligence and Decision Making Trends and Applications

    CERN Document Server

    Madureira, Ana; Marques, Viriato

    2013-01-01

    This book provides a general overview and original analysis of new developments and applications in several areas of Computational Intelligence and Information Systems. Computational Intelligence has become an important tool for engineers to develop and analyze novel techniques to solve problems in basic sciences such as physics, chemistry, biology, engineering, environment and social sciences.   The material contained in this book addresses the foundations and applications of Artificial Intelligence and Decision Support Systems, Complex and Biological Inspired Systems, Simulation and Evolution of Real and Artificial Life Forms, Intelligent Models and Control Systems, Knowledge and Learning Technologies, Web Semantics and Ontologies, Intelligent Tutoring Systems, Intelligent Power Systems, Self-Organized and Distributed Systems, Intelligent Manufacturing Systems and Affective Computing. The contributions have all been written by international experts, who provide current views on the topics discussed and pr...

  8. Invariance Signatures: Characterizing contours by their departures from invariance

    OpenAIRE

    Squire, David; Caelli, Terry M.

    1997-01-01

    In this paper, a new invariant feature of two-dimensional contours is reported: the Invariance Signature. The Invariance Signature is a measure of the degree to which a contour is invariant under a variety of transformations, derived from the theory of Lie transformation groups. It is shown that the Invariance Signature is itself invariant under shift, rotation and scaling of the contour. Since it is derived from local properties of the contour, it is well-suited to a neural network implement...

  9. An ID-based Blind Signature Scheme from Bilinear Pairings

    OpenAIRE

    B.Umaprasada Rao; K.A.Ajmath

    2010-01-01

    Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing any thing about the message to the signer. Blind signatures play on important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography can be a good alternative for certified based public key setting, especially when efficient key management and moderate security are required. In this paper, we prop...

  10. Distributed intelligence in CAMAC

    International Nuclear Information System (INIS)

    Kunz, P.F.

    1977-01-01

    The CAMAC digital interface standard has served us well since 1969. During this time there have been enormous advances in digital electronics. In particular, low cost microprocessors now make it feasible to consider use of distributed intelligence even in simple data acquisition systems. This paper describes a simple extension of the CAMAC standard which allows distributed intelligence at the crate level

  11. Intelligence and treaty ratification

    International Nuclear Information System (INIS)

    Naftzinger, J.E.

    1990-01-01

    This paper describes the atmosphere leading up to the Senate INF hearings and then surveys the broad issues they raised. After that, the author highlights several aspects of the intelligence community's involvement and discusses the specific intelligence-related issues as the Senate committees saw them, notes their impact on the outcome, and finally draws several conclusions and lessons pertinent to the future

  12. Intelligent robot action planning

    Energy Technology Data Exchange (ETDEWEB)

    Vamos, T; Siegler, A

    1982-01-01

    Action planning methods used in intelligent robot control are discussed. Planning is accomplished through environment understanding, environment representation, task understanding and planning, motion analysis and man-machine communication. These fields are analysed in detail. The frames of an intelligent motion planning system are presented. Graphic simulation of the robot's environment and motion is used to support the planning. 14 references.

  13. Influence of triaxiality on the signature inversion in odd-odd nuclei

    International Nuclear Information System (INIS)

    Zheng, R.R.; Luo, X.D.; Timar, J.; Sohler, S.; Nyako, B.M.; Zolnai, L.; Paul, E.S.

    2004-01-01

    Complete text of publication follows. Signature inversion in the A ∼ 100 region has been reported earlier only in the case of the odd-odd 98 Rh nucleus. Our studies on the 100-103 Rh isotopes and a close inspection of the known πg 9/2 νh 11/ 2 bands of the Rh (Z = 45) and Ag (Z = 47) isotopes revealed that the signature splitting effects, earlier considered as quenchings of signature splitting, are not only quenchings but signature inversions. Indeed, the energetically favored signature at low spins in these πg 9/2 νh 11/2 bands is the α = 1 branch (odd spins) instead of the expected α = 0 branch (even spins). The systematic occurrence of signature inversion in this mass region is discussed in Refs. together with attempts to understand its behavior qualitatively. Among many attempts for interpreting the mechanism of signature inversion in odd-odd nuclei, a model using an axially symmetric rotor plus two quasi-particles has already been successfully applied to describe the observed signature inversions in the A ∼ 80 and A ∼ 160 mass regions. According to this model the signature inversion is caused by the competition between the Coriolis and the proton-neutron residual interactions in low K space. Such calculations have been also successfully applied to the π g9/2 νh 11/2 bands in the odd-odd 98 Rh and 102 Rh nuclei. Recent observations of chiral band structures in the nearby Rh nuclei suggest a possibility of triaxiality in these nuclei, too. In the present work we examined the possible influence of triaxiality on the signature inversion using a triaxial rotor plus two-quasiparticle model and compared the results with the experimental data of 98 Rh and 102 Rh. The calculations provided a better agreement with the experiment than the axially symmetric calculations. Compared to the axially symmetric case, the triaxiality applied in the Hamiltonian enlarges the amplitudes of high-spin signature zigzags at small triaxial deformation and might push the

  14. Comparison of transcriptomic signature of post-Chernobyl and postradiotherapy thyroid tumors.

    Science.gov (United States)

    Ory, Catherine; Ugolin, Nicolas; Hofman, Paul; Schlumberger, Martin; Likhtarev, Illya A; Chevillard, Sylvie

    2013-11-01

    We previously identified two highly discriminating and predictive radiation-induced transcriptomic signatures by comparing series of sporadic and postradiotherapy thyroid tumors (322-gene signature), and by reanalyzing a previously published data set of sporadic and post-Chernobyl thyroid tumors (106-gene signature). The aim of the present work was (i) to compare the two signatures in terms of gene expression deregulations and molecular features/pathways, and (ii) to test the capacity of the postradiotherapy signature in classifying the post-Chernobyl series of tumors and reciprocally of the post-Chernobyl signature in classifying the postradiotherapy-induced tumors. We now explored if postradiotherapy and post-Chernobyl papillary thyroid carcinomas (PTC) display common molecular features by comparing molecular pathways deregulated in the two tumor series, and tested the potential of gene subsets of the postradiotherapy signature to classify the post-Chernobyl series (14 sporadic and 12 post-Chernobyl PTC), and reciprocally of gene subsets of the post-Chernobyl signature to classify the postradiotherapy series (15 sporadic and 12 postradiotherapy PTC), by using conventional principal component analysis. We found that the five genes common to the two signatures classified the learning/training tumors (used to search these signatures) of both the postradiotherapy (seven PTC) and the post-Chernobyl (six PTC) thyroid tumor series as compared with the sporadic tumors (seven sporadic PTC in each series). Importantly, these five genes were also effective for classifying independent series of postradiotherapy (five PTC) and post-Chernobyl (six PTC) tumors compared to independent series of sporadic tumors (eight PTC and six PTC respectively; testing tumors). Moreover, part of each postradiotherapy (32 genes) and post-Chernobyl signature (16 genes) cross-classified the respective series of thyroid tumors. Finally, several molecular pathways deregulated in post

  15. Interactive analysis of geodata based intelligence

    Science.gov (United States)

    Wagner, Boris; Eck, Ralf; Unmüessig, Gabriel; Peinsipp-Byma, Elisabeth

    2016-05-01

    When a spatiotemporal events happens, multi-source intelligence data is gathered to understand the problem, and strategies for solving the problem are investigated. The difficulties arising from handling spatial and temporal intelligence data represent the main problem. The map might be the bridge to visualize the data and to get the most understand model for all stakeholders. For the analysis of geodata based intelligence data, a software was developed as a working environment that combines geodata with optimized ergonomics. The interaction with the common operational picture (COP) is so essentially facilitated. The composition of the COP is based on geodata services, which are normalized by international standards of the Open Geospatial Consortium (OGC). The basic geodata are combined with intelligence data from images (IMINT) and humans (HUMINT), stored in a NATO Coalition Shared Data Server (CSD). These intelligence data can be combined with further information sources, i.e., live sensors. As a result a COP is generated and an interaction suitable for the specific workspace is added. This allows the users to work interactively with the COP, i.e., searching with an on board CSD client for suitable intelligence data and integrate them into the COP. Furthermore, users can enrich the scenario with findings out of the data of interactive live sensors and add data from other sources. This allows intelligence services to contribute effectively to the process by what military and disaster management are organized.

  16. Artificial Intelligence Applications to High-Technology Training.

    Science.gov (United States)

    Dede, Christopher

    1987-01-01

    Discusses the use of artificial intelligence to improve occupational instruction in complex subjects with high performance goals, such as those required for high-technology jobs. Highlights include intelligent computer assisted instruction, examples in space technology training, intelligent simulation environments, and the need for adult training…

  17. Intelligence Defined and Undefined: A Relativistic Appraisal

    Science.gov (United States)

    Wechsler, David

    1975-01-01

    Major reasons for the continuing divergency of opinion as regards the nature and meaning of intelligence are examined. An appraisal of intelligence as a relative concept is proposed which advocates the necessity of specifying the reference systems to which a statement about intelligence refers. (EH)

  18. Spinors, superalgebras and the signature of space-time

    CERN Document Server

    Ferrara, S.

    2001-01-01

    Superconformal algebras embedding space-time in any dimension and signature are considered. Different real forms of the $R$-symmetries arise both for usual space-time signature (one time) and for Euclidean or exotic signatures (more than one times). Application of these superalgebras are found in the context of supergravities with 32 supersymmetries, in any dimension $D \\leq 11$. These theories are related to $D = 11, M, M^*$ and $M^\\prime$ theories or $D = 10$, IIB, IIB$^*$ theories when compactified on Lorentzian tori. All dimensionally reduced theories fall in three distinct phases specified by the number of (128 bosonic) positive and negative norm states: $(n^+,n^-) = (128,0), (64,64), (72,56)$.

  19. A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.

    Science.gov (United States)

    Shen, Limin; Ma, Jianfeng; Liu, Ximeng; Miao, Meixia

    2016-11-01

    Wireless sensor networks (WSNs) are being used in a wide range of applications for healthcare monitoring, like heart rate monitors and blood pressure monitors, which can minimize the need for healthcare professionals. In medical system, sensors on or in patients produce medical data which can be easily compromised by a vast of attacks. Although signature schemes can protect data authenticity and data integrity, when the number of users involved in the medical system becomes huge, the bandwidth and storage cost will rise sharply so that existing signature schemes are inapplicability for WSNs. In this paper, we propose an efficient aggregate signature scheme for healthcare WSNs according to an improved security model, which can combine multiple signatures into a single aggregate signature. The length of such an aggregate signature may be as long as that of an individual one, which can greatly decrease the bandwidth and storage cost for networks.

  20. Observation of a 27-day solar signature in noctilucent cloud altitude

    Science.gov (United States)

    Köhnke, Merlin C.; von Savigny, Christian; Robert, Charles E.

    2018-05-01

    Previous studies have identified solar 27-day signatures in several parameters in the Mesosphere/Lower thermosphere region, including temperature and Noctilucent cloud (NLC) occurrence frequency. In this study we report on a solar 27-day signature in NLC altitude with peak-to-peak variations of about 400 m. We use SCIAMACHY limb-scatter observations from 2002 to 2012 to detect NLCs. The superposed epoch analysis method is applied to extract solar 27-day signatures. A 27-day signature in NLC altitude can be identified in both hemispheres in the SCIAMACHY dataset, but the signature is more pronounced in the northern hemisphere. The solar signature in NLC altitude is found to be in phase with solar activity and temperature for latitudes ≳ 70 ° N. We provide a qualitative explanation for the positive correlation between solar activity and NLC altitude based on published model simulations.