WorldWideScience

Sample records for voice channel authentication

  1. Authentication over Noisy Channels

    CERN Document Server

    Lai, Lifeng; Poor, H Vincent

    2008-01-01

    In this work, message authentication over noisy channels is studied. The model developed in this paper is the authentication theory counterpart of Wyner's wiretap channel model. Two types of opponent attacks, namely impersonation attacks and substitution attacks, are investigated for both single message and multiple message authentication scenarios. For each scenario, information theoretic lower and upper bounds on the opponent's success probability are derived. Remarkably, in both scenarios, lower and upper bounds are shown to match, and hence the fundamental limit of message authentication over noisy channels is fully characterized. The opponent's success probability is further shown to be smaller than that derived in the classic authentication model in which the channel is assumed to be noiseless. These results rely on a proposed novel authentication scheme in which key information is used to provide simultaneous protection again both types of attacks.

  2. METHODS FOR QUALITY ENHANCEMENT OF USER VOICE SIGNAL IN VOICE AUTHENTICATION SYSTEMS

    Directory of Open Access Journals (Sweden)

    O. N. Faizulaieva

    2014-03-01

    Full Text Available The reasonability for the usage of computer systems user voice in the authentication process is proved. The scientific task for improving the signal/noise ratio of the user voice signal in the authentication system is considered. The object of study is the process of input and output of the voice signal of authentication system user in computer systems and networks. Methods and means for input and extraction of voice signal against external interference signals are researched. Methods for quality enhancement of user voice signal in voice authentication systems are suggested. As modern computer facilities, including mobile ones, have two-channel audio card, the usage of two microphones is proposed in the voice signal input system of authentication system. Meanwhile, the task of forming a lobe of microphone array in a desired area of voice signal registration (100 Hz to 8 kHz is solved. The usage of directional properties of the proposed microphone array gives the possibility to have the influence of external interference signals two or three times less in the frequency range from 4 to 8 kHz. The possibilities for implementation of space-time processing of the recorded signals using constant and adaptive weighting factors are investigated. The simulation results of the proposed system for input and extraction of signals during digital processing of narrowband signals are presented. The proposed solutions make it possible to improve the value of the signal/noise ratio of the useful signals recorded up to 10, ..., 20 dB under the influence of external interference signals in the frequency range from 4 to 8 kHz. The results may be useful to specialists working in the field of voice recognition and speaker’s discrimination.

  3. Message Authentication over Noisy Channels

    Directory of Open Access Journals (Sweden)

    Fanfan Zheng

    2015-01-01

    Full Text Available The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework for message authentication is presented based on the results of Wyner’s wiretap channel. Impersonation and substitution attacks are primarily investigated. Information-theoretic lower and upper bounds on the opponent’s success probability are derived, and the lower bound and the upper bound are shown to match. In general, the fundamental limits on message authentication over noisy channels are fully characterized. Analysis results demonstrate that introducing noisy channels is a reliable way to enhance the security of authentication.

  4. Identity Authentication over Noisy Channels

    Directory of Open Access Journals (Sweden)

    Fanfan Zheng

    2015-07-01

    Full Text Available Identity authentication is the process of verifying users’ validity. Unlike classical key-based authentications, which are built on noiseless channels, this paper introduces a general analysis and design framework for identity authentication over noisy channels. Specifically, the authentication scenarios of single time and multiple times are investigated. For each scenario, the lower bound on the opponent’s success probability is derived, and it is smaller than the classical identity authentication’s. In addition, it can remain the same, even if the secret key is reused. Remarkably, the Cartesian authentication code proves to be helpful for hiding the secret key to maximize the secrecy performance. Finally, we show a potential application of this authentication technique.

  5. EXPERIMENTAL STUDY OF FIRMWARE FOR INPUT AND EXTRACTION OF USER’S VOICE SIGNAL IN VOICE AUTHENTICATION SYSTEMS

    Directory of Open Access Journals (Sweden)

    O. N. Faizulaieva

    2014-09-01

    Full Text Available Scientific task for improving the signal-to-noise ratio for user’s voice signal in computer systems and networks during the process of user’s voice authentication is considered. The object of study is the process of input and extraction of the voice signal of authentication system user in computer systems and networks. Methods and means for input and extraction of the voice signal on the background of external interference signals are investigated. Ways for quality improving of the user’s voice signal in systems of voice authentication are investigated experimentally. Firmware means for experimental unit of input and extraction of the user’s voice signal against external interference influence are considered. As modern computer means, including mobile, have two-channel audio card, two microphones are used in the voice signal input. The distance between sonic-wave sensors is 20 mm and it provides forming one direction pattern lobe of microphone array in a desired area of voice signal registration (from 100 Hz to 8 kHz. According to the results of experimental studies, the usage of directional properties of the proposed microphone array and space-time processing of the recorded signals with implementation of constant and adaptive weighting factors has made it possible to reduce considerably the influence of interference signals. The results of firmware experimental studies for input and extraction of the user’s voice signal against external interference influence are shown. The proposed solutions will give the possibility to improve the value of the signal/noise ratio of the useful signals recorded up to 20 dB under the influence of external interference signals in the frequency range from 4 to 8 kHz. The results may be useful to specialists working in the field of voice recognition and speaker discrimination.

  6. Secure voice-based authentication for mobile devices: vaulted voice verification

    Science.gov (United States)

    Johnson, R. C.; Scheirer, Walter J.; Boult, Terrance E.

    2013-05-01

    As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile phones, such as photo based biometrics, voice is a more natural choice. The idea of voice as a biometric identifier has been around a long time. One of the major concerns with using voice as an identifier is the instability of voice. We have developed a protocol that addresses those instabilities and preserves privacy. This paper describes a novel protocol that allows a user to authenticate using voice on a mobile/remote device without compromising their privacy. We first discuss the Vaulted Verification protocol, which has recently been introduced in research literature, and then describe its limitations. We then introduce a novel adaptation and extension of the Vaulted Verification protocol to voice, dubbed Vaulted Voice Verification (V3). Following that we show a performance evaluation and then conclude with a discussion of security and future work.

  7. The design of a digital voice data compression technique for orbiter voice channels

    Science.gov (United States)

    1975-01-01

    Voice bandwidth compression techniques were investigated to anticipate link margin difficulties in the shuttle S-band communication system. It was felt that by reducing the data rate on each voice channel from the baseline 24 (or 32) Kbps to 8 Kbps, additional margin could be obtained. The feasibility of such an alternate voice transmission system was studied. Several factors of prime importance that were addressed are: (1) achieving high quality voice at 8 Kbps; (2) performance in the presence of the anticipated shuttle cabin environmental noise; (3) performance in the presence of the anticipated channel error statistics; and (4) minimal increase in size, weight, and power over the current baseline voice processor.

  8. Authenticated semi-quantum key distributions without classical channel

    Science.gov (United States)

    Li, Chuan-Ming; Yu, Kun-Fei; Kao, Shih-Hung; Hwang, Tzonelih

    2016-07-01

    Yu et al. have proposed the first authenticated semi-quantum key distribution (ASQKD) without using an authenticated classical channel. This study further proposes two advanced ASQKD protocols. Compared to Yu et al.'s schemes, the proposed protocols ensure better qubit efficiency and require fewer pre-shared keys. Security analyses show that the proposed ASQKD protocols also can be secure against several well-known outside eavesdropper's attacks.

  9. A TDM link with channel coding and digital voice.

    Science.gov (United States)

    Jones, M. W.; Tu, K.; Harton, P. L.

    1972-01-01

    The features of a TDM (time-division multiplexed) link model are described. A PCM telemetry sequence was coded for error correction and multiplexed with a digitized voice channel. An all-digital implementation of a variable-slope delta modulation algorithm was used to digitize the voice channel. The results of extensive testing are reported. The measured coding gain and the system performance over a Gaussian channel are compared with theoretical predictions and computer simulations. Word intelligibility scores are reported as a measure of voice channel performance.

  10. A New Covert Channel over Cellular Voice Channel in Smartphones

    OpenAIRE

    Aloraini, Bushra; Johnson, Daryl; Stackpole, Bill; Mishra, Sumita

    2015-01-01

    Investigating network covert channels in smartphones has become increasingly important as smartphones have recently replaced the role of traditional computers. Smartphones are subject to traditional computer network covert channel techniques. Smartphones also introduce new sets of covert channel techniques as they add more capabilities and multiple network connections. This work presents a new network covert channel in smartphones. The research studies the ability to leak information from the...

  11. Twenty-Channel Voice Response System.

    Science.gov (United States)

    1981-06-01

    programs and vocabulary. 0 Telephone Company (TELCO) Switched Lines - provides access to VRS using telephones. * Bell 407C Data Sets - Converts the Touch...from the twenty 407C units. 0 DLII-E - Asynchronous interface to the 11/34 unibus for the VOTRAX unit. * 20 Channel ADPCM Decoder - a specially designed

  12. Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware

    DEFF Research Database (Denmark)

    Bilgin, Begul; Bogdanov, Andrey; Knezevic, Miroslav

    2013-01-01

    In this paper, we present a novel lightweight authenticated cipher optimized for hardware implementations called Fides. It is an online nonce-based authenticated encryption scheme with authenticated data whose area requirements are as low as 793 GE and 1001 GE for 80-bit and 96-bit security, resp......, cryptographically optimal 5-bit and 6-bit S-boxes are used as basic nonlinear components while paying a special attention on the simplicity of providing first order side-channel resistance with threshold implementation....

  13. Irish Accents, Foreign Voices: Mediated Agency and Authenticity in In the Name of the Father and Fifty Dead Men Walking

    Directory of Open Access Journals (Sweden)

    Nicole Ives-Allison

    2013-06-01

    Full Text Available Given the intensity of narrative contestation over the public history of and discourse around the modern period of Northern Irish civil conflict known locally as ‘the Troubles’, for filmmakers from outside of Northern Ireland to be seen as making a legitimate contribution to existing debates, there is a pressure for their film texts to be read as ‘authentic’. This desire for authenticity fundamentally shapes the narrative approach taken by these filmmakers. Various filmmaking strategies have been employed in the pursuit of authenticity, but both Jim Sheridan’s In the Name of the Father (1993 and Kari Skogland’s Fifty Dead Men Walking (2008 have taken a distinctly narrative approach, relying upon local written autobiographical material. However, the way in which Sheridan and Skogland have sought to deploy the authenticity embedded in locally grounded source material flirts with self-defeatism as both films problematically obscure the limitations on agency imposed by the filmmakers on the local voices upon who claims of authenticity, and thus the films’ legitimacy, depend.

  14. Arbitrated quantum signature of classical messages without using authenticated classical channels

    Science.gov (United States)

    Luo, Yi-Ping; Hwang, Tzonelih

    2014-01-01

    This paper points out design confusion existing in all the arbitrated quantum signatures (AQS) that require public discussions over authenticated classical channels. Instead, an AQS scheme of classical messages without using authenticated classical channels is proposed here. A cryptographic hash function is used in combine with quantum mechanics to check the existence of an eavesdropping or to verify a signature. In addition, by using only single photons, this scheme provides higher efficiency both in quantum transmissions and generations. The proposed AQS scheme is shown to be immune to several well-known attacks, i.e., the Trojan-horse attacks and the existential forgery attack.

  15. Confidentiality & Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth & Unreliable channel

    CERN Document Server

    Singh, Raju

    2011-01-01

    The security of bio-metric information - finger print, retina mapping, DNA mapping and some other chemical and biological modified genes related information - transfer through low bandwidth and unreliable or covert channel is challenging task. Therefore, Security of biometric information is essential requirement in this fast developing communication world. Thus, in this paper, we propose efficient and effective mechanism for confidentiality and authentication for biometric information transmitted by using arithmetic encoding representation over low bandwidth and unreliable channel. It enhances the speed of encryption, decryption and authentication process. It uses arithmetic encoding scheme and public key cryptography e.g. modified version of RSA algorithm called RSA-2 algorithm.

  16. Protocol of Secure Key Distribution Using Hash Functions and Quantum Authenticated Channels (KDP-6DP

    Directory of Open Access Journals (Sweden)

    Mohammed M.A. Majeed

    2010-01-01

    Full Text Available Problem statement: In previous researches, we investigated the security of communication channels, which utilizes authentication, key distribution between two parties, error corrections and cost establishment. In the present work, we studied new concepts of Quantum Authentication (QA and sharing key according to previous points. Approach: This study presented a new protocol concept that allows the session and key generation on-site by independently applying a cascade of two hash functions on a random string of bits at the sender and receiver sides. This protocol however, required a reliable method of authentication. It employed an out-of-band authentication methodology based on quantum theory, which uses entangled pairs of photons. Results: The proposed quantum-authenticated channel is secure in the presence of eavesdropper who has access to both the classical and the quantum channels. Conclusion/Recommendations: The key distribution process using cascaded hash functions provides better security. The concepts presented by this protocol represent a valid approach to the communication security problem.

  17. The Limits of Children's Voices: From Authenticity to Critical, Reflexive Representation

    Science.gov (United States)

    Spyrou, Spyros

    2011-01-01

    This article provides a critique of the preoccupation with children's voices in child-centred research by exploring their limits and problematizing their use in research. The article argues that critical, reflexive researchers need to reflect on the processes which produce children's voices in research, the power imbalances that shape them and the…

  18. Design of a digital voice data compression technique for orbiter voice channels

    Science.gov (United States)

    1975-01-01

    Candidate techniques were investigated for digital voice compression to a transmission rate of 8 kbps. Good voice quality, speaker recognition, and robustness in the presence of error bursts were considered. The technique of delayed-decision adaptive predictive coding is described and compared with conventional adaptive predictive coding. Results include a set of experimental simulations recorded on analog tape. The two FM broadcast segments produced show the delayed-decision technique to be virtually undegraded or minimally degraded at .001 and .01 Viterbi decoder bit error rates. Preliminary estimates of the hardware complexity of this technique indicate potential for implementation in space shuttle orbiters.

  19. Speaker Authentication

    CERN Document Server

    Li, Qi (Peter)

    2012-01-01

    This book focuses on use of voice as a biometric measure for personal authentication. In particular, "Speaker Recognition" covers two approaches in speaker authentication: speaker verification (SV) and verbal information verification (VIV). The SV approach attempts to verify a speaker’s identity based on his/her voice characteristics while the VIV approach validates a speaker’s identity through verification of the content of his/her utterance(s). SV and VIV can be combined for new applications. This is still a new research topic with significant potential applications. The book provides with a broad overview of the recent advances in speaker authentication while giving enough attention to advanced and useful algorithms and techniques. It also provides a step by step introduction to the current state of the speaker authentication technology, from the fundamental concepts to advanced algorithms. We will also present major design methodologies and share our experience in developing real and successful speake...

  20. Secure access to patient's health records using SpeechXRays a mutli-channel biometrics platform for user authentication.

    Science.gov (United States)

    Spanakis, Emmanouil G; Spanakis, Marios; Karantanas, Apostolos; Marias, Kostas

    2016-08-01

    The most commonly used method for user authentication in ICT services or systems is the application of identification tools such as passwords or personal identification numbers (PINs). The rapid development in ICT technology regarding smart devices (laptops, tablets and smartphones) has allowed also the advance of hardware components that capture several biometric traits such as fingerprints and voice. These components are aiming among others to overcome weaknesses and flaws of password usage under the prism of improved user authentication with higher level of security, privacy and usability. To this respect, the potential application of biometrics for secure user authentication regarding access in systems with sensitive data (i.e. patient's data from electronic health records) shows great potentials. SpeechXRays aims to provide a user recognition platform based on biometrics of voice acoustics analysis and audio-visual identity verification. Among others, the platform aims to be applied as an authentication tool for medical personnel in order to gain specific access to patient's electronic health records. In this work a short description of SpeechXrays implementation tool regarding eHealth is provided and analyzed. This study explores security and privacy issues, and offers a comprehensive overview of biometrics technology applications in addressing the e-Health security challenges. We present and describe the necessary requirement for an eHealth platform concerning biometric security.

  1. Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware

    NARCIS (Netherlands)

    Bilgin, Begül; Bogdanov, Andrey; Knezevic, Miroslav; Mendel, Florian; Wang, Qingju; Bertoni, G.; Coron, J.S.

    2013-01-01

    In this paper, we present a novel lightweight authenticated cipher optimized for hardware implementations called Fides. It is an online nonce-based authenticated encryption scheme with authenticated data whose area requirements are as low as 793 GE and 1001 GE for 80-bit and 96-bit security, respect

  2. Protecting Touch: Authenticated App-To-Server Channels for Mobile Devices Using NFC Tags

    Directory of Open Access Journals (Sweden)

    Fernando Kaway Carvalho Ota

    2017-07-01

    Full Text Available Traditional authentication methods (e.g., password, PIN often do not scale well to the context of mobile devices in terms of security and usability. However, the adoption of Near Field Communication (NFC on a broad range of smartphones enables the use of NFC-enabled tokens as an additional authentication factor. This additional factor can help to improve the security, as well as usability of mobile apps. In this paper, we evaluate the use of different types of existing NFC tags as tokens for establishing authenticated secure sessions between smartphone apps and web services. Based on this evaluation, we present two concepts for a user-friendly secure authentication mechanism for mobile apps, the Protecting Touch (PT architectures. These two architectures are designed to be implemented with either end of the spectrum of inexpensive and widely-available NFC tags while maintaining a reasonable trade-off between security, availability and cost.

  3. Irish Accents, Foreign Voices: Mediated Agency and Authenticity in In the Name of the Father and Fifty Dead Men Walking

    OpenAIRE

    Nicole Ives-Allison

    2013-01-01

    Given the intensity of narrative contestation over the public history of and discourse around the modern period of Northern Irish civil conflict known locally as ‘the Troubles’, for filmmakers from outside of Northern Ireland to be seen as making a legitimate contribution to existing debates, there is a pressure for their film texts to be read as ‘authentic’. This desire for authenticity fundamentally shapes the narrative approach taken by these filmmakers. Various filmmaking strategies have ...

  4. Efficient and side-channel resistant authenticated encryption of FPGA bitstreams

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Moradi, Amir; Yalcin, Tolga

    2013-01-01

    State-of-the-art solutions for FPGA bitstream protection rely on encryption and authentication of the bitstream to both ensure its confidentiality, thwarting unauthorized copying and reverse engineering, and prevent its unauthorized modification, maintaining a root of trust in the field. Adequate...... protection of the FPGA bitstream is of paramount importance to sustain the central functionality of dynamic reconfiguration in a hostile environment. In this work, we propose a new solution for authenticated encryption (AE) tailored for FPGA bitstream protection. It is based on the recent proposal presented...... AE modes of operation with the same countermeasure. We conclude that the deployment of dedicated AE schemes such as ALE significantly facilitates the real-world efficiency and security of FPGA bitstream protection in practice: Not only our solution enables authenticated encryption for bitstream...

  5. Distributed Authentication Mechanism for Secure Channel Establishment in Ubiquitous Medical Sensor Networks

    Directory of Open Access Journals (Sweden)

    Inshil Doh

    2011-01-01

    Full Text Available In medical sensor networks, sensor nodes on a body of the patient sense the vital data and deliver them to the server system through mobile devices or gateways in the middle. However, when these linking devices do not function because of the battery outage or the system fault, the server system could not get patients' data during that period, and this situation could lead to serious problems. In this paper, to cope with this problem, we propose a distributed authentication mechanism in which substituted devices could be authenticated to deliver patients' data to the server system in the unusual situation.

  6. Enhancing Author's Voice through Scripting

    Science.gov (United States)

    Young, Chase J.; Rasinski, Timothy V.

    2011-01-01

    The authors suggest using scripting as a strategy to mentor and enhance author's voice in writing. Through gradual release, students use authentic literature as a model for writing with voice. The authors also propose possible extensions for independent practice, integration across content areas, and tips for evaluation.

  7. Geometry of human vocal folds and glottal channel for mathematical and biomechanical modeling of voice production.

    Science.gov (United States)

    Sidlof, Petr; Svec, Jan G; Horácek, Jaromír; Veselý, Jan; Klepácek, Ivo; Havlík, Radan

    2008-01-01

    Current models of the vocal folds derive their shape from approximate information rather than from exactly measured data. The objective of this study was to obtain detailed measurements on the geometry of human vocal folds and the glottal channel in phonatory position. A non-destructive casting methodology was developed to capture the vocal fold shape from excised human larynges on both medial and superior surfaces. Two female larynges, each in two different phonatory configurations corresponding to low and high fundamental frequency of the vocal fold vibrations, were measured. A coordinate measuring machine was used to digitize the casts yielding 3D computer models of the vocal fold shape. The coronal sections were located in the models, extracted and fitted by piecewise-defined cubic functions allowing a mathematical expression of the 2D shape of the glottal channel. Left-right differences between the cross-sectional shapes of the vocal folds were found in both the larynges.

  8. Geospatial Authentication

    Science.gov (United States)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time has been developed. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server. The Geospatial Authentication software has two parts Server and Client. The server software is a virtual private network (VPN) developed in Linux operating system using Perl programming language. The server can be a stand-alone VPN server or can be combined with other applications and services. The client software is a GUI Windows CE software, or Mobile Graphical Software, that allows users to authenticate into a network. The purpose of the client software is to pass the needed satellite information to the server for authentication.

  9. A Methodology for Measuring Voice Quality Using PESQ and Interactive Voice Response in the GSM Channel Designed by OpenBTS

    Directory of Open Access Journals (Sweden)

    Pavol Partila

    2013-01-01

    Full Text Available This article discusses a methodology for rating the quality of mobile calls. Majority telecommunications service from the perspective of the whole world is using mobile telephony networks. One of the problems affecting this service and its quality are landscape barriers, which prevent the spread signal. Price and complex construction of classic BTS does not allow their dense distribution. In such cases, one solution is to use OpenBTS technology. Design of OpenBTS is more available, so it can be applied to much more places and more complex points. Purpose of this measurement is a model for effective stations deployment, due to shape and distribution of local barriers that reduce signal power, and thus the quality of speech. GSM access point for our mobile terminals is OpenBTS USRP N210 station. The PESQ method for evaluating of speech quality is compared with the subjective evaluation, which provides Asterisk PBX with IVR call back. Measurement method was taken into account the call quality depending on terminal position. The measured results and its processing bring knowledge to use this technology for more complicated locations with degraded signal level and increases the quality of voice services in telecommunications.

  10. Authenticating cache.

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Tyler Barratt; Urrea, Jorge Mario

    2012-06-01

    The aim of the Authenticating Cache architecture is to ensure that machine instructions in a Read Only Memory (ROM) are legitimate from the time the ROM image is signed (immediately after compilation) to the time they are placed in the cache for the processor to consume. The proposed architecture allows the detection of ROM image modifications during distribution or when it is loaded into memory. It also ensures that modified instructions will not execute in the processor-as the cache will not be loaded with a page that fails an integrity check. The authenticity of the instruction stream can also be verified in this architecture. The combination of integrity and authenticity assurance greatly improves the security profile of a system.

  11. Authenticating cache.

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Tyler Barratt; Urrea, Jorge Mario

    2012-06-01

    The aim of the Authenticating Cache architecture is to ensure that machine instructions in a Read Only Memory (ROM) are legitimate from the time the ROM image is signed (immediately after compilation) to the time they are placed in the cache for the processor to consume. The proposed architecture allows the detection of ROM image modifications during distribution or when it is loaded into memory. It also ensures that modified instructions will not execute in the processor-as the cache will not be loaded with a page that fails an integrity check. The authenticity of the instruction stream can also be verified in this architecture. The combination of integrity and authenticity assurance greatly improves the security profile of a system.

  12. Authentic leadership.

    Science.gov (United States)

    Kerfoot, Karlene

    2006-12-01

    There is leadership, and then there is authentic leadership. If you are not willing to engage from your heart, to passionately work to create a greater quality of work life for front-line staff every day, and to push yourself to the ultimate limit to make that happen, you might be a leader, but you will not be perceived as an authentic leader. Authentic leaders love, challenge people to do what they didn't believe was possible, and generate the energy to make the impossible possible by their passion for their people, their patients, and for doing the right thing. Thankfully, there are leaders who are willing to live on the edge, model their love, and inspire people to change the world. Will you be one of them?

  13. Vein matching using artificial neural network in vein authentication systems

    Science.gov (United States)

    Noori Hoshyar, Azadeh; Sulaiman, Riza

    2011-10-01

    Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.

  14. System and method for authentication

    Energy Technology Data Exchange (ETDEWEB)

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  15. Voice Disorders

    Science.gov (United States)

    Voice is the sound made by air passing from your lungs through your larynx, or voice box. In your larynx are your vocal cords, ... to make sound. For most of us, our voices play a big part in who we are, ...

  16. Every Voice

    Science.gov (United States)

    Patrick, Penny

    2008-01-01

    This article discusses how the author develops an approach that allows her students, who are part of the marginalized population, to learn the power of their own voices--not just their writing voices, but their oral voices as well. The author calls it "TWIST": Thoughts, Writing folder, Inquiring mind, Supplies, and Teamwork. It is where…

  17. Every Voice

    Science.gov (United States)

    Patrick, Penny

    2008-01-01

    This article discusses how the author develops an approach that allows her students, who are part of the marginalized population, to learn the power of their own voices--not just their writing voices, but their oral voices as well. The author calls it "TWIST": Thoughts, Writing folder, Inquiring mind, Supplies, and Teamwork. It is where…

  18. Voice restoration

    NARCIS (Netherlands)

    Hilgers, F.J.M.; Balm, A.J.M.; van den Brekel, M.W.M.; Tan, I.B.; Remacle, M.; Eckel, H.E.

    2010-01-01

    Surgical prosthetic voice restoration is the best possible option for patients to regain oral communication after total laryngectomy. It is considered to be the present "gold standard" for voice rehabilitation of laryngectomized individuals. Surgical prosthetic voice restoration, in essence, is alwa

  19. Quantum Communication Complexity of Quantum Authentication Protocols

    CERN Document Server

    Guedes, Elloá B

    2011-01-01

    In order to perform Quantum Cryptography procedures it is often essencial to ensure that the parties of the communication are authentic. Such task is accomplished by quantum authentication protocols which are distributed algorithms based on the intrinsic properties of Quantum Mechanics. The choice of an authentication protocol must consider that quantum states are very delicate and that the channel is subject to eavesdropping. However, even in face of the various existing definitions of quantum authentication protocols in the literature, little is known about them in this perspective, and this lack of knowledge may unfavor comparisons and wise choices. In the attempt to overcome this limitation, in the present work we aim at showing an approach to evaluate quantum authentication protocols based on the determination of their quantum communication complexity. Based on our investigation, no similar methods to analyze quantum authentication protocols were found in the literature. Pursuing this further, our approa...

  20. Post-Session Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2012-01-01

    . In this paper, we consider the case of post-session authentication, where parties authenticate each other at the end of their interactive session. This use of authentication is different from session-less authentication (e.g., in RFID) and pre-session authentication (e.g., for access control.) Post...

  1. Tibetan Interpretations of Authenticity

    DEFF Research Database (Denmark)

    Sobisch, Jan-Ulrich

    2015-01-01

    The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions.......The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions....

  2. AIS authentication

    CERN Multimedia

    2006-01-01

    Users are invited to use the NICE password for AIS authentication. As announced in CNL June-August 2006 (see http://www.cerncourier.com/articles/cnl/3/6/14/1) it is possible to use the NICE username and password to log on to AIS. The procedure is now fully operational and users can themselves reset the AIS password such that the NICE password will be used for authentication required by AIS applications. We strongly recommend CERN users who have a NICE account (this is the case of most users) to do this, with the objective to reduce the number of passwords they need to remember. This can be achieved very easily, directly from the Change Password option on the AIS login (https://aislogin.cern.ch/). Users should just select the '[Change Password]' option displayed at the bottom of the page, provide the 'Old Password' and then click on the button 'Use Nice password' followed by 'Submit'. Change Password option on the AIS login windowSetting the AIS password - Use Nice Password It should be noted that the proce...

  3. Authenticating the Leader

    DEFF Research Database (Denmark)

    Johnsen, Christian Garmann

    of authentication within discourse of authentic leadership. If authentic leadership is to make any sense, it is necessary to be able to distinguish the authentic from the inauthentic leader – in other words, it is necessary to authenticate the leader. This paper uses Gilles Deleuze’s reading of Plato as the point...... of departure for discussing the problem of authentication – separating the authentic leader form the inauthentic one – in the leadership guru Bill George’s model of authentic leadership. By doing so, the paper offers a way of conceptualizing the problem of authenticating leaders, as well as challenging...... procedure of separating the authentic from the inauthentic leader underlying the discourse on authentic leadership....

  4. Using Student Voices to Guide Instruction

    Science.gov (United States)

    Elliott-Johns, Susan E.; Booth, David; Rowsell, Jennifer; Puig, Enrique; Paterson, Jane

    2012-01-01

    A collaborative team of five international teacher educators/researchers examine the importance of student voice for authentic discourse and instructional design in contemporary classrooms. Excerpts from their perspectives on teaching, research, and innovative programs are woven together and include suggested Actions/Reflections for the reader.…

  5. Towards non-repudiable authentication through biometrics and smart cards

    CSIR Research Space (South Africa)

    Msiza, I

    2012-10-01

    Full Text Available : Biometrics ? CSIR 2012 Slide 2 ? Biometric Authentication ? Why Fingerprint Recognition? ? Fingerprint Recognition ? Africa Needs to Catch-up Part C: Biometrics & Smart Cards ? Fingerprint Recognition and Smart Cards ? Some Challenges Part D... ? These traits could be their iris, fingerprint, face, voice, gate, and others ? Fingerprint recognition is currently the most popular mode of biometric authentication Why Fingerprint Recognition? ? CSIR 2012 Slide 9 Biometric Recognition ? Africa Needs...

  6. Authenticating Performances

    DEFF Research Database (Denmark)

    Rudolph, Michael

    2015-01-01

    Adherents of performance theory emphasize the constitutive and transformative potential of rituals with respect to patterns of social organization and authority. For them, rituals “not only mean something, but also do something, particularly the way they construct and inscribe power relationships......” (Bell 1997). This contribution focuses on the role of ritual in postcolonial identity constitution and the performative authentication of political power and social authority in Taiwan. Since the middle of the 1990s, traditionalist performances have been on the rise on the island. Generously subsidized...... at the contemporary rituals of the Taroko and Ami, which are characterized by the above mentioned dynamics, I argue that rituals publicly performed by aborigines today amalgamate different levels of meaning. While they articulate and negotiate the identity needs and social exigencies of the respective social group...

  7. Definition of Entity Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    Authentication is considered a pre-requisite for communication security, but the definition of authentication is generally not agreed upon. Many attacks on authentication protocols are the result of misunderstanding of the goals of authentication. This state of affairs indicate limitations in the...

  8. Should Teachers Be Authentic?

    Science.gov (United States)

    Bialystok, Lauren

    2015-01-01

    Authenticity is often touted as an important virtue for teachers. But what do we mean when we say that a teacher ought to be "authentic"? Research shows that discussions of teacher authenticity frequently refer to other character traits or simply to teacher effectiveness, but authenticity is a unique concept with a long philosophical…

  9. Definition of Entity Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    Authentication is considered a pre-requisite for communication security, but the definition of authentication is generally not agreed upon. Many attacks on authentication protocols are the result of misunderstanding of the goals of authentication. This state of affairs indicate limitations...... in theoretical understanding of the meanings of authentication. We provide a new insight in this direction and formalize it in CFPS (Common Framework for authentication Protocols' Specifications). CFPS provides a precise scope of definition for authentication protocols, which could make the design and analysis...

  10. Transparent User Authentication

    CERN Document Server

    Clarke, Nathan

    2011-01-01

    This groundbreaking text examines the problem of user authentication from a completely new viewpoint. Rather than describing the requirements, technologies and implementation issues of designing point-of-entry authentication, the book introduces and investigates the technological requirements of implementing transparent user authentication -- where authentication credentials are captured during a user's normal interaction with a system. This approach would transform user authentication from a binary point-of-entry decision to a continuous identity confidence measure. Topics and features: discu

  11. Authenticating the Leader

    DEFF Research Database (Denmark)

    Garmann Johnsen, Christian

    2015-01-01

    In the wake of a series of corporate scandals, there has been a growing call for authentic leadership in order to ensure ethical conduct in contemporary organizations. Authentic leadership, however, depends upon the ability to draw a distinction between the authentic and inauthentic leader....... This paper uses Deleuze’s discussion of Platonism as a point of departure for critically scrutinizing the problem of authenticating the leader - drawing a distinction between authentic and inauthentic leaders. This will be done through a reading of Bill George’s book Authentic Leadership. Informed by Deleuze......’s inverted Platonism, the paper challenges the practice by which authentic leaders are distinguished from inauthentic leaders. In conclusion, the paper suggests that an adequate concept of authentic leadership should consider how ethics can occur when the authentic leader is able to critically reflect his...

  12. Research and Implement on the Driver of Multi-channel Voice Device under Linux%Linux下多通道话音采集压缩卡的驱动研究与实现

    Institute of Scientific and Technical Information of China (English)

    翟永久

    2011-01-01

    Device driver in the Linux kernel plays an important role,which is responsible for the mapped of the actual hardware-specific operations.To achieve the real-time multi-channel voice data collection in Linux of simultaneous multi-channel digital recorder, we proposed multi-channel voice capture and compression card driver design,described the initialization of the device driver, Finally we analyzed the stability and real-time of the driver in Linux.%设备驱动程序在Linux内核中占有重要的地位,它是负责实际硬件设备的特定操作的映射。为了实现多通道同步数字记录仪在Linux下对多通道话音数据的实时采集,给出了多通道话音采集压缩卡的驱动程序的设计,描述了驱动程序的初始化过程,提高了系统的可靠性。最后分析了驱动程序的稳定性与实时性。

  13. Keeping Your Voice Healthy

    Science.gov (United States)

    ... Find an ENT Doctor Near You Keeping Your Voice Healthy Keeping Your Voice Healthy Patient Health Information ... heavily voice-related. Key Steps for Keeping Your Voice Healthy Drink plenty of water. Moisture is good ...

  14. Defining Authentic Classroom Assessment

    Science.gov (United States)

    Frey, Bruce B.; Schmitt, Vicki L.; Allen, Justin P.

    2012-01-01

    A commonly advocated best practice for classroom assessment is to make the assessments authentic. Authentic is often used as meaning the mirroring of real-world tasks or expectations. There is no consensus, however, in the actual definition of the term or the characteristics of an authentic classroom assessment. Sometimes, the realistic component…

  15. Authenticity in Adult Learning

    Science.gov (United States)

    Ashton, Sam

    2010-01-01

    This paper is concerned with the relationship between authenticity and adult learning and prompted by some studies in which adult "authentic learning" is a central concept. The implication revealed by them is that real-worldness of learning contexts, learning content and learning tasks is perceived as conferring authenticity on learning. Here,…

  16. Authentic Assessment, Professional's Guide.

    Science.gov (United States)

    Ryan, Concetta Doti

    Authentic assessment is the process of gathering evidence and documenting student learning and growth in an authentic context. Authentic assessment can do a better job than more traditional forms of assessment in informing educators and parents about a student's real achievement. The first chapter of this book presents an overview of authentic…

  17. Multi-factor authentication

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  18. Towards Public Key Infrastructure less authentication in Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Md. Sarwar Morshed

    2010-01-01

    Full Text Available The Session Initiation Protocol (SIP has become the most predominant protocol for Voice over Internet Protocol (VoIP signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from pre-shared secret based solutions to Public Key Infrastructure (PKI based solution. However, due to the limitations in PKI based solutions, some PKI less authentications mechanisms are proposed. This paper aims to present an overview of different authentication methods used in or together with SIP. We start by highlighting the security issues in SIP in the context of VoIP communication. Then we illustrate the current activities regarding the SIP authentication mechanisms including the recent developments in the research community and standardization efforts within the Internet Engineering Task Force (IETF. Finally we analyze the security aspects of these approaches.

  19. Towards Public Key Infrastructure less authentication in Session Initiation Protocol

    CERN Document Server

    Hasib, Abdullah Al; Morshed, Md Sarwar

    2010-01-01

    The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from pre-shared secret based solutions to Public Key Infrastructure (PKI) based solution. However, due to the limitations in PKI based solutions, some PKI less authentications mechanisms are proposed. This paper aims to present an overview of different authentication methods used in or together with SIP. We start by highlighting the security issues in SIP in the context of VoIP communication. Then we illustrate the current activities regarding the SIP authentication mechanisms including the recent developments in the research community and standardization efforts within the Internet Engineering Task Force (IETF). Finally we analyze the security aspects of these approaches.

  20. Three-party authenticated key agreements for optimal communication.

    Science.gov (United States)

    Lee, Tian-Fu; Hwang, Tzonelih

    2017-01-01

    Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any common secret key, they require the help of the server to authenticate their identities and exchange confidential and authenticated information over insecure networks. However, if the session key security is based on asymmetric cryptosystems, then revealing the sub-keys cannot compromise the session key. The clients can directly exchange the sub-keys and reduce the transmissions. In addition, authenticated key agreements were developed by using the derived results of the lower bounds on communications. Compared with related approaches, the proposed protocols had fewer transmissions and realized the lower bounds on communications.

  1. Password Authentication Based on Fractal Coding Scheme

    Directory of Open Access Journals (Sweden)

    Nadia M. G. Al-Saidi

    2012-01-01

    Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.

  2. Authenticity at work

    NARCIS (Netherlands)

    van den Bosch, Ralph

    2016-01-01

    Authenticity at work, loosely defined as the degree to which an individual stays true to their core self, has impact on workers in the workplace. This thesis shows that authenticity at work can be measured with a reliable and valid instrument: the IAM Work. Furthermore, results of this thesis show t

  3. Authenticity and Imagination

    Science.gov (United States)

    Dirkx, John M.

    2006-01-01

    Central to development of authenticity in teaching is self-understanding and self-awareness. Using a Jungian perspective, the author suggests that the imaginative dimensions of the self play a critical role in our journey and experience as teachers, and in developing self-awareness and authenticity in our teaching.

  4. Authenticity at work

    NARCIS (Netherlands)

    van den Bosch, Ralph

    2016-01-01

    Authenticity at work, loosely defined as the degree to which an individual stays true to their core self, has impact on workers in the workplace. This thesis shows that authenticity at work can be measured with a reliable and valid instrument: the IAM Work. Furthermore, results of this thesis show

  5. Decolonizing Researcher Authenticity

    Science.gov (United States)

    Daza, Stephanie Lynn

    2008-01-01

    This article examines the ways in which researcher authenticity is negotiated along three axes of difference, ethno-linguistic affiliation, sexual orientation and race/skin color. Ultimately, it analyzes how researcher authenticity is produced and played out within research, via interactions between participants, researchers and others who…

  6. Single password authentication

    OpenAIRE

    Küpçü, Alptekin; Acar, Tolga; Belenkiy, Mira

    2013-01-01

    Single Password Authentication Tolga Acar∗ Intel Corporation, Bellevue, WA, USA Mira Belenkiy Microsoft Research, Redmond, WA, USA Alptekin K up c u† Ko c University, _Istanbul, TURKEY May 11, 2013 Abstract Users frequently reuse their passwords when authenticating to various online services. Com-bined with the use of weak passwords or honeypot/phishing attacks, this brings high risks to th...

  7. Discovering Their Voices: Engaging Adolescent Girls with Young Adult Literature

    Science.gov (United States)

    Sprague, Marsha M.; Keeling, Kara K.

    2007-01-01

    Authors Marsha M. Sprague and Kara K. Keeling propose a language arts curriculum that incorporates literature-based discussions to help adolescent girls deal constructively with difficult issues and develop their own authentic voices. To help put such a curriculum into action, this book offers the following resources: (1) A research base to frame…

  8. LabVIEW in Design of a Two-channel Voice Recording System%基于LabVIEW的双声道语音录制系统的设计

    Institute of Scientific and Technical Information of China (English)

    智耕

    2012-01-01

    本文论述了一款双声道语音录制系统的组成及开发过程,该系统利用LabVIEW进行设计,采用计算机声卡代替专用数据采集卡,实现语音信号的录制、显示、存储等功能,具有广阔的应用前景。%This paper discusses components and development process of a two-channel voice recording system, using LabVIEW and computer's sound card instead of a special DAC. This method could achieve functions of recording, displaying and saving signal data, enjoying broad application prospects.

  9. LabVIEW in Design of a Two-channel Voice Recording System%基于LabVIEW的双声道语音录制系统的设计

    Institute of Scientific and Technical Information of China (English)

    智耕

    2012-01-01

    本文论述了一款双声道语音录制系统的组成及开发过程,该系统利用LabVIEW进行设计,采用计算机声卡代替专用数据采集卡,实现语音信号的录制、显示、存储等功能,具有广阔的应用前景。%This paper discusses components and development process of a two-channel voice recording system,using LabVIEW and computer's sound card instead of a special DAC.This method could achieve functions of recording,displaying and saving signal data,enjoying broad application prospects.

  10. AUTHENTICITY IN THE BLOGOSPHERE

    Directory of Open Access Journals (Sweden)

    Waclaw Branicki

    2010-01-01

    Full Text Available The primary purpose of this article is to answer the question of whether writing a blog defined as a personal diary can help to better understand himself. Self-awareness is a prerequisite for authentic existence. In the first part analyzed the concept of authenticity. Pointed out the relationship of authenticity to the categories of freedom, truth and responsibility. The second part presents the relationship between authentic existence and the process of self-disclosure, which may take place in the blogosphere. In the third part presents the question whether a writing blog affects the level authenticity of existence. It was recognized that a key element of this phenomenon is the sense of responsibility.

  11. IMAGE AUTHENTICATION TECHNIQUES AND ADVANCES SURVEY

    Directory of Open Access Journals (Sweden)

    Derroll David

    2015-10-01

    Full Text Available With the advanced technologies in the area of Engineering the World has become a smaller place and communication is in our finger tips. The multimedia sharing traffic through electronic media has increased tremendously in the recent years with the higher use of social networking sites. The statistics of amount of images uploaded in the internet per day is very huge. Digital Image security has become vulnerable due to increase transmission over non-secure channel and needs protection. Digital Images play a crucial role in medical and military images etc. and any tampering of them is a serious issue. Several approaches are introduced to authenticate multimedia images. These approaches can be categorized into fragile and semi-fragile watermarking, conventional cryptography and digital signatures based on the image content. The aim of this paper is to provide a comparative study and also a survey of emerging techniques for image authentication. The important requirements for an efficient image authentication system design are discussed along with the classification of image authentication into tamper detection, localization and reconstruction and robustness against image processing operation. Furthermore, the concept of image content based authentication is enlightened.

  12. Authentication: science and art at odds?

    Science.gov (United States)

    Chartier, Duane R.; Notehelfer, Fred G.

    1998-05-01

    Contrary to popular belief, there is a very great difference between the detection of forgery versus the authentication of works of art. Sciences is generally very good at producing evidence of falsification but often is equally poor at proving authenticity. The primary reason for these gross differences is that connoisseurship and art history are more strongly involved in the process of authentication than are scientific testing and analysis. There is also a pronounced lack of substantive interaction between art conservation professionals, scientists and art historians. The case of a recently discovered painting by John Constable will be used to illustrate the difficulties and opportunities of a balanced and systematic approach to the process of authentication. There is much more than science involved in such endeavors and this would not surprise anyone who has attempted to introduce works of art through non-traditional channels. Great problems arise when the curatorial community is asked to consider works that do not so easily 'fit' into a neat art historical period or stylistic pigeonhole. Connoisseurs often will only accept the best works of an artist and discount the inevitable products of the artist's evolution -- less accomplished works. Scientific principles and technical evidence can and must be used in order to elevate the practice of authentication.

  13. Data Authentication Using Cryptography

    Directory of Open Access Journals (Sweden)

    Sagar Chouksey

    2013-06-01

    Full Text Available We present a novel approach using cryptographyfor data authentication. The key idea is to provide aencoded quantized data projection as authenticationdata. This can be correctly decoded with the help ofan authentic data using as side information.Cryptography source coding provides the desiredrobustness against legitimate variations whiledetecting illegitimate modification. Additionaladjustments might not change the meaning of thecontent, but could be misclassified as tampering.Users might also beinterested in localizingtampered regions. Distinguishing legitimateencodings with possible adjustments fromtampering and localizing tampering are thechallenges addressed in this paper. We applycryptography source coding and statistical methodsto solve the data authentication problem.Experimental results have been presented for dataauthentication.

  14. Richard Peters and Valuing Authenticity

    Science.gov (United States)

    Degenhardt, M. A. B.

    2009-01-01

    Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…

  15. Quantum deniable authentication protocol

    Science.gov (United States)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2014-07-01

    The proposed quantum identity authentication schemes only involved authentication between two communicators, but communications with deniability capability are often desired in electronic applications such as online negotiation and electronic voting. In this paper, we proposed a quantum deniable authentication protocol. According to the property of unitary transformation and quantum one-way function, this protocol can provide that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Security analysis results show that this protocol satisfies the basic security requirements of deniable authentication protocol such as completeness and deniability and can withstand the forgery attack, impersonation attack, inter-resend attack.

  16. Authenticity in Anatomy Art.

    Science.gov (United States)

    Adkins, Jessica

    2017-01-12

    The aim of this paper is to observe the evolution and evaluate the 'realness' and authenticity in Anatomy Art, an art form I define as one which incorporates accurate anatomical representations of the human body with artistic expression. I examine the art of 17th century wax anatomical models, the preservations of Frederik Ruysch, and Gunther von Hagens' Body Worlds plastinates, giving consideration to authenticity of both body and art. I give extra consideration to the works of Body Worlds since the exhibit creator believes he has created anatomical specimens with more educational value and bodily authenticity than ever before. Ultimately, I argue that von Hagens fails to offer Anatomy Art 'real human bodies,' and that the lack of bodily authenticity of his plastinates results in his creations being less pedagogic than he claims.

  17. Speaking and Nonspeaking Voice Professionals: Who Has the Better Voice?

    Science.gov (United States)

    Chitguppi, Chandala; Raj, Anoop; Meher, Ravi; Rathore, P K

    2017-04-18

    Voice professionals can be classified into two major subgroups: the primarily speaking and the primarily nonspeaking voice professionals. Nonspeaking voice professionals mainly include singers, whereas speaking voice professionals include the rest of the voice professionals. Although both of these groups have high vocal demands, it is currently unknown whether both groups show similar voice changes after their daily voice use. Comparison of these two subgroups of voice professionals has never been done before. This study aimed to compare the speaking voice of speaking and nonspeaking voice professionals with no obvious vocal fold pathology or voice-related complaints on the day of assessment. After obtaining relevant voice-related history, voice analysis and videostroboscopy were performed in 50 speaking and 50 nonspeaking voice professionals. Speaking voice professionals showed significantly higher incidence of voice-related complaints as compared with nonspeaking voice professionals. Voice analysis revealed that most acoustic parameters including fundamental frequency, jitter percent, and harmonic-to-noise ratio were significantly higher in speaking voice professionals, whereas videostroboscopy did not show any significant difference between the two groups. This is the first study of its kind to analyze the effect of daily voice use in the two subgroups of voice professionals with no obvious vocal fold pathology. We conclude that voice professionals should not be considered as a homogeneous group. The detrimental effects of excessive voice use were observed to occur more significantly in speaking voice professionals than in nonspeaking voice professionals. Copyright © 2017 The Voice Foundation. Published by Elsevier Inc. All rights reserved.

  18. Leveraging voice

    DEFF Research Database (Denmark)

    Frølunde, Lisbeth

    2017-01-01

    researchers improve our practices and how could digital online video help offer more positive stories about research and higher education? How can academics in higher education be better to tell about our research, thereby reclaiming and leveraging our voice in a post-factual era? As higher education......This paper speculates on how researchers share research without diluting our credibility and how to make strategies for the future. It also calls for consideration of new traditions and practices for communicating knowledge to a wider audience across multiple media platforms. How might we...... continues to engage with digital and networked technologies it becomes increasingly relevant to question why and how academics could (re) position research knowledge in the digital and online media landscape of today and the future. The paper highlights methodological issues that arise in relation...

  19. Feeling voices.

    Directory of Open Access Journals (Sweden)

    Paolo Ammirante

    Full Text Available Two experiments investigated deaf individuals' ability to discriminate between same-sex talkers based on vibrotactile stimulation alone. Nineteen participants made same/different judgments on pairs of utterances presented to the lower back through voice coils embedded in a conforming chair. Discrimination of stimuli matched for F0, duration, and perceived magnitude was successful for pairs of spoken sentences in Experiment 1 (median percent correct = 83% and pairs of vowel utterances in Experiment 2 (median percent correct = 75%. Greater difference in spectral tilt between "different" pairs strongly predicted their discriminability in both experiments. The current findings support the hypothesis that discrimination of complex vibrotactile stimuli involves the cortical integration of spectral information filtered through frequency-tuned skin receptors.

  20. Information-theoretic analysis of electronic and printed document authentication

    Science.gov (United States)

    Voloshynovskiy, Sviatoslav; Koval, Oleksiy; Villan, Renato; Topak, Emre; Vila Forcén, José Emilio; Deguillaume, Frederic; Rytsar, Yuriy; Pun, Thierry

    2006-02-01

    In this paper we consider the problem of document authentication in electronic and printed forms. We formulate this problem from the information-theoretic perspectives and present the joint source-channel coding theorems showing the performance limits in such protocols. We analyze the security of document authentication methods and present the optimal attacking strategies with corresponding complexity estimates that, contrarily to the existing studies, crucially rely on the information leaked by the authentication protocol. Finally, we present the results of experimental validation of the developed concept that justifies the practical efficiency of the elaborated framework.

  1. Persistent Authentication in Smart Environments

    DEFF Research Database (Denmark)

    Hansen, Mads Syska; Kirschmeyer, Martin; Jensen, Christian D.

    2008-01-01

    Inhabitants in smart environments are often authenticated when they enter the smart environment, e.g., through biometrics or smart-/swipe-card systems. It may sometimes be necessary to re-authenticate when an inhabitant wishes to enter a restricted area or access ambient services or location based...... will not be installed unless it is absolutely necessary. The cost of installing and maintaining an authentication infrastructure and the inconvenience of repeatedly authenticating toward different location based service providers mean that new models of authentication are needed in smart environments. This paper...... defines a persistent authentication model for a smart environment, which tracks inhabitants in the smart environment from the point of authentication to the protected resource, thus rendering authentication persistent by correlating the initial authentication event with the access control request. We...

  2. Who speaks for extinct nations? The Beothuk and narrative voice

    Directory of Open Access Journals (Sweden)

    C. Leggo

    1995-05-01

    Full Text Available The Beothuk of Newfoundland were among the first inhabitants of North America to encounter European explorers and settlers. By the first part of the nineteenth century the Beothuk were extinct, exterminated by the fishers and soldiers and settlers of western Europe. The last Beothuk was a woman named Shanadithit. She was captured and lived with white settlers for a few years before she died in 1829. Today all that remains of the Beothuk nation, which once numbered seven hundred to one thousand people, are some bones, arrowheads, tools, written records of explorers and settlers, and copies of drawings by Shanadithit in the Newfoundland Museum. In recent years several writers (all are white and male have written fiction and poetry and drama about the Beothuk, including Peter Such (Riverrun, 1973, Paul O'Neill (Legends of a Lost Tribe, 1976, Sid Stephen (Beothuk Poems, 1976, Al Pittman ("Shanadithit," 1978, Geoffrey Ursell (The Running of the Deer; A Play, 1981, Donald Gale (Sooshewan: A Child of the Beothuk, 1988, and Kevin Major (Blood Red Ochre, 1990. A recurring theme in all these narratives is the theme of regret and guilt. These narrative accounts of the Beothuk raise significant questions about voice and narrative, including: Who can speak for Native peoples? Who can speak for extinct peoples? Are there peoples without voices? How is voice historically determined? What is the relationship between voice and power? How are the effects of voice generated? What is an authentic voice? How is voice related to the illusion of presence? What is the relation between voice and silence? In examining contemporary narrative accounts of the Beothuk my goal is to reveal the rhetorical ways in which the Beothuk are given voice(s and to interrogate the ethical and pedagogical implications of contemporary authors revisiting and revisioning and re-voicing a nation of people long extinct.

  3. Authentication Without Secrets

    Energy Technology Data Exchange (ETDEWEB)

    Pierson, Lyndon G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Robertson, Perry J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  4. Password authentication in cloud

    Directory of Open Access Journals (Sweden)

    Indal Singh

    2015-09-01

    Full Text Available Cloud computing is an Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand. However, adopting a cloud computing paradigm may have positive as well as negative effects on the data security of service consumers [1]. Cloud Computing is a term used to describe both a platform and type of application. As a platform it supplies, configures and reconfigures servers, while the servers can be physical machines or virtual machines. On the other hand, Cloud Computing describes applications that are extended to be accessible through the internet and for this purpose large data centers and powerful servers are used to host the web applications and web services. Authentication is one the most important security primitive [6]. Password authentication is most widely used authentication mechanism. Password provides security mechanism for authentication and protection services against unwanted access to resource. In this paper, we applied a technique to preserve our password using graphical authentication.

  5. Brand new authentic places

    DEFF Research Database (Denmark)

    Stender, Marie

    neighbourhoods stories of authenticity seems to be of great importance giving value and identity to place and people. By way of design and branding new places are implied with notions of the real, the original and the unique referring to e.g. its historical past, architectural uniqueness, sustainability or sense......How are places and material surroundings ascribed with meaning when new residential neighbourhoods are designed, branded and taken into use? Existing research on housing, neighbourhoods and urban design tends to take the perspective of either the architect or the user rather than to explore...... the relation and interplay between the two. This study strives to fill this gap by ethnographically tracing the process from design to occupancy including the role of branding as a means to create authenticity. The concept of authenticity is often associated with old houses and neighbourhoods, but also in new...

  6. Brand new authentic places

    DEFF Research Database (Denmark)

    Stender, Marie

    How are places and material surroundings ascribed with meaning when new residential neighbourhoods are designed, branded and taken into use? Existing research on housing, neighbourhoods and urban design tends to take the perspective of either the architect or the user rather than to explore...... the relation and interplay between the two. This study strives to fill this gap by ethnographically tracing the process from design to occupancy including the role of branding as a means to create authenticity. The concept of authenticity is often associated with old houses and neighbourhoods, but also in new...... neighbourhoods stories of authenticity seems to be of great importance giving value and identity to place and people. By way of design and branding new places are implied with notions of the real, the original and the unique referring to e.g. its historical past, architectural uniqueness, sustainability or sense...

  7. Dimensionality in voice quality.

    Science.gov (United States)

    Bele, Irene Velsvik

    2007-05-01

    This study concerns speaking voice quality in a group of male teachers (n = 35) and male actors (n = 36), as the purpose was to investigate normal and supranormal voices. The goal was the development of a method of valid perceptual evaluation for normal to supranormal and resonant voices. The voices (text reading at two loudness levels) had been evaluated by 10 listeners, for 15 vocal characteristics using VA scales. In this investigation, the results of an exploratory factor analysis of the vocal characteristics used in this method are presented, reflecting four dimensions of major importance for normal and supranormal voices. Special emphasis is placed on the effects on voice quality of a change in the loudness variable, as two loudness levels are studied. Furthermore, the vocal characteristics Sonority and Ringing voice quality are paid special attention, as the essence of the term "resonant voice" was a basic issue throughout a doctoral dissertation where this study was included.

  8. Voice box (image)

    Science.gov (United States)

    The larynx, or voice box, is located in the neck and performs several important functions in the body. The larynx is involved in swallowing, breathing, and voice production. Sound is produced when the air which ...

  9. Voice and Aging

    Science.gov (United States)

    ... dramatic voice changes are those during childhood and adolescence. The larynx (or voice box) and vocal cord tissues do not fully mature until late teenage years. Hormone-related changes during adolescence are ...

  10. Two-factor authentication

    CERN Document Server

    Stanislav, Mark

    2015-01-01

    During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organization and individual would want to use two factor, and core milestones in the progress of growing the market.

  11. Voice and endocrinology

    OpenAIRE

    KVS Hari Kumar; Anurag Garg; Ajai Chandra, N. S.; Singh, S. P.; Rakesh Datta

    2016-01-01

    Voice is one of the advanced features of natural evolution that differentiates human beings from other primates. The human voice is capable of conveying the thoughts into spoken words along with a subtle emotion to the tone. This extraordinary character of the voice in expressing multiple emotions is the gift of God to the human beings and helps in effective interpersonal communication. Voice generation involves close interaction between cerebral signals and the peripheral apparatus consistin...

  12. DLMS Voice Data Entry.

    Science.gov (United States)

    1980-06-01

    between operator and computer displayed on ADM-3A 20c A-I Possible Hardware Configuration for a Multistation Cartographic VDES ...this program a Voice Recognition System (VRS) which can be used to explore the use of voice data entry ( VDE ) in the DIMS or other cartographic data...Multi-Station Cartographic Voice Data Entry System An engineering development model voice data entry system ( VDES ) could be most efficiently

  13. Writing with Voice

    Science.gov (United States)

    Kesler, Ted

    2012-01-01

    In this Teaching Tips article, the author argues for a dialogic conception of voice, based in the work of Mikhail Bakhtin. He demonstrates a dialogic view of voice in action, using two writing examples about the same topic from his daughter, a fifth-grade student. He then provides five practical tips for teaching a dialogic conception of voice in…

  14. Tips for Healthy Voices

    Science.gov (United States)

    ... social interaction as well as for most people’s occupation. Proper care and use of your voice will give you the best chance for having a healthy voice for your entire lifetime. Hoarseness or roughness in your voice is often ...

  15. Converse PUF-based authentication

    NARCIS (Netherlands)

    Kocabas, U.; Peter, A.; Katzenbeisser, S.; Sadeghi, A.

    2012-01-01

    Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich

  16. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  17. Contextualization and Authenticity in TBLT: Voices from Chinese Classrooms

    Science.gov (United States)

    Chen, Qi; Wright, Clare

    2017-01-01

    In view of ongoing debates about the future of task-based language teaching (TBLT) in contexts of English as a foreign language (EFL), we present a detailed case study of teacher beliefs and practices regarding TBLT conducted in a secondary school in mainland China with a long history of communicative and task-based teaching approaches. We used a…

  18. Authentic Multiculturalism and Nontraditional Students: Voices from the "Contact Zone."

    Science.gov (United States)

    Flores, Juan

    New multicultural anthologies too often end up looking suspiciously like the color palate of a paint-by-numbers kit. Canonical tokenism is quickly seen as a ruse by minority students and teachers who are circumspect and adept at uncovering counterfeits. As an alternative to tokenism, one recommendation is to use Patricia Bizzell's "contact…

  19. Low-bandwidth authentication.

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, Patrick Joseph; McIver, Lauren; Gaines, Brian R.; Anderson, Erik; Collins, Michael Joseph; Thomas,Kurt Adam; McDaniel, Austin

    2007-09-01

    Remotely-fielded unattended sensor networks generally must operate at very low power--in the milliwatt or microwatt range--and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and since sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication methods become impractical or impossible when bandwidth is severely constrained; if messages are small, a standard digital signature or HMAC will be many times larger than the message itself, yet it might be possible to spare only a few extra bits per message for security. Furthermore, the authentication tags themselves are only one part of cryptographic overhead, as key management functions (distributing, changing, and revoking keys) consume still more bandwidth. To address this problem, we have developed algorithms that provide secure authentication while adding very little communication overhead. Such techniques will make it possible to add strong cryptographic guarantees of data integrity to a much wider range of systems.

  20. Low-bandwidth authentication.

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, Patrick Joseph; McIver, Lauren; Gaines, Brian R.; Anderson, Erik; Collins, Michael Joseph; Thomas,Kurt Adam; McDaniel, Austin

    2007-09-01

    Remotely-fielded unattended sensor networks generally must operate at very low power--in the milliwatt or microwatt range--and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and since sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication methods become impractical or impossible when bandwidth is severely constrained; if messages are small, a standard digital signature or HMAC will be many times larger than the message itself, yet it might be possible to spare only a few extra bits per message for security. Furthermore, the authentication tags themselves are only one part of cryptographic overhead, as key management functions (distributing, changing, and revoking keys) consume still more bandwidth. To address this problem, we have developed algorithms that provide secure authentication while adding very little communication overhead. Such techniques will make it possible to add strong cryptographic guarantees of data integrity to a much wider range of systems.

  1. Tools for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2008-07-09

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work.

  2. Effects of Consensus Training on the Reliability of Auditory Perceptual Ratings of Voice Quality

    DEFF Research Database (Denmark)

    Iwarsson, Jenny; Petersen, Niels Reinholt

    2012-01-01

    a multidimensional protocol with four-point equal-appearing interval scales. The stimuli consisted of text reading by authentic dysphonic patients. The consensus training for each perceptual voice parameter included (1) definition, (2) underlying physiology, (3) presentation of carefully selected sound examples...... training, including use of a reference voice sample material, to calibrate, equalize, and stabilize the internal standards held in memory by the listeners....

  3. Voice handicap in singers.

    Science.gov (United States)

    Murry, Thomas; Zschommler, Anne; Prokop, Jan

    2009-05-01

    The study aimed to determine the differences in responses to the Voice Handicap Index (VHI-10) between singers and nonsingers and to evaluate the ranked order differences of the VHI-10 statements for both groups. The VHI-10 was modified to include statements related to the singing voice for comparison to the original VHI-10. Thirty-five nonsingers with documented voice disorders responded to the VHI-10. A second group, consisting of 35 singers with voice complaints, responded to the VHI-10 with three statements added specifically addressing the singing voice. Data from both groups were analyzed in terms of overall subject self-rating of voice handicap and the rank order of statements from least to most important. The difference between the mean VHI-10 for the singers and nonsingers was not statistically significant, thus, supporting the validity of the VHI-10. However, the 10 statements were ranked differently in terms of their importance by both groups. In addition, when three statements related specifically to the singing voice were substituted in the original VHI-10, the singers judged their voice problem to be more severe than when using the original VHI-10. The type of statements used to assess self-perception of voice handicap may be related to the subject population. Singers with voice problems do not rate their voices to be more handicapped than nonsingers unless statements related specifically to singing are included.

  4. FPGA Authentication Methods.

    Energy Technology Data Exchange (ETDEWEB)

    Brotz, Jay Kristoffer [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hymel, Ross W [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Punnoose, Ratish J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mannos, Tom [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Grant, Neil [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom); Evans, Neil [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom)

    2017-05-01

    One of the greatest challenges facing designers of equipment to be used in a nuclear arms control treaty is how to convince the other party in the treaty to trust its results and functionality. Whether the host provides equipment meant to prove treaty obligations and the inspector needs to gain that trust (commonly referred to as authentication), or the inspector provides this equipment and the host needs to gain this trust (commonly considered to be included in certification), one party generally has higher confidence in the equipment at the start of a treaty regime and the other party needs to gain that confidence prior to use. While we focus on authentication in this document—that is, the inspector gaining confidence in host-provided equipment—our conclusions will likely apply to host certification of inspector-provided equipment.

  5. Haunted by the authentic

    DEFF Research Database (Denmark)

    d'Ambrosio, Luigi

    2013-01-01

    Facebook page has been conducted. Research limitations/implications: The data were collected among guests at only one Italian restaurant in Denmark. Therefore, generalizing the results for other segments of the restaurant industry may not be possible. However, the purpose of this study is not to generalize......Research description and purpose: The purpose of this investigation is to explore Danish guests’ experience when consuming ‘authentic’ Italian food in Italian restaurants in Denmark. In this context, the aim of the research is to engage in a discussion of the concept of authenticity in ethnic food...... consumption, and the guests’ experience with and reaction to the authentic culinary experience in ethnic restaurants in the consumers’ home country. Design/Methodology: The paper methodology is based on the use of mixed methods. A collection of primary quantitative and qualitative data through a questionnaire...

  6. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  7. Probabilistic authenticated quantum dialogue

    Science.gov (United States)

    Hwang, Tzonelih; Luo, Yi-Ping

    2015-12-01

    This work proposes a probabilistic authenticated quantum dialogue (PAQD) based on Bell states with the following notable features. (1) In our proposed scheme, the dialogue is encoded in a probabilistic way, i.e., the same messages can be encoded into different quantum states, whereas in the state-of-the-art authenticated quantum dialogue (AQD), the dialogue is encoded in a deterministic way; (2) the pre-shared secret key between two communicants can be reused without any security loophole; (3) each dialogue in the proposed PAQD can be exchanged within only one-step quantum communication and one-step classical communication. However, in the state-of-the-art AQD protocols, both communicants have to run a QKD protocol for each dialogue and each dialogue requires multiple quantum as well as classical communicational steps; (4) nevertheless, the proposed scheme can resist the man-in-the-middle attack, the modification attack, and even other well-known attacks.

  8. Physiological Biometric Authentication Systems Advantages Disadvantages And Future Development A Review

    Directory of Open Access Journals (Sweden)

    Israa M. Alsaadi

    2015-08-01

    Full Text Available Abstract With the fast increasing of the electronic crimes and their related issues deploying a reliable user authentication system became a significant task for both of access control and securing users private data. Human biometric characteristics such as face finger iris scanning voice signature and other features provide a dependable security level for both of the personal and the public use. Many biometric authentication systems have been approached for long time. Due to the uniqueness of human biometrics witch played a master role in degrading imposters attacks. Such authentication models have overcome other traditional security methods like passwords and PIN. This paper aims to briefly address the psychological biometric authentication techniques. Also a brief summary to the advantages disadvantages and future developments of each method is provided in this paper.

  9. Towards authentic conversations. Authenticity in the patient-professional relationship.

    Science.gov (United States)

    Arnason, V

    1994-01-01

    The purpose of this paper is to evaluate the significance of the existential notion of authenticity for medical ethics. This is done by analyzing authenticity and examining its implications for the patient-professional relationship and for ethical decision-making in medical situations. It is argued that while authenticity implies important demand for individual responsibility, which has therapeutic significance, it perpetuates ideas which are antithetical both to authentic interaction between patients and professionals and to fruitful deliberation of moral dilemmas. In order to counteract these consequences, an alternative idea of authenticity is introduced. According to this idea, authenticity is not regarded primarily as individual sovereignty, but as an ability to participate in a dialogue in which the subjectivity of both partners is respected. Such practice, based on mutual trust and responsibility, would enhance common decision-making and overcome the alienation between patients and professionals.

  10. Authentication of vegetable oils.

    OpenAIRE

    Cunha, S.C.; Amaral, J S; Oliveira, M.B.P.P.

    2011-01-01

    Authenticity of vegetable oils continues to be a challenge and the target of many studies. Consumers expectancy on healthier products that conform to the labelled information, and the vast amount of legislation a bout the correct characterisation and classification of vegetable oils have boosted a number of scientific works on this subject. Analytical t echniques to face this challenge are, at least, as manifold as ar e the ways of adulteration, ranging fro...

  11. International safeguards data authentication

    Energy Technology Data Exchange (ETDEWEB)

    Melton, R.B.; Smith, C.E.; DeLand, S.M.; Manatt, D.R.

    1996-07-01

    The International Safeguards community is becoming increasingly reliant on information stored in electronic form. In international monitoring and related activities it must be possible to verify and maintain the integrity of this electronic information. This paper discusses the use of data authentication technology to assist in accomplishing this task. The paper provides background information, identifies the relevance to international safeguards, discusses issues related to export controls, algorithm patents, key management and the use of commercial vs. custom software.

  12. Authenticity in Employment Relations

    DEFF Research Database (Denmark)

    Tackney, Charles Thomas

    This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review of the con......This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review...... of the concept in Western culture, philosophy, and management studies, Religious Society of Friends (Quaker) and Roman Catholic social teachings are investigated for positively correlative data to help develop the criterion variable. From the literature review of concept and historical data in both traditions......, it becomes possible to specify employment relations parameters between the indirect and direct employer and employees in a manner that will ensure working conditions consistent with these traditions, substantially enhancing the prospect of authenticity in employment relations. This theology of the workplace...

  13. Singing voice outcomes following singing voice therapy.

    Science.gov (United States)

    Dastolfo-Hromack, Christina; Thomas, Tracey L; Rosen, Clark A; Gartner-Schmidt, Jackie

    2016-11-01

    The objectives of this study were to describe singing voice therapy (SVT), describe referred patient characteristics, and document the outcomes of SVT. Retrospective. Records of patients receiving SVT between June 2008 and June 2013 were reviewed (n = 51). All diagnoses were included. Demographic information, number of SVT sessions, and symptom severity were retrieved from the medical record. Symptom severity was measured via the 10-item Singing Voice Handicap Index (SVHI-10). Treatment outcome was analyzed by diagnosis, history of previous training, and SVHI-10. SVHI-10 scores decreased following SVT (mean change = 11, 40% decrease) (P singing lessons (n = 10) also completed an average of three SVT sessions. Primary muscle tension dysphonia (MTD1) and benign vocal fold lesion (lesion) were the most common diagnoses. Most patients (60%) had previous vocal training. SVHI-10 decrease was not significantly different between MTD and lesion. This is the first outcome-based study of SVT in a disordered population. Diagnosis of MTD or lesion did not influence treatment outcomes. Duration of SVT was short (approximately three sessions). Voice care providers are encouraged to partner with a singing voice therapist to provide optimal care for the singing voice. This study supports the use of SVT as a tool for the treatment of singing voice disorders. 4 Laryngoscope, 126:2546-2551, 2016. © 2016 The American Laryngological, Rhinological and Otological Society, Inc.

  14. Clinical Voices - an update

    DEFF Research Database (Denmark)

    Fusaroli, Riccardo; Weed, Ethan

    Anomalous aspects of speech and voice, including pitch, fluency, and voice quality, are reported to characterise many mental disorders. However, it has proven difficult to quantify and explain this oddness of speech by employing traditional statistical methods. In this talk we will show how the t...... the temporal dynamics of the voice in Asperger's patients enable us to automatically reconstruct the diagnosis, and assess the Autism quotient score. We then generalise the findings to Danish and American children with autism....

  15. A Multifactor Secure Authentication System for Wireless Payment

    Science.gov (United States)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  16. Effects of Medications on Voice

    Science.gov (United States)

    ... ENT Doctor Near You Effects of Medications on Voice Effects of Medications on Voice Patient Health Information ... entnet.org . Could Your Medication Be Affecting Your Voice? Some medications including prescription, over-the-counter, and ...

  17. AUTHENTIC LEADERSHIP IN EDUCATIONAL INSTITUTIONS

    OpenAIRE

    Nebojsa Pavlovic

    2015-01-01

    This work investigates authentic leadership models in the organizational culture of a school. The aim of this quantitative research is to define the factors of authentic leadership in educational institutions in order to provide answers to the questions related to the existence of specific authentic leadership in a school. The sample included 227 randomly selected directors of secondary and primary schools in the former Yugoslav republics: Serbia, Montenegro, and the Republic Srpska. The rese...

  18. NMACA Approach Used to Build a Secure Message Authentication Code

    Science.gov (United States)

    Alosaimy, Raed; Alghathbar, Khaled; Hafez, Alaaeldin M.; Eldefrawy, Mohamed H.

    Secure storage systems should consider the integrity and authentication of long-term stored information. When information is transferred through communication channels, different types of digital information can be represented, such as documents, images, and database tables. The authenticity of such information must be verified, especially when it is transferred through communication channels. Authentication verification techniques are used to verify that the information in an archive is authentic and has not been intentionally or maliciously altered. In addition to detecting malicious attacks, verifying the integrity also identifies data corruption. The purpose of Message Authentication Code (MAC) is to authenticate messages, where MAC algorithms are keyed hash functions. In most cases, MAC techniques use iterated hash functions, and these techniques are called iterated MACs. Such techniques usually use a MAC key as an input to the compression function, and this key is involved in the compression function, f, at every stage. Modification detection codes (MDCs) are un-keyed hash functions, and are widely used by authentication techniques such as MD4, MD5, SHA-1, and RIPEMD-160. There have been new attacks on hash functions such as MD5 and SHA-1, which requires the introduction of more secure hash functions. In this paper, we introduce a new MAC methodology that uses an input MAC key in the compression function, to change the order of the message words and shifting operation in the compression function. The new methodology can be used in conjunction with a wide range of modification detection code techniques. Using the SHA-1 algorithm as a model, a new (SHA-1)-MAC algorithm is presented. The (SHA-1)-MAC algorithm uses the MAC key to build the hash functions by defining the order for accessing source words and defining the number of bit positions for circular left shifts.

  19. Mobile authentication problems and solutions

    CERN Document Server

    Jakobsson, Markus

    2012-01-01

    Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and would be able to follow instructions, or that end users were hopeless and would always make mistakes. The truth, of course, is somewhere in between, which is exactly what makes this topic so enticing. We cannot make progress with human-to-machine authentication with

  20. Fast and secure handover of intra-ASN IEEE802.16 network by proposed certificate based pre-authentication

    Science.gov (United States)

    Sridevi, B.; Supriya, T. S.; Rajaram, S.

    2013-01-01

    The current generation of wireless networks has been designed predominantly to support voice and more recently data traffic. WiMAX is currently one of the hottest technologies in wireless. The main motive of the mobile technologies is to provide seamless cost effective mobility. But this is affected by Authentication cost and handover delay since on each handoff the Mobile Station (MS) has to undergo all steps of authentication. Pre-Authentication is used to reduce the handover delay and increase the speed of the Intra-ASN Handover. Proposed Pre-Authentication method is intended to reduce the authentication delay by getting pre authenticated by central authority called Pre Authentication Authority (PAA). MS requests PAA for Pre Authentication Certificate (PAC) before performing handoff. PAA verifies the identity of MS and provides PAC to MS and also to the neighboring target Base Stations (tBSs). MS having time bound PAC can skip the authentication process when recognized by target BS during handoff. It also prevents the DOS (Denial Of Service) attack and Replay attack. It has no wastage of unnecessary key exchange of the resources. The proposed work is simulated by NS2 model and by MATLAB.

  1. Hearing Children's Voices through a Conversation Analysis Approach

    Science.gov (United States)

    Bateman, Amanda

    2017-01-01

    This article introduces the methodological approach of conversation analysis (CA) and demonstrates its usefulness in presenting more authentic documentation and analysis of children's voices. Grounded in ethnomethodology, CA has recently gained interest in the area of early childhood studies due to the affordances it holds for gaining access to…

  2. Transgender Voice and Communication Treatment: A Retrospective Chart Review of 25 Cases

    Science.gov (United States)

    Hancock, Adrienne B.; Garabedian, Laura M.

    2013-01-01

    Background: People transitioning from male to female (MTF) gender seek speech-language pathology services when they feel their voice is betraying their genuine self or perhaps is the last obstacle to representing their authentic gender. Speaking fundamental frequency (pitch) and resonance are most often targets in treatment because the combination…

  3. Anonymous authenticated communications

    Science.gov (United States)

    Beaver, Cheryl L.; Schroeppel, Richard C.; Snyder, Lillian A.

    2007-06-19

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  4. Molecular authentication of geo-authentic Scrophularia ningpoensis

    Institute of Scientific and Technical Information of China (English)

    Chuan CHEN; Li-na DUAN; Xiao-long ZHOU; Bing-long CHEN; Cheng-xin FU

    2011-01-01

    Scrophularia ningpoensis has long been used in the Chinese Materia Medica for inflammation. Like other herbal medicines, S. ningpoensis collected from different localities may considerably differ in their therapeutic efficacy,and the one grown in Zhejiang Province is recognized as geo-authentic. However, it is difficult to confirm the geographical authenticity by similar morphological characteristics. In the present study, inter-simple sequence repeat (ISSR) markers were conducted to detect S. ningpoensis from different origins. A 1259-bp fragment amplified by primer UBC874 was found only in geo-authentic ones. By cloning and sequencing that specific band, sequence characterized amplified region (SCAR) markers were designed to distinguish geo-authentic S. ningpoensis from others.This is a rapid and easy method that can be used to identify the geographical authenticity of S. ningpoensis.

  5. Trust Authentication Protocol on the Web

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other. Trust relationship must be established between strangers before authentication. To achieve trust authentication, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web.

  6. Voiced Reading and Rhythm

    Institute of Scientific and Technical Information of China (English)

    詹艳萍

    2007-01-01

    Since voiced reading is an important way in learning English,rhythm is the most critical factor that enables to read beautifully.This article illustrates the relationship between rhythm and voiced reading,the importance of rhythm,and the methods to develop the sense of rhythm.

  7. Clinical Voices - an update

    DEFF Research Database (Denmark)

    Fusaroli, Riccardo; Weed, Ethan

    Anomalous aspects of speech and voice, including pitch, fluency, and voice quality, are reported to characterise many mental disorders. However, it has proven difficult to quantify and explain this oddness of speech by employing traditional statistical methods. In this talk we will show how...

  8. Borderline Space for Voice

    Science.gov (United States)

    Batchelor, Denise

    2012-01-01

    Being on the borderline as a student in higher education is not always negative, to do with marginalisation, exclusion and having a voice that is vulnerable. Paradoxically, being on the edge also has positive connections with integration, inclusion and having a voice that is strong. Alternative understandings of the concept of borderline space can…

  9. Voice and endocrinology

    Directory of Open Access Journals (Sweden)

    KVS Hari Kumar

    2016-01-01

    Full Text Available Voice is one of the advanced features of natural evolution that differentiates human beings from other primates. The human voice is capable of conveying the thoughts into spoken words along with a subtle emotion to the tone. This extraordinary character of the voice in expressing multiple emotions is the gift of God to the human beings and helps in effective interpersonal communication. Voice generation involves close interaction between cerebral signals and the peripheral apparatus consisting of the larynx, vocal cords, and trachea. The human voice is susceptible to the hormonal changes throughout life right from the puberty until senescence. Thyroid, gonadal and growth hormones have tremendous impact on the structure and function of the vocal apparatus. The alteration of voice is observed even in physiological states such as puberty and menstruation. Astute clinical observers make out the changes in the voice and refer the patients for endocrine evaluation. In this review, we shall discuss the hormonal influence on the voice apparatus in normal and endocrine disorders.

  10. Face the voice

    DEFF Research Database (Denmark)

    Lønstrup, Ansa

    2014-01-01

    will be based on a reception aesthetic and phenomenological approach, the latter as presented by Don Ihde in his book Listening and Voice. Phenomenologies of Sound , and my analytical sketches will be related to theoretical statements concerning the understanding of voice and media (Cavarero, Dolar, La...

  11. Voice integrated systems

    Science.gov (United States)

    Curran, P. Mike

    1977-01-01

    The program at Naval Air Development Center was initiated to determine the desirability of interactive voice systems for use in airborne weapon systems crew stations. A voice recognition and synthesis system (VRAS) was developed and incorporated into a human centrifuge. The speech recognition aspect of VRAS was developed using a voice command system (VCS) developed by Scope Electronics. The speech synthesis capability was supplied by a Votrax, VS-5, speech synthesis unit built by Vocal Interface. The effects of simulated flight on automatic speech recognition were determined by repeated trials in the VRAS-equipped centrifuge. The relationship of vibration, G, O2 mask, mission duration, and cockpit temperature and voice quality was determined. The results showed that: (1) voice quality degrades after 0.5 hours with an O2 mask; (2) voice quality degrades under high vibration; and (3) voice quality degrades under high levels of G. The voice quality studies are summarized. These results were obtained with a baseline of 80 percent recognition accuracy with VCS.

  12. Ontario's Student Voice Initiative

    Science.gov (United States)

    Courtney, Jean

    2014-01-01

    This article describes in some detail aspects of the Student Voice initiative funded and championed by Ontario's Ministry of Education since 2008. The project enables thousands of students to make their voices heard in meaningful ways and to participate in student-led research. Some students from grades 7 to 12 become members of the Student…

  13. Messaging and Voice Conferencing through Wi-Fi Network

    OpenAIRE

    Miss. Nayana H S,; Dr. M C Padma

    2014-01-01

    The use of Wi-Fi enabled android phones as IP phones, and their communication within a local wireless LAN is discussed in this paper. This proposed model is a form of telecommunication that allows exchange of data and voice via Wi-Fi network. The phones, which are Wi-Fi enabled and have android operating system, can be used to communicate with each other through the Wi-Fi communication channel. Proposed system incorporates messaging (Text and voice), conferencing (group conver...

  14. Authenticity, Culture and Language Learning

    Science.gov (United States)

    MacDonald, Malcolm N.; Badger, Richard; Dasli, Maria

    2006-01-01

    In philosophy, authenticity has been used with two meanings: one entails the notion of correspondence; the other entails the notion of genesis (Cooper, 1983: 15). As in certain branches of philosophy, language teaching has perhaps clung too long to the first of these notions of authenticity at the expense of the other. This paper reviews four key…

  15. Reading Authentic Polish, Volume II.

    Science.gov (United States)

    Walczynski, Waldemar

    The second volume on reading authentic Polish is the continuation of a supplementary textbook to be used either in the classroom or in independent study. The materials included in it are unaltered authentic texts from Polish newspapers, magazines, and other mass media that provide exposure to the context and format of everyday reading matter. The…

  16. EasyVoice: Integrating voice synthesis with Skype

    CERN Document Server

    Condado, Paulo A

    2007-01-01

    This paper presents EasyVoice, a system that integrates voice synthesis with Skype. EasyVoice allows a person with voice disabilities to talk with another person located anywhere in the world, removing an important obstacle that affect these people during a phone or VoIP-based conversation.

  17. Authenticity and commoditization at home

    DEFF Research Database (Denmark)

    Stender, Marie

    . In Denmark, the concept of authenticity is often associated with old houses. By way of design and branding, though, new neighbourhoods are made authentic, referring to their historical past, architectural uniqueness or sense of community. Based on a fieldwork in three new residential buildings in Copenhagen......This paper investigates how interest and affect are entangled in the built environment of new Danish homes. The paper unfolds tensions and conflicts in the process from design through branding to occupancy of the house, and the relationship between authenticity and commoditization is explored...... seems to be a key concept in contemporary branding of products, places, and more recently also private homes. On the one hand authenticity thus seems to be closely related to the commercial value of things, on the other hand the authentic is held to be an expression of an inner nature or feeling...

  18. Voice Savers for Music Teachers

    Science.gov (United States)

    Cookman, Starr

    2012-01-01

    Music teachers are in a class all their own when it comes to voice use. These elite vocal athletes require stamina, strength, and flexibility from their voices day in, day out for hours at a time. Voice rehabilitation clinics and research show that music education ranks high among the professionals most commonly affected by voice problems.…

  19. Neural mechanisms for voice recognition

    NARCIS (Netherlands)

    Andics, A.V.; McQueen, J.M.; Petersson, K.M.; Gal, V.; Rudas, G.; Vidnyanszky, Z.

    2010-01-01

    We investigated neural mechanisms that support voice recognition in a training paradigm with fMRI. The same listeners were trained on different weeks to categorize the mid-regions of voice-morph continua as an individual's voice. Stimuli implicitly defined a voice-acoustics space, and training expli

  20. A Novel Trusted Computing Model for Network Security Authentication

    Directory of Open Access Journals (Sweden)

    Ling Xing

    2014-02-01

    Full Text Available Network information poses great threats from malicious attacks due to the openness and virtuality of network structure. Traditional methods to ensure infor- mation security may fail when both integrity and source authentication for information are required. Based on the security of data broadcast channel, a novel Trusted Com- puting Model (TCM of network security authentication is proposed to enhance the security of network information. In this model, a method of Uniform content locator security Digital Certificate (UDC, which is capable of fully and uniquely index network information, is developed. Standard of MPEG-2 Transport Streams (TS is adopted to pack UDC data. Additionally, a UDC hashing algorithm (UHA512 is designed to compute the integrity and security of data infor- mation . Experimental results show that the proposed model is feasible and effective to network security authentication

  1. Authenticated Quantum Key Distribution with Collective Detection using Single Photons

    Science.gov (United States)

    Huang, Wei; Xu, Bing-Jie; Duan, Ji-Tong; Liu, Bin; Su, Qi; He, Yuan-Hang; Jia, Heng-Yue

    2016-10-01

    We present two authenticated quantum key distribution (AQKD) protocols by utilizing the idea of collective (eavesdropping) detection. One is a two-party AQKD protocol, the other is a multiparty AQKD protocol with star network topology. In these protocols, the classical channels need not be assumed to be authenticated and the single photons are used as the quantum information carriers. To achieve mutual identity authentication and establish a random key in each of the proposed protocols, only one participant should be capable of preparing and measuring single photons, and the main quantum ability that the rest of the participants should have is just performing certain unitary operations. Security analysis shows that these protocols are free from various kinds of attacks, especially the impersonation attack and the man-in-the-middle (MITM) attack.

  2. Sensing Emotion in Voices

    DEFF Research Database (Denmark)

    Young, Katherine S; Parsons, Christine E; LeBeau, Richard T;

    2016-01-01

    Emotional expressions are an essential element of human interactions. Recent work has increasingly recognized that emotional vocalizations can color and shape interactions between individuals. Here we present data on the psychometric properties of a recently developed database of authentic...

  3. Issues of authenticity

    Science.gov (United States)

    Vara, Renee N.

    2000-03-01

    The problems which the fake or copy present, has received much attention among the art historians, philosophers, and art professionals within the last ten years. This renewed interest has largely focused upon aspects of what constitutes originality or fraud, but also has elucidated the fact that making copies was a common artistic practice during classical antiquity, the Renaissance, the early baroque and most commonly during the post modern period. One academic conference, held in 1985 at National Gallery of Art Symposium, entitled 'Retaining the Original' was focused around the very nature of the question of originality and authenticity. In the introduction to the published paper, Henry Million reminded us, that historically, 'making copies...constituted a major part of the artistic 'enterprise;' copies were valued and costly.

  4. Authentic, Original, and Valuable

    DEFF Research Database (Denmark)

    Tupasela, Aaro Mikael; Tamminen, Sakari

    2015-01-01

    The idea of genetic authenticity and origin has been an important issue within genetics for decades for scientific, political, and economic reasons. The question of where species and populations come from, as well as the linking of genetic traits to particular geographical locations, has resurfaced...... as both a scientific and political site of interest more recently through the study of population genetics in both humans and non-humans. This article explores the ways in which genetics and notions of ‘authentic’, ‘indigenous’, and ‘endemic’ have become intertwined with everyday practices in research....... Using the case of human and non-human genetics to compare and contrast the various facets associated with genetic identity, we seek to develop a broader picture of the ways in which genetics plays an important role in stabilizing categories of origin....

  5. [Problems of food authenticity].

    Science.gov (United States)

    Czerwiecki, Ludwik

    2004-01-01

    In this review the several data concerning food authenticity were presented. Typical examples of food adulteration were described. The most known are adulteration of vegetable and fruit products, adulteration of wine, honeys, olive oil etc. The modern analytical techniques for detection of food adulteration were discussed. Among physicochemical methods isotopic techniques (SCIRA, IRMS, SNIF-NMR) were cited. The main spectral methods are: IACPAES, PyMs, FTIR, NIR. The chromatographic techniques (GC, HPLC, HPAEC, HPTLC) with several kinds of detectors were described and the ELISA and PCR techniques are mentioned, too. The role of chemometrics as a way of several analytical data processing was highlighted. It was pointed out at the necessity of more rigorous control of food to support of all activity in area of fight with fraud in food industry.

  6. Dominant Voice in Hamlet

    Institute of Scientific and Technical Information of China (English)

    李丹

    2015-01-01

    <正>The Tragedy of Hamlet dramatizes the revenge Prince Hamlet exacts on his uncle Claudius for murdering King Hamlet,Claudius’s brother and Prince Hamlet’s father,and then succeeding to the throne and taking as his wife Gertrude,the old king’s widow and Prince Hamlet’s mother.This paper will discuss something about dominant voice in the play.Dominant voice is the major voice in the country,the society,or the whole world.Those people who have the power or

  7. AUTHENTIC LEADERSHIP IN EDUCATIONAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    Nebojsa Pavlovic

    2015-06-01

    Full Text Available This work investigates authentic leadership models in the organizational culture of a school. The aim of this quantitative research is to define the factors of authentic leadership in educational institutions in order to provide answers to the questions related to the existence of specific authentic leadership in a school. The sample included 227 randomly selected directors of secondary and primary schools in the former Yugoslav republics: Serbia, Montenegro, and the Republic Srpska. The research included the use of an ALQ questionnaire for the estimation of leadership behavior. The components of authentic leadership are defined using factor analysis and other statistics techniques. The findings developed in this research indicated the fact that directors in educational institutions have a specific authentic leadership style. We suggest the concept of authentic leadership based on the four following factors: Communication-conformist, self-consciousness, self-discovery, and self-concept. Supporting these factors provides the directors with the possibility of obtaining a high level of authentic leadership.

  8. A Novel User Authentication Scheme Based on QR-Code

    Directory of Open Access Journals (Sweden)

    Kuan-Chieh Liao

    2010-08-01

    Full Text Available User authentication is one of the fundamental procedures to ensure secure communications and share system resources over an insecure public network channel.  Thus, a simple and efficient authentication mechanism is required for securing the network system in the real environment. In general, the password-based authentication mechanism provides the basic capability to prevent unauthorized access. Especially, the purpose of the one-time password is to make it more difficult to gain unauthorized access to restricted resources. Instead of using the password file as conventional authentication systems, many researchers have devoted to implement various one-time password schemes using smart cards, time-synchronized token or short message service in order to reduce the risk of tampering and maintenance cost.  However, these schemes are impractical because of the far from ubiquitous hardware devices or the infrastructure requirements. To remedy these weaknesses, the attraction of the QR-code technique can be introduced into our one-time password authentication protocol. Not the same as before, the proposed scheme based on QR code not only eliminates the usage of the password verification table, but also is a cost effective solution since most internet users already have mobile phones. For this reason, instead of carrying around a separate hardware token for each security domain, the superiority of handiness benefit from the mobile phone makes our approach more practical and convenient.

  9. Multimedia authentication for copyright protection

    Science.gov (United States)

    Yin, Mingsheng

    2017-06-01

    Multimedia contents are easy to be copied and modified, so it is important to use authentication technology to ensure reliability and copyright security. Multimedia authentication technology is usually divided into digital signature and digital watermarking. In this paper, we introduce some basic image and video authentication technology, such as PCA algorithm and image signature method based on DCT coefficient, LSB -based digital image watermark, SVD-based digital image watermark, and video watermark. Through these digital content security technology, digital contents can be ensured security

  10. Authenticity in CALL: Three Domains of "Realness"

    Science.gov (United States)

    Buendgens-Kosten, Judith

    2013-01-01

    This paper discusses the role of authenticity and authenticity claims in computer assisted language learning (CALL). It considers authenticity as the result of a social negotiation process rather than an innate feature of a text, object, person, or activity. From this basis, it argues that authenticity claims play an important role in both second…

  11. Authentic leadership: application to women leaders

    Science.gov (United States)

    Hopkins, Margaret M.; O’Neil, Deborah A.

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women. PMID:26236254

  12. Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem

    Directory of Open Access Journals (Sweden)

    Juan Qu

    2014-01-01

    Full Text Available A password authentication scheme using smart card is called two-factor authentication scheme. Two-factor authentication scheme is the most accepted and commonly used mechanism that provides the authorized users a secure and efficient method for accessing resources over insecure communication channel. Up to now, various two-factor user authentication schemes have been proposed. However, most of them are vulnerable to smart card loss attack, offline password guessing attack, impersonation attack, and so on. In this paper, we design a password remote user authentication with key agreement scheme using elliptic curve cryptosystem. Security analysis shows that the proposed scheme has high level of security. Moreover, the proposed scheme is more practical and secure in contrast to some related schemes.

  13. Effects of Helping on State Authenticity Versus Recalled Authenticity

    OpenAIRE

    Allan, Clare M.

    2011-01-01

    This study focuses on the under-researched subject of “state authenticity”, the experience of expressing one’s true self. The 2 major hypotheses of the causes of state authenticity are tested: behavioural content versus consistency with personal traits. Investigations examine the proposal that behaviour expressing values, specifically “helping others” increases state authenticity, regardless of an individual’s own helpfulness-traits. Using a web-based survey, 238 participants were randomly as...

  14. Security Gaps In Authentication Factor Credentials

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Authentication factors refer to user login credentials that a user supplies to an authentication process for it to decide whether to grant or deny access. While two-factor and three-factor authentication generally provides better security than one-factor authentication the aim of this paper is to review security in individual authentication factor credentials that are in use nowadays. These credentials will be discussed in factor categories knowledge factor possession factor and inherence factor. The paper details current security gaps and some novel approaches to diminish the gaps in these authentication factors. We believe that our recommendations will inspire development of better authentication credentials and systems.

  15. Physical trust-based persistent authentication

    DEFF Research Database (Denmark)

    Fujita, Masahiro; Jensen, Christian D.; Arimura, Shiori

    2015-01-01

    Recently companies have applied two-factor user authentication. Persistent Authentication is one of the interesting authentication mechanisms to establish security and usability of two-factor authentication systems. However, there is room to improve its feasibility and usability. In this paper, we...... propose a new type of persistent authentication, called Persistent Authentication Based On physical Trust (PABOT). PABOT uses a context of “physical trust relationship” that is built by visual contact between users, and thus can offer a persistent authentication mechanism with better usability and higher...

  16. Ethnographic Voice Memo Narratives

    DEFF Research Database (Denmark)

    Rasmussen, Mette Apollo; Conradsen, Maria Bosse

    1800-01-01

    -based technique which actively involves actors in producing ethnography-based data concerning their everyday practice. With the help from smartphone technology it is possible to complement ethnography-based research methods when involving the actors and having them create small voice memo narratives. The voice...... memos create insights of actors‟ everyday practice, without the direct presence of a researcher and could be considered a step towards meeting the dilemmas of research in complex fieldwork settings....

  17. STRONG ZERO-KNOWLEDGE AUTHENTICATION BASED ON THE SESSION KEYS (SASK

    Directory of Open Access Journals (Sweden)

    Younes ASIMI

    2015-01-01

    Full Text Available In this article, we propose a new symmetric communication system secured, founded upon strong zero knowledge authentication protocol based on session keys (SASK. The users’ authentication is done in two steps: the first is to regenerate a virtual password, and to assure the integrity and the confidentiality of nonces exchanged thanks to the symmetric encryption by a virtual password. The second is to calculate a session key shared between the client and the web server to insure the symmetric encryption by this session key. This passage allows to strengthen the process of users’ authentication, also, to evolve the process of update and to supply a secure communication channel. This evolution aims at implementing an authentication protocol with session keys able to verify the users’ identity, to create a secure communication channel, and to supply better cyber-defense against the various types of attacks.

  18. Authentic Assessment: Testing in Reality

    Science.gov (United States)

    Svinicki, Marilla D.

    2004-01-01

    The new learning paradigm brings with it the need for a change in assessment practices as well. In this chapter, one of the assessment practices that is most consistent with this paradigm, authentic assessment, is discussed.

  19. Robustness of digital artist authentication

    DEFF Research Database (Denmark)

    Jacobsen, Robert; Nielsen, Morten

    In many cases it is possible to determine the authenticity of a painting from digital reproductions of the paintings; this has been demonstrated for a variety of artists and with different approaches. Common to all these methods in digital artist authentication is that the potential of the method...... is in focus, while the robustness has not been considered, i.e. the degree to which the data collection process influences the decision of the method. However, in order for an authentication method to be successful in practice, it needs to be robust to plausible error sources from the data collection....... In this paper we investigate the robustness of the newly proposed authenticity method introduced by the authors based on second generation multiresolution analysis. This is done by modelling a number of realistic factors that can occur in the data collection....

  20. Research on Mixed Encryption Authentication

    Institute of Scientific and Technical Information of China (English)

    SUN Zhi-xin; WANG Ru-chuan; WANG Shao-di

    2003-01-01

    With the development of network techniques, the problem of network security is also arising as we enjoy its open convenience. There are many developed methods to overcome this problem. Identity authentication is one of these important measures. The authentication methods of traditional symmetric cryptogram systems and asymmetric cryptogram systems have both advantages and defects. This paper brings forward a Mixed Encryption Model for Authentication (MEMA), which has obvious advantages compared to the two traditional methods. MEMA model can be used widely in opening network environment such as mobile agent systems, multi-agents security safeguard systems and other situations in which identity authentication of users are needed. At last, the paper also presents the MEMA model's structure and implementation of an experimental system.

  1. Authentically Assessing an Assembly Line.

    Science.gov (United States)

    Kirkwood, James J.; Kendrick, Martha L.

    1999-01-01

    Authentic assessment in elementary school technology education is linked to a continuum of teacher behavior: nondirective, mediating, directive, and concurrent with teaching. It should be a two-way process between the students and the activity. (JOW)

  2. Capillary electrophoresis in food authenticity.

    Science.gov (United States)

    Kvasnicka, Frantisek

    2005-06-01

    Food authenticity is a term which simply refers to whether the food purchased by the consumer matches its description. False description can occur in many forms, from the undeclared addition of water or other cheaper materials, or the wrong declaration of the amount of a particular ingredient in the product, to making false statements about the source of ingredients i.e., their geographic, plant, or animal origin. The aim of this review is to summarize applications of capillary electrophoresis in food authentication.

  3. Speaking in Character: Voice Communication in Virtual Worlds

    Science.gov (United States)

    Wadley, Greg; Gibbs, Martin R.

    This chapter summarizes 5 years of research on the implications of introducing voice communication systems to virtual worlds. Voice introduces both benefits and problems for players of fast-paced team games, from better coordination of groups and greater social presence of fellow players on the positive side, to negative features such as channel congestion, transmission of noise, and an unwillingness by some to use voice with strangers online. Similarly, in non-game worlds like Second Life, issues related to identity and impression management play important roles, as voice may build greater trust that is especially important for business users, yet it erodes the anonymity and ability to conceal social attributes like gender that are important for other users. A very different mixture of problems and opportunities exists when users conduct several simultaneous conversations in multiple text and voice channels. Technical difficulties still exist with current systems, including the challenge of debugging and harmonizing all the participants' voice setups. Different groups use virtual worlds for very different purposes, so a single modality may not suit all.

  4. Teaching Materials Should be Authentic

    Institute of Scientific and Technical Information of China (English)

    俞莹

    2008-01-01

    <正>In terms of the teaching materials,we hold the opinion that authentic materials should be adapted in the process of teaching,and students should have access to the original language. According to Richards(2001),authentic materials refer to the use in teaching of texts,photographs, video selections,and other teaching resources that were not specially prepared for pedagogical purposes.Created materials refer to textbooks and other specially developed instructional resources. The use of authentic materials in an EFL classroom is what many teachers involved in foreign language teaching have discussed in recent years.Most of the teachers throughout the world agree that authentic texts or materials are beneficial to the language learning process.Authentic materials enable learners to interact with the real language and content rather than the form.Learners feel that they are learning a target language as it is used outside the classroom.Exposing students to authentic materials can also help them better understand the target culture and envision how they might participate in this community.

  5. A Multi-Factor Security Protocol for Wireless Payment - Secure Web Authentication using Mobile Devices

    CERN Document Server

    Tiwari, Ayu; Abraham, Ajith; Knapskog, Svein Johan; Sanyal, Sugata

    2011-01-01

    Previous Web access authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. This paper proposes a new protocol using multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce extra security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy, that does not require any change in infrastructure or protocol of wireless networks. This Protocol for Wireless Payment is extended to provide two way authentications.

  6. Study on the security of the authentication scheme with key recycling in QKD

    Science.gov (United States)

    Li, Qiong; Zhao, Qiang; Le, Dan; Niu, Xiamu

    2016-09-01

    In quantum key distribution (QKD), the information theoretically secure authentication is necessary to guarantee the integrity and authenticity of the exchanged information over the classical channel. In order to reduce the key consumption, the authentication scheme with key recycling (KR), in which a secret but fixed hash function is used for multiple messages while each tag is encrypted with a one-time pad (OTP), is preferred in QKD. Based on the assumption that the OTP key is perfect, the security of the authentication scheme has be proved. However, the OTP key of authentication in a practical QKD system is not perfect. How the imperfect OTP affects the security of authentication scheme with KR is analyzed thoroughly in this paper. In a practical QKD, the information of the OTP key resulting from QKD is partially leaked to the adversary. Although the information leakage is usually so little to be neglected, it will lead to the increasing degraded security of the authentication scheme as the system runs continuously. Both our theoretical analysis and simulation results demonstrate that the security level of authentication scheme with KR, mainly indicated by its substitution probability, degrades exponentially in the number of rounds and gradually diminishes to zero.

  7. Patterns-of-Life Aided Authentication

    Directory of Open Access Journals (Sweden)

    Nan Zhao

    2016-09-01

    Full Text Available Wireless Body Area Network (WBAN applications have grown immensely in the past few years. However, security and privacy of the user are two major obstacles in their development. The complex and very sensitive nature of the body-mounted sensors means the traditional network layer security arrangements are not sufficient to employ their full potential, and novel solutions are necessary. In contrast, security methods based on physical layers tend to be more suitable and have simple requirements. The problem of initial trust needs to be addressed as a prelude to the physical layer security key arrangement. This paper proposes a patterns-of-life aided authentication model to solve this issue. The model employs the wireless channel fingerprint created by the user’s behavior characterization. The performance of the proposed model is established through experimental measurements at 2.45 GHz. Experimental results show that high correlation values of 0.852 to 0.959 with the habitual action of the user in different scenarios can be used for auxiliary identity authentication, which is a scalable result for future studies.

  8. Patterns-of-Life Aided Authentication.

    Science.gov (United States)

    Zhao, Nan; Ren, Aifeng; Zhang, Zhiya; Zhu, Tianqiao; Rehman, Masood Ur; Yang, Xiaodong; Hu, Fangming

    2016-09-23

    Wireless Body Area Network (WBAN) applications have grown immensely in the past few years. However, security and privacy of the user are two major obstacles in their development. The complex and very sensitive nature of the body-mounted sensors means the traditional network layer security arrangements are not sufficient to employ their full potential, and novel solutions are necessary. In contrast, security methods based on physical layers tend to be more suitable and have simple requirements. The problem of initial trust needs to be addressed as a prelude to the physical layer security key arrangement. This paper proposes a patterns-of-life aided authentication model to solve this issue. The model employs the wireless channel fingerprint created by the user's behavior characterization. The performance of the proposed model is established through experimental measurements at 2.45 GHz. Experimental results show that high correlation values of 0.852 to 0.959 with the habitual action of the user in different scenarios can be used for auxiliary identity authentication, which is a scalable result for future studies.

  9. Voice Matching Using Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Abhishek Bal

    2014-03-01

    Full Text Available In this paper, the use of Genetic Algorithm (GA for voice recognition is described. The practical application of Genetic Algorithm (GA to the solution of engineering problem is a rapidly emerging approach in the field of control engineering and signal processing. Genetic algorithms are useful for searching a space in multi-directional way from large spaces and poorly defined space. Voice is a signal of infinite information. Digital processing of voice signal is very important for automatic voice recognition technology. Nowadays, voice processing is very much important in security mechanism due to mimicry characteristic. So studying the voice feature extraction in voice processing is very necessary in military, hospital, telephone system, investigation bureau and etc. In order to extract valuable information from the voice signal, make decisions on the process, and obtain results, the data needs to be manipulated and analyzed. In this paper, if the instant voice is not matched with same person’s reference voices in the database, then Genetic Algorithm (GA is applied between two randomly chosen reference voices. Again the instant voice is compared with the result of Genetic Algorithm (GA which is used, including its three main steps: selection, crossover and mutation. We illustrate our approach with different sample of voices from human in our institution.

  10. Efficient and secure source authentication scheme for multicast user authentication

    Institute of Scientific and Technical Information of China (English)

    JEONG; Yoon-su; LEE; Sang-hyuk; SHIN; Seung-soo

    2013-01-01

    Multicast technology application has been widely utilized in broadband internet. Source authentication is one of the most needs for many multicast applications transferring real-time information such as stream video and online news. Because multicast current services provided to the group members are changed dynamically, data transferring by a group member is not used by the recipient. In order to verify the identity of the sender who sent the packet and to make sure that the data have not been tampered, an optimized source authentication scheme has been proposed to transfer the authentication information not to the next-door packet. The proposed method for multiple packets authenticates the source with a limited number of electronic signatures. The proposed method can reduce overhead compared to the method by adding a digital signature for every packet. In addition, by sending the generated electronic signature to the first packet and the last packet, it prevents the loss of consecutive packets, as well as a source authentication can be provided in real-time services.

  11. Voice Therapy Practices and Techniques: A Survey of Voice Clinicians.

    Science.gov (United States)

    Mueller, Peter B.; Larson, George W.

    1992-01-01

    Eighty-three voice disorder therapists' ratings of statements regarding voice therapy practices indicated that vocal nodules are the most frequent disorder treated; vocal abuse and hard glottal attack elimination, counseling, and relaxation were preferred treatment approaches; and voice therapy is more effective with adults than with children.…

  12. Voice in early glottic cancer compared to benign voice pathology

    NARCIS (Netherlands)

    Van Gogh, C. D. L.; Mahieu, H. F.; Kuik, D. J.; Rinkel, R. N. P. M.; Langendijk, J. A.; Verdonck-de Leeuw, I. M.

    2007-01-01

    The purpose of this study is to compare (Dutch) Voice Handicap Index (VHIvumc) scores from a selected group of patients with voice problems after treatment for early glottic cancer with patients with benign voice disorders and subjects from the normal population. The study included a group of 35 pat

  13. The inner voice

    Directory of Open Access Journals (Sweden)

    Anthony James Ridgway

    2009-12-01

    Full Text Available The inner voice- we all know what it is because we all have it and use it when we are thinking or reading, for example. Little work has been done on it in our field, with the notable exception of Brian Tomlinson, but presumably it must be a cognitive phenomenon which is of great importance in thinking, language learning, and reading in a foreign language. The inner voice will be discussed as a cognitive psychological phenomenon associated with short-term memory, and distinguished from the inner ear. The process of speech recoding will be examined (the process of converting written language into the inner voice and the importance of developing the inner voice, as a means of both facilitating the production of a new language and enhancing the comprehension of a text in a foreign language, will be emphasized. Finally, ways of developing the inner voice in beginning and intermediate readers of a foreign language will be explored and recommended.

  14. Smartphone App for Voice Disorders

    Science.gov (United States)

    ... on. Feature: Taste, Smell, Hearing, Language, Voice, Balance Smartphone App for Voice Disorders Past Issues / Fall 2013 ... developed a mobile monitoring device that relies on smartphone technology to gather a week's worth of talking, ...

  15. Sequence Patterns of Identity Authentication Protocols

    Institute of Scientific and Technical Information of China (English)

    Tao Hongcai; He Dake

    2006-01-01

    From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TTP). Ten feasible sequence patterns of authentication protocol with TTP and 5 sequence patterns without TTP are gained. These gained sequence patterns meet the requirements for identity authentication,and basically cover almost all the authentication protocols with TTP and without TTP at present. All of the sequence patterns gained are classified into unilateral or bilateral authentication. Then , according to the sequence symmetry, several good sequence patterns with TTP are evaluated. The accompolished results can provide a reference to design of new identity authentication protocols.

  16. Ramp Secret Sharing Approach to Authentication and Data Repairing For Document Image

    Directory of Open Access Journals (Sweden)

    Larry Liston

    2014-04-01

    Full Text Available Digital images are widely used to protect confidential and important information. But the problem is to provide the authentication and integrity to these digital images is a very challenging task. Therefore a new efficient authentication method is proposed for document images with verification and data self-repair capability using the Portable Network Graphics (PNG image. Here, an authentication signal is generated for each block of a document image which, combine with the binarized block data, is transformed into several shares using the Ramp secret sharing scheme. These several binarized block data shares are then embedded into an alpha channel plane. During the embedding process, the generated share values are mapped into a range of 238-255 to yield a transparent stego-image with a disguise effect. Alpha channel is combining with the original image and converted into PNG image format. While the process of image authentication, the image block is marked as tampered, if the authentication signal generated from the current block content does not match with share that extracted from the alpha channel plane. Then using reverse Ramp scheme, two shares from unmarked blocks are collected and then data repairing is applied. Some security measures are also proposed for protecting the security of the shares hidden in the alpha channel.

  17. Sustainable Consumer Voices

    DEFF Research Database (Denmark)

    Klitmøller, Anders; Rask, Morten; Jensen, Nevena

    2011-01-01

    Aiming to explore how user driven innovation can inform high level design strategies, an in-depth empirical study was carried out, based on data from 50 observations of private vehicle users. This paper reports the resulting 5 consumer voices: Technology Enthusiast, Environmentalist, Design Lover......, Pragmatist and Status Seeker. Expedient use of the voices in creating design strategies is discussed, thus contributing directly to the practice of high level design managers. The main academic contribution of this paper is demonstrating how applied anthropology can be used to generate insights...... into disruptive emergence of product service systems, where quantitative user analyses rely on historical continuation....

  18. Biometric Authentication using Nonparametric Methods

    CERN Document Server

    Sheela, S V; 10.5121/ijcsit.2010.2309

    2010-01-01

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determined from the training samples. Hu moments are applied on the components. The summation of moment values corresponding to minimum variance components are provided as input vector to k-means and fuzzy kmeans classifiers. The best performance was obtained for MMU database consisting of 45 subjects. The number of subjects with zero False Rejection Rate [FRR] was 44 and number of subjects with zero False Acceptance Rate [FAR] was 45. This paper addresses the computational load reduction in off-line signature verification based o...

  19. Improving Usability of Passphrase Authentication

    DEFF Research Database (Denmark)

    Nielsen, Glen; Vedel, Michael; Jensen, Christian D.

    2014-01-01

    The combination of user-names and passwords has become the predominant method of user authentication in computer systems. Most users have multiple accounts on different systems, which impose different constraints on the length and complexity of passwords that the user is allowed to select....... This is done to ensure an appropriate degree of security, but instead, it makes it difficult for users to remember their password, which results in passwords that are either insecure, but easy to remember, or written down on paper. In this paper we address the problem of usability in user authentication......, which accepts the most common typing mistakes. The proposed algorithm has been implemented in secure hardware and integrated into a standard Unix system. We present the design, implementation and preliminary evaluation of the developed passphrase authentication prototype....

  20. Biometric Authentication using Nonparametric Methods

    CERN Document Server

    Sheela, S V; 10.5121/ijcsit.2010.2309

    2010-01-01

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determined from the training samples. Hu moments are applied on the components. The summation of moment values corresponding to minimum variance components are provided as input vector to k-means and fuzzy k-means classifiers. The best performance was obtained for MMU database consisting of 45 subjects. The number of subjects with zero False Rejection Rate [FRR] was 44 and number of subjects with zero False Acceptance Rate [FAR] was 45. This paper addresses the computational load reduction in off-line signature verification based ...

  1. Designing Pu600 for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2008-07-10

    Many recent Non-proliferation and Arms Control software projects include an authentication component. Demonstrating assurance that software and hardware performs as expected without hidden 'back-doors' is crucial to a project's success. In this context, 'authentication' is defined as determining that the system performs only its intended purpose and performs that purpose correctly and reliably over many years. Pu600 is a mature software solution for determining the presence of Pu and the ratio of Pu240 to Pu239 by analyzing the gamma ray spectra in the 600 KeV region. The project's goals are to explore hardware and software technologies which can by applied to Pu600 which ease the authentication of a complete, end-to-end solution. We will discuss alternatives and give the current status of our work.

  2. VoiceRelay: voice key operation using visual basic.

    Science.gov (United States)

    Abrams, Lise; Jennings, David T

    2004-11-01

    Using a voice key is a popular method for recording vocal response times in a variety of language production tasks. This article describes a class module called VoiceRelay that can be easily utilized in Visual Basic programs for voice key operation. This software-based voice key offers the precision of traditional voice keys (although accuracy is system dependent), as well as the flexibility of volume and sensitivity control. However, VoiceRelay is a considerably less expensive alternative for recording vocal response times because it operates with existing PC hardware and does not require the purchase of external response boxes or additional experiment-generation software. A sample project demonstrating implementation of the VoiceRelay class module may be downloaded from the Psychonomic Society Web archive, www.psychonomic.org/archive.

  3. Authentic counterfeit in viral marketing

    OpenAIRE

    2016-01-01

    This master thesis deals with authentic fake, a phenomenon present in viral marketing. After a brief introduction into the issue and clarification of terms, the study aims to find out whether a seemingly authentic video recording of a catchy incident helps a marketing campaign to succeed, that is to say to achieve high sharing figures amongst internet users. In a theoretical part, the thesis elaborates information from technical books, publications and internet sources dealing with authentici...

  4. Quantified Trust Levels for Authentication

    Science.gov (United States)

    Thomas, Ivonne; Menzel, Michael; Meinel, Christoph

    Service-oriented Architectures (SOAs) facilitate applications to integrate seamlessly services from collaborating business partners regardless of organizational borders. In order to secure access to these services, mechanisms for authentication and authorisation must be deployed that control the access based on identity-related information. To enable a business partners’ users to access the provided services, an identity federation is often established that enables the brokering of identity information across organisational borders. The establishment of such a federation requires complex agreements and contracts that define common policies, obligations and procedures. Generally, this includes obligations on the authentication process as well.

  5. Voice application development for Android

    CERN Document Server

    McTear, Michael

    2013-01-01

    This book will give beginners an introduction to building voice-based applications on Android. It will begin by covering the basic concepts and will build up to creating a voice-based personal assistant. By the end of this book, you should be in a position to create your own voice-based applications on Android from scratch in next to no time.Voice Application Development for Android is for all those who are interested in speech technology and for those who, as owners of Android devices, are keen to experiment with developing voice apps for their devices. It will also be useful as a starting po

  6. The Authentic Personality: A Theoretical and Empirical Conceptualization and the Development of the Authenticity Scale

    Science.gov (United States)

    Wood, Alex M.; Linley, P. Alex; Maltby, John; Baliousis, Michael; Joseph, Stephen

    2008-01-01

    This article describes the development of a measure of dispositional authenticity and tests whether authenticity is related to well-being, as predicted by several counseling psychology perspectives. Scales were designed to measure a tripartite conception of authenticity, comprising self-alienation, authentic living, and accepting external…

  7. Using medical history embedded in biometrics medical card for user identity authentication: privacy preserving authentication model by features matching.

    Science.gov (United States)

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.

  8. Sustainable Consumer Voices

    DEFF Research Database (Denmark)

    Klitmøller, Anders; Rask, Morten; Jensen, Nevena

    2011-01-01

    Aiming to explore how user driven innovation can inform high level design strategies, an in-depth empirical study was carried out, based on data from 50 observations of private vehicle users. This paper reports the resulting 5 consumer voices: Technology Enthusiast, Environmentalist, Design Lover...

  9. Voices of courage

    Directory of Open Access Journals (Sweden)

    Noraida Abdullah Karim

    2007-07-01

    Full Text Available In May 2007 the Women’s Commission for Refugee Women and Children1 presented its annual Voices of Courage awards to three displaced people who have dedicated their lives to promoting economic opportunities for refugee and displaced women and youth. These are their (edited testimonies.

  10. Listen to a voice

    DEFF Research Database (Denmark)

    Hølge-Hazelton, Bibi

    2001-01-01

    Listen to the voice of a young girl Lonnie, who was diagnosed with Type 1 diabetes at 16. Imagine that she is deeply involved in the social security system. She lives with her mother and two siblings in a working class part of a small town. She is at a special school for problematic youth, and he...

  11. Political animal voices

    NARCIS (Netherlands)

    Meijer, E.R.

    2017-01-01

    In this thesis, I develop a theory of political animal voices. The first part of the thesis focuses on non-human animal languages and forming interspecies worlds. I first investigate the relation between viewing language as exclusively human and seeing humans as categorically different from other

  12. Finding a Voice

    Science.gov (United States)

    Stuart, Shannon

    2012-01-01

    Schools have struggled for decades to provide expensive augmentative and alternative communication (AAC) resources for autistic students with communication challenges. Clunky voice output devices, often included in students' individualized education plans, cost about $8,000, a difficult expense to cover in hard times. However, mobile technology is…

  13. the Voice of Tomorrow

    Institute of Scientific and Technical Information of China (English)

    AlanBurdick

    2003-01-01

    Have you heard Mide? Coule be.Mike is a professional reader,and he's everywhere these days. On MapQuest, the Web-based map service,he'll read aloud whatever directions you ask for. If you like to have AOL or Yahoo! e-mail read aloud to you over the phone, that's Mike's voice you 're hearing. Soon

  14. What the voice reveals.

    NARCIS (Netherlands)

    Ko, Sei Jin

    2007-01-01

    Given that the voice is our main form of communication, we know surprisingly little about how it impacts judgment and behavior. Furthermore, the modern advancement in telecommunication systems, such as cellular phones, has meant that a large proportion of our everyday interactions are conducted voca

  15. The Inner Voice

    Science.gov (United States)

    Ridgway, Anthony James

    2009-01-01

    The inner voice- we all know what it is because we all have it and use it when we are thinking or reading, for example. Little work has been done on it in our field, with the notable exception of Brian Tomlinson, but presumably it must be a cognitive phenomenon which is of great importance in thinking, language learning, and reading in a foreign…

  16. Moving beyond Youth Voice

    Science.gov (United States)

    Serido, Joyce; Borden, Lynne M.; Perkins, Daniel F.

    2011-01-01

    This study combines research documenting the benefits of positive relationships between youth and caring adults on a young person's positive development with studies on youth voice to examine the mechanisms through which participation in youth programs contributes to positive developmental outcomes. Specifically, the study explores whether youth's…

  17. Bodies and Voices

    DEFF Research Database (Denmark)

    A wide-ranging collection of essays centred on readings of the body in contemporary literary and socio-anthropological discourse, from slavery and rape to female genital mutilation, from clothing, ocular pornography, voice, deformation and transmutation to the imprisoned, dismembered, remembered...

  18. Voices for Careers.

    Science.gov (United States)

    York, Edwin G.; Kapadia, Madhu

    Listed in this annotated bibliography are 502 cassette tapes of value to career exploration for Grade 7 through the adult level, whether as individualized instruction, small group study, or total class activity. Available to New Jersey educators at no charge, this Voices for Careers System is also available for duplication on request from the New…

  19. What the voice reveals

    NARCIS (Netherlands)

    Ko, Sei Jin

    2007-01-01

    Given that the voice is our main form of communication, we know surprisingly little about how it impacts judgment and behavior. Furthermore, the modern advancement in telecommunication systems, such as cellular phones, has meant that a large proportion of our everyday interactions are conducted voca

  20. Bodies and Voices

    DEFF Research Database (Denmark)

    A wide-ranging collection of essays centred on readings of the body in contemporary literary and socio-anthropological discourse, from slavery and rape to female genital mutilation, from clothing, ocular pornography, voice, deformation and transmutation to the imprisoned, dismembered, remembered...

  1. Authentic Montessori: The Teacher Makes the Difference

    Science.gov (United States)

    Huxel, Alexa C.

    2013-01-01

    What are the elements that make up authentic Montessori? Is Montessori something concrete or abstract? Are there intangibles that make Montessori what it is? Many classrooms today have Montessori materials and small tables and chairs. Are they authentic Montessori? When examining areas that traditionally make defining authentic Montessori…

  2. 28 CFR 68.46 - Authenticity.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Authenticity. 68.46 Section 68.46... ALIENS, UNFAIR IMMIGRATION-RELATED EMPLOYMENT PRACTICES, AND DOCUMENT FRAUD § 68.46 Authenticity. The authenticity of all documents submitted as proposed exhibits in advance of the hearing shall be deemed...

  3. Authenticity, Autonomy and Altruism: Keys for Transformation

    Science.gov (United States)

    Clarken, Rodney

    2011-01-01

    The value of authentic knowing, autonomous behavior and altruistic motivation is presented. Authenticity, autonomy and altruism are primary human capacities and keys for individual and collective transformation. Realizing the full development of these three basic potentialities can serve as goals and standards for well-being. Authenticity,…

  4. 29 CFR 18.50 - Authenticity.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Authenticity. 18.50 Section 18.50 Labor Office of the Secretary of Labor RULES OF PRACTICE AND PROCEDURE FOR ADMINISTRATIVE HEARINGS BEFORE THE OFFICE OF ADMINISTRATIVE LAW JUDGES General § 18.50 Authenticity. The authenticity of all documents submitted as...

  5. Authentic Montessori: The Teacher Makes the Difference

    Science.gov (United States)

    Huxel, Alexa C.

    2013-01-01

    What are the elements that make up authentic Montessori? Is Montessori something concrete or abstract? Are there intangibles that make Montessori what it is? Many classrooms today have Montessori materials and small tables and chairs. Are they authentic Montessori? When examining areas that traditionally make defining authentic Montessori…

  6. Improving Usability of Passphrase Authentication

    DEFF Research Database (Denmark)

    Nielsen, Glen; Vedel, Michael; Jensen, Christian D.

    2014-01-01

    . This is done to ensure an appropriate degree of security, but instead, it makes it difficult for users to remember their password, which results in passwords that are either insecure, but easy to remember, or written down on paper. In this paper we address the problem of usability in user authentication...

  7. Literacy Cafe: Making Writing Authentic

    Science.gov (United States)

    Daniels, Erika

    2007-01-01

    The "Literacy Cafe," a celebration of genre study and student writing, offers students (and visitors!) a positive environment in which to engage in reading and discussion of writing without self-consciousness or fear of criticism. It works because students learn to recognize writing as a learning tool and a relevant, authentic skill in the real…

  8. Authenticity in a Digital Environment.

    Science.gov (United States)

    Cullen, Charles T.; Hirtle, Peter B.; Levy, David; Lynch, Clifford A.; Rothenberg, Jeff

    On January 24, 2000, the Council on Library and Information Resources (CLIR) convened a group of experts from different domains of the information resources community to address the question, "What is an authentic digital object?" Five writers--an archivist, a digital library expert, a documentary editor and special collections…

  9. The embodiment of authentic leadership.

    Science.gov (United States)

    Waite, Roberta; McKinney, Nicole; Smith-Glasgow, Mary Ellen; Meloy, Faye A

    2014-01-01

    Development of student leadership capacity and efficacy is critical to the nursing profession, and vital to this process is a strong foundation in critical thinking that includes a depth of understanding of self (i.e., authentic leadership development). This article will (a) present a theoretical overview of authentic leadership as compared with other popular leadership theories, (b) provide an overview of development/implementation of an authentic leadership course, the first in a series of six one-credit courses as an integral component of the Macy Undergraduate Leadership Fellows Program for upper-level nursing students, and (c) discuss related implications for nursing education. Findings from an investigator-developed quantitative pre-post survey and qualitative evaluation questions are provided. Student feedback regarding the comprehensive nature of the course was extremely positive and affirmed the value of introspection associated with authentic leadership in ongoing personal and professional development. Critical pedagogy and action-oriented learning strategies also proved beneficial to student engagement.

  10. Authentic Supervision Reconciles the Irreconcilables.

    Science.gov (United States)

    Pajak, Edward F.; Seyfarth, John T.

    1983-01-01

    Successful supervisors share a characteristic of "authenticity," rather than a particular pattern of behavior. From a background of Gestalt psychology, four steps are offered to help supervisors become aware of their own needs and feelings and recognize the "shoulds" that prevent real contact with others. (MLF)

  11. Authenticity and Lesbian Health Educators

    Science.gov (United States)

    Weiler-Timmins, Rebecca A.

    2011-01-01

    This qualitative study used narrative inquiry to explore how lesbian health educators navigate authenticity in a heteronormative higher education setting. The study was grounded in a lesbian standpoint pedagogical viewpoint, which provided a lens with which to view the nine participants' experiences. Of particular interest was how the educators in…

  12. Authenticity or School-only?

    DEFF Research Database (Denmark)

    Fougt, Simon Skov

    Challenging the apparent distinction among educational researchers between ‘authenticity’ outside schools and ‘school-only’ inside schools, this paper investigates the concept of meaningfulness from different perspectives with a focus on formal learning in schools, as it states that teaching...... and learning inside school also can be authentic....

  13. Embodying Authenticity in Higher Education

    Science.gov (United States)

    Douglass, Laura

    2016-01-01

    Orienting to the community of higher education involves a learning experience that is authentic and embodied for one new college administrator. Reflecting on her experience, she articulates how her relationship to her body helps to understand and respond to the tensions of engaging with a scholarly community.

  14. Literacy Cafe: Making Writing Authentic

    Science.gov (United States)

    Daniels, Erika

    2007-01-01

    The "Literacy Cafe," a celebration of genre study and student writing, offers students (and visitors!) a positive environment in which to engage in reading and discussion of writing without self-consciousness or fear of criticism. It works because students learn to recognize writing as a learning tool and a relevant, authentic skill in the real…

  15. Embodying Authenticity in Higher Education

    Science.gov (United States)

    Douglass, Laura

    2016-01-01

    Orienting to the community of higher education involves a learning experience that is authentic and embodied for one new college administrator. Reflecting on her experience, she articulates how her relationship to her body helps to understand and respond to the tensions of engaging with a scholarly community.

  16. Voice over IP in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially......IP communications are difficult to achieve in a time-varying environment due to channel errors and traffic congestion and across different systems. The provision of VoIP in wireless heterogeneous networks requires a set of time-efficient control mechanisms to support a VoIP session with acceptable quality...

  17. Authenticity as an aim of psychoanalysis.

    Science.gov (United States)

    Neri, Claudio

    2008-12-01

    This paper will present a series of predominantly clinical observations concerning the lengthy work a patient carries out, with the help of the analyst, in order to achieve greater personal authenticity. When this work is drawing to a close and the patient has gained a degree of authenticity, this authenticity remains within him, almost without his realizing it. The power of authenticity is instead revealed through the patient's most intimate and important relationships. In the long term, the patient's authenticity also alters his perception of himself and of his role in the world. He feels more alive and less overcome by a sense of futility, if earlier this had been the case.

  18. AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted the protocol could withstand the existing attacks. This paper shows that Ku and Wang's protocol is still vulnerable to the modification attack and presents an improved authenticated key agreement protocol to enhance the security of Ku and Wang's protocol. The protocol has more efficient performance by replacing exponentiation operations with message authentication code operations.

  19. Quantum identity authentication with single photon

    Science.gov (United States)

    Hong, Chang ho; Heo, Jino; Jang, Jin Gak; Kwon, Daesung

    2017-10-01

    Quantum identity authentication with single photons is proposed in the paper. It can verify a user's identity without exposing to an authentication key information. The protocol guarantees high efficiency in that it can verify two bits of authentication information using just a single photon. The security of our authentication scheme is analyzed and confirmed in the case of a general attack. Moreover, the proposed protocol is practicable with current technology. Our quantum identity authentication protocol does not require quantum memory registration and any entangled photon sources.

  20. An efficient quantum secure direct communication scheme with authentication

    Institute of Scientific and Technical Information of China (English)

    Yang Yu-Guang; Wen Qiao-Yan; Zhu Fu-Chen

    2007-01-01

    In this paper an efficient quantum secure direct communication (QSDC) scheme with authentication is presented,which is based on quantum entanglement and polarized single photons. The present protocol uses Einstein-PodolskyRosen (EPR) pairs and polarized single photons in batches. A particle of the EPR pairs is retained in the sender's QSDC protocol. According to the shared information beforehand, these two kinds of quantum states are mixed and then transmitted via a quantum channel. The EPR pairs are used to transmit secret messages and the polarized single photons used for authentication and eavesdropping check. Consequently, because of the dual contributions of the polarized single photons, no classical information is needed. The intrinsic efficiency and total efficiency are both 1 in this scheme as almost all of the instances are useful and each EPR pair can be used to carry two bits of information.

  1. April 16th : The World Voice Day

    NARCIS (Netherlands)

    Svec, Jan G.; Behlau, Mara

    2007-01-01

    Although the voice is used as an everyday basis of speech, most people realize its importance only when a voice problem arises. Increasing public awareness of the importance of the voice and alertness to voice problems are the main goals of the World Voice Day, which is celebrated yearly on April 16

  2. Risk factors for voice problems in teachers

    NARCIS (Netherlands)

    Kooijman, P. G. C.; de Jong, F. I. C. R. S.; Thomas, G.; Huinck, W.; Donders, R.; Graamans, K.; Schutte, H. K.

    2006-01-01

    In order to identify factors that are associated with voice problems and voice-related absenteeism in teachers, 1,878 questionnaires were analysed. The questionnaires inquired about personal data, voice complaints, voice-related absenteeism from work and conditions that may lead to voice complaints

  3. You're a What? Voice Actor

    Science.gov (United States)

    Liming, Drew

    2009-01-01

    This article talks about voice actors and features Tony Oliver, a professional voice actor. Voice actors help to bring one's favorite cartoon and video game characters to life. They also do voice-overs for radio and television commercials and movie trailers. These actors use the sound of their voice to sell a character's emotions--or an advertised…

  4. Risk factors for voice problems in teachers

    NARCIS (Netherlands)

    Kooijman, P. G. C.; de Jong, F. I. C. R. S.; Thomas, G.; Huinck, W.; Donders, R.; Graamans, K.; Schutte, H. K.

    2006-01-01

    In order to identify factors that are associated with voice problems and voice-related absenteeism in teachers, 1,878 questionnaires were analysed. The questionnaires inquired about personal data, voice complaints, voice-related absenteeism from work and conditions that may lead to voice complaints

  5. Risk factors for voice problems in teachers.

    NARCIS (Netherlands)

    Kooijman, P.G.C.; Jong, F.I.C.R.S. de; Thomas, G.; Huinck, W.J.; Donders, A.R.T.; Graamans, K.; Schutte, H.K.

    2006-01-01

    In order to identify factors that are associated with voice problems and voice-related absenteeism in teachers, 1,878 questionnaires were analysed. The questionnaires inquired about personal data, voice complaints, voice-related absenteeism from work and conditions that may lead to voice complaints

  6. Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks.

    Science.gov (United States)

    Lee, Tian-Fu

    2015-06-25

    A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To increase efficiency, recent temporal credential-based authenticated key agreement schemes for WSNs have been designed to involve few computational operations, such as hash and exclusive-or operations. However, these schemes cannot protect the privacy of users and withstand possible attacks. This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations and scalar multiplications on an elliptic curve. The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses.

  7. Keyboard With Voice Output

    Science.gov (United States)

    Huber, W. C.

    1986-01-01

    Voice synthesizer tells what key is about to be depressed. Verbal feedback useful for blind operators or where dim light prevents sighted operator from seeing keyboard. Also used where operator is busy observing other things while keying data into control system. Used as training aid for touch typing, and to train blind operators to use both standard and braille keyboards. Concept adapted to such equipment as typewriters, computers, calculators, telephones, cash registers, and on/off controls.

  8. Infusing Authentic Inquiry into Biotechnology

    Science.gov (United States)

    Hanegan, Nikki L.; Bigler, Amber

    2009-10-01

    Societal benefit depends on the general public's understandings of biotechnology (Betsch in World J Microbiol Biotechnol 12:439-443, 1996; Dawson and Cowan in Int J Sci Educ 25(1):57-69, 2003; Schiller in Business Review: Federal Reserve Bank of Philadelphia (Fourth Quarter), 2002; Smith and Emmeluth in Am Biol Teach 64(2):93-99, 2002). A National Science Foundation funded survey of high school biology teachers reported that hands-on biotechnology education exists in advanced high school biology in the United States, but is non-existent in mainstream biology coursework (Micklos et al. in Biotechnology labs in American high schools, 1998). The majority of pre-service teacher content preparation courses do not teach students appropriate content knowledge through the process of inquiry. A broad continuum exists when discussing inquiry-oriented student investigations (Hanegan et al. in School Sci Math J 109(2):110-134, 2009). Depending on the amount of structure in teacher lessons, inquiries can often be categorized as guided or open. The lesson can be further categorized as simple or authentic (Chinn and Malhotra in Sci Educ 86(2):175-218, 2002). Although authentic inquiries provide the best opportunities for cognitive development and scientific reasoning, guided and simple inquiries are more often employed in the classroom (Crawford in J Res Sci Teach 37(9):916-937, 2000; NRC in Inquiry and the national science education standards: a guide for teaching and learning, 2000). For the purposes of this study we defined inquiry as "authentic" if original research problems were resolved (Hanegan et al. in School Sci Math J 109(2):110-134, 2009; Chinn and Malhotra in Sci Educ 86(2):175-218, 2002; Roth in Authentic school science: knowing and learning in open-inquiry science laboratories, 1995). The research question to guide this study through naturalistic inquiry research methods was: How will participants express whether or not an authentic inquiry experience enhanced

  9. Why Is My Voice Changing? (For Teens)

    Science.gov (United States)

    ... Week of Healthy Breakfasts Shyness Why Is My Voice Changing? KidsHealth > For Teens > Why Is My Voice ... deeper than a girl's, though. What Causes My Voice to Change? At puberty, guys' bodies begin producing ...

  10. Common Problems That Can Affect Your Voice

    Science.gov (United States)

    ... near you Common Problems That Can Affect Your Voice Common Problems That Can Affect Your Voice Patient ... that traditionally accompany gastro esophageal reflux disease (GERD). Voice Misuse and Overuse Speaking is a physical task ...

  11. Voice and silence in organizations

    Directory of Open Access Journals (Sweden)

    Moaşa, H.

    2011-01-01

    Full Text Available Unlike previous research on voice and silence, this article breaksthe distance between the two and declines to treat them as opposites. Voice and silence are interrelated and intertwined strategic forms ofcommunication which presuppose each other in such a way that the absence of one would minimize completely the other’s presence. Social actors are not voice, or silence. Social actors can have voice or silence, they can do both because they operate at multiple levels and deal with multiple issues at different moments in time.

  12. VOICE REHABILITATION FOLLOWING TOTAL LARYNGECTOMY

    Directory of Open Access Journals (Sweden)

    Balasubramanian Thiagarajan

    2015-03-01

    Full Text Available Despite continuing advances in surgical management of laryngeal malignancy, total laryngectomy is still the treatment of choice in advanced laryngeal malignancies. Considering the longevity of the patient following total laryngectomy, various measures have been adopted in order to provide voice function to the patient. Significant advancements have taken place in voice rehabilitation of post laryngectomy patients. Advancements in oncological surgical techniques and irradiation techniques have literally cured laryngeal malignancies. Among the various voice rehabilitation techniques available TEP (Tracheo oesophageal puncture is considered to be the gold standard. This article attempts to explore the various voice rehabilitation technique available with primary focus on TEP.

  13. Information fusion for palmprint authentication

    Science.gov (United States)

    Wu, Xiangqian; Wang, Kuanquan; Zhang, David

    2006-04-01

    A palmprint can be represented using different features and the different representations reflect the different characteristic of a palmprint. Fusion of multiple palmprint features may enhance the performance of a palmprint authentication system. This paper investigates the fusion of two types of palmprint information: the phase (called PalmCode) and the orientation (called OrientationCode). The PalmCode is extracted using the 2-D Gabor filters based algorithm and the OrientationCode is computed using several directional templates. Then several fusion strategies are investigated and compared. The experimental results show that the fusion of the PalmCode and OrientationCode using the Product, Sum and Weighted Sum strategies can greatly improve the accuracy of palmprint authentication, which is up to 99.6%.

  14. The impact of voice on speech realization

    OpenAIRE

    Jelka Breznik

    2014-01-01

    The study discusses spoken literary language and the impact of voice on speech realization. The voice consists of a sound made by a human being using the vocal folds for talking, singing, laughing, crying, screaming… The human voice is specifically the part of human sound production in which the vocal folds (vocal cords) are the primary sound source. Our voice is our instrument and identity card. How does the voice (voice tone) affect others and how do they respond, positively or negatively? ...

  15. Lightweight query authentication on streams

    OpenAIRE

    2014-01-01

    We consider a stream outsourcing setting, where a data owner delegates the management of a set of disjoint data streams to an untrusted server. The owner authenticates his streams via signatures. The server processes continuous queries on the union of the streams for clients trusted by the owner. Along with the results, the server sends proofs of result correctness derived from the owner's signatures, which are easily verifiable by the clients. We design novel constructions for a collection o...

  16. Food authentication by molecular methods

    OpenAIRE

    Oliveira, B; Mafra, I; J. COSTA; Amaral, J.S.; FARIA, M.; Fernandes, T.J.R.; Soares, S.

    2011-01-01

    Quality and authenticity evaluation of foods encompasses many issues, such as the entire or partial fraudulent substitution of higher commercial value constituents by others with lower value and the presence of undeclared constituents/ingredients. To protect consumers from misleading labeling, regulations issued across the world have implemented specific guidelines and listed particular foods that sh ould be declared on the label. Particularly in the case of genetically modi...

  17. Authentic subjectivity and social transformation

    Directory of Open Access Journals (Sweden)

    Michael O'Sullivan

    2016-05-01

    Full Text Available Holiness in the Christian tradition has often been understood in a way that devalues embodiment and practical engagement with the world of one’s time. The latter understanding, for example, led to Marx’s critique and repudiation of Christianity. Both interpretations of holiness can be understood as mistaken efforts to express the dynamism for authenticity in contextualised human subjectivity. Vatican 2 opposed both views by addressing itself to all people of good will, declaring that everyone was called to holiness, and that authentic Christian identity involved solidarity with the world of one’s time, especially those who are poor. Vatican 2, therefore, provided an authoritative faith foundation for holiness expressed through social commitment and for viewing social commitment on the part of people of good will in whatever state of life as a form of holiness. This vision was also the conviction of leading spirituality writers of the period, like Thomas Merton, and inspired liberation theologians and the Latin American Catholic bishops at their conference in Medellín a few years after the Council. The argument of this article is that the emergence and development of a non-dualist Christian spirituality is grounded methodologically in the correct appropriation of the common innate dynamism for authenticity in concrete human persons and lived spiritual experiences consistent with and capable of enhancing this dynamism.

  18. Authenticity assessment of dairy products.

    Science.gov (United States)

    de la Fuente, Miguel Angel; Juárez, Manuela

    2005-01-01

    The authenticity of dairy products has become a focal point, attracting the attention of scientists, producers, consumers, and policymakers. Among many others, some of the practices not allowed in milk and milk products are the substitution of part of the fat or proteins, admixtures of milk of different species, additions of low-cost dairy products (mainly whey derivatives), or mislabeling of products protected by denomination of origin. A range of analytical methods to detect frauds have been developed, modified, and continually reassessed to be one step ahead of manufacturers who pursue these illegal activities. Traditional procedures to assess the authenticity of dairy products include chromatographic, electrophoretic, and immunoenzymatic methods. New approaches such as capillary electrophoresis, polymerase chain reaction, and isotope ratio mass spectrometry have also emerged alongside the latest developments in the former procedures. This work intends to provide an updated and extensive overview since 1991 on the principal applications of all these techniques together with their advantages and disadvantages for detecting the authenticity of dairy products. The scope and limits of different tools are also discussed.

  19. EXPLORING THE RELATIONSHIP BETWEEN AUTHENTIC DIALOGUE AND SPANISH FOR HEALTHCARE PROFESSIONALS

    Directory of Open Access Journals (Sweden)

    Karol Hardin

    2017-03-01

    Full Text Available Although linguistic studies of healthcare communication are common for English dialects, they are less frequent for Spanish. Furthermore, linguistic research is virtually non-existent for Ecuadorian healthcare discourse, primarily occurring in literature on anthropology rather than linguistics per se. The present study therefore uses a qualitative approach to examine videotaped dialogues between ten Spanish-speaking patients and two Spanish-speaking physicians at a hospital in eastern Ecuador. The study's goal was to observe naturally occurring communication to determine how patients and family physicians negotiated meaning in medical interviews. Dialogues were transcribed using a conversational analysis methodology and then were specifically analyzed by applying Cordella's (2004 notion of physician "voices" to investigate ways that doctors conveyed different roles they had during an interview. Examples of the "Doctor, Educator, and Fellow Human" voices were reflected in the data, both in complementary and overlapping contexts. A secondary goal of the study was to provide videos of authentic medical interviews for use in teaching aspects of conversation to students taking intermediate Spanish for pre-health professions. Responses to questions about the video suggested that as students worked to improve their comprehension in a clinical context, the video dialogue raised their awareness about pragmatic notions such as politeness and register, "voices" (or roles that physicians and patients use in cooperative/non-cooperative interaction, certain discourse markers, and embedded cultural beliefs about health. As a result, authentic dialogue within this specific context, that of medical Spanish interviews, served as a meaningful method for teaching pragmatic concepts, negotiation of meaning, and culturally implied information. It is therefore likely that authentic health conversations such as those in this study can inform language education for

  20. The Voice Handicap Index with Post-Laryngectomy Male Voices

    Science.gov (United States)

    Evans, Eryl; Carding, Paul; Drinnan, Michael

    2009-01-01

    Background: Surgical treatment for advanced laryngeal cancer involves complete removal of the larynx ("laryngectomy") and initial total loss of voice. Post-laryngectomy rehabilitation involves implementation of different means of "voicing" for these patients wherever possible. There is little information about laryngectomees'…

  1. Pedagogic Voice: Student Voice in Teaching and Engagement Pedagogies

    Science.gov (United States)

    Baroutsis, Aspa; McGregor, Glenda; Mills, Martin

    2016-01-01

    In this paper, we are concerned with the notion of "pedagogic voice" as it relates to the presence of student "voice" in teaching, learning and curriculum matters at an alternative, or second chance, school in Australia. This school draws upon many of the principles of democratic schooling via its utilisation of student voice…

  2. Sustaining Security In MANET: Biometric Stationed Authentication Protocol (BSAP Inculcating Meta-Heuristic Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Sherin Zafar

    2014-09-01

    Full Text Available The paper comprehends an impending accost of intensifying biometric stationed authentication protocol(BSAP bestowing meta-heuristic genetic algorithm for securing MANET. Biometric authentication using fingerprint, facial, iris scan, voice recognition etc. have gain a lot of importance in recent years to provide security in MANET. Biometrics are more advantageous and secure as compared to prevailing data security techniques like password or token mechanisms. A higher level of security is achieved in our impending approach using genetic algorithm to overcome the security and privacy concerns that exist in biometric technology. The foremost requirement of our protocol is to overcome various data attacks such as wormhole, cache poisoning, invisible node attack etc. that are confronted by MANET and make the network more secure.

  3. STEGANOGRAPHIC METHOD VERIFYING THE INTEGRITY AND AUTHENTICITY OF EMBEDDED INFORMATION

    Directory of Open Access Journals (Sweden)

    Kobozeva A.A.

    2014-12-01

    Full Text Available The paper focuses on the steganographic method that carries out simultaneous effective solution for creation of covert communication channel within the channel for public use, check of the integrity and authenticity of the transmitted additional information. These tasks define the so-called three-pronged task (TT that is of current interest, but today, according to the data available from the open press, has no satisfactory solution. This is connected with the complexity of TT and moreover a covert communication channel itself requires additional guaranteeing the reliability of perception and insensitivity of formed steganomessage against disturbing influences. The digital image stands as a container. The additional embedded information that is the result of pre-primary encoding of confidential information and the subsequent secondary coding using a secret key for authentication is represented as a binary sequence. Developed steganomethod for solving TT, ensures the reliability of perception of formed steganomessage, is resistant to attacks against embedded messages and allows to effectively decode the transmitted information even in the event of a breach of its integrity, that is evidenced by the results of a computational experiment.

  4. Controlling An Electric Car Starter System Through Voice

    Directory of Open Access Journals (Sweden)

    A.B. Muhammad Firdaus

    2015-04-01

    Full Text Available Abstract These days automotive has turned into a stand out amongst the most well-known modes of transportation on the grounds that a large number of Malaysians could bear to have an auto. There are numerous decisions of innovations in auto that have in the market. One of the engineering is voice controlled framework. Voice Recognition is the procedure of consequently perceiving a certain statement talked by a specific speaker focused around individual data included in discourse waves. This paper is to make an car controlled by voice of human. An essential pre-processing venture in Voice Recognition systems is to recognize the vicinity of noise. Sensitivity to speech variability lacking recognition precision and helplessness to mimic are among the principle specialized obstacles that keep the far reaching selection of speech-based recognition systems. Voice recognition systems work sensibly well with a quiet conditions however inadequately under loud conditions or in twisted channels. The key focus of the project is to control an electric car starter system.

  5. An Examination of Career Indecision and Application to Dispositional Authenticity

    Science.gov (United States)

    White, Nathan J.; Tracey, Terence J. G.

    2011-01-01

    Authenticity has been viewed as a dimension related to life satisfaction, but we propose that authenticity is related to career outcomes. In this study, we examined the relation between authenticity and career indecision. Authenticity was assessed by the Authenticity Scale and it was found to be moderately related to different indices of career…

  6. Staging constructions of authenticity in organizational change

    DEFF Research Database (Denmark)

    Dupret, Katia

    2015-01-01

    Authenticity in organizations has gained increased focus in recent years. Authentic management and leadership are ways to motivate and make sustainable changes in the organization. But authenticity is also strategically worked with in order to serve social and political functions...... that are emotionally charged. Through a socio-material perspective this paper seeks to explore how change processes in organizations challenges the idea of authentic leadership as a merely individual ability or personality trait and suggest that the authentic leader is distributed into the practices of change....... The paper explores how staged organizational change where authentic role-play and scripts from everyday life combined with meta-reflection and feedback construct new forms of reflection where its ethical side-effects should be discussed....

  7. Identity-based authentication protocol for grid

    Institute of Scientific and Technical Information of China (English)

    Li Hon; Sun Shixin; Yang Homiao

    2008-01-01

    Current grid authentication frameworks are achieved by applying the standard SSL authentication protocol(SAP).The authentication process is very complicated,and therefore,the grid user is in a heavily loaded point both in computation and in communication.Based on identity-based architecture for grid(IBAG)and corre-sponding encryption and signature schemes,an identity-based authentication protocol for grid is proposed.Being certificate-free,the authentication protocol aligns well with the demands of grid computing.Through simulation testing,it is seen that the authentication protocol is more lightweight and efficient than SAP,especially the more lightweight user side.This contributes to the larger grid scalability.

  8. Autonomy and authenticity of enhanced personality traits.

    Science.gov (United States)

    Bublitz, Jan Christoph; Merkel, Reinhard

    2009-07-01

    There is concern that the use of neuroenhancements to alter character traits undermines consumer's authenticity. But the meaning, scope and value of authenticity remain vague. However, the majority of contemporary autonomy accounts ground individual autonomy on a notion of authenticity. So if neuroenhancements diminish an agent's authenticity, they may undermine his autonomy. This paper clarifies the relation between autonomy, authenticity and possible threats by neuroenhancements. We present six neuroenhancement scenarios and analyse how autonomy accounts evaluate them. Some cases are considered differently by criminal courts; we demonstrate where academic autonomy theories and legal reasoning diverge and ascertain whether courts should reconsider their concept of autonomy. We argue that authenticity is not an appropriate condition for autonomy and that new enhancement technologies pose no unique threats to personal autonomy.

  9. Authenticity is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity.

    NARCIS (Netherlands)

    Gulikers, Judith; Bastiaens, Theo; Kirschner, Paul A.; Kester, Liesbeth

    2008-01-01

    Gulikers, J. T. M., Bastiaens, Th. J., Kirschner, P. A., & Kester, L. (2008). Authenticity is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity. Journal of Vocational Education and Training, 60(4)

  10. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  11. Authentication in Online Banking Systems through Quantum Cryptography

    Directory of Open Access Journals (Sweden)

    Anand Sharma

    2013-06-01

    Full Text Available The new information technology is becoming an important factor in the future development of financial services industry, and especially banking industry. Growing international trading and problems in transferring money have motivated researchers to introduce a new structure. Online banking is the newest delivery channel for retail banking services. Online banking facilitated by various Electronic Commerce technologies, has helped commercial banks to stay competitive through productivity gains, transaction cost reduction and customer service improvement. Security for online banking has changed considerably during the relatively short period that online banking has been in use. In particular, authentication in the early implementations was, and sometimes still is, vulnerable to various attacks such as phishing. It is known that the quantum cryptography protocols are able to detect immediately any attempt to attack the key exchange and the authentication process. This paper presentsan introduction of online banking and quantum cryptography. In this paper we are proposing a model for authentication in online banking system with quantum cryptography.

  12. Quantum Key Distribution Protocol with User Authentication

    CERN Document Server

    Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

    2005-01-01

    We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

  13. Quantum Secure Direct Communication Based on Authentication

    Institute of Scientific and Technical Information of China (English)

    WANG Min-Jie; PAN Wei

    2008-01-01

    We propose two schemes of quantum secure direct communication (QSDC) combined ideas of user authentication [Phys. Rev. A 73 (2006) 042305] and direct communication with dense coding [Phys. Rev. A. 68 (2003) 042317]. In these protocols, the privacy of authentication keys and the properties of the EPR pairs not only ensure the realization of identity authentication but also further improve the security of communication, and no secret messages are leaked even if the messages were broken.

  14. Authentication Methods in Cloud Computing: A Survey

    Directory of Open Access Journals (Sweden)

    Mahnoush Babaeizadeh

    2015-03-01

    Full Text Available This study presents a review on the various methods of authentication in cloud environment. Authentication plays an important role in security of Cloud Computing (CC. It protects Cloud Service Providers (CSP against various types of attacks, where the aim is to verify a user’s identity when a user wishes to request services from cloud servers. There are multiple authentication technologies that verify the identity of a user before granting access to resources.

  15. Voice and Speech after Laryngectomy

    Science.gov (United States)

    Stajner-Katusic, Smiljka; Horga, Damir; Musura, Maja; Globlek, Dubravka

    2006-01-01

    The aim of the investigation is to compare voice and speech quality in alaryngeal patients using esophageal speech (ESOP, eight subjects), electroacoustical speech aid (EACA, six subjects) and tracheoesophageal voice prosthesis (TEVP, three subjects). The subjects reading a short story were recorded in the sound-proof booth and the speech samples…

  16. Voice Quality of Psychological Origin

    Science.gov (United States)

    Teixeira, Antonio; Nunes, Ana; Coimbra, Rosa Lidia; Lima, Rosa; Moutinho, Lurdes

    2008-01-01

    Variations in voice quality are essentially related to modifications of the glottal source parameters, such as: F[subscript 0], jitter, and shimmer. Voice quality is affected by prosody, emotional state, and vocal pathologies. Psychogenic vocal pathology is particularly interesting. In the present case study, the speaker naturally presented a…

  17. Voice handicap index in Swedish.

    Science.gov (United States)

    Ohlsson, Ann-Christine; Dotevall, Hans

    2009-01-01

    The objective of this study was to evaluate a Swedish version of the voice handicap index questionnaire (Sw-VHI). A total of 57 adult, dysphonic patients and 15 healthy controls completed the Sw-VHI and rated the degree of vocal fatigue and hoarseness on visual analogue scales. A perceptual voice evaluation was also performed. Test-retest reliability was analyzed in 38 subjects without voice complaints. Sw-VHI distinguished between dysphonic subjects and controls (P 0.84) and test-retest reliability (intraclass correlation coefficient >0.75) were good. Only moderate or weak correlations were found between Sw-VHI and the subjective and perceptual voice ratings. The data indicate that a difference above 13 points for the total Sw-VHI score and above 6 points for the Sw-VHI subscales is significant for an individual when comparing two different occasions. In conclusion, the Sw-VHI appears to be a robust instrument for assessment of the psycho-social impact of a voice disorder. However, Sw-VHI seems to, at least partly, capture different aspects of voice function to the subjective voice ratings and the perceptual voice evaluation.

  18. Voice, Schooling, Inequality, and Scale

    Science.gov (United States)

    Collins, James

    2013-01-01

    The rich studies in this collection show that the investigation of voice requires analysis of "recognition" across layered spatial-temporal and sociolinguistic scales. I argue that the concepts of voice, recognition, and scale provide insight into contemporary educational inequality and that their study benefits, in turn, from paying attention to…

  19. Voices in History

    Directory of Open Access Journals (Sweden)

    Ivan Leudar

    2001-06-01

    Full Text Available Experiences of “hearing voices” nowadays usually count as verbal hallucinations and they indicate serious mental illness. Some are first rank symptoms of schizophrenia, and the mass media, at least in Britain, tend to present them as antecedents of impulsive violence. They are, however, also found in other psychiatric conditions and epidemiological surveys reveal that even individuals with no need of psychiatric help can hear voices, sometimes following bereavement or abuse, but sometimes for no discernible reason. So do these experiences necessarily mean insanity and violence, and must they be thought of as pathogenic hallucinations; or are there other ways to understand them and live with them, and with what consequences?One way to make our thinking more flexible is to turn to history. We find that hearing voices was always an enigmatic experience, and the people who had it were rare. The gallery of voice hearers is, though, distinguished and it includes Galilei, Bunyan and St Teresa. Socrates heard a daemon who guided his actions, but in his time this did not signify madness, nor was it described as a hallucination. Yet in 19th century French psychological medicine the daemon became a hallucination and Socrates was retrospectively diagnosed as mentally ill. This paper examines the controversies which surrounded the experience at different points in history as well as the practice of retrospective psychiatry. The conclusion reached on the basis of the historical materials is that the experience and the ontological status it is ascribed are not trans-cultural or trans-historic but situated both in history and in the contemporary conflicts.

  20. Facing Sound - Voicing Art

    DEFF Research Database (Denmark)

    Lønstrup, Ansa

    2013-01-01

    This article is based on examples of contemporary audiovisual art, with a special focus on the Tony Oursler exhibition Face to Face at Aarhus Art Museum ARoS in Denmark in March-July 2012. My investigation involves a combination of qualitative interviews with visitors, observations of the audienc......´s interactions with the exhibition and the artwork in the museum space and short analyses of individual works of art based on reception aesthetics and phenomenology and inspired by newer writings on sound, voice and listening....

  1. Voice over IP Security

    CERN Document Server

    Keromytis, Angelos D

    2011-01-01

    Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse. In this book, the authors examine the

  2. Effects on vocal range and voice quality of singing voice training: the classically trained female voice.

    Science.gov (United States)

    Pabon, Peter; Stallinga, Rob; Södersten, Maria; Ternström, Sten

    2014-01-01

    A longitudinal study was performed on the acoustical effects of singing voice training under a given study program, using the voice range profile (VRP). Pretraining and posttraining recordings were made of students who participated in a 3-year bachelor singing study program. A questionnaire that included questions on optimal range, register use, classification, vocal health and hygiene, mixing technique, and training goals was used to rate and categorize self-assessed voice changes. Based on the responses, a subgroup of 10 classically trained female voices was selected, which was homogeneous enough for effects of training to be identified. The VRP perimeter contour was analyzed for effects of voice training. Also, a mapping within the VRP of voice quality, as expressed by the crest factor, was used to indicate the register boundaries and to monitor the acoustical consequences of the newly learned vocal technique of "mixed voice." VRPs were averaged across subjects. Findings were compared with the self-assessed vocal changes. Pre/post comparison of the average VRPs showed, in the midrange, (1) a decrease in the VRP area that was associated with the loud chest voice, (2) a reduction of the crest factor values, and (3) a reduction of maximum sound pressure level values. The students' self-evaluations of the voice changes appeared in some cases to contradict the VRP findings. VRPs of individual voices were seen to change over the course of a singing education. These changes were manifest also in the average group. High-resolution computerized recording, complemented with an acoustic register marker, allows a meaningful assessment of some effects of training, on an individual basis and for groups that comprise singers of a specific genre. It is argued that this kind of investigation is possible only within a focused training program, given by a faculty who has agreed on the goals. Copyright © 2014 The Voice Foundation. Published by Mosby, Inc. All rights reserved.

  3. The voices and protests of China's labour NGOs and their effort to promote migrant worker rights

    OpenAIRE

    Yamaguchi, Mami

    2015-01-01

    Labour NGOs in China are relatively new organizations that emerged in the 1990s and have spread during the 2000s. Migrant workers in China are weak both socially and economically and have been lacking ways of voicing grievances and protesting. Grassroots labour NGOs for migrant workers seem to be an efficient channel for their voices. This paper examines how labour NGOs emerged and how they function in the context of current Chinese society. This paper adopts the case study method to describe...

  4. User Authentication based on Continuous Touch Biometrics

    Directory of Open Access Journals (Sweden)

    Christina J Kroeze

    2016-12-01

    Full Text Available Mobile devices such as smartphones have until now been protected by traditional authentication methods, including passwords or pattern locks. These authentication mechanisms are difficult to remember and are often disabled, leaving the device vulnerable if stolen. This paper investigates the possibility of unobtrusive, continuous authentication for smartphones based on biometric data collected using a touchscreen. The possibility of authenticating users on a smartphone was evaluated by conducting an experiment simulating real-world touch interaction. Touch data was collected from 30 participants during normal phone use. The touch features were analysed in terms of the information provided for authentication. It was found that features such as finger pressure, location of touch interaction and shape of the finger were important discriminators for authentication. The touch data was also analysed using two classification algorithms to measure the authentication accuracy. The results show that touch data is sufficiently distinct between users to be used in authentication without disrupting normal touch interaction. It is also shown that the raw touch data was more effective in authentication than the aggregated gesture data.

  5. ARE AUTHENTIC LEADERS SATISFIED WITH THEIR JOB?

    Directory of Open Access Journals (Sweden)

    Nebojsa Pavlovic

    2016-06-01

    Full Text Available A crisis in management has led to the appearance of Authentic leadership. The aim of this work is to determine the characteristics of Authentic leadership in educational institutions and to respond to the question as to whether authentic leaders are satisfied with their job. The third aim is to determine differences among the researched regions. The sample included 227 randomly selected directors from primary and secondary schools in Serbia, Montenegro and the Republika Srpska. The research used an ALQ questionnaire for the estimation of leadership behaviour. Descriptions for the results prediction and multiple linear regressions were used. A multivariance analysis of variance was used to compare the groups. The research results showed that every fourth director is an authentic leader. Authentic leadership has a significant influence on job satisfaction through two aspects: internalised perspective and balanced processing. There are no differences in Authentic leadership in the researched areas. The results could be useful for educational institutions in countries where the research was conducted. Further research could be carried out in other countries while cultural differences should be taken into account. One limiting factor consists of the fact that the analysed data are obtained only from school directors. Leaders of educational institutions should provide management through the development of their own authenticity and the authenticity of their followers. The characteristics of Authentic leadership were reviewed and tested practically in the West-Balkan environment.

  6. A compression tolerant scheme for image authentication

    Institute of Scientific and Technical Information of China (English)

    刘宝锋; 张文军; 余松煜

    2004-01-01

    Image authentication techniques used to protect the recipients against malicious forgery. In this paper, we propose a new image authentication technique based on digital signature. The authentication is verified by comparing the features of the each block in tested image with the corresponding features of the block recorded in the digital signature. The proposed authentication scheme is capable of distinguishing visible but non-malicious changes due to common processing operations from malicious changes. At last our experimental results show that the proposed scheme is not only efficient to protect integrity of image, but also with low computation,which are feasible for practical applications.

  7. Authentic leadership: develop the leader within.

    Science.gov (United States)

    Yasinski, Lesia

    2014-03-01

    Great leadership usually starts with a willing heart, a positive attitude, and a desire to make a difference. Strong leadership is important, in today's health care climate, to ensure optimal patient outcomes and the fostering of future generations of knowledgeable, motivated and enthusiastic perioperative nurses. This article will explore key elements necessary for the development of authentic leadership. While highlighting the role that personal development plays in leadership skills, this article will also discuss ways to cultivate authenticity in leadership. The following questions will be addressed: What is authentic leadership? How does one become an authentic leader?

  8. Multifactor Authentication: Its Time Has Come

    Directory of Open Access Journals (Sweden)

    Jim Reno

    2013-08-01

    Full Text Available Transactions of any value must be authenticated to help prevent online crime. Even seemingly innocent interactions, such as social media postings, can have serious consequences if used fraudulently. A key problem in modern online interactions is establishing the identity of the user without alienating the user. Historically, almost all online authentications have been implemented using simple passwords, but increasingly these methods are under attack. Multifactor authentication requires the presentation of two or more of the three authentication factor types: “What you know”, “What you have”, and “What you are”. After presentation, each factor must be validated by the other party for authentication to occur. Multifactor authentication is a potential solution to the authentication problem, and it is beginning to be implemented at websites operated by well-known companies. This article surveys the different mechanisms used to implement multifactor authentication. How a site chooses to implement multifactor authentication affects security as well as the overall user experience.

  9. Questioning Photovoice Research: Whose Voice?

    Science.gov (United States)

    Evans-Agnew, Robin A; Rosemberg, Marie-Anne S

    2016-07-01

    Photovoice is an important participatory research tool for advancing health equity. Our purpose is to critically review how participant voice is promoted through the photovoice process of taking and discussing photos and adding text/captions. PubMed, Scopus, PsycINFO, and Web of Science databases were searched from the years 2008 to 2014 using the keywords photovoice, photonovella, photovoice and social justice, and photovoice and participatory action research. Research articles were reviewed for how participant voice was (a) analyzed, (b) exhibited in community forums, and (c) disseminated through published manuscripts. Of 21 studies, 13 described participant voice in the data analysis, 14 described participants' control over exhibiting photo-texts, seven manuscripts included a comprehensive set of photo-texts, and none described participant input on choice of manuscript photo-texts. Photovoice designs vary in the advancement of participant voice, with the least advancement occurring in manuscript publication. Future photovoice researchers should expand approaches to advancing participant voice.

  10. Voice quality of psychological origin.

    Science.gov (United States)

    Teixeira, Antonio; Nunes, Ana; Coimbra, Rosa Lídia; Lima, Rosa; Moutinho, Lurdes

    2008-01-01

    Variations in voice quality are essentially related to modifications of the glottal source parameters, such as: F0, jitter, and shimmer. Voice quality is affected by prosody, emotional state, and vocal pathologies. Psychogenic vocal pathology is particularly interesting. In the present case study, the speaker naturally presented a ventricular band voice whereas in a controlled production he was able to use a more normal phonation process. A small corpus was recorded which included sustained vowels and short sentences in both registers. A normal speaker was also recorded in similar tasks. Annotation and extraction of parameters were made using Praat's voice report function. Application of the Hoarseness Diagram to sustained productions situates this case in the pseudo-glottic phonation region. Analysis of several different parameters related to F0, jitter, shimmer, and harmonicity revealed that the speaker with psychogenic voice was capable of controlling certain parameters (e.g. F0 maximum) but was unable to correct others such as shimmer.

  11. Muscular tension and body posture in relation to voice handicap and voice quality in teachers with persistent voice complaints.

    NARCIS (Netherlands)

    Kooijman, P.G.C.; Jong, F.I.C.R.S. de; Oudes, M.J.; Huinck, W.J.; Acht, H. van; Graamans, K.

    2005-01-01

    The aim of this study was to investigate the relationship between extrinsic laryngeal muscular hypertonicity and deviant body posture on the one hand and voice handicap and voice quality on the other hand in teachers with persistent voice complaints and a history of voice-related absenteeism. The st

  12. Bodies, Spaces, Voices, Silences

    Directory of Open Access Journals (Sweden)

    Donatella Mazzoleni

    2013-07-01

    Full Text Available A good architecture should not only allow functional, formal and technical quality for urban spaces, but also let the voice of the city be perceived, listened, enjoyed. Every city has got its specific sound identity, or “ISO” (R. O. Benenzon, made up of a complex texture of background noises and fluctuation of sound figures emerging and disappearing in a game of continuous fadings. For instance, the ISO of Naples is characterized by a spread need of hearing the sound return of one’s/others voices, by a hate of silence. Cities may fall ill: illness from noise, within super-crowded neighbourhoods, or illness from silence, in the forced isolation of peripheries. The proposal of an urban music therapy denotes an unpublished and innovative enlarged interdisciplinary research path, where architecture, music, medicine, psychology, communication science may converge, in order to work for rebalancing spaces and relation life of the urban collectivity, through the care of body and sound dimensions.

  13. Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol

    NARCIS (Netherlands)

    Pavlovic, Dusko; Meadows, Catherine; Mislove, M.; Selinger, P.

    2010-01-01

    As mobile devices pervade physical space, the familiar authentication patterns are becoming insufficient: besides entity authentication, many applications require, e.g., location authentication. Many interesting protocols have been proposed and implemented to provide such strengthened forms of authe

  14. Authentic Learning and Alien Worlds

    Science.gov (United States)

    Watt, Sara D.; Watt, Keith; Gleim, Brian

    2015-01-01

    Glendale Community College has developed a laboratory course and observing program which provides non-science majors with opportunities to perform authentic science in a community college setting. The program is designed around experiential learning which allows students to meaningfully construct concepts within contexts that involve real-world problems that are relevant to the learner. Students learn observational astronomy and data analysis techniques by observing exoplanet transits using 8-inch Celestron telescopes. The exoplanet data gathered and analyzed by the students is contributed to the exoplanet database. This poster presents an overview of the program and highlights early educational results.

  15. Authenticity and its Contemporary Challenges

    DEFF Research Database (Denmark)

    Bork Petersen, Franziska

    2013-01-01

    In this thesis I investigate what ‘authenticity’ means in a contemporary popular context and how it is used in the staging of bodies. Furthermore, I analyse works of dance and fashion from the past fifteen years with a focus on their strategies of challenging the notion of ‘bodily authenticity...... and by a depiction of 'working hard'. But various techniques also mask the hard work, for example by showing a participant ‘having fun’ performing it. Contemporary works of dance and fashion challenge the problematic implications in the notion of ‘bodily authenticity’. I analyse three strategies of undermining...

  16. Crossing Cultures with Multi-Voiced Journals

    Science.gov (United States)

    Styslinger, Mary E.; Whisenant, Alison

    2004-01-01

    In this article, the authors discuss the benefits of using multi-voiced journals as a teaching strategy in reading instruction. Multi-voiced journals, an adaptation of dual-voiced journals, encourage responses to reading in varied, cultured voices of characters. It is similar to reading journals in that they prod students to connect to the lives…

  17. Authentication Model Based Bluetooth-enabled Mobile Phone

    OpenAIRE

    Rania Abdelhameed; Sabira Khatun; Borhanuddin M. Ali; Abdul R. Ramli

    2005-01-01

    Authentication is a mechanism to establish proof of identities, the authentication process ensure that who a particular user is. Current PC, laptop user authentication systems are always done once and hold until it explicitly revoked by the user, or asking the user to frequently reestablish his identity which encouraging him to disable authentication. Zero-Interaction Authentication (ZIA) provides solution to this problem. In ZIA, a user wears a small authentication token ...

  18. Bluetooth-based authentication system for ambient intelligence

    Institute of Scientific and Technical Information of China (English)

    Jian HE; Hui LI; Yong ZHANG; Zhang-qin HUANG

    2008-01-01

    According to the requirement of natural human-computer interaction for Ambient Intelligence (AmI), a Bluetooth-based authentication technique is provided. An authentication network combining advantages of Bluetooth ad hoc network with the Ethernet is introduced first in detail. Then we propose a Bluetooth badge for storing the user's identification information. Finally, the authentication system based on Bluetooth badge and authentication network is introduced. It is demonstrated experimentally that the Bluetooth-based authentication technique can authenticate the user automatically.

  19. Lexical frequency and voice assimilation.

    Science.gov (United States)

    Ernestus, Mirjam; Lahey, Mybeth; Verhees, Femke; Baayen, R Harald

    2006-08-01

    Acoustic duration and degree of vowel reduction are known to correlate with a word's frequency of occurrence. The present study broadens the research on the role of frequency in speech production to voice assimilation. The test case was regressive voice assimilation in Dutch. Clusters from a corpus of read speech were more often perceived as unassimilated in lower-frequency words and as either completely voiced (regressive assimilation) or, unexpectedly, as completely voiceless (progressive assimilation) in higher-frequency words. Frequency did not predict the voice classifications over and above important acoustic cues to voicing, suggesting that the frequency effects on the classifications were carried exclusively by the acoustic signal. The duration of the cluster and the period of glottal vibration during the cluster decreased while the duration of the release noises increased with frequency. This indicates that speakers reduce articulatory effort for higher-frequency words, with some acoustic cues signaling more voicing and others less voicing. A higher frequency leads not only to acoustic reduction but also to more assimilation.

  20. Test-Task Authenticity: The Multiple Perspectives

    Science.gov (United States)

    Gan, Zhengdong

    2012-01-01

    Leung and Lewkowicz remind us that the debate over the past two decades that is most relevant to ELT (English languge teaching) pedagogy and curriculum concerns test-task authenticity. This paper first reviews how the authenticity debate in the literature of second language acquisition, pedagogy and testing has evolved. Drawing on a body of…

  1. Authentic Interdisciplinary Instruction: Raising the Bar

    Science.gov (United States)

    Mohnsen, Bonnie

    2011-01-01

    This article addressed the need for authentic interdisciplinary instruction. Authentic interdisciplinary instruction is defined as a learning activity that simultaneously improves student performance related to grade-level standards in two or more disciplines (e.g., science and physical education). The process described for creating authentic…

  2. Authenticity, Validity and a Tea Party.

    Science.gov (United States)

    Stevenson, Douglas K.

    1985-01-01

    Discusses authenticity in language testing in relation to the language proficiency movement. Looks at both sociolinguistic and psychometric principles as they are concerned with authenticity and validity as well as the inferential distance that separates face validity from techical validities. Criticizes the belief that some test type possess…

  3. Difference packing arrays and systematic authentication codes

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    In this paper, a type of combinatorial design (called difference packing array)is proposed and used to give a construction of systematic authentication codes. Taking advantage of this construction, some new series of systematic authentication codes are obtainable in terms of existing difference packing arrays.

  4. Teacher Authenticity: A Theoretical and Empirical Investigation

    Science.gov (United States)

    Akoury, Paul N.

    2013-01-01

    This study builds on a small, under-acknowledged body of educational works that speak to the problem of an overly technical focus on teaching, which negates a more authentic consideration of what it means to teach, including an exploration of the spiritual and moral dimensions. A need for educational change and the teacher's authentic way of…

  5. Research on Secure Authentication Mechanism of Grid

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Based on the analysis on the security mechanism of grid, this paper discusses the advantages of latest techniques of grid security, and presents a secure authentication scheme of grid based on elliptic curve cryptosystem (ECC). The secure authentication scheme may provide reference value for the further application of grid.

  6. Making it Real: Authenticity, Process and Pedagogy

    Science.gov (United States)

    Badger, Richard; MacDonald, Malcolm

    2010-01-01

    Authenticity has been a part of the intellectual resources of language teaching since the 1890s but its precise meaning and implications are contested. This commentary argues for a view of authenticity which recognizes the limits of the concept as a guide for pedagogic practice and acknowledges the fact that texts are processes rather than…

  7. Efficient Quantum Secure Direct Communication with Authentication

    Institute of Scientific and Technical Information of China (English)

    LIU Wen-Jie; CHEN Han-Wu; LI Zhi-Qiang; LIU Zhi-Hao

    2008-01-01

    Two protocols of quantum direct communication with authentication [Phys. Rev. A 73 (2006) 042305] were recently indicated to be insecure against the authenticator Trent attacks [Phys. Rev. A 75 (2007) 026301]. We present two efficient protocols by using four Pauli operations, which are secure against inner Trent attacks as well as outer Eve attacks. Finally, we generalize them to multiparty quantum direction communication.

  8. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...

  9. Authenticated communication from quantum readout of PUFs

    NARCIS (Netherlands)

    Skoric, Boris; Pinkse, Pepijn W.H.; Mosk, Allard P.

    2016-01-01

    Quantum Readout of Physical Unclonable Functions (PUFs) is a recently introduced method for remote authentication of objects. We present an extension of the protocol to enable the authentication of data: a verifier can check if received classical data was sent by the PUF holder. We call this modific

  10. Ignoring Authentic African Literature Means Ignoring Africans

    Science.gov (United States)

    Romano, Carlin

    2005-01-01

    Africa produces imaginative and authentic literature whose texture makes it impossible to think of Africans as statistics. African writers, however have to struggle to get recognized in America due to their culture and other racial and social differences, hence suggesting that efforts should be made to give authentic African literature its due.

  11. Authentication of digital video evidence

    Science.gov (United States)

    Beser, Nicholas D.; Duerr, Thomas E.; Staisiunas, Gregory P.

    2003-11-01

    In response to a requirement from the United States Postal Inspection Service, the Technical Support Working Group tasked The Johns Hopkins University Applied Physics Laboratory (JHU/APL) to develop a technique tha will ensure the authenticity, or integrity, of digital video (DV). Verifiable integrity is needed if DV evidence is to withstand a challenge to its admissibility in court on the grounds that it can be easily edited. Specifically, the verification technique must detect additions, deletions, or modifications to DV and satisfy the two-part criteria pertaining to scientific evidence as articulated in Daubert et al. v. Merrell Dow Pharmaceuticals Inc., 43 F3d (9th Circuit, 1995). JHU/APL has developed a prototype digital video authenticator (DVA) that generates digital signatures based on public key cryptography at the frame level of the DV. Signature generation and recording is accomplished at the same time as DV is recorded by the camcorder. Throughput supports the consumer-grade camcorder data rate of 25 Mbps. The DVA software is implemented on a commercial laptop computer, which is connected to a commercial digital camcorder via the IEEE-1394 serial interface. A security token provides agent identification and the interface to the public key infrastructure (PKI) that is needed for management of the public keys central to DV integrity verification.

  12. Voice Habits and Behaviors: Voice Care Among Flamenco Singers.

    Science.gov (United States)

    Garzón García, Marina; Muñoz López, Juana; Y Mendoza Lara, Elvira

    2017-03-01

    The purpose of this study is to analyze the vocal behavior of flamenco singers, as compared with classical music singers, to establish a differential vocal profile of voice habits and behaviors in flamenco music. Bibliographic review was conducted, and the Singer's Vocal Habits Questionnaire, an experimental tool designed by the authors to gather data regarding hygiene behavior, drinking and smoking habits, type of practice, voice care, and symptomatology perceived in both the singing and the speaking voice, was administered. We interviewed 94 singers, divided into two groups: the flamenco experimental group (FEG, n = 48) and the classical control group (CCG, n = 46). Frequency analysis, a Likert scale, and discriminant and exploratory factor analysis were used to obtain a differential profile for each group. The FEG scored higher than the CCG in speaking voice symptomatology. The FEG scored significantly higher than the CCG in use of "inadequate vocal technique" when singing. Regarding voice habits, the FEG scored higher in "lack of practice and warm-up" and "environmental habits." A total of 92.6% of the subjects classified themselves correctly in each group. The Singer's Vocal Habits Questionnaire has proven effective in differentiating flamenco and classical singers. Flamenco singers are exposed to numerous vocal risk factors that make them more prone to vocal fatigue, mucosa dehydration, phonotrauma, and muscle stiffness than classical singers. Further research is needed in voice training in flamenco music, as a means to strengthen the voice and enable it to meet the requirements of this musical genre. Copyright © 2017 The Voice Foundation. Published by Elsevier Inc. All rights reserved.

  13. Voices of the Unheard

    DEFF Research Database (Denmark)

    Matthiesen, Noomi Christine Linde

    2014-01-01

    . They were in two different classes at both schools, i.e. four classes in total. The families were followed for 18 months. Formal interviews were conducted with mothers and teachers, parent-teacher conferences were recorded, participant observations were conducted in classrooms and playgrounds, afterschool...... is that Somali diaspora parents (and with special focus on mothers as these where the parents who took most responsibility in the four cases of this research) have difficulty expressing their opinions as there are structural, historical and social dynamics that create conditions in which their voices...... are silenced, or at least restricted significantly, resulting in marginalizing consequences. The focus in each article is on here-and-now interactional dynamics but in order to understand these constitutive negotiations, it is argued that the analysis must be situated in a description of the constituted...

  14. Passing on power & voice

    DEFF Research Database (Denmark)

    Noer, Vibeke Røn; Nielsen, Cathrine Sand

    2014-01-01

    . The education lasts for 3,5 years and the landmark of the educational model is the continuously shifts between teaching in classroom and teaching in clinical practice. Clinical teaching takes place at approved clinical placement institutions in hospitals and in the social and health care services outside...... intention of gaining knowledge about other possible ways to perform the education. The class, named the E-class, followed what in the field was named ‘an experimental educational model based on experienced-based learning’ (Nielsen et al. 2011). The experiential educational model is argued as an experiment.......aspx Higher degree of student involvement in planning as well as teaching was in the field presented as a part of ‘the overall educational approach’. In the course ‘Acute, Critical Nursing & Terminal, Palliative Care’ this was transferred into an innovative pedagogy with intend to pass on power and voice...

  15. Voice stress analysis

    Science.gov (United States)

    Brenner, Malcolm; Shipp, Thomas

    1988-01-01

    In a study of the validity of eight candidate voice measures (fundamental frequency, amplitude, speech rate, frequency jitter, amplitude shimmer, Psychological Stress Evaluator scores, energy distribution, and the derived measure of the above measures) for determining psychological stress, 17 males age 21 to 35 were subjected to a tracking task on a microcomputer CRT while parameters of vocal production as well as heart rate were measured. Findings confirm those of earlier studies that increases in fundamental frequency, amplitude, and speech rate are found in speakers involved in extreme levels of stress. In addition, it was found that the same changes appear to occur in a regular fashion within a more subtle level of stress that may be characteristic, for example, of routine flying situations. None of the individual speech measures performed as robustly as did heart rate.

  16. Voice over IP

    OpenAIRE

    Mantula, Juha

    2006-01-01

    Tämä opinnäytetyö käsittelee Voice over Internet Protocol -tekniikkaa ja sen tuomia mahdollisuuksia yrityselämässä. Teoriaosa käsittelee VoIP:n kannalta tärkeitä pro-tokollia ja standardeja, VoIP:n ominaisuuksia sekä esittelee erilaisia puheohjelmia, jotka käyttävät VoIP-tekniikkaa hyväkseen. Empiirinen osuus tutkii Viestintä Ky Pitkärannan Skype-ohjelman käyttöä. Työn tarkoituksena on selvittää VoIP:n hyviä ja huonoja puolia ja sitä kuinka tek-niikkaa voidaan käyttää hyväksi päivittäisessä ...

  17. Voice and choice by delegation.

    Science.gov (United States)

    van de Bovenkamp, Hester; Vollaard, Hans; Trappenburg, Margo; Grit, Kor

    2013-02-01

    In many Western countries, options for citizens to influence public services are increased to improve the quality of services and democratize decision making. Possibilities to influence are often cast into Albert Hirschman's taxonomy of exit (choice), voice, and loyalty. In this article we identify delegation as an important addition to this framework. Delegation gives individuals the chance to practice exit/choice or voice without all the hard work that is usually involved in these options. Empirical research shows that not many people use their individual options of exit and voice, which could lead to inequality between users and nonusers. We identify delegation as a possible solution to this problem, using Dutch health care as a case study to explore this option. Notwithstanding various advantages, we show that voice and choice by delegation also entail problems of inequality and representativeness.

  18. The Christian voice in philosophy

    Directory of Open Access Journals (Sweden)

    Stuart Fowler

    1982-03-01

    Full Text Available In this paper the Rev. Stuart Fowler outlines a Christian voice in Philosophy and urges the Christian philosopher to investigate his position and his stance with integrity and honesty.

  19. Voice Force tulekul / Tõnu Ojala

    Index Scriptorium Estoniae

    Ojala, Tõnu, 1969-

    2005-01-01

    60. sünnipäeva tähistava Tallinna Tehnikaülikooli Akadeemilise Meeskoori juubelihooaja üritusest - a capella pop-gruppide festivalist Voice Force (kontserdid 12. nov. klubis Parlament ja 3. dets. Vene Kultuurikeskuses)

  20. Voice Force tulekul / Tõnu Ojala

    Index Scriptorium Estoniae

    Ojala, Tõnu, 1969-

    2005-01-01

    60. sünnipäeva tähistava Tallinna Tehnikaülikooli Akadeemilise Meeskoori juubelihooaja üritusest - a capella pop-gruppide festivalist Voice Force (kontserdid 12. nov. klubis Parlament ja 3. dets. Vene Kultuurikeskuses)

  1. Feature Extraction of Voice Segments Using Cepstral Analysis for Voice Regeneration

    OpenAIRE

    Banerjee, P. S.; Baisakhi Chakraborty; Jaya Banerjee

    2015-01-01

    Even though a lot of work has been done on areas of speech to text and vice versa or voice detection or similarity analysis of two voice samples but very less emphasis has be given to voice regeneration. General algorithms for distinct voice checking for two voice sources paved way for our endeavor in reconstructing the voice from the source voice samples provided. By utilizing these algorithms and putting further stress on the feature extraction part we tried to fabricate the source voice wi...

  2. Voice Simulation in Nursing Education.

    Science.gov (United States)

    Kepler, Britney B; Lee, Heeyoung; Kane, Irene; Mitchell, Ann M

    2016-01-01

    The goal of this study was to improve prelicensure nursing students' attitudes toward and self-efficacy related to delivering nursing care to patients with auditory hallucinations. Based on the Hearing Voices That Are Distressing curriculum, 87 participants were instructed to complete 3 tasks while wearing headphones delivering distressing voices. Comparing presimulation and postsimulation results, this study suggests that the simulation significantly improved attitudes toward patients with auditory hallucinations; however, self-efficacy related to caring for these patients remained largely unchanged.

  3. Work-related voice disorder

    OpenAIRE

    Paulo Eduardo Przysiezny; Luciana Tironi Sanson Przysiezny

    2015-01-01

    INTRODUCTION: Dysphonia is the main symptom of the disorders of oral communication. However, voice disorders also present with other symptoms such as difficulty in maintaining the voice (asthenia), vocal fatigue, variation in habitual vocal fundamental frequency, hoarseness, lack of vocal volume and projection, loss of vocal efficiency, and weakness when speaking. There are several proposals for the etiologic classification of dysphonia: functional, organofunctional, organic, and work-related...

  4. Tracheostomy cannulas and voice prosthesis.

    Science.gov (United States)

    Kramp, Burkhard; Dommerich, Steffen

    2009-01-01

    Cannulas and voice prostheses are mechanical aids for patients who had to undergo tracheotomy or laryngectomy for different reasons. For better understanding of the function of those artificial devices, first the indications and particularities of the previous surgical intervention are described in the context of this review. Despite the established procedure of percutaneous dilatation tracheotomy e.g. in intensive care units, the application of epithelised tracheostomas has its own position, especially when airway obstruction is persistent (e.g. caused by traumata, inflammations, or tumors) and a longer artificial ventilation or special care of the patient are required. In order to keep the airways open after tracheotomy, tracheostomy cannulas of different materials with different functions are available. For each patient the most appropriate type of cannula must be found. Voice prostheses are meanwhile the device of choice for rapid and efficient voice rehabilitation after laryngectomy. Individual sizes and materials allow adaptation of the voice prostheses to the individual anatomical situation of the patients. The combined application of voice prostheses with HME (Head and Moisture Exchanger) allows a good vocal as well as pulmonary rehabilitation. Precondition for efficient voice prosthesis is the observation of certain surgical principles during laryngectomy. The duration of the prosthesis mainly depends on material properties and biofilms, mostly consisting of funguses and bacteries. The quality of voice with valve prosthesis is clearly superior to esophagus prosthesis or electro-laryngeal voice. Whenever possible, tracheostoma valves for free-hand speech should be applied. Physicians taking care of patients with speech prostheses after laryngectomy should know exactly what to do in case the device fails or gets lost.

  5. Voice communications over packet radio networks

    Science.gov (United States)

    Seah, M. M.

    1985-03-01

    The use of packet virtual circuit technique for voice communications in military radio networks was investigated. The work was concerned with various aspects of networking which include network modeling, communications techniques, traffic analysis and network control. An attempt has been made to develop a simple yet efficient time slot assignment algorithm . This was analyzed under a variety of slot depths and networks topologies using computer simulation. The Erlang' B results were used to provide more insight into the channel characteristics of the packet radio networks. The capabilities of implementing TDMA/CDMA hybrid schemes in the system were scrutinized. A method to estimate the transmission capacity of the inter-node links was found. We demonstrate its effectiveness in controlling local congestion by computer simulation. Graphical results were presented to highlight the behavior of the proposed packet radio networks. We concluded that an appropriate link weight function would provide efficient and reliable network services.

  6. Voice Collection under Different Spectrum

    Directory of Open Access Journals (Sweden)

    Min Li

    2013-05-01

    Full Text Available According to the short-time Fourier transform theory and principle of digital filtering, this paper established a mathematical model called collection of voice signal collection at different spectrum. The voice signal was a non-stationary process, while the standard Fourier transform only applied to the periodic signal, transient signals or stationary random signal. Therefore, the standard Fourier transform could not be directly used for the speech signal. By controlling the input different types and parameters, this paper analyzed the collected original voice signal spectrum with the use of MATLAB software platform. At the same time, it realized the extraction, recording and playback of the speech signal at different frequencies. Therefore, the waveforms could be displayed obviously on the graphic user interface and voice effect could be more clearly. Meanwhile, the result was verified by the hardware platforms, which consisted of TMS320VC5509A [1] chip and TLV320AIC23 voice chip. The results showed that the extraction of voice signal under different spectrum model was scientific, rational and effective.

  7. Abstract: Lightweight Authentication for HIP

    Science.gov (United States)

    Heer, Tobias

    In recent years numerous solutions for overcoming the architectural constraints of the Internet have emerged. One of the most promising among them is the Host Identity Protocol (HIP) [2], which was recently approved as an experimental standard by the IETF. HIP adds an additional protocol layer between TCP and IP to implement the Identifier/Locator split. Apart from mobility and multihoming, HIP supports host authentication, payload encryption, and a cryptographic namespace without requiring changes to the network infrastructure or network applications. However, especially mobile devices with tightly limited CPU resources are slowed down by HIP. Its poor performance on these mobile devices is a result of the extensive use of public-key (PK) cryptography for securing the main protocol functions.

  8. Perfumed historic buildings: Issues of authenticity

    Directory of Open Access Journals (Sweden)

    Tošić Jovana

    2016-01-01

    Full Text Available Contemporary historical preservation practice includes olfactory preservation as an experimental method of architectural preservation. The implementation of manufactured scents in historic buildings raises important issues of authenticity. This paper focuses on three important issues in the relation between olfactory preservation and authenticity: the importance of phenomenology in memory evocation; the relative character of the authenticity concept; and the significance of social values in historic preservation. This requires a critical examination of charters, documents and theoretical interpretations which reflect a broader concept of authenticity. The paper discusses certain articles of the Venice Charter, the Nara Document on Authenticity, as well as the sense of smell in architectural experience through critical analysis of the theories of John Ruskin, Viollet-le-Duc, Roger Scruton and Juhani Pallasmaa and their concepts of authenticity. Authenticity issues are illustrated by the examples of olfactory preservation: olfactory reconstruction of Philip Johnson’s Glass House; interior restoration and olfactory reconstruction of the Arts Club in Mayfair, London; and the creation process of the perfume brand Arquiste, a meaningful example which relocates the olfactory reconstruction context. These critical analyses raise the question of scent in historic buildings as a value in itself.

  9. The impact of voice on speech realization

    Directory of Open Access Journals (Sweden)

    Jelka Breznik

    2014-12-01

    Full Text Available The study discusses spoken literary language and the impact of voice on speech realization. The voice consists of a sound made by a human being using the vocal folds for talking, singing, laughing, crying, screaming… The human voice is specifically the part of human sound production in which the vocal folds (vocal cords are the primary sound source. Our voice is our instrument and identity card. How does the voice (voice tone affect others and how do they respond, positively or negatively? How important is voice (voice tone in communication process? The study presents how certain individuals perceive voice. The results of the research on the relationships between the spoken word, excellent speaker, voice and description / definition / identification of specific voices done by experts in the field of speech and voice as well as non-professionals are presented. The study encompasses two focus groups. One consists of amateurs (non-specialists in the field of speech or voice who have no knowledge in this field and the other consists of professionals who work with speech or language or voice. The questions were intensified from general to specific, directly related to the topic. The purpose of such a method of questioning was to create relaxed atmosphere, promote discussion, allow participants to interact, complement, and to set up self-listening and additional comments.

  10. Client-to-client Password-Based Authenticated Key Establishment in a Cross-Realm Setting

    Directory of Open Access Journals (Sweden)

    Shuhua Wu

    2009-09-01

    Full Text Available The area of password-based authenticated key establishment protocols has been the subject of a vast amount of work in the last few years due to its practical aspects. Despite the attention given to it, most passwordauthenticated key establishment (PAKE schemes in the literature consider authentication between a client and a sever. Although some of them are extended to a threeparty PAKE protocol, in which a trusted server exists to mediate between two clients to allow mutual authentication, they are less considered in a cross-realm setting like in kerberos system. In this paper, we propose a provably secure password-authenticated key establishment protocol in a cross-realm setting where two clients in different realms obtain a secret session key as well as mutual authentication, with the help of respective servers. We deal with it using ideas similar to those used in the three-party protocol due to M. Abdalla et al. In our protocol, each client firstly establish secure channel with its server and then the servers securely distribute a fresh common session key to the two clients. One of the attractive features is that our protocol can be easily extended to a more general scenario where a common key should be established among more than two clients. Moreover, analysis shows that the proposed protocol has a per-user computational cost of the underlying two-party encrypted key exchange.

  11. Authenticated communication from quantum readout of PUFs

    Science.gov (United States)

    Škorić, Boris; Pinkse, Pepijn W. H.; Mosk, Allard P.

    2017-08-01

    Quantum readout of physical unclonable functions (PUFs) is a recently introduced method for remote authentication of objects. We present an extension of the protocol to enable the authentication of data: A verifier can check if received classical data were sent by the PUF holder. We call this modification QR-d or, in the case of the optical-PUF implementation, QSA-d. We discuss how QSA-d can be operated in a parallel way. We also present a protocol for authenticating quantum states.

  12. Authentication Systems in Internet of Things

    Directory of Open Access Journals (Sweden)

    Tuhin Borgohain

    2015-01-01

    Full Text Available This paper analyzes the various authentication systems implemented for enhanced security and private reposition of an individual’s login credentials. The first part of the paper describes the multi-factor authentication (MFA systems, which, though not applicable to the field of Internet of Things, provides great security to a user’s credentials. MFA is followed by a brief description of the working mechanism of interaction of third party clients with private resources over the OAuth protocol framework and a study of the delegation based authentication system in IP-based IoT.

  13. Authenticated Key Agreement in Group Settings

    Institute of Scientific and Technical Information of China (English)

    LI Ming; WANG Yong; GU Da-wu; BAI Ying-cai

    2006-01-01

    An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-efficient and authenticated group key agreement protocol. Besides, it avoids dependence on signature or MAC by involving member's long-term keys and short-term keys in the group key. Furthermore, the idea behind this design can be employed as a general approach to extend the authenticated two-party Diffie-Hellman protocols to group settings.

  14. Authentic And Concurrent Evaluation-refining

    DEFF Research Database (Denmark)

    Eriksson, Carina Ihlström; Åkesson, Maria; Kautz, Karlheinz

    2011-01-01

    This paper addresses the need for more detailed accounts for evaluation in design science research literature. By revisiting a design project regarding the future e-newspaper we give detailed descriptions of its authentic and concurrent evaluation approach by illustrating the what, why and how...... as well as decisions on strategic levels. We emphasize a holistic and concurrent approach to evaluation compared to the general design science research thinking and argue that reflecting on how to seek authenticity is important. By authenticity we refer to the notion of how closely an evaluation captures...

  15. Towards distortion-free robust image authentication

    Energy Technology Data Exchange (ETDEWEB)

    Coltuc, D [EE Department, Valahia University Targoviste (Romania)

    2007-07-15

    This paper investigates a general framework for distortion-free robust image authentication by multiple marking. First, by robust watermarking a subsampled version of image edges is embedded. Then, by reversible watermarking the information needed to recover the original image is inserted, too. The hiding capacity of the reversible watermarking is the essential requirement for this approach. Thus in case of no attacks not only image is authenticated but also the original is exactly recovered. In case of attacks, reversibility is lost, but image can still be authenticated. Preliminary results providing very good robustness against JPEG compression are presented.

  16. Authentication planning for XOR network coding

    CERN Document Server

    Jaffres-Runser, Katia

    2011-01-01

    This paper formulates the authentication planning problem when network coding is implemented in a wireless sensor network. The planning problem aims at minimizing the energy consumed by the security application which is guarantied using message authentication codes. This paper proposes a binary non-linear optimization formulation for this planning problem whose decision variables are the authentication decision of the nodes and the MAC modes of operation. It is illustrated for a butterfly topology. Results show that there is a real trade-off between energy efficiency and message throughput in this context.

  17. Final report for the network authentication investigation and pilot.

    Energy Technology Data Exchange (ETDEWEB)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  18. 声纹鉴定及相关问题研究%Voice Print Identification and Related Issues

    Institute of Scientific and Technical Information of China (English)

    杨英仓

    2011-01-01

    Objective: Analysis the influence factors of the voice print identification, verify whether the selected syllables were optimal. Methods: Compare pronouncing differences of the same words between different people. Compare differences of the same word read by one person in different dialects, the authenticity of the voice, the impact of recording equipments on the identification of voice print. And analyze the results. Results: Determine the authenticity of the voice, identify the speaker' s information and verify whether the selected svllables were ontimal.%目的:探讨声纹鉴定的影响因素,准确选定特征音节。方法:利用听辨和图谱分析比较不同人同一音节间的差异、同一人相同字词不同方言间的差异,语音原始真实性的检验、不同通信系统语音资料的个体识别统计,并对结果进行分析。结果:通过检验可分析送检语音的原始真实性、识别话者相关信息、判断特征音节的准确性。

  19. Physical Layer Authentication Enhancement Using Maximum SNR Ratio Based Cooperative AF Relaying

    Directory of Open Access Journals (Sweden)

    Jiazi Liu

    2017-01-01

    Full Text Available Physical layer authentication techniques developed in conventional macrocell wireless networks face challenges when applied in the future fifth-generation (5G wireless communications, due to the deployment of dense small cells in a hierarchical network architecture. In this paper, we propose a novel physical layer authentication scheme by exploiting the advantages of amplify-and-forward (AF cooperative relaying, which can increase the coverage and convergence of the heterogeneous networks. The essence of the proposed scheme is to select the best relay among multiple AF relays for cooperation between legitimate transmitter and intended receiver in the presence of a spoofer. To achieve this goal, two best relay selection schemes are developed by maximizing the signal-to-noise ratio (SNR of the legitimate link to the spoofing link at the destination and relays, respectively. In the sequel, we derive closed-form expressions for the outage probabilities of the effective SNR ratios at the destination. With the help of the best relay, a new test statistic is developed for making an authentication decision, based on normalized channel difference between adjacent end-to-end channel estimates at the destination. The performance of the proposed authentication scheme is compared with that in a direct transmission in terms of outage and spoofing detection.

  20. The Study of MSADQ/CDMA Protocol in Voice/Data Integration Packet Networks

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A new packet medium access protocol, namely, minislot signalingaccess based on distributed queues(MSADQ/CDMA), is proposed in voice and data intergration CDMA networks. The MSADQ protocol is based on distributed queues and collision resolution algorithm. Through proper management of the PN codes, the number of random competition collision reduces greatly, the multiple access interference (MAI) decreases. It has several special access signaling channels to carry the voice and data access request. Each slot is devided into several control minislots (CMSs), in which the Data Terminals (DT) or Voice Terminals (VT) transmit their request. According to the voice and data traffic character, the signaling access structure is proposed. The code assign rules and queue managing rules are also proposed to ensure the QoS requirement of each traffic. Comparisions with other three protocol are developed by simulation, which shows that MSADQ/CDMA protocol occupies less PN codes, but still has very good performance.

  1. COMMENTARY: LEARNER-BASED LISTENING AND TECHNOLOGICAL AUTHENTICITY

    Directory of Open Access Journals (Sweden)

    Richard Robin

    2007-02-01

    Full Text Available You dropped a hundred and fifty grand on an education you could’ve picked up for a dollar fifty in late charges at the public library. Good Will Hunting, 1997Language teachers know that even the best technology cannot provide the high degree of interaction required to acquire meaningful proficiency in a foreign language. Even the most polished packages available today (and likely to be available for several years to come cannot evaluate learner input and provide subtle shades of context-based feedback, except in the narrowest of circumstances. Technology’s dull blade is even more apparent the moment interactive orality is required. A simple phone call to a voice-automated service center reminds us to what extent mass-market speech recognition is crude and speaker-finicky, even in English. The speakers of less common languages may have to wait years before work begins on speech recognition for speakers of their languages.Off-the-shelf technology is not ready for interactive oral-aural instruction, but it has reached a level of sophistication that makes it ideal for use by the strategically independent learner to acquire and improve receptive skills in an authentic environment, if we update our definition of authenticity to include the technologically-enabled possibilities supporting a text or script1: the availability of combined texts and scripts, user-control over script delivery both in terms of speed and chunking, user-created glossing aides, captioning, etc. This technological overlay, available not just to language learners but to all users, is "authenticizing" practices that were once considered inauthentic. No longer are such devices part of the specialized landscape of the L2 learner; instead they make up the everyday L1 machine-mediated world of listening. That has implications for the demands learners make of themselves and the tasks that they choose. It also leads us to reexamine the value of pre-packaged listening comprehension

  2. The Effect of Authentic versus Non-Authentic Texts on Upper Intermediate Iranian EFL Learners' Vocabulary Retention

    Science.gov (United States)

    Nematollahi, Shirin; Maghsoudi, Mojtaba

    2015-01-01

    In this current study the researchers have tried to investigate the possible effect of authentic and non-authentic texts on Iranian EFL learners' vocabulary retention. Despite the great deal of studies conducted in the area of EFL/ESL learning, the effect of authentic versus non-authentic texts have almost gained little attention and been…

  3. A User Authentication Based on Personal History- A User Authentication System Using E-mail History -

    Directory of Open Access Journals (Sweden)

    Masakatsu Nishigaki

    2007-04-01

    Full Text Available This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user's daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user's e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.

  4. Mechanics of human voice production and control

    Science.gov (United States)

    Zhang, Zhaoyan

    2016-01-01

    As the primary means of communication, voice plays an important role in daily life. Voice also conveys personal information such as social status, personal traits, and the emotional state of the speaker. Mechanically, voice production involves complex fluid-structure interaction within the glottis and its control by laryngeal muscle activation. An important goal of voice research is to establish a causal theory linking voice physiology and biomechanics to how speakers use and control voice to communicate meaning and personal information. Establishing such a causal theory has important implications for clinical voice management, voice training, and many speech technology applications. This paper provides a review of voice physiology and biomechanics, the physics of vocal fold vibration and sound production, and laryngeal muscular control of the fundamental frequency of voice, vocal intensity, and voice quality. Current efforts to develop mechanical and computational models of voice production are also critically reviewed. Finally, issues and future challenges in developing a causal theory of voice production and perception are discussed. PMID:27794319

  5. Guap-A strong user authentication protocol for GSM

    OpenAIRE

    Aydemir, Özer

    2005-01-01

    Cataloged from PDF version of article. Traditionally, the authentication protocols for cellular phone networks have been designed for device authentication rather than user authentication, which brings limitations and restrictions on the functionality of the system. In this thesis we propose a user authentication protocol for GSM (Global System for Mobile) based cellular phone networks. Our protocol permits the use of weak secrets (e.g. passwords or PINs) for authentication ...

  6. Authentication Schemes Using Polynomials Over Non-Commutative Rings

    OpenAIRE

    Valluri, Maheswara Rao

    2013-01-01

    Authentication is a process by which an entity,which could be a person or intended computer,establishes its identity to another entity.In private and public computer networks including the Internet,authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic.Internet business and many other transactions require a more stringent authentication process. The aim of this paper is to propose two authentication sche...

  7. Developing Listening Skills with Authentic Materials.

    Science.gov (United States)

    Miller, Lindsay

    2003-01-01

    Discusses how to help English-as-a-Second-Language learners develop effective listening skills. Suggests a process for helping ESL learners develop their listening skills and makes suggestions for how this might be achieved with authentic materials. (VWL)

  8. Adapting Authentic Materials for Language Teaching.

    Science.gov (United States)

    Darian, Steven

    2001-01-01

    Illustrates the process of adapting authentic materials for use in the English-as-a-Second-language classroom. Focuses on four areas: semantic elements, lexical elements, syntactic elements, and discourse elements.(Author/VWL)

  9. Developing Listening Skills with Authentic Materials.

    Science.gov (United States)

    Miller, Lindsay

    2003-01-01

    Discusses how to help English-as-a-Second-Language learners develop effective listening skills. Suggests a process for helping ESL learners develop their listening skills and makes suggestions for how this might be achieved with authentic materials. (VWL)

  10. Remote Biometrics for Robust Persistent Authentication

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew; Jensen, Christian D.

    2014-01-01

    that fusion of two remote biometric modalities, facial recognition and appearance analysis, gives a significant improvement over each of the individual experts. Furthermore, the experimental results show that using remote biometrics increases the performance of tracking in persistent authentication...

  11. Robust audio hashing for audio authentication watermarking

    Science.gov (United States)

    Zmudzinski, Sascha; Steinebach, Martin

    2008-02-01

    Current systems and protocols based on cryptographic methods for integrity and authenticity verification of media data do not distinguish between legitimate signal transformation and malicious tampering that manipulates the content. Furthermore, they usually provide no localization or assessment of the relevance of such manipulations with respect to human perception or semantics. We present an algorithm for a robust message authentication code in the context of content fragile authentication watermarking to verify the integrity of audio recodings by means of robust audio fingerprinting. Experimental results show that the proposed algorithm provides both a high level of distinction between perceptually different audio data and a high robustness against signal transformations that do not change the perceived information. Furthermore, it is well suited for the integration in a content-based authentication watermarking system.

  12. Intrinsic-surface-tag image authentication

    Energy Technology Data Exchange (ETDEWEB)

    Palm, R.G.; DeVolpi, A.

    1991-12-01

    The objective of this work is to further the development of a unique treaty limited item (TLI) intrinsic surface tag for arms control applications. This tag's unique feature is the ability to capture the sub-micron scale topography of the TLI surface. The surface topography is captured by plastic castings of the surface as digitally imaged by an electron microscope. Tag authentication is accomplished by comparing digital castings images obtained in two different inspections. Surface replication experiments are described, as these experiments from the basis for the authentication algorithm. Both the experiments and the authentication algorithm are analyzed using the modulation transfer function. Recommendations for future improvements in tag authentication are also suggested by the modulation transfer function analysis. 4 refs.

  13. Intrinsic-surface-tag image authentication

    Energy Technology Data Exchange (ETDEWEB)

    Palm, R.G.; DeVolpi, A.

    1991-12-01

    The objective of this work is to further the development of a unique treaty limited item (TLI) intrinsic surface tag for arms control applications. This tag`s unique feature is the ability to capture the sub-micron scale topography of the TLI surface. The surface topography is captured by plastic castings of the surface as digitally imaged by an electron microscope. Tag authentication is accomplished by comparing digital castings images obtained in two different inspections. Surface replication experiments are described, as these experiments from the basis for the authentication algorithm. Both the experiments and the authentication algorithm are analyzed using the modulation transfer function. Recommendations for future improvements in tag authentication are also suggested by the modulation transfer function analysis. 4 refs.

  14. Authentication for Propulsion Test Streaming Video Project

    Data.gov (United States)

    National Aeronautics and Space Administration — An application was developed that could enforce two-factor authentication for NASA access to the Propulsion Test Streaming Video System.  To gain access to the...

  15. IPCT: A scheme for mobile authentication

    Directory of Open Access Journals (Sweden)

    Vishnu Shankar

    2016-09-01

    Full Text Available Mobile is becoming a part of everyone's life and as their power of computation and storage is rising and cost is coming down. Most of mobile phone users have a lot of private data which they want to protect from others (La Polla et al., 2013. It means user must be authenticated properly for accessing the mobile resources. Normally user is authenticated using text passwords, PIN, face recognition or patterns etc. All these methods are used but they have some shortcomings. In this paper we have seen various existing methods of mobile authentications and proposed our improved mobile authentication IPCT scheme. We have compared our Image Pass Code with tapping scheme with existing techniques and shown that our scheme is better than existing techniques.

  16. Design of Anonymous Attribute Authentication Mechanism

    Science.gov (United States)

    Kiyomoto, Shinsaku; Fukushima, Kazuhide; Tanaka, Toshiaki

    Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication.In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.

  17. Hardware device binding and mutual authentication

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  18. Athos: Efficient Authentication of Outsourced File Systems

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Goodrich, Michael T.; Papamanthou, Charalampos

    2008-01-01

    outsourced storage. Using light-weight cryptographic primitives and efficient data-structuring techniques, we design authentication schemes that allow a client to efficiently verify that the file system is fully consistent with the exact history of updates and queries requested by the client. In Athos, file-system......We study the problem of authenticated storage, where we wish to construct protocols that allow to outsource any complex file system to an untrusted server and yet ensure the file-system's integrity. We introduce Athos, a new, platform-independent and user-transparent architecture for authenticated...... operations are verified in time that is logarithmic in the size of the file system using optimal storage complexity-constant storage overhead at the client and asymptotically no extra overhead at the server. We provide a prototype implementation of Athos validating its performance and its authentication...

  19. Authenticating Devices in Ubiquitous Computing Environment

    Directory of Open Access Journals (Sweden)

    Kamarularifin Abd Jalil

    2015-05-01

    Full Text Available The deficient of a good authentication protocol in a ubiquitous application environment has made it a good target for adversaries. As a result, all the devices which are participating in such environment are said to be exposed to attacks such as identity impostor, man-in-the-middle attacks and also unauthorized attacks. Thus, this has created skeptical among the users and has resulted them of keeping their distance from such applications. For this reason, in this paper, we are proposing a new authentication protocol to be used in such environment. Unlike other authentication protocols which can be adopted to be used in such environment, our proposed protocol could avoid a single point of failures, implements trust level in granting access and also promotes decentralization. It is hoped that the proposed authentication protocol can reduce or eliminate the problems mentioned.

  20. Adapting Authentic Materials for Language Teaching.

    Science.gov (United States)

    Darian, Steven

    2001-01-01

    Illustrates the process of adapting authentic materials for use in the English-as-a-Second-language classroom. Focuses on four areas: semantic elements, lexical elements, syntactic elements, and discourse elements.(Author/VWL)

  1. Authentic professional competence in clinical neuropsychology.

    Science.gov (United States)

    Denney, Robert L

    2010-08-01

    Authentic Professional Competence in Clinical Neuropsychology was Dr Denney's 2009 presidential address at the Annual Conference of the National Academy of Neuropsychology. In his address, he highlighted the need for clinical neuropsychologists to strive for authentic professional competence rather than a mere pretense of expertise. Undisputed credibility arises from authentic professional competence. Achieving authentic professional competence includes the completion of a thorough course of training within the defined specialty area and validation of expertise by one's peers through the board certification process. Included in the address were survey results regarding what the consumer believes about board certification as well as survey results regarding the experiences of recent neuropsychology diplomates. It is important for neuropsychologists to realize that the board certification process enhances public perception and credibility of the field as well as personal growth for the neuropsychologist. Lastly, he urged all neuropsychologists to support the unified training model and pursue board certification.

  2. Channel protein engineering: Synthetic 22-mer peptide from the primary structure of the voltage-sensitive sodium channel forms ionic channels in lipid bilayers

    OpenAIRE

    1988-01-01

    A synthetic 22-mer peptide that mimics the sequence of a putative pore segment of the voltage-dependent sodium channel forms transmembrane ionic channels in lipid bilayers. Several features of the authentic sodium channel are exhibited by the synthetic peptide: (i) The single channel conductance of the most frequent event is 20 pS in 0.5 M NaCl. (ii) The single channel open and closed lifetimes are in the ms time range. (iii) The synthetic channel discriminates cations over anions but is nons...

  3. Entity Authentication:Analysis using Structured Intuition

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    In this paper, we propose a new method for the analysis that uses intuition of the analyst in a structured way. First we define entity authentication in terms of fine level authentication goals (FLAGs). Then we use some relevant structures in protocol narrations and use them to justify FLAGs...... specification of security in terms of FLAGs; and secondly the outcome can be used to transform basic protocol narrations into more detailed specifications, which makes a subsequent formal analysis much more meaningful....

  4. Improved Authenticated Multi-Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hua; YUAN Zheng; WEN Qiaoyan

    2006-01-01

    Zhou et al give an attack on Harn's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.

  5. Keystroke Dynamics Authentication For Collaborative Systems

    OpenAIRE

    Giot, Romain; El-Abed, Mohamad; Rosenberger, Christophe

    2009-01-01

    International audience; We present in this paper a study on the ability and the benefits of using a keystroke dynamics authentication method for collaborative systems. Authentication is a challenging issue in order to guarantee the security of use of collaborative systems during the access control step. Many solutions exist in the state of the art such as the use of one time passwords or smart-cards. We focus in this paper on biometric based solutions that do not necessitate any additional se...

  6. Native voice, self-concept and the moral case for personalized voice technology.

    Science.gov (United States)

    Nathanson, Esther

    2017-01-01

    Purpose (1) To explore the role of native voice and effects of voice loss on self-concept and identity, and survey the state of assistive voice technology; (2) to establish the moral case for developing personalized voice technology. Methods This narrative review examines published literature on the human significance of voice, the impact of voice loss on self-concept and identity, and the strengths and limitations of current voice technology. Based on the impact of voice loss on self and identity, and voice technology limitations, the moral case for personalized voice technology is developed. Results Given the richness of information conveyed by voice, loss of voice constrains expression of the self, but the full impact is poorly understood. Augmentative and alternative communication (AAC) devices facilitate communication but, despite advances in this field, voice output cannot yet express the unique nuances of individual voice. The ethical principles of autonomy, beneficence and equality of opportunity establish the moral responsibility to invest in accessible, cost-effective, personalized voice technology. Conclusions Although further research is needed to elucidate the full effects of voice loss on self-concept, identity and social functioning, current understanding of the profoundly negative impact of voice loss establishes the moral case for developing personalized voice technology. Implications for Rehabilitation Rehabilitation of voice-disordered patients should facilitate self-expression, interpersonal connectedness and social/occupational participation. Proactive questioning about the psychological and social experiences of patients with voice loss is a valuable entry point for rehabilitation planning. Personalized voice technology would enhance sense of self, communicative participation and autonomy and promote shared healthcare decision-making. Further research is needed to identify the best strategies to preserve and strengthen identity and sense of

  7. Dual Authentication For Bluetooth Connection

    Directory of Open Access Journals (Sweden)

    Diallo Alhassane Saliou

    2014-07-01

    Full Text Available Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN. This is because the radio frequency (RF waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS. These two characteristics have led to replace wired communication by wireless systems. However, there are serious security challenges associated with wireless communication systems because they are easier to eavesdrop, disrupt and jam than the wired systems. Bluetooth technology started with a form of pairing called legacy pairing prior to any communication. However, due to the serious security issues found in the legacy pairing, a secure and simple pairing called SPP was announced with Bluetooth 2.1 and later since 2007. SPP has solved the main security issue which is the weaknesses of the PIN code in the legacy pairing, however it has been found with some vulnerabilities such as eavesdropping and man-in-the-middle (MITM attacks. Since the discovery of these vulnerabilities, some enhancements have been proposed to the Bluetooth Specification Interest Group (SIG which is the regulatory body of Bluetooth technology; nevertheless, some proposed enhancements are ineffective or are not yet implemented by Manufacturers. Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC algorithm with Secure Hash Algorithm (SHA-256. The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE as software and a Bluetooth (BT Shield connected to an Arduino Uno R3 boards as hardware. The result was verified on a Graphical User Interface (GUI built in Microsoft Visual Studio 2010 with C sharp as default environment. It has shown that the proposed scheme works perfectly with the used hardware and software. In addition, the

  8. Children's Voice or Children's Voices? How Educational Research Can Be at the Heart of Schooling

    Science.gov (United States)

    Stern, Julian

    2015-01-01

    There are problems with considering children and young people in schools as quite separate individuals, and with considering them as members of a single collectivity. The tension is represented in the use of "voice" and "voices" in educational debates. Voices in dialogue, in contrast to "children's voice", are…

  9. Voice complaints, risk factors for voice problems and history of voice problems in relation to puberty in female student teachers.

    NARCIS (Netherlands)

    Thomas, G.; Jong, F.I.C.R.S. de; Kooijman, P.G.C.; Donders, A.R.T.; Cremers, C.W.R.J.

    2006-01-01

    The aim of the study was to estimate voice complaints, risk factors for voice complaints and history of voice problems in student teachers before they embarked on their professional teaching career. A cross-sectional questionnaire survey was performed among female student teachers. The response rate

  10. Voice complaints, risk factors for voice problems and history of voice problems in relation to puberty in female student teachers.

    NARCIS (Netherlands)

    Thomas, G.; Jong, F.I.C.R.S. de; Kooijman, P.G.C.; Donders, A.R.T.; Cremers, C.W.R.J.

    2006-01-01

    The aim of the study was to estimate voice complaints, risk factors for voice complaints and history of voice problems in student teachers before they embarked on their professional teaching career. A cross-sectional questionnaire survey was performed among female student teachers. The response rate

  11. Authenticated join processing in outsourced databases

    KAUST Repository

    Yang, Yin

    2009-01-01

    Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner\\'s signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections. ©2009 ACM.

  12. Human voice recognition depends on language ability.

    Science.gov (United States)

    Perrachione, Tyler K; Del Tufo, Stephanie N; Gabrieli, John D E

    2011-07-29

    The ability to recognize people by their voice is an important social behavior. Individuals differ in how they pronounce words, and listeners may take advantage of language-specific knowledge of speech phonology to facilitate recognizing voices. Impaired phonological processing is characteristic of dyslexia and thought to be a basis for difficulty in learning to read. We tested voice-recognition abilities of dyslexic and control listeners for voices speaking listeners' native language or an unfamiliar language. Individuals with dyslexia exhibited impaired voice-recognition abilities compared with controls only for voices speaking their native language. These results demonstrate the importance of linguistic representations for voice recognition. Humans appear to identify voices by making comparisons between talkers' pronunciations of words and listeners' stored abstract representations of the sounds in those words.

  13. Quick Statistics about Voice, Speech, and Language

    Science.gov (United States)

    ... here Home » Health Info » Statistics and Epidemiology Quick Statistics About Voice, Speech, Language Voice, Speech, Language, and ... no 205. Hyattsville, MD: National Center for Health Statistics. 2015. Hoffman HJ, Li C-M, Losonczy K, ...

  14. Introduction: Textual and contextual voices of translation

    DEFF Research Database (Denmark)

    2017-01-01

    Voices – marks of the tangle of subjectivities involved in textual processes – constitute the very fabric of texts in general and translations in particular. The title of this book, Textual and Contextual Voices of Translation, refers both to textual voices, that is, the voices found within...... the translated texts, and to contextual voices, that is, the voices of those involved in shaping, commenting, or otherwise influencing the textual voices. The latter appear in prefaces, reviews, and other texts that surround the translated texts and provide them with a context. Our main claim is that studying...... both the textual and contextual voices helps us better understand and explain the complexity of both the translation process and the translation product. The dovetailed approach to translation research that is advocated in this book aims at highlighting the diversity of participants, power positions...

  15. The effect of different navigation voices on trust and attention while using in-vehicle navigation systems.

    Science.gov (United States)

    Large, David R; Burnett, Gary E

    2014-06-01

    Automobiles are suffused with computers and technology designed to support drivers at all levels of the driving hierarchy. Classic secondary devices, such as in-vehicle navigation systems (IVNS), present strategic and tactical information to drivers. In order to mitigate the potential distraction and workload when interacting with these devices while driving, IVNS often employ voices to deliver navigational instructions. In contrast, voices are used during interpersonal encounters to engage the listener, provide clues about the speaker's personality and make judgments about them, for example, whether to like them and to trust them. A study conducted within a fixed-based medium-fidelity driving simulator investigated if drivers made similar 'personality' attributions to voices emanating from an IVNS and if this subsequently affected how they engaged with the device while driving. Twenty-nine experienced drivers and IVNS users drove to a specified destination with a simulated IVNS and authentically reproduced UK road signage to support their route-finding. Either of two navigation voices were used; one considered 'high-trust' and the other 'low-trust.' Presented with a conflict scenario, where the verbal route guidance differed to the road signs, 22 drivers followed the IVNS instruction rather than the road signs. Of these, the majority were using the 'high-trust' voice. A post-drive questionnaire revealed that, despite the fact that message content and delivery remained equivalent, participants recognized different attributes ('personalities') associated with each of the navigation voices. This influenced their attitudes towards them, including how much they liked them, their preferences for use, and the level of trust that they associated with each voice. While these, so-called, social responses may be invited and indeed encouraged in other contexts, in the automotive domain they are likely to conflict with the intended benefits of using a voice to deliver route

  16. NASA balloon: Aircraft ranging, data and voice experiment

    Science.gov (United States)

    Wishna, S.; Hamby, C.; Reed, D.

    1972-01-01

    A series of tests to evaluate, at L-band, the ranging, voice, and data communications concepts proposed for the air traffic control experiment of the Applications Technology Satellite-F are described. The ground station facilities, balloon platforms and the aircraft were supplied by the European Space Research Organization. One ground simulation and two aircraft flights at low elevation angles were conducted. Even under high interference conditions good performance was obtained for both voice communications and side tone ranging. High bit errors occurred in the data channels resulting in false commands. As a result of the experience gained in operating the equipment in an aircraft environment several recommendations were made for improving the equipment performance.

  17. Speaker's voice as a memory cue.

    Science.gov (United States)

    Campeanu, Sandra; Craik, Fergus I M; Alain, Claude

    2015-02-01

    Speaker's voice occupies a central role as the cornerstone of auditory social interaction. Here, we review the evidence suggesting that speaker's voice constitutes an integral context cue in auditory memory. Investigation into the nature of voice representation as a memory cue is essential to understanding auditory memory and the neural correlates which underlie it. Evidence from behavioral and electrophysiological studies suggest that while specific voice reinstatement (i.e., same speaker) often appears to facilitate word memory even without attention to voice at study, the presence of a partial benefit of similar voices between study and test is less clear. In terms of explicit memory experiments utilizing unfamiliar voices, encoding methods appear to play a pivotal role. Voice congruency effects have been found when voice is specifically attended at study (i.e., when relatively shallow, perceptual encoding takes place). These behavioral findings coincide with neural indices of memory performance such as the parietal old/new recollection effect and the late right frontal effect. The former distinguishes between correctly identified old words and correctly identified new words, and reflects voice congruency only when voice is attended at study. Characterization of the latter likely depends upon voice memory, rather than word memory. There is also evidence to suggest that voice effects can be found in implicit memory paradigms. However, the presence of voice effects appears to depend greatly on the task employed. Using a word identification task, perceptual similarity between study and test conditions is, like for explicit memory tests, crucial. In addition, the type of noise employed appears to have a differential effect. While voice effects have been observed when white noise is used at both study and test, using multi-talker babble does not confer the same results. In terms of neuroimaging research modulations, characterization of an implicit memory effect

  18. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication

    CERN Document Server

    Xiao, Liang; Mandayam, Narayan; Trappe, Wade

    2009-01-01

    The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to exploit the fact that, in a typically rich scattering environment, the radio channel response decorrelates quite rapidly in space. Specifically, we describe a physical-layer algorithm that combines channel probing (M complex frequency response samples over a bandwidth W) with hypothesis testing to determine whether current and prior communication attempts are made by the same user (same channel response). In this way, legitimate users can be reliably authenticated and false users can be reliably detected. To evaluate the feasibility of our algorithm, we simulate spatially variable channel responses in real environments using the WiSE ray-tracing tool; and we analyze the ability of a receiver to discriminate between transmitters (users) based on their channel frequency responses in a given office environment. For several rooms in the extremities o...

  19. A New Look at Composition of Authenticated Byzantine Generals

    CERN Document Server

    Gupta, Anuj; Bansal, Piyush; Srinathan, Kannan

    2012-01-01

    The problem of {\\em Authenticated Byzantine Generals} (ABG) aims to simulate a {\\em virtual} reliable broadcast channel from the {\\em General} to all the players via a protocol over a {\\em real} (point-to-point) network in the presence of faults. We propose a new model to study the self-composition of protocols for {\\em Authenticated Byzantine Generals}. The central dogma of our approach can be phrased as follows: Consider a player who diligently executes (only) the delegated protocol but the adversary steals some private information from him. Should such a player be considered faulty? With respect to ABG protocols, we argue that the answer has to be {\\em no}. In the new model we show that in spite of using unique session identifiers, if $n < 2t$, there cannot exist any ABG protocol that composes in parallel even twice. Further, for $n \\geq 2t$, we design ABG protocols that compose for any number of parallel executions. Besides, investigating the composition of ABG under a new light, our work brings out se...

  20. Using Brain Waves as New Biometric Feature for Authenticating a Computer User in Real-Time

    OpenAIRE

    Kusuma Mohanchandra; Lingaraju G M; Prashanth Kambli; Vinay Krishnamurthy

    2013-01-01

    In this paper we propose an Electroencephalogram based Brain Computer Interface as a new modality for Person Authentication and develop a screen lock application that will lock and unlock the computer screen at the users will. The brain waves of the person, recorded in real time are used as password to unlock the screen. Data fusion from 14 sensors of the Emotiv headset is done to enhance the signal features. The power spectral density of the intermingle signals is computed. The channel spect...

  1. Voicing Consciousness: The Mind in Writing

    Science.gov (United States)

    Luce-Kapler, Rebecca; Catlin, Susan; Sumara, Dennis; Kocher, Philomene

    2011-01-01

    In this paper, the authors investigate the enduring power of voice as a concept in writing pedagogy. They argue that one can benefit from considering Elbow's assertion that both text and voice be considered as important aspects of written discourse. In particular, voice is a powerful metaphor for the material, social and historical nature of…

  2. Understanding the 'Anorexic Voice' in Anorexia Nervosa.

    Science.gov (United States)

    Pugh, Matthew; Waller, Glenn

    2016-07-20

    In common with individuals experiencing a number of disorders, people with anorexia nervosa report experiencing an internal 'voice'. The anorexic voice comments on the individual's eating, weight and shape and instructs the individual to restrict or compensate. However, the core characteristics of the anorexic voice are not known. This study aimed to develop a parsimonious model of the voice characteristics that are related to key features of eating disorder pathology and to determine whether patients with anorexia nervosa fall into groups with different voice experiences. The participants were 49 women with full diagnoses of anorexia nervosa. Each completed validated measures of the power and nature of their voice experience and of their responses to the voice. Different voice characteristics were associated with current body mass index, duration of disorder and eating cognitions. Two subgroups emerged, with 'weaker' and 'stronger' voice experiences. Those with stronger voices were characterized by having more negative eating attitudes, more severe compensatory behaviours, a longer duration of illness and a greater likelihood of having the binge-purge subtype of anorexia nervosa. The findings indicate that the anorexic voice is an important element of the psychopathology of anorexia nervosa. Addressing the anorexic voice might be helpful in enhancing outcomes of treatments for anorexia nervosa, but that conclusion might apply only to patients with more severe eating psychopathology. Copyright © 2016 John Wiley & Sons, Ltd.

  3. Voice and culture: A prospect theory approach

    NARCIS (Netherlands)

    Paddock, E.L.; Ko, Junsu; Cropanzano, R.; Bagger, J.; El Akremi, A.; Camerman, A.; Greguras, G. J.; Mladinic, A.; Moliner, C.; Nam, K.; Törnblom, K.; Van den Bos, Kees

    2015-01-01

    The present study examines the congruence of individuals' minimum preferred amounts of voice with the prospect theory value function across nine countries. Accounting for previously ignored minimum preferred amounts of voice and actual voice amounts integral to testing the steepness of gain and loss

  4. Finding Voice: Learning about Language and Power

    Science.gov (United States)

    Christensen, Linda

    2011-01-01

    Christensen discusses why teachers need to teach students "voice" in its social and political context, to show the intersection of voice and power, to encourage students to ask, "Whose voices get heard? Whose are marginalized?" As Christensen writes, "Once students begin to understand that Standard English is one language among many, we can help…

  5. Analyzing the mediated voice - a datasession

    DEFF Research Database (Denmark)

    Lawaetz, Anna

    Broadcasted voices are technologically manipulated. In order to achieve a certain autencity or sound of “reality” paradoxically the voices are filtered and trained in order to reach the listeners. This “mis-en-scene” is important knowledge when it comes to the development of a consistent method o...... of analysis of the mediated voice...

  6. Analyzing the mediated voice - a datasession

    DEFF Research Database (Denmark)

    Lawaetz, Anna

    Broadcasted voices are technologically manipulated. In order to achieve a certain autencity or sound of “reality” paradoxically the voices are filtered and trained in order to reach the listeners. This “mis-en-scene” is important knowledge when it comes to the development of a consistent method...... of analysis of the mediated voice...

  7. Voice and culture: A prospect theory approach

    NARCIS (Netherlands)

    Paddock, E.L.; Ko, Junsu; Cropanzano, R.; Bagger, J.; El Akremi, A.; Camerman, A.; Greguras, G. J.; Mladinic, A.; Moliner, C.; Nam, K.; Törnblom, K.; Van den Bos, Kees

    2015-01-01

    The present study examines the congruence of individuals' minimum preferred amounts of voice with the prospect theory value function across nine countries. Accounting for previously ignored minimum preferred amounts of voice and actual voice amounts integral to testing the steepness of gain and loss

  8. "Voice Forum" The Human Voice as Primary Instrument in Music Therapy

    DEFF Research Database (Denmark)

    Pedersen, Inge Nygaard; Storm, Sanne

    2009-01-01

    Aspects will be drawn on the human voice as tool for embodying our psychological and physiological state, and attempting integration of feelings. Presentations and dialogues on different methods and techniques in "Therapy related body-and voice work.", as well as the human voice as a tool for non...... for nonverbal orientation and information both to our selves and others. Focus on training on the voice instrument, the effect and impact of the human voice, and listening perspectives...

  9. Speaker Authentication Operational Test and Evaluation.

    Science.gov (United States)

    1980-04-01

    training data was reduced to 10 seconds, and the unknown speech was limited to less than one minute. The aproach was to divide the effort into two parts... methods for separating the various subpopulations are described below. uied-S neec’it T he voice/unvoiced subpopulations are derived by the voicing...system on unknown speech data of less than 10 se- conds. 7. New methods for computing and displaying the confidence and similarity scores should be

  10. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.

    Science.gov (United States)

    Li, Chun-Ta; Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-06-23

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.

  11. Authenticity is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity

    NARCIS (Netherlands)

    Gulikers, J.T.M.; Bastiaens, Th.J.; Kirschner, P.A.; Kester, L.

    2008-01-01

    In vocational education and training (VET) in the Netherlands, learning and working are integrated from the start. Authentic assessments are used during competence-based VET curricula to achieve correspondence between learning and working. The premise behind this study is that authenticity is subjec

  12. Perceptions of Leadership Coaches Regarding Leader Authenticity and Authenticity Development Strategies

    Science.gov (United States)

    Stone, Anne H.

    2012-01-01

    Purpose: The purpose of this study was to identify what leadership coaches perceive to be the benefits of authenticity to their clients' success. Another purpose was to identify what barriers leadership coaches perceive as preventing their clients from developing authenticity. A final purpose of this study was to identify which strategies…

  13. Authenticity Is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity

    Science.gov (United States)

    Gulikers, Judith T. M.; Bastiaens, Theo J.; Kirschner, Paul A.; Kester, Liesbeth

    2008-01-01

    In vocational education and training (VET) in the Netherlands, learning and working are integrated from the start. Authentic assessments are used during competence-based VET curricula to achieve correspondence between learning and working. The premise behind this study is that authenticity is subjective and that perceptions of assessment…

  14. Novel Sequence Number Based Secure Authentication Scheme for Wireless LANs

    Institute of Scientific and Technical Information of China (English)

    Rajeev Singh; Teek Parval Sharma

    2015-01-01

    Authentication per frame is an implicit necessity for security in wireless local area networks (WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs. The scheme involves no cryptographic overheads for authentication of frames. It utilizes the sequence number of the frame along with the authentication stream generators for authentication. Hence, it requires no extra bits or messages for the authentication purpose and also no change in the existing frame format is required. The scheme provides authentication by modifying the sequence number of the frame at the sender, and that the modification is verified at the receiver. The modified sequence number is protected by using the XOR operation with a random number selected from the random stream. The authentication is lightweight due to the fact that it requires only trivial arithmetic operations like the subtraction and XOR operation.

  15. Robust image authentication in the presence of noise

    CERN Document Server

    2015-01-01

    This book addresses the problems that hinder image authentication in the presence of noise. It considers the advantages and disadvantages of existing algorithms for image authentication and shows new approaches and solutions for robust image authentication. The state of the art algorithms are compared and, furthermore, innovative approaches and algorithms are introduced. The introduced algorithms are applied to improve image authentication, watermarking and biometry.    Aside from presenting new directions and algorithms for robust image authentication in the presence of noise, as well as image correction, this book also:   Provides an overview of the state of the art algorithms for image authentication in the presence of noise and modifications, as well as a comparison of these algorithms, Presents novel algorithms for robust image authentication, whereby the image is tried to be corrected and authenticated, Examines different views for the solution of problems connected to image authentication in the pre...

  16. Voice-Specialized Speech-Language Pathologist's Criteria for Discharge from Voice Therapy.

    Science.gov (United States)

    Gillespie, Amanda I; Gartner-Schmidt, Jackie

    2017-08-07

    No standard protocol exists to determine when a patient is ready and able to be discharged from voice therapy. The aim of the present study was to determine what factors speech-language pathologists (SLPs) deem most important when discharging a patient from voice therapy. A second aim was to determine if responses differed based on years of voice experience. Step 1: Seven voice-specialized SLPs generated a list of items thought to be relevant to voice therapy discharge. Step 2: Fifty voice-specialized SLPs rated each item on the list in terms of importance in determining discharge from voice therapy. Step 1: Four themes emerged-outcome measures, laryngeal appearance, SLP perceptions, and patient factors-as important items when determining discharge from voice therapy. Step 2: The top five most important criteria for discharge readiness were that the patient had to be able to (1) independently use a better voice (transfer), (2) function with his or her new voice production in activities of daily living (transfer), (3) differentiate between good and bad voice, (4) take responsibility for voice, and (5) sound better from baseline. Novice and experienced clinicians agreed between 94% and 97% concerning what was deemed "very important." SLPs agree that a patient's ability to use voice techniques in conversation and real-life situations outside of the therapy room are the most important determinants for voice therapy discharge. Copyright © 2017 The Voice Foundation. Published by Elsevier Inc. All rights reserved.

  17. Authentication Model Based Bluetooth-enabled Mobile Phone

    Directory of Open Access Journals (Sweden)

    Rania Abdelhameed

    2005-01-01

    Full Text Available Authentication is a mechanism to establish proof of identities, the authentication process ensure that who a particular user is. Current PC, laptop user authentication systems are always done once and hold until it explicitly revoked by the user, or asking the user to frequently reestablish his identity which encouraging him to disable authentication. Zero-Interaction Authentication (ZIA provides solution to this problem. In ZIA, a user wears a small authentication token that communicates with a laptop over a short-range, wireless link. ZIA combine authentication with a file encryption. Here we proposed a Laptop-user Authentication Based Mobile phone (LABM, in our model of authentication, a user uses his Bluetooth-enabled mobile phone, which work as an authentication token that provides the authentication for laptop over a Bluetooth wireless link, in the concept of transient authentication with out combining it with encryption file system. The user authenticate to the mobile phone infrequently. In turn, the mobile phone continuously authenticates to the laptop by means of the short-range, wireless link.

  18. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    Science.gov (United States)

    Kent, Alexander Dale

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  19. An Authentication Protocol for RFID Tag and Its Simulation

    Directory of Open Access Journals (Sweden)

    Shang-ping Wang

    2011-03-01

    Full Text Available RFID tag has limited calculation resources and small storage capacity, the wireless communication channel between RFID tag and reader is vulnerable to various malicious attacks. Aimed at these problems, a HMAC-based RFID lightweight authentication protocol is proposed in this paper, and some considerations about protocol implementation are made subsequently. In the new protocol, only the Hash function and XOR operation are used, so that the calculation capacity and storage space of RFID reader are utilized efficiently, the demand for the capacity of calculation and storage of tag are reduced. The protocol framework and the packet format are presented. The hardware implementation was done in Verilog HDL for an FPGA target device to get a fast prototype. The analysis of security and performance show that the new protocol can resist some malicious attacks, such as spoofing attack, replay attack, tracking, etc., and is suitable for low-cost RFID system.

  20. The development of the Spanish verb ir into auxiliary of voice

    DEFF Research Database (Denmark)

    Vinther, Thora

    2005-01-01

    spanish, syntax, grammaticalisation, past participle, passive voice, middle voice, language development......spanish, syntax, grammaticalisation, past participle, passive voice, middle voice, language development...

  1. Objective Voice Parameters in Colombian School Workers with Healthy Voices

    Directory of Open Access Journals (Sweden)

    Lady Catherine Cantor Cutiva

    2015-09-01

    Full Text Available Objectives: To characterize the objective voice parameters among school workers, and to identi­fy associated factors of three objective voice parameters, namely fundamental frequency, sound pressure level and maximum phonation time. Materials and methods: We conducted a cross-sectional study among 116 Colombian teachers and 20 Colombian non-teachers. After signing the informed consent form, participants filled out a questionnaire. Then, a voice sample was recorded and evaluated perceptually by a speech therapist and by objective voice analysis with praat software. Short-term environmental measurements of sound level, temperature, humi­dity, and reverberation time were conducted during visits at the workplaces, such as classrooms and offices. Linear regression analysis was used to determine associations between individual and work-related factors and objective voice parameters. Results: Compared with men, women had higher fundamental frequency (201 Hz for teachers and 209 for non-teachers vs. 120 Hz for teachers and 127 for non-teachers and sound pressure level (82 dB vs. 80 dB, and shorter maximum phonation time (around 14 seconds vs. around 16 seconds. Female teachers younger than 50 years of age evidenced a significant tendency to speak with lower fundamental frequen­cy and shorter mpt compared with female teachers older than 50 years of age. Female teachers had significantly higher fundamental frequency (66 Hz, higher sound pressure level (2 dB and short phonation time (2 seconds than male teachers. Conclusion: Female teachers younger than 50 years of age had significantly lower F0 and shorter mpt compared with those older than 50 years of age. The multivariate analysis showed that gender was a much more important determinant of variations in F0, spl and mpt than age and teaching occupation. Objectively measured temperature also contributed to the changes on spl among school workers.

  2. Playful Interaction with Voice Sensing Modular Robots

    DEFF Research Database (Denmark)

    Heesche, Bjarke; MacDonald, Ewen; Fogh, Rune

    2013-01-01

    This paper describes a voice sensor, suitable for modular robotic systems, which estimates the energy and fundamental frequency, F0, of the user’s voice. Through a number of example applications and tests with children, we observe how the voice sensor facilitates playful interaction between...... children and two different robot configurations. In future work, we will investigate if such a system can motivate children to improve voice control and explore how to extend the sensor to detect emotions in the user’s voice....

  3. BIOMETRIC CRYPTOGRAPHY AND NETWORK AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    Tonimir Kišasondi

    2007-06-01

    Full Text Available In this paper we will present some schemes for strengthening network authentification over insecure channels with biometric concepts or how to securely transfer or use biometric characteristics as cryptographic keys. We will show why some current authentification schemes are insufficient and we will present our concepts of biometric hashes and authentification that rely on unimodal and multimodal biometrics. Our concept can be applied on any biometric authentification scheme and is universal for all systems.

  4. VOICE QUALITY BEFORE AND AFTER THYROIDECTOMY

    Directory of Open Access Journals (Sweden)

    Dora CVELBAR

    2016-04-01

    Full Text Available Introduction: Voice disorders are a well-known complication which is often associated with thyroid gland diseases and because voice is still the basic mean of communication it is very important to maintain its quality healthy. Objectives: The aim of this study referred to questions whether there is a statistically significant difference between results of voice self-assessment, perceptual voice assessment and acoustic voice analysis before and after thyroidectomy and whether there are statistically significant correlations between variables of voice self-assessment, perceptual assessment and acoustic analysis before and after thyroidectomy. Methods: This scientific research included 12 participants aged between 41 and 76. Voice self-assessment was conducted with the help of Croatian version of Voice Handicap Index (VHI. Recorded reading samples were used for perceptual assessment and later evaluated by two clinical speech and language therapists. Recorded samples of phonation were used for acoustic analysis which was conducted with the help of acoustic program Praat. All of the data was processed through descriptive statistics and nonparametric statistical methods. Results: Results showed that there are statistically significant differences between results of voice self-assessments and results of acoustic analysis before and after thyroidectomy. Statistically significant correlations were found between variables of perceptual assessment and acoustic analysis. Conclusion: Obtained results indicate the importance of multidimensional, preoperative and postoperative assessment. This kind of assessment allows the clinician to describe all of the voice features and provides appropriate recommendation for further rehabilitation to the patient in order to optimize voice outcomes.

  5. SECURING VIRTUAL IMAGES USING BLIND AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    RAVIKIRAN PEELUKHANA,

    2011-04-01

    Full Text Available The cloud virtualization technology improves the economy of scale for data centers through server consolidation, application consolidation and resources consolidation. Virtualization allows the provider to move Virtual Images from more congested host to less-congested hosts, as required. Enterprises also get improved server reliability, which in turn increases application performance. Despite these benefits, it includes major security challenges with the portability of Virtual Images between different cloud providers.The security and integrity of Virtual images is the foundation for the overall security of the cloud. Many of the Virtual images are intended to be shared by diverse and unrelated users. Unfortunately, existing approaches to cloud security built by cloud practitioners fall short when dealing with Virtual images. Secure transmission of virtual Images can bepossible by providing authentication using Blind Authentication protocol (BAP. The proposed approach authenticates the allocation of virtual images using Blind authentication protocol. It provides provable protection against replay and client side attacks even if the keys of the user are compromised. The encryption also provides template protection, revocability and alleviates the concerns on privacy in widespread use of biometrics. Carrying out the authentication in the encrypted domain is a secure process, while the encryption key acts as an additional layer of security.

  6. Stereo Image Reversible Watermarking for Authentication

    Science.gov (United States)

    Luo, Ting; Jiang, Gangyi; Peng, Zongju; Shao, Feng; Yu, Mei

    2015-03-01

    To authenticate stereo image, this paper proposes a stereo image reversible watermarking method for three dimensional television systems. The proposed method can recover the original stereo image without any distortion if stereo image is not tampered. Otherwise, it can authenticate stereo image with the capability of locating tamper. Difference expansion is used to embed authentication bits reversibly into each block for locating tamper. Pixel pairs without resulting in overflow/underflow after expansion are chosen as candidates of embedding locations. In order to avoid transmit big size of embedding location map, the same embedding locations for each block are decided in advance, which adaptively determines the block size. Moreover, in order to resist collage attack, authentication bits generated from each block embedded into its mapping blocks, so that authentication of each block is not independent. Experimental results demonstrate that stereo image can be totally recovered if watermarked stereo image is not modified. Moreover, it proves suitability and stability of the proposed method for tamper location with relationships of stereo images.

  7. Beyond Insularity: Releasing the Voices.

    Science.gov (United States)

    Greene, Maxine

    1993-01-01

    Aspects of English-as-a-Second-Language are discussed from the standpoint of a teacher-educator with a particular interest in philosophy, the arts, and humanities and what they signify for the schools. The idea of giving voice to all viewpoints and sociocultural circumstances is considered for content learning and heterogeneous grouping. (Contains…

  8. A voice and nothing more

    DEFF Research Database (Denmark)

    Mebus, Andreas Nozic Lindgren

    2012-01-01

    Andreas Mebus fokuserer herefter på et helt konkret aspekt af talen, nemlig ”stemmen” i sin artikel ”A voice and nothing more – en filosofisk udredning af stemmen”. Gennem Mladen Dolars teori om stemmen, redegør Mebus for de forskellige aspekter ved stemmen; som bærer af mening, som æstetisk...

  9. Voice, Citizenship, and Civic Action

    DEFF Research Database (Denmark)

    Tufte, Thomas

    2014-01-01

    In recent years the world has experienced a resurgence in practices of bottom-up communication for social change, a plethora of agency in which claims for voice and citizenship through massive civic action have conquered center stage in the public debate. This resurgence has sparked a series...

  10. FILTWAM and Voice Emotion Recognition

    NARCIS (Netherlands)

    Bahreini, Kiavash; Nadolski, Rob; Westera, Wim

    2014-01-01

    This paper introduces the voice emotion recognition part of our framework for improving learning through webcams and microphones (FILTWAM). This framework enables multimodal emotion recognition of learners during game-based learning. The main goal of this study is to validate the use of microphone d

  11. The Performing Voice of Radio

    DEFF Research Database (Denmark)

    Lawaetz, Anna

    The ongoing international development of opening media archives for researchers as well as for broader audiences calls for a closer discussion of the mediated voice and how to analyse it. Which parameters can be analysed and which parameters are not covered by the analysis? Furthermore, how do we...

  12. Voice and choice by delegation

    NARCIS (Netherlands)

    van de Bovenkamp, H.; Vollaard, H.; Trappenburg, M.; Grit, K

    2013-01-01

    In many Western countries, options for citizens to influence public services are increased to improve the quality of services and democratize decision making. Possibilities to influence are often cast into Albert Hirschman's taxonomy of exit (choice), voice, and loyalty. In this article we identify

  13. Work-related voice disorder

    Directory of Open Access Journals (Sweden)

    Paulo Eduardo Przysiezny

    2015-04-01

    Full Text Available INTRODUCTION: Dysphonia is the main symptom of the disorders of oral communication. However, voice disorders also present with other symptoms such as difficulty in maintaining the voice (asthenia, vocal fatigue, variation in habitual vocal fundamental frequency, hoarseness, lack of vocal volume and projection, loss of vocal efficiency, and weakness when speaking. There are several proposals for the etiologic classification of dysphonia: functional, organofunctional, organic, and work-related voice disorder (WRVD.OBJECTIVE: To conduct a literature review on WRVD and on the current Brazilian labor legislation.METHODS: This was a review article with bibliographical research conducted on the PubMed and Bireme databases, using the terms "work-related voice disorder", "occupational dysphonia", "dysphonia and labor legislation", and a review of labor and social security relevant laws.CONCLUSION: WRVD is a situation that frequently is listed as a reason for work absenteeism, functional rehabilitation, or for prolonged absence from work. Currently, forensic physicians have no comparative parameters to help with the analysis of vocal disorders. In certain situations WRVD may cause, work disability. This disorder may be labor-related, or be an adjuvant factor to work-related diseases.

  14. The Performing Voice of Radio

    DEFF Research Database (Denmark)

    Lawaetz, Anna

    The ongoing international development of opening media archives for researchers as well as for broader audiences calls for a closer discussion of the mediated voice and how to analyse it. Which parameters can be analysed and which parameters are not covered by the analysis? Furthermore, how do we...

  15. Adolescent Leadership: The Female Voice

    Science.gov (United States)

    Archard, Nicole

    2013-01-01

    This research investigated the female adolescent view of leadership by giving voice to student leaders through focus group discussions. The questions: What is leadership? Where/how was leadership taught?, and How was leadership practised? were explored within the context of girls' schools located in Australia, with one school located in South…

  16. FILTWAM and Voice Emotion Recognition

    NARCIS (Netherlands)

    Bahreini, Kiavash; Nadolski, Rob; Westera, Wim

    2014-01-01

    This paper introduces the voice emotion recognition part of our framework for improving learning through webcams and microphones (FILTWAM). This framework enables multimodal emotion recognition of learners during game-based learning. The main goal of this study is to validate the use of microphone

  17. Voicing children's critique and utopias

    DEFF Research Database (Denmark)

    Husted, Mia; Lind, Unni

    2016-01-01

    , designed to accommodate children's participation through graphic illustrations of young children's critique and utopias. The study is informed by a commitment to democratic participation and processes (Reason and Bradbury 2001, Gunnarsson et al. 2016). Ethical guidelines implied dialogues and discussions......, children's voice, critique and utopias, pedagogical work...

  18. Women's Voices in Experiential Education.

    Science.gov (United States)

    Warren, Karen, Ed.

    This book is a collection of feminist analyses of various topics in experiential education, particularly as it applies to outdoors and adventure education, as well as practical examples of how women's experiences can contribute to the field as a whole. Following an introduction, "The Quilt of Women's Voices" (Maya Angelou), the 25…

  19. Temporal voice areas exist in autism spectrum disorder but are dysfunctional for voice identity recognition

    Science.gov (United States)

    Borowiak, Kamila; von Kriegstein, Katharina

    2016-01-01

    The ability to recognise the identity of others is a key requirement for successful communication. Brain regions that respond selectively to voices exist in humans from early infancy on. Currently, it is unclear whether dysfunction of these voice-sensitive regions can explain voice identity recognition impairments. Here, we used two independent functional magnetic resonance imaging studies to investigate voice processing in a population that has been reported to have no voice-sensitive regions: autism spectrum disorder (ASD). Our results refute the earlier report that individuals with ASD have no responses in voice-sensitive regions: Passive listening to vocal, compared to non-vocal, sounds elicited typical responses in voice-sensitive regions in the high-functioning ASD group and controls. In contrast, the ASD group had a dysfunction in voice-sensitive regions during voice identity but not speech recognition in the right posterior superior temporal sulcus/gyrus (STS/STG)—a region implicated in processing complex spectrotemporal voice features and unfamiliar voices. The right anterior STS/STG correlated with voice identity recognition performance in controls but not in the ASD group. The findings suggest that right STS/STG dysfunction is critical for explaining voice recognition impairments in high-functioning ASD and show that ASD is not characterised by a general lack of voice-sensitive responses. PMID:27369067

  20. Authentic Voices: Advice for Incorporating American Indians and Alaska Natives in the Elementary School Curriculum.

    Science.gov (United States)

    Rains, Frances V.; Swisher, Karen Gayton

    1999-01-01

    Questions the methods in which schools traditionally teach about American Indians and Alaska Natives. Offers alternatives to help eliminate the stereotypes and misconceptions often found in school curricula. Offers four recommendations to help teachers and teacher educators gain more knowledge about these indigenous peoples. (CMK)

  1. Mean E-Streets Violence beyond the Virtual: Authentic Suffering or Agitprop? Virtual Voices of Kosovo.

    Science.gov (United States)

    Wills, Katherine V.

    This paper elaborates on the rhetorical uses of immigrants' life experiences as expressed through late technology of the Internet. The paper draws readers' attention to stories about refugees in electronic texts from the Kosovo War of 1998. It compares these materials to archival material about a Greek immigrant family from the 1954 "New York…

  2. Toward Authentic Student-Centered Practices: Voices of Alternative School Students

    Science.gov (United States)

    Phillips, Rachel Sophia

    2013-01-01

    This investigation uncovered the conditions of learning, both positive and negative, that students in an alternative school experienced both in and out of the classroom setting. Eleven students at an alternative high school in a large suburban school district in the Pacific Northwest were interviewed using methods of narrative inquiry and…

  3. Authentic Voices: Advice for Incorporating American Indians and Alaska Natives in the Elementary School Curriculum.

    Science.gov (United States)

    Rains, Frances V.; Swisher, Karen Gayton

    1999-01-01

    Questions the methods in which schools traditionally teach about American Indians and Alaska Natives. Offers alternatives to help eliminate the stereotypes and misconceptions often found in school curricula. Offers four recommendations to help teachers and teacher educators gain more knowledge about these indigenous peoples. (CMK)

  4. Authentic moral conflicts and students' moral development

    Institute of Scientific and Technical Information of China (English)

    Fu Wei-li

    2006-01-01

    This research deals with the different psychological processes people undergo when they experience firsthand authentic moral conflicts.It also discusses the value of authentic moral conflicts in students' moral development,and reasons for the ineffectiveness of moral education in China.The main reason for the unsatisfactory effects of moral education in China over a period of time lies in the predominance of virtual moral education.In authentic situations,the proper arrangement of moral conflicts requires careful analysis of values hidden in the prearranged or generated moral conflicts so as to utilize,guide,and control them properly.Such arrangement of moral conflicts should be adapted to students' life experience for deepening their understanding of the moral aspects of life.Also,special attention should be attached to students' varied requirements,thus leaving enough options and space for their independent participation in activities of moral education.

  5. Enhanced Authentication Mechanism Using Multilevel Security Model

    Directory of Open Access Journals (Sweden)

    Abdulameer Hussain

    2009-06-01

    Full Text Available This paper presents a proposed multilevel authentication method which is implemented especially in sensitive applications where they contain multilevel secure and confidential data. The proposed method divides the system into multiple sensitive levels and tests users against different authentication methods for each level. Most levels are subdivided further into secure sublevels. Each sublevel contains its own privileges and data types which are managed by an Identity Manager (IM whose responsibility is to transit users to other higher sublevels. The transition’s decision is done by assigning different weights to each authentication method .After a series of tests, the IM must generate a status report describing the results and the decision made to each user’s activity. This technique permits granting only the required privileges for a selected group of users and limits the configuration functions of those that users in a particular user group can perform.

  6. Authenticating Tripartite Key Agreement Protocol with Pairings

    Institute of Scientific and Technical Information of China (English)

    Sheng-Li Liu; Fang-Guo Zhang; Ke-Fei Chen

    2004-01-01

    In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special signature scheme, so that messages carrying the information of two ephemeral keys can be broadcasted authentically by an entity. Consequently, one instance of the protocol results in eight session keys for three entities. In other word, one instance of the protocol generates a session key, which is eight times longer than those obtained from traditional key agreement protocols. Security attributes of the protocol are presented, and the computational overhead and bandwidth of the broadcast messages are analyzed as well.

  7. Approximate Public Key Authentication with Information Hiding

    Energy Technology Data Exchange (ETDEWEB)

    THOMAS,EDWARD V.; DRAELOS,TIMOTHY J.

    2000-10-01

    This paper describes a solution for the problem of authenticating the shapes of statistically variant gamma spectra while simultaneously concealing the shapes and magnitudes of the sensitive spectra. The shape of a spectrum is given by the relative magnitudes and positions of the individual spectral elements. Class-specific linear orthonormal transformations of the measured spectra are used to produce output that meet both the authentication and concealment requirements. For purposes of concealment, the n-dimensional gamma spectra are transformed into n-dimensional output spectra that are effectively indistinguishable from Gaussian white noise (independent of the class). In addition, the proposed transformations are such that statistical authentication metrics computed on the transformed spectra are identical to those computed on the original spectra.

  8. A lightweight authentication scheme with user untraceability

    Institute of Scientific and Technical Information of China (English)

    Kuo-Hui YEH

    2015-01-01

    With the rapid growth of electronic commerce and associated demands on variants of Internet based applications, application systems providing network resources and business services are in high demand around the world. To guarantee ro-bust security and computational efficiency for service retrieval, a variety of authentication schemes have been proposed. How-ever, most of these schemes have been found to be lacking when subject to a formal security analysis. Recently, Changet al. (2014) introduced a formally provable secure authentication protocol with the property of user-untraceability. Unfortunately, based on our analysis, the proposed scheme fails to provide the property of user-untraceability as claimed, and is insecure against user impersonation attack, server counterfeit attack, and man-in-the-middle attack. In this paper, we demonstrate the details of these malicious attacks. A security enhanced authentication scheme is proposed to eliminate all identified weaknesses.

  9. CRYPTOGRAPHIC PROTOCOL DEPENDING ON BIOMETRIC AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    SANJUKTA PAL

    2013-02-01

    Full Text Available In modern age, security is the most challenging issue for using the secure data used by computer. This cryptographic protocol on biometric authentication is nothing but the combination of cryptography and biometric authentication. Here the same idea of cryptography is working (i.e. using key, conversion of plain textinto cipher text called encryption and the reverse, means cipher text to plain text called decryption. Here the most promising method fingerprint geometry of biometric authentication is used as the key for encryption and decryption. Here this cryptographic protocol is just an algorithm for matching the key means matching of stored fingerprint images say DB Images with further given fingerprint image say Final Image. For matching purpose we used binary conversion of images. This algorithm is suitable for any type of data (means text data, multimedia data etc.

  10. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  11. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Directory of Open Access Journals (Sweden)

    Alexandra Rivero-García

    2017-03-01

    Full Text Available A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  12. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  13. Smart-card-loss-attack and Improvement of Hsiang et al.’s Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Y. C. Lee

    2013-08-01

    Full Text Available Due to the open environment, all network systems suffer from various security threats. The remote user authentication scheme is a secure mechanism to allow users obtaining a variety of information services through insecure channels. For efficiency and security, many remote user authentication schemes identify users with smart cards. However, many smart card based schemes are vulnerable to lots of attacks. Recently, Hsiang et al. proposed a smart card based remote authentication scheme. In this article, we show that their scheme is vulnerable to the smart-card-loss-attack. That is, if an unauthorized person obtains the smart card, he/she can guess the correct password to masquerade as a legitimate user to login the system. The attack is caused by the smart card outputs fixed message for the same inputs. We propose an improved scheme to fix the flaw. The improved scheme withstands the off-line password guessing attack, parallel session attack and smart-card-loss-attack. Moreover, it also has the merits of providing mutual authentication, no verification table and users can freely update their passwords.

  14. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiuhua Wang

    2017-02-01

    Full Text Available Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  15. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Qiuhua

    2017-02-04

    Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  16. Facelock: familiarity-based graphical authentication

    Directory of Open Access Journals (Sweden)

    Rob Jenkins

    2014-06-01

    Full Text Available Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised ‘facelock’, in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate, even after a one-year delay (86.1% success rate. Zero-acquaintance attackers were reduced to guessing (<1% success rate. Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate. In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate. Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.

  17. Android Based Total Security for System Authentication

    Directory of Open Access Journals (Sweden)

    Mithil Vasani

    2015-04-01

    Full Text Available In this Paper [5], A highly severe menace to any computing device is the impersonation of an authenticate user. The most frequent computer authentication scheme is to use alphanumerical usernames and passwords. But the textual passwords are prone to dictionary attacks, eves dropping, shoulder surfing and social engineering. As such, graphical passwords have been introduced as an alternative to the traditional authentication process. Though the graphical password schemes provide a way of making more user friendly passwords, while increasing the level of security, they are vulnerable to shoulder surfing. To address this problem, text can be used in combination with the colors and images to generate the session passwords, thereby making a stronger authentication means. In general, session passwords are those that can be used only once and for every new session, a new password is engendered. This paper [7] describes a method of implementing two factor authentication using mobile phones. The proposed method guarantees that authenticating to services, such as online banking or ATM machines, is done in a very secure manner. The proposed system involves using a mobile phone as a software token for One Time Password generation. The generated One Time Password is valid for only a short user defined period of time and is generated by factors that are unique to both, the user and the mobile device itself. Additionally, an SMS-based mechanism is implemented as both a backup mechanism for retrieving the password and as a possible mean of synchronization. The proposed method has been implemented and tested. Initial results show the success of the proposed method.

  18. Designing authentic assessment: strategies for nurse educators.

    Science.gov (United States)

    Poindexter, Kathleen; Hagler, Debra; Lindell, Deborah

    2015-01-01

    Increased emphasis on health care safety requires renewed attention to teaching and learning processes for future health care professionals. When presented with problems situated in a clinical context, learners have rich opportunities to demonstrate integration of concepts. Authentic assessment is an approach to evaluation of learning through which students can demonstrate acquired knowledge, skills, and attitudes in the context of real-world or realistic nursing practice activities. This article describes features, approaches, and examples of authentic assessment processes in the context of classroom, clinical, and online nursing education.

  19. Multimedia encryption and authentication techniques and applications

    CERN Document Server

    Furht, Borko

    2006-01-01

    Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for thos

  20. Biometrics Identity Authentication in Secure Electronic Transactions

    Directory of Open Access Journals (Sweden)

    Deepu Saini

    2012-06-01

    Full Text Available There are so many ways by which a person can be identified, but authentication of a person by biometric methods is assumed to be more secure. There are many reasons behind this e.g. in this world each person is having different biometric features, even thetwins in this world having different biometrics features. In electronic transactions, biometric method is used from very early days but now a day’s it is supposed to be the best and secure method for electronic transactions. In this paper the concepts regarding biometric identity authentication are explained.

  1. Fingerprint Recognition on Various Authentication Sensors

    Institute of Scientific and Technical Information of China (English)

    A.Tirupathi Rao; N.Pattabhi Ramaiah; C.Krishna Mohan

    2014-01-01

    Fingerprint is a very popular and an ancient biometric technology to uniquely identify a person. In this paper, a fingerprint matcher is proposed which uses the global and local adaptive binarization and global minutia features. The fingerprint data is collected using three different authentication devices based on optical sensors. The experimental results are compared with the National Institute of Standards and Technology (NIST) Bozorth algorithm and various authentication fingerprint sensors. The accuracy of the proposed algorithm has been improved significantly compared with that of the NIST Bozorth algorithm.

  2. ANALYSIS OF THE PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    Amit Rana

    2012-09-01

    Full Text Available The Internet Engineering Task Force (IETF has proposednew protocols for highly secured wireless networking. Thepurpose of this paper is to implement one such proposedsecurity protocol - PEAP (Protected ExtensibleAuthentication Protocol [1]. PEAP was jointly developedby Microsoft, Cisco and RSA security. The protocolimplementation is done on the server end of a Client/Servernetwork model on a RADIUS server (RemoteAuthentication Dial-in User Service. The proposedprotocol - PEAP provides for Client identity protection andkey generation thus preventing unauthorized user accessand protecting or encrypting the data against maliciousactivities.

  3. Entity Authentication:Analysis using Structured Intuition

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    In this paper, we propose a new method for the analysis that uses intuition of the analyst in a structured way. First we define entity authentication in terms of fine level authentication goals (FLAGs). Then we use some relevant structures in protocol narrations and use them to justify FLAGs...... for the protocol. All along this process, we discover vulnerabilities and unstated assumptions of the protocol. As the method is intuition based, the quality of results depends on the expertise of the security analyst, however, the structured intuition has two major advantages: Firstly we get a precise...

  4. Enhanced ATM Security using Biometric Authentication and Wavelet Based AES

    OpenAIRE

    Sreedharan Ajish

    2016-01-01

    The traditional ATM terminal customer recognition systems rely only on bank cards, passwords and such identity verification methods are not perfect and functions are too single. Biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. This paper presents a highly secured ATM banking system using biometric authentication and wavelet based Advanced Encryption ...

  5. The role of authenticity in electoral social media campaigns

    OpenAIRE

    Grow, Gabrielle; Ward, Janelle

    2013-01-01

    textabstractAuthenticity is a popular buzzword in electoral politics: Electoral candidates and politicians are expected to be authentic in their public interactions. Since 2008, campaigning via social media has become an integral part of elections in the United States, and continues to gain importance. In such an environment, this paper presents research into the role of authenticity in electoral social media campaigns. Using Gilpin, et al.'s (2010) definition of authenticity as the theoretic...

  6. Color Based Authentication Scheme for Publically Disclosable Entities

    Directory of Open Access Journals (Sweden)

    A. S. Syed Shahul Hameed

    2015-01-01

    Full Text Available Traditional password authentication system are not strong enough to cope up with the current age of cybercrime. It’s high time that new password authentication schemes are explored and studied. This paper aims to provide an authentication system based on color recognition which would provide a way to encrypt both the username and password. The Color based authentication system would provide an efficient way to encrypt account details for sensitive applications like defense and banking.

  7. A study of user authentication using mobile phone

    OpenAIRE

    Hallsteinsen, Steffen Gullikstad

    2007-01-01

    The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentication scheme is based on usernames and passwords which are neither secure nor user-friendly. Hence, better solutions for simplified, yet secure authentication, is required in the future. This thesis present an authentication scheme based on a One-Time Password (OTP) MIDlet running on a mobile phone for unified authenti...

  8. Comparing acoustic and perceptual voice parameters in female teachers based on voice complaints

    Directory of Open Access Journals (Sweden)

    Maryam Faghani Abukeili

    2014-04-01

    Full Text Available Background and Aim: Teachers are a large group of professional voice users that several risk factors and voice demands causes various voice complaints among them. As the voice is multidimensional, the aim of this study was acoustic and perceptual measurement of teachers’ voice and comparing the findings between two groups with many and few voice complaints.Methods: Sixty female teachers of high school in Sari, north of Iran, were chosen by available sampling to participate in this cross-sectional study. According to a voice complaints questionnaire, 21 subjects located in few voice complaints and 31 in many voice complaints group. After a working day, subjects completed a voice self-assessment questionnaire. Also, teachers’voice were recorded during three tasks including sustained vowels /a/ and /i/, text reading and conversational speech. Acoustic parameters were analyzed by Praat software and 2 speech-language pathalogists performed auditory-perceptual assessment by GRBAS ( Grade, Roughness, Breathiness, Asthenia, Strain scale. Results: Comparing of the voice self-assessment between the two groups demonstrated statistically significant difference (p<0.05; however results of the acoustic and auditory-perceptual measurement did not show significant diffrence.Conclusion: Despite prevalent voice problems in teachers, there are various conditions in terms of complaints and assessments methods. In this study, only a remarkable deviation documented in the client-based assessments in many voice compliants group in comparison with few voice compliants, which would be probably related to different individual’s perception of voice problem between two groups. These results support paying attention to self-assessments in clinical process of voice problems.

  9. The Role of Occupational Voice Demand and Patient-Rated Impairment in Predicting Voice Therapy Adherence.

    Science.gov (United States)

    Ebersole, Barbara; Soni, Resha S; Moran, Kathleen; Lango, Miriam; Devarajan, Karthik; Jamal, Nausheen

    2017-07-11

    Examine the relationship among the severity of patient-perceived voice impairment, perceptual dysphonia severity, occupational voice demand, and voice therapy adherence. Identify clinical predictors of increased risk for therapy nonadherence. A retrospective cohort study of patients presenting with a chief complaint of persistent dysphonia at an interdisciplinary voice center was done. The Voice Handicap Index-10 (VHI-10) and the Voice-Related Quality of Life (V-RQOL) survey scores, clinician rating of dysphonia severity using the Grade score from the Grade, Roughness Breathiness, Asthenia, and Strain scale, occupational voice demand, and patient demographics were tested for associations with therapy adherence, defined as completion of the treatment plan. Classification and Regression Tree (CART) analysis was performed to establish thresholds for nonadherence risk. Of 166 patients evaluated, 111 were recommended for voice therapy. The therapy nonadherence rate was 56%. Occupational voice demand category, VHI-10, and V-RQOL scores were the only factors significantly correlated with therapy adherence (P occupational voice demand are significantly more likely to be nonadherent with therapy than those with high occupational voice demand (P 40 is a significant cutoff point for predicting therapy nonadherence (P Occupational voice demand and patient perception of impairment are significantly and independently correlated with therapy adherence. A VHI-10 score of ≤9 or a V-RQOL score of >40 is a significant cutoff point for predicting nonadherence risk. Copyright © 2017 The Voice Foundation. Published by Elsevier Inc. All rights reserved.

  10. Meeting EFL Learners Halfway by Using Locally Relevant Authentic Materials

    Science.gov (United States)

    Thomas, Catherine

    2014-01-01

    The author defines and describes authentic materials and discusses their benefits--citing the Input Hypothesis and the Output Principle in support of such materials--as well as some challenges of using authentic materials. Five categories of authentic materials are presented, and sources for materials and ways to use them in the EFL classroom are…

  11. From Lessons to Life: Authentic Materials Bridge the Gap.

    Science.gov (United States)

    Spelleri, Maria

    2002-01-01

    Focuses on the use of authentic materials in teaching English as a Second Language. Issues addressed include students' interest in "real life" materials, the role of the teacher, and how to teach using authentic materials. Sample criteria for selecting authentic materials are included. (Author/VWL)

  12. Authentic Assessment for Student Learning: An Ontological Conceptualisation

    Science.gov (United States)

    Vu, Thuy T.; Dall'Alba, Gloria

    2014-01-01

    Authentic assessment has been proposed as having potential to enhance student learning for a changing world. Conventionally, assessment is seen to be authentic when the tasks are real-to-life or have real-life value. Drawing on Martin Heidegger's work, we challenge this conceptualisation as narrow and limited. We argue that authenticity need…

  13. Teachers' Development Model to Authentic Assessment by Empowerment Evaluation Approach

    Science.gov (United States)

    Charoenchai, Charin; Phuseeorn, Songsak; Phengsawat, Waro

    2015-01-01

    The purposes of this study were 1) Study teachers authentic assessment, teachers comprehension of authentic assessment and teachers needs for authentic assessment development. 2) To create teachers development model. 3) Experiment of teachers development model. 4) Evaluate effectiveness of teachers development model. The research is divided into 4…

  14. Quantum-secure authentication of a physical unclonable key

    NARCIS (Netherlands)

    Goorden, S.A.; Horstmann, M.; Mosk, A.P.; Skoric, B.; Pinkse, P.W.H.

    2014-01-01

    Authentication of persons and objects is a crucial aspect of security. We experimentally demonstrate quantumsecure authentication (QSA) of a classical multiplescattering key. The key is authenticated by illuminating it with a light pulse containing fewer photons than spatial degrees of freedom and v

  15. Toward Developing Authentic Leadership: Team-Based Simulations

    Science.gov (United States)

    Shapira-Lishchinsky, Orly

    2014-01-01

    Although there is a consensus that authentic leadership should be an essential component in educational leadership, no study to date has ever tried to find whether team-based simulations may promote authentic leadership. The purpose of this study was to identify whether principal trainees can develop authentic leadership through ethical decision…

  16. 22 CFR 92.40 - Authentication of foreign extradition papers.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication of foreign extradition papers... RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign extradition papers are authenticated by chiefs of mission....

  17. Robust authentication through stochastic femtosecond laser filament induced scattering surfaces

    Science.gov (United States)

    Zhang, Haisu; Tzortzakis, Stelios

    2016-05-01

    We demonstrate a reliable authentication method by femtosecond laser filament induced scattering surfaces. The stochastic nonlinear laser fabrication nature results in unique authentication robust properties. This work provides a simple and viable solution for practical applications in product authentication, while also opens the way for incorporating such elements in transparent media and coupling those in integrated optical circuits.

  18. Children's and Adolescents' Perception of the Authenticity of Smiles

    Science.gov (United States)

    Thibault, Pascal; Gosselin, Pierre; Brunel, Marie-Lise; Hess, Ursula

    2009-01-01

    Recently, Thibault and colleagues described the Duchenne marker as a cultural dialect for the perception of smile authenticity. The current study had the goal to follow up on this finding and to investigate the cues that French Canadian children use to evaluate the authenticity of smiles from members of three ethnic groups. The authenticity of six…

  19. Claims-Based Authentication for a Web-Based Enterprise

    Science.gov (United States)

    2013-07-01

    Processing Standards Publication. “Entity Authentication Using Public Key Cryptography”, February 18, 1997 b. FIPS 197, Advanced Encryption Standard ( AES ...provided by a trusted entity and can be verified and validated. Of the many authentication protocols, including self-attestation, username/ password ...authentication and Active Entity B retrieving content from a passive entity. Figure 1 Communication between Active Entities III. CREDENTIALING IN THE

  20. Reconciling Divisions in the Field of Authentic Education

    Science.gov (United States)

    Sarid, Ariel

    2015-01-01

    The aim of this article is twofold: first, to identify and address three central divisions in the field of authentic education that introduce ambiguity and at times inconsistencies within the field of authentic education. These divisions concern a) the relationship between autonomy and authenticity; b) the division between the two basic attitudes…

  1. A Research on the Consequences of Authentic Leadership

    OpenAIRE

    Akif Tabak; Mustafa Polat; Serkan Cosar; Tolga Turkoz

    2013-01-01

    The present study examined the relationship between employees' authentic leadership perceptions and three relevant authentic leadership consequences, organizational trust, organizational commitment and organizational cynicism. With 371 employees in a Turkish firm, correlation analysis results showed that authentic leadership perceptions of employees were positively related to organizational trust and organizational commitment, but was negatively related with organizational cynicism. Moreover,...

  2. School Principals' Authentic Leadership and Teachers' Psychological Capital: Teachers' Perspectives

    Science.gov (United States)

    Feng, Feng-I

    2016-01-01

    This study examined teachers' perceptions of principals' authentic leadership and the relationship of authentic leadership to teachers' psychological capital in Taiwan. A total of 1,429 elementary and secondary school teachers were surveyed. The results showed that teachers perceived their principals' authentic leadership as moderate and that the…

  3. On the security flaws in ID-based password authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-01-01

    Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.

  4. Perturbation Measures of Voice: A Comparative Study between Multi-Dimensional Voice Program and Praat

    National Research Council Canada - National Science Library

    Maryn, Youri; Corthals, Paul; De Bodt, Marc; Van Cauwenberge, Paul; Deliyski, Dimitar

    2009-01-01

    .... In the present study, perturbation measures provided by two computer systems (a purpose-built professional voice analysis apparatus and a personal computer-based system for acoustic voice assessment...

  5. [The smokers voice self assessment based on Voice Handicap Index (VHI)].

    Science.gov (United States)

    Wiskirska-Woźnica, Bozena; Wojnowski, Waldemar

    2009-01-01

    Complex voice assessment due to European Laryngeal Society proposals (2000) contains voice self estimation based on the Polish version of the Voice Handicap Index (VHI). This study focuses on the relation between voice handicap and smoking in dysphonic patients, who are using voice professionally. Thirty outpatient (25 female and 5 male, aged 40 to 55 years) voice department attendees suffering from professional dysphonia took part in this study. All patients after phoniatric examination completed the Polish version of the Voice Handicap Index (VHI). The questions concern functional, emotional and physical complains due to dysphonia. Most of smokers did not complain of dysphonia related problems comparing to non smokers. Even the scores of functional and emotional scales of VHI in smokers shown better results (less handicap) than in nonsmokers. Smoking does not affect patients handicap due to dysphonia measured in the Voice Handicap Index.

  6. Analytical strategies to confirm Scotch whisky authenticity. Part II: Mobile brand authentication.

    Science.gov (United States)

    MacKenzie, W M; Aylott, R I

    2004-07-01

    Whilst the authentication of Scotch whisky brands using laboratory based gas chromatography is well established, there is a need for authentication methods for use under field test conditions. The UV/visible absorbance spectra of specific brands of Scotch whisky were found to produce consistent absorbance ranges which allowed the development of a faster, cheaper and more mobile test method. Test samples with spectra outside the acceptable ranges for genuine reference samples were therefore deemed suspect, enabling their authenticity to be later confirmed in the laboratory by GC. This novel application allowed brand authenticity analyses to be undertaken at remote sites where gas chromatography was unavailable and has also allowed the introduction of field testing using a small portable hand held spectrophotometer.

  7. Qos and Voice Over IP

    Directory of Open Access Journals (Sweden)

    Adrian GHENCEA

    Full Text Available As Voice over Internet Protocol (VoIP technology matures, companies are increasingly adopting it to cut costs, improve efficiency and enhance customer service. Using the Internet as an existing network for integrating data and telecom systems through intelligent VoIP, a range of benefits results: lower long distance costs, cost cuts in cabling processes and more flexible telephony management. However, as voice over IP services grow in popularity, major threats arise: this rapid growth leads to traffic congestion, security is jeopardizedand the poor quality of calls affects communication. The objective of this article is to present all the elements that can affect voicequality in a VoIP network and to provide methods for solving them. A detailed analysis to minimize the impact of implementation of QoS will be made, and at the end solutions to management strategies will be proposed.

  8. Effect of Religiosity on Voice.

    Science.gov (United States)

    Hamdan, Abdul-Latif; Khneisser, Gebran; Dowli, Alex; Ziade, Georges; Tamim, Hani

    2017-04-01

    The aim of this study was to examine the relationship between religiosity and phonatory behavior. A total of 186 participants participated in a survey that included four sections: demographic data, extent of religiosity, history of dysphonia, phonatory behavior and laryngeal manipulation, in addition to the Voice Handicap Index (VHI-10). There was no significant association between the prevalence of phonatory symptoms and any of the religiosity questions. There was no significant association between phonatory behavior, history of laryngeal manipulation and any of the religiosity questions. There was also no significant association between the score of the Voice Handicap Index and any of the five religiosity questions. There is no association between religiosity and prevalence of phonatory disturbances, phonotraumatic behavior and/or history of laryngeal manipulation.

  9. Speed Bumps for Authentic Listening Material

    Science.gov (United States)

    Meinardi, Marty

    2009-01-01

    This article investigates whether authentic native speaker (NS) to NS speech can be made available to the learner listener through the use of a novel slow-down tool. Results from various preliminary tests seem to indicate that the use of a slow-down algorithm in many cases, and in particular in samples with a higher speed rate and word count,…

  10. Elemental Scanning Devices Authenticate Works of Art

    Science.gov (United States)

    2013-01-01

    To better detect aluminum compounds, Marshall Space Flight Center partnered with KeyMaster Inc. (later acquired by Madison, Wisconsin-based Bruker AXS Inc.) to develop a vacuum pump system that could be attached to X-ray fluorescence (XRF) scanners. The resulting technology greatly expanded XRF scanner capabilities, and hundreds of museums now use them to authenticate artifacts and works of art.

  11. Community Engagement as Authentic Learning with Reflection

    Science.gov (United States)

    Power, Anne

    2010-01-01

    Authentic learning in teacher education is deeply connected with students' future professional practice. This paper describes coaching and mentoring strands of a unit in the preparation of pre-service teachers and critically evaluates reflections made in terms of Professional Teacher Standards. (Contains 1 table.)

  12. Towards an ethics of authentic practice.

    Science.gov (United States)

    Murray, Stuart J; Holmes, Dave; Perron, Amélie; Rail, Geneviève

    2008-10-01

    This essay asks how we might best elaborate an ethics of authentic practice. Will we be able to agree on a set of shared terms through which ethical practice will be understood? How will we define ethics and the subject's relation to authoritative structures of power and knowledge? We begin by further clarifying our critique of evidence-based medicine (EBM), reflecting on the intimate relation between theory and practice. We challenge the charge that our position amounts to no more than 'subjectivism' and 'antiauthoritarian' theory. We argue that an ethical practice ought to question the authority of EBM without falling into the trap of dogmatic antiauthoritarianism. In this, we take up the work of Hannah Arendt, who offers terms to help understand our difficult political relation to authority in an authentic ethical practice. We continue with a discussion of Michel Foucault's use of 'free speech' or parrhesia, which he adopts from Ancient Greek philosophy. Foucault demonstrates that authentic ethical practice demands that we 'speak truth to power.' We conclude with a consideration of recent biotechnologies, and suggest that these biomedical practices force us to re-evaluate our theoretical understanding of the ethical subject. We believe that we are at a crucial juncture: we must develop an ethics of authentic practice that will be commensurable with new and emergent biomedical subjectivities.

  13. Pathways to Authenticity in Operatic Interpretation

    DEFF Research Database (Denmark)

    Grund, Cynthia M.; Westney, WIlliam

    through physically interactive and expressive warm-up exercises that break down barriers at the start of the session, and through interactive and experimental techniques in response to the performances themselves. On this approach, physicality and interactivity provide pathways to authenticity on the part...

  14. Supporting Authentic Learning Contexts Beyond Classroom Walls

    Science.gov (United States)

    Herrington, Jan; Specht, Marcus; Brickell, Gwyn; Harper, Barry

    At the classroom level, contexts for learning are often limited in the experiential component. Teachers and trainers feel overwhelmed by the difficulty of inventing authentic learning contexts, and creating tasks that truly reflect the way knowledge would be used in the real world (Herrington et al. 2004). However, there are growing numbers of examples of how such authentic learning environments are being used in schools, higher education, and professional development in a variety of contexts and discipline areas, such as in literacy education (Ferry et al. 2006), in physical activity fitness and health (Rice et al. 1999), in Indigenous education (Marshall et al. 2001), in evaluation (Agostinho 2006), in multimedia and ICT (Bennett et al. 2001), in literature (Fitzsimmons 2006), and in business writing (Pennell et al. 1997). Teachers and trainers who subscribe to this approach to learning can be very inventive in developing learner perceptions of authentic contexts, but often financial, situational and time constraints limit the experiential elements of authentic learning settings.

  15. Rugged Practices: Embodying Authenticity in Outdoor Recreation

    Science.gov (United States)

    Senda-Cook, Samantha

    2012-01-01

    When people recreate outdoors, they value the quality of the experience. This study examines rhetorical practices that sustain or undermine perceived authentic outdoor recreation experiences. I conducted a rhetorical analysis of my fieldnotes gathered through participant observation and interview transcripts of online and in-person interviews. I…

  16. Authenticated hash tables

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Papamanthou, Charalampos; Tamassia, Roberto

    2008-01-01

    Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so that the client can save space or achieve load balancing. Authenticating the hash table functionality, i.e., verifying ...

  17. Authentic Scientific Inquiry and School Science

    Science.gov (United States)

    Hume, Anne

    2009-01-01

    Scientific literacy goals feature strongly in the rhetoric of most forward-looking science curricula. Many science educators believe that a key means of attaining these goals is through the engagement of students in "authentic scientific inquiry". For students to experience such learning it is critical that teachers understand and appreciate what…

  18. Disambiguating authenticity: Interpretations of value and appeal

    Science.gov (United States)

    O’Connor, Kieran; Carroll, Glenn R.; Kovács, Balázs

    2017-01-01

    While shaping aesthetic judgment and choice, socially constructed authenticity takes on some very different meanings among observers, consumers, producers and critics. Using a theoretical framework positing four distinct meanings of socially constructed authenticity–type, moral, craft, and idiosyncratic–we aim to document empirically the unique appeal of each type. We develop predictions about the relationships between attributed authenticity and corresponding increases in the value ascribed to it through: (1) consumer value ratings, (2) willingness to pay, and (3) behavioral choice. We report empirical analyses from a research program of three multi-method studies using (1) archival data from voluntary consumer evaluations of restaurants in an online review system, (2) a university-based behavioral lab experiment, and (3) an online survey-based experiment. Evidence is consistent across the studies and suggests that perceptions of four distinct subtypes of socially constructed authenticity generate increased appeal and value even after controlling for option quality. Findings suggest additional directions for research on authenticity. PMID:28650997

  19. Simulation for Authentic Learning in Informal Education

    Science.gov (United States)

    Dupuis, Jason; Ludwig-Palit, DeDee

    2016-01-01

    In 2011, the Museum of Science and Industry in Chicago, Illinois embarked on the creation of a program that allows middle and high school students to explore community health issues using human patient simulation. MedLab was created to engage students in an authentic exploration of medical science, biology, and human anatomy, with a particular…

  20. Biometric Authentication System on Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Qian; Veldhuis, Raymond

    2010-01-01

    We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information fu

  1. Semiotic and semantic implications of "authenticity".

    Science.gov (United States)

    Giannini, A James

    2010-04-01

    The concept of transgenerational authenticity was examined in a Japanese cohort by Ito, et al. Reviewing that study, it was noted the eldest generation was distinguished from succeeding ones as this group grew up under U.S. military occupation. The possibility of resultant semantic and semiotic disruptions was considered.

  2. In Search of Authentic Learning in Kazakhstan

    Science.gov (United States)

    Cua, Francisco Chia; Reames, Stephen A.

    2012-01-01

    The foreign faculty in Kazakhstan faced the challenge of designing a total authentic learning curricula for undergraduate students used to a traditional approach to learning. Students were asked to submit reflective learning journeys at the end of the spring 2011 semester. This study uses their stories as a springboard to explore their perspective…

  3. Using Rose and Compass for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2009-07-09

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

  4. Secure Authentication in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Arjan Durresi

    2008-01-01

    Full Text Available The convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a primary challenge for this new integrated wireless technology. Successful execution of 3G security algorithms can be limited to a specified area by encrypting a user's authentication challenge with spatial data defining his visited WLAN. With limited capacity to determine a user's location only to within a current cell and restrictions on accessing users' location due to privacy, 3G operators must rely on spatial data sent from visited WLANs to implement spatial authentication control. A potential risk is presented to 3G operators since no prior relationship or trust may exist with a WLAN owner. Algorithms to quantify the trust between all parties of 3G-WLAN integrated networks are presented to further secure user authentication. Ad-hoc serving networks and the trust relationships established between mobile users are explored to define stronger algorithms for 3G – WLAN user authentication.

  5. Active Authentication Using Covert Cognitive Interrogation Games

    Science.gov (United States)

    2013-06-01

    cognitive fingerprint detection methods and could be used to help increase the overall accuracy of a system of combined biometric modalities. The technical...Authentication, Game Theory, Cognitive fingerprint detection 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES...contextual analysis or explicit communicative behavior. This approach complements many other cognitive fingerprint detection methods and could be

  6. Capturing Cognitive Processing Time for Active Authentication

    Science.gov (United States)

    2014-02-01

    Description Physical biometrics relies on physical characteristics, such as fingerprints or retinal patterns. The behavioral biometric of keystroke...cognitive fingerprint for continuous authentication. Its effectiveness has been verified through a campus-wide experiment at Iowa State University...typing rhythm (CTR), Support Vector Machine (SVM), Behavioral Biometrics 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF

  7. Smartphone Sensors for Stone Lithography Authentication

    Science.gov (United States)

    Schirripa Spagnolo, Giuseppe; Cozzella, Lorenzo; Papalillo, Donato

    2014-01-01

    Nowadays mobile phones include quality photo and video cameras, access to wireless networks and the internet, GPS assistance and other innovative systems. These facilities open them to innovative uses, other than the classical telephonic communication one. Smartphones are a more sophisticated version of classic mobile phones, which have advanced computing power, memory and connectivity. Because fake lithographs are flooding the art market, in this work, we propose a smartphone as simple, robust and efficient sensor for lithograph authentication. When we buy an artwork object, the seller issues a certificate of authenticity, which contains specific details about the artwork itself. Unscrupulous sellers can duplicate the classic certificates of authenticity, and then use them to “authenticate” non-genuine works of art. In this way, the buyer will have a copy of an original certificate to attest that the “not original artwork” is an original one. A solution for this problem would be to insert a system that links together the certificate and the related specific artwork. To do this it is necessary, for a single artwork, to find unique, unrepeatable, and unchangeable characteristics. In this article we propose an innovative method for the authentication of stone lithographs. We use the color spots distribution captured by means of a smartphone camera as a non-cloneable texture of the specific artworks and an information management system for verifying it in mobility stone lithography. PMID:24811077

  8. Existential Authenticity: A Foundational Value for Counseling.

    Science.gov (United States)

    Miars, Russell D.

    2002-01-01

    The author challenges the view that adopting an existential perspective in counseling is inapplicable or a luxury for most clients. The concept of existential authenticity is presented as an organizing ethic that can bring out the positive side of existentialism in counseling. Specific values and conditions are presented that can be adopted to…

  9. Vocation as the Quest for Authentic Existence.

    Science.gov (United States)

    Homan, Kenneth B.

    1986-01-01

    Examines the concept of vocation and demonstrates that vocation is the organizing, existential principle of the concept of work. Presents a critical examination of Green's (1968) delineation of job and work and asserts that vocation as the quest for authentic existence is the unifying concept that gives grounding to Green's notion of work. (NB)

  10. Handwritten Text Image Authentication using Back Propagation

    CERN Document Server

    Chakravarthy, A S N; Avadhani, P S

    2011-01-01

    Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program is a trusted one. The authentication of information can pose special problems (especially man-in-the-middle attacks), and is often wrapped up with authenticating identity. Literary can involve imitating the style of a famous author. If an original manuscript, typewritten text, or recording is available, then the medium itself (or its packaging - anything from a box to e-mail headers) can help prove or disprove the authenticity of the document. The use of digital images of handwritten historical documents has become more popular in recent years. Volunteers around the world now read thousands of these images as part of their indexing process. Handwritten text images of old documents are sometimes difficult to read or noisy du...

  11. Authenticating the writings of Julius Caesar

    NARCIS (Netherlands)

    Kestemont, Mike; Stover, Justin; Koppel, Moshe; Karsdorp, F.B.; Daelemans, Walter

    2016-01-01

    In this paper, we shed new light on the authenticity of the Corpus Caesarianum, a group of five commentaries describing the campaigns of Julius Caesar (100–44 BC), the founder of the Roman empire. While Caesar himself has authored at least part of these commentaries, the authorship of the rest of th

  12. Authenticating the writings of Julius Caesar

    NARCIS (Netherlands)

    Kestemont, Mike; Stover, Justin; Koppel, Moshe; Karsdorp, F.B.; Daelemans, Walter

    2016-01-01

    In this paper, we shed new light on the authenticity of the Corpus Caesarianum, a group of five commentaries describing the campaigns of Julius Caesar (100–44 BC), the founder of the Roman empire. While Caesar himself has authored at least part of these commentaries, the authorship of the rest of

  13. Two-Factor Cancelable Biometrics Authenticator

    Institute of Scientific and Technical Information of China (English)

    Ying-Han Pang; Andrew T. B. J; David N. C. L

    2007-01-01

    Biometrics-based authentication system offers advantages of providing high reliability and accuracy.However,the contemporary authentication system is impuissance to compromise.If a biometrics data is compromised, it cannot be replaced and rendered unusable.In this paper, a cancelable biometrics-based authenticator is proposed to solve this irrevocability issue.The proposed approach is a two-factor authentication system, which requires both of the random data and facial feature in order to access the system.In this system, tokenized pseudo-random data is coupled with moment-based facial feature via inner product algorithm.The output of the product is then discretized to generate a set of private binary code, coined as 2factor-Hashing code, which is acted as verification key.If this biometrics-based verification key is compromised, a new one can be issued by replacing a different set of random number via token replacement.Then, the compromised one is rendered completely useless.This feature offers an extra protection layer against biometrics fabrication since the verification code is replaceable.Experimental results demonstrate that the proposed system provides zero Equal Error Rate in which there is a clear separation in between the genuine and the imposter distribution populations.

  14. Design and implementation of E-Kanban voice system based on Wifi%基于Wifi的电子看板语音系统设计实现

    Institute of Scientific and Technical Information of China (English)

    赵慧元; 孙鲁; 苏禹; 彭文亮

    2012-01-01

    E-Kanban widely used in Industrial production areas The paper introduce a new type E-Kanban. compared with traditional one , the system Add IC card authentication, video monitoring, voice call functions, among them the voice call enhance the work field management, and voice broadcast is also implementation, it can provide real time voice training. The function consists of two parts-position machine and embedded system, voice is compressed by adpcm and transferred by wifi. Through testing, the voice is clear and no delay.%电子看版广泛的应用到工业生产领域,文中介绍了一种新型基于arm嵌入式的工业电子看板。和传统的电子看板系统相比,增加了刷卡认证、视频监控、语音通话。其中语音通话增强现场的管理,并能实现广播,给现场人员提供实时培训等功能。语音系统包括上位机及嵌入式两部分组成,语音采用adpcm进行压缩并通过wifi传输,通过测试语音输出清晰、没有延迟。

  15. Voice disorders in mucosal leishmaniasis.

    Directory of Open Access Journals (Sweden)

    Ana Cristina Nunes Ruas

    Full Text Available INTRODUCTION: Leishmaniasis is considered as one of the six most important infectious diseases because of its high detection coefficient and ability to produce deformities. In most cases, mucosal leishmaniasis (ML occurs as a consequence of cutaneous leishmaniasis. If left untreated, mucosal lesions can leave sequelae, interfering in the swallowing, breathing, voice and speech processes and requiring rehabilitation. OBJECTIVE: To describe the anatomical characteristics and voice quality of ML patients. MATERIALS AND METHODS: A descriptive transversal study was conducted in a cohort of ML patients treated at the Laboratory for Leishmaniasis Surveillance of the Evandro Chagas National Institute of Infectious Diseases-Fiocruz, between 2010 and 2013. The patients were submitted to otorhinolaryngologic clinical examination by endoscopy of the upper airways and digestive tract and to speech-language assessment through directed anamnesis, auditory perception, phonation times and vocal acoustic analysis. The variables of interest were epidemiologic (sex and age and clinic (lesion location, associated symptoms and voice quality. RESULTS: 26 patients under ML treatment and monitored by speech therapists were studied. 21 (81% were male and five (19% female, with ages ranging from 15 to 78 years (54.5+15.0 years. The lesions were distributed in the following structures 88.5% nasal, 38.5% oral, 34.6% pharyngeal and 19.2% laryngeal, with some patients presenting lesions in more than one anatomic site. The main complaint was nasal obstruction (73.1%, followed by dysphonia (38.5%, odynophagia (30.8% and dysphagia (26.9%. 23 patients (84.6% presented voice quality perturbations. Dysphonia was significantly associated to lesions in the larynx, pharynx and oral cavity. CONCLUSION: We observed that vocal quality perturbations are frequent in patients with mucosal leishmaniasis, even without laryngeal lesions; they are probably associated to disorders of some

  16. WHEEL CHAIR USING VOICE RECOGNITION

    OpenAIRE

    Manish Kumar Yadav*; Rajat Kumar; Santosh Yadav; Ravindra Prajapati; Prof. Kshirsagar

    2016-01-01

    The wide spread prevalence of lost limbs and sensing system is of major concern in present day due to wars, accident, age and health problems. This Omni-directional wheelchair was designed for the less able elderly to move more flexibly in narrow spaces, such as elevators or small aisle. The wheelchair is developed to help disabled patients by using speech recognition system to control the movement of wheelchair in different directions by using voice commands and also the simple movement of t...

  17. English Spoken Language & Voice Quality

    OpenAIRE

    Folsberg, Jens; Nielsen, Charlotte; Brusokaite, Giedre; Beinkamp, Line; Bach Jensen, Niels; Aalbæk Jensen, Sandra

    2013-01-01

    This project investigates the way language and accents are depicted in animated features and how linguistic stereotypes can be used in the process of character construction. In order to look into that, examples from four movies, produced by two studios, have been selected; the American Disney studios being represented by The Lion King (1994) and Up (2009), and the Japanese Studio Ghibli being represented by Ponyo (2008) and Howl's Moving Castle (2004). Voice qualities and specific accents ...

  18. Tracheostomy cannulas and voice prosthesis

    OpenAIRE

    2011-01-01

    Cannulas and voice prostheses are mechanical aids for patients who had to undergo tracheotomy or laryngectomy for different reasons. For better understanding of the function of those artificial devices, first the indications and particularities of the previous surgical intervention are described in the context of this review. Despite the established procedure of percutaneous dilatation tracheotomy e.g. in intensive care units, the application of epithelised tracheostomas has its own position,...

  19. The voice of the voiceless

    Directory of Open Access Journals (Sweden)

    Carlos Morales

    2014-12-01

    Full Text Available Women’s voice, these are stories of a group of women and their partners who lived part of a particular historical period agriculture during the twentieth century, the hacienda. The present work attempts to reflect their everyday life, reinterpreted from nowadays as a reflection of collective memory, in the big farms where they grew by putting in scene their roles in juxtaposition to the roles of male tradition.

  20. What Do You Mean by "Authentic"? A Comparative Review of the Literature on Conceptions of Authenticity in Teaching

    Science.gov (United States)

    Kreber, Carolin; Klampfleitner, Monika; McCune, Velda; Bayne, Sian; Knottenbelt, Miesbeth

    2007-01-01

    "Authenticity in teaching" has been recognized as an important yet under-researched phenomenon. To gain greater insight into the meaning of authenticity in teaching in adult and higher education settings, the authors delved into some of the philosophical and educational literature on authenticity, giving particular attention, but not confining…

  1. Voice congruency facilitates word recognition.

    Directory of Open Access Journals (Sweden)

    Sandra Campeanu

    Full Text Available Behavioral studies of spoken word memory have shown that context congruency facilitates both word and source recognition, though the level at which context exerts its influence remains equivocal. We measured event-related potentials (ERPs while participants performed both types of recognition task with words spoken in four voices. Two voice parameters (i.e., gender and accent varied between speakers, with the possibility that none, one or two of these parameters was congruent between study and test. Results indicated that reinstating the study voice at test facilitated both word and source recognition, compared to similar or no context congruency at test. Behavioral effects were paralleled by two ERP modulations. First, in the word recognition test, the left parietal old/new effect showed a positive deflection reflective of context congruency between study and test words. Namely, the same speaker condition provided the most positive deflection of all correctly identified old words. In the source recognition test, a right frontal positivity was found for the same speaker condition compared to the different speaker conditions, regardless of response success. Taken together, the results of this study suggest that the benefit of context congruency is reflected behaviorally and in ERP modulations traditionally associated with recognition memory.

  2. Voices in (and around the Museum: Introduction

    Directory of Open Access Journals (Sweden)

    Ruth Holt

    2012-08-01

    Full Text Available The voice already plays an important role in contemporary art. This introductory paper summarises a series of four sessions in which speakers explored the place of the voice in the museum context. It became clear that the voice not only offered richness in interpretation of and response to other museum artefacts but was itself an artefact meriting conservation  and interpretation.

  3. Authenticity and integrity of digital mammography images.

    Science.gov (United States)

    Zhou, X Q; Huang, H K; Lou, S L

    2001-08-01

    Data security becomes more and more important in telemammography which uses a public high-speed wide area network connecting the examination site with the mammography expert center. Generally, security is characterized in terms of privacy, authenticity and integrity of digital data. Privacy is a network access issue and is not considered in this paper. We present a method, authenticity and integrity of digital mammography, here which can meet the requirements of authenticity and integrity for mammography image (IM) transmission. The authenticity and integrity for mammography (AIDM) consists of the following four modules. 1) Image preprocessing: To segment breast pixels from background and extract patient information from digital imaging and communication in medicine (DICOM) image header. 2) Image hashing: To compute an image hash value of the mammogram using the MD5 hash algorithm. 3) Data encryption: To produce a digital envelope containing the encrypted image hash value (digital signature) and corresponding patient information. 4) Data embedding: To embed the digital envelope into the image. This is done by replacing the least significant bit of a random pixel of the mammogram by one bit of the digital envelope bit stream and repeating for all bits in the bit stream. Experiments with digital IMs demonstrate the following. 1) In the expert center, only the user who knows the private key can open the digital envelope and read the patient information data and the digital signature of the mammogram transmitted from the examination site. 2) Data integrity can be verified by matching the image hash value decrypted from the digital signature with that computed from the transmitted image. 3) No visual quality degradation is detected in the embedded image compared with the original. Our preliminary results demonstrate that AIDM is an effective method for image authenticity and integrity in telemammography application.

  4. Watermarking-Based Digital Audio Data Authentication

    Directory of Open Access Journals (Sweden)

    Jana Dittmann

    2003-09-01

    Full Text Available Digital watermarking has become an accepted technology for enabling multimedia protection schemes. While most efforts concentrate on user authentication, recently interest in data authentication to ensure data integrity has been increasing. Existing concepts address mainly image data. Depending on the necessary security level and the sensitivity to detect changes in the media, we differentiate between fragile, semifragile, and content-fragile watermarking approaches for media authentication. Furthermore, invertible watermarking schemes exist while each bit change can be recognized by the watermark which can be extracted and the original data can be reproduced for high-security applications. Later approaches can be extended with cryptographic approaches like digital signatures. As we see from the literature, only few audio approaches exist and the audio domain requires additional strategies for time flow protection and resynchronization. To allow different security levels, we have to identify relevant audio features that can be used to determine content manipulations. Furthermore, in the field of invertible schemes, there are a bunch of publications for image and video data but no approaches for digital audio to ensure data authentication for high-security applications. In this paper, we introduce and evaluate two watermarking algorithms for digital audio data, addressing content integrity protection. In our first approach, we discuss possible features for a content-fragile watermarking scheme to allow several postproduction modifications. The second approach is designed for high-security applications to detect each bit change and reconstruct the original audio by introducing an invertible audio watermarking concept. Based on the invertible audio scheme, we combine digital signature schemes and digital watermarking to provide a public verifiable data authentication and a reproduction of the original, protected with a secret key.

  5. Speak Up! But don't strain your voice

    Science.gov (United States)

    ... Disorders Speak Up! But don't strain your voice Past Issues / Fall 2008 Table of Contents For ... Javascript on. A clinical trial at the NIDCD Voice Center gave Sherdina Jones tools to limit voice ...

  6. Familiarity and Voice Representation: From Acoustic-Based Representation to Voice Averages

    Directory of Open Access Journals (Sweden)

    Maureen Fontaine

    2017-07-01

    Full Text Available The ability to recognize an individual from their voice is a widespread ability with a long evolutionary history. Yet, the perceptual representation of familiar voices is ill-defined. In two experiments, we explored the neuropsychological processes involved in the perception of voice identity. We specifically explored the hypothesis that familiar voices (trained-to-familiar (Experiment 1, and famous voices (Experiment 2 are represented as a whole complex pattern, well approximated by the average of multiple utterances produced by a single speaker. In experiment 1, participants learned three voices over several sessions, and performed a three-alternative forced-choice identification task on original voice samples and several “speaker averages,” created by morphing across varying numbers of different vowels (e.g., [a] and [i] produced by the same speaker. In experiment 2, the same participants performed the same task on voice samples produced by familiar speakers. The two experiments showed that for famous voices, but not for trained-to-familiar voices, identification performance increased and response times decreased as a function of the number of utterances in the averages. This study sheds light on the perceptual representation of familiar voices, and demonstrates the power of average in recognizing familiar voices. The speaker average captures the unique characteristics of a speaker, and thus retains the information essential for recognition; it acts as a prototype of the speaker.

  7. Speaking up in groups: a cross-level study of group voice climate and voice.

    Science.gov (United States)

    Morrison, Elizabeth Wolfe; Wheeler-Smith, Sara L; Kamdar, Dishan

    2011-01-01

    Despite a growing body of research on employee voice—defined as the discretionary communication of ideas, suggestions, or opinions intended to improve organizational or unit functioning—the effects of shared or collective-level cognitions have received scant attention. There has also been relatively little research on voice within work groups. Our goal in this study was to address these important gaps by focusing on the effects of group-level beliefs about voice (i.e., group voice climate) on individual voice behavior within work groups. We conducted a cross-level investigation of voice behavior within 42 groups of engineers from a large chemical company. Consistent with our hypotheses, group voice climate was highly predictive of voice and explained variance beyond the effects of individual-level identification and satisfaction, and procedural justice climate. Also consistent with predictions, the effect of identification on voice was stronger in groups with favorable voice climates. These findings provide evidence that voice is shaped not just by individual attitudes and perceptions of the work context, as past research has shown, but also by group-level beliefs. The results also highlight the importance of broadening our conceptual models of voice to include shared cognitions and of conducting additional cross-level research on voice.

  8. Authentication and Authorization in Server Systems for Bio-Informatics

    CERN Document Server

    Madhuri, K Lakshmi

    2010-01-01

    Authentication and authorization are two tightly coupled and interrelated concepts which are used to keep transactions secure and help in protecting confidential information. This paper proposes to evaluate the current techniques used for authentication and authorization also compares them with the best practices and universally accepted authentication and authorization methods. Authentication verifies user identity and provides reusable credentials while authorization services stores information about user access levels. These mechanisms by which a system checks what level of access a particular authenticated user should have to view secure resources is controlled by the system

  9. An Ancient Indian Board Game as a Tool for Authentication

    Directory of Open Access Journals (Sweden)

    Sreelatha Malempati

    2011-08-01

    Full Text Available User authentication is the first phase of information security. Users should remember their passwords and recall them for authentication. Text based passwords is the traditional method for authentication. Short and simple passwords are memorable and usable but not secure. Random and lengthy passwords are secure but not memorable and usable. Graphical password schemes are introduced as alternatives to text based schemes. Few grid based authentication techniques are also proposed. The purpose of this paper is to introduce a tool to enhance the memorability and security of passwords which also provides usability. The most popular ancient Indian board game “Snakes and Ladders” is used as a tool for authentication.

  10. A NEW TWO-WAY AUTHENTICATION AND PRIVACY MECHANISM FOR WLAN SECURITY

    Institute of Scientific and Technical Information of China (English)

    Zheng Qinghua (郑庆华); David Pepyne

    2003-01-01

    Objective Aiming at lots of vulnerabilities in the Wired Equivalent Privacy (WEP) which threats the authentication and confidentiality in wireless communication, a new kind of mutual authentication and privacy mechanism named MWEP(Modified WEP) is proposed. Methods MWEP is based on pseudo random number generator (PRNG) and asymmetric cryptograph approach, it generates a unique session-key like "One-Time Password" for each data frame transmission between any two mobile stations. Results Using this session-key to encrypt the transmission data, not only can it avoid replay attack, but also provide a good secure virtual channel for the sender and receiver. MWEP can be incorporated into IEEE 802.11. Conclusion It shows that the proposed mechanism is effective and practical after comparison with WEP and simulation.

  11. The electrolarynx: voice restoration after total laryngectomy.

    Science.gov (United States)

    Kaye, Rachel; Tang, Christopher G; Sinclair, Catherine F

    2017-01-01

    The ability to speak and communicate with one's voice is a unique human characteristic and is fundamental to many activities of daily living, such as talking on the phone and speaking to loved ones. When the larynx is removed during a total laryngectomy (TL), loss of voice can lead to a devastating decrease in a patient's quality of life, and precipitate significant frustration over their inability to communicate with others effectively. Over the past 50 years there have been many advances in techniques of voice restoration after TL. Currently, there are three main methods of voice restoration: the electrolarynx, esophageal speech, and tracheoesophageal speech through a tracheoesophageal puncture (TEP) with voice prosthesis. Although TEP voice is the current gold standard for vocal rehabilitation, a significant minority of patients cannot use or obtain TEP speech for various reasons. As such, the electrolarynx is a viable and useful alternative for these patients. This article will focus on voice restoration using an electrolarynx with the following objectives: 1) To provide an understanding of the importance of voice restoration after total laryngectomy. 2) To discuss how the electrolarynx may be used to restore voice following total laryngectomy. 3) To outline some of the current electrolarynx devices available, including their mechanism of action and limitations. 4) To compare pros and cons of electrolaryngeal speech to TEP and esophageal speech.

  12. The Performing Voice of the Audiobook

    DEFF Research Database (Denmark)

    Pedersen, Birgitte Stougaard; Have, Iben

    2014-01-01

    will be based on a reception aesthetic and phenomenological approach, the latter as presented by Don Ihde in his book Listening and Voice. Phenomenologies of Sound , and my analytical sketches will be related to theoretical statements concerning the understanding of voice and media (Cavarero, Dolar, La......Belle, Neumark). Finally, the article will discuss the specific artistic combination and our auditory experience of mediated human voices and sculpturally projected faces in an art museum context under the general conditions of the societal panophonia of disembodied and mediated voices, as promoted by Steven...

  13. Methods of Translating the English passive voice

    Institute of Scientific and Technical Information of China (English)

    张李丽

    2009-01-01

    @@ 一、Comparisons between Voices in English and Chinese In English as in many other languages,the passive voice is the form of a transitive verb whose grammatical sabjOct serves as the patient,receiving the action of the verb.The passive voice is typically contrasted with the active voice,which is the form of a transitive verb whose subject serves as the agent,performing the action of the verb.The subject of a verb in the passive voice corresponds to the object of the same verb in the active voice.English's passive voice is periphrastic;that is,it does not have a one-word form.Rather,it is formed using a form of the auxiliary verb be together with a verb's past participle.The passive voice is widely used in English when it is unnecessary,undesirable,or impossible to ilame the agent of an action,or when the passive voice is needed to link the text better.

  14. Prevalence of voice disorders among future teachers.

    Science.gov (United States)

    Simberg, S; Laine, A; Sala, E; Rönnemaa, A M

    2000-06-01

    An epidemiological study was conducted in order to find out the prevalence of voice disorders among students studying to be teachers. Vocal symptoms were inquired of 226 students. Their voices were assessed perceptually by a speech therapist and those who had abnormal voice quality or reported several vocal symptoms were referred to a clinical examination by a laryngologist. The results showed that 20% of this population reported two or more vocal symptoms during the previous year and that 19% had an organic voice disorder. This reinforces the need for clinical evaluation of students with vocal symptoms and more vocal training in the teacher education programs.

  15. Evaluate interference in digital channels

    Science.gov (United States)

    Davarian, F.; Sumida, J.

    1985-01-01

    Any future mobile satellite service (MSS) which is to provide simultaneous mobile communications for a large number of users will have to make very efficient use of the spectrum. As the spectrum available for an MSS is limited, the system's channels should be packed as closely together as possible, with minimum-width guard bands. In addition the employment of frequency reuse schemes is an important factor. Difficulties regarding these solutions are related to the introduction of interference in the link. A balance must be achieved between the competing aims of spectrum conservation and low interference. While the interference phenomenon in narrowband FM voice channels is reasonably well understood, very little effort, however, has been devoted to the problem in digital radios. Attention is given to work, which illuminates the effects of cochannel and adjacent channel interference on digital FM (FSK) radios.

  16. Design of a MEMS-based retina scanning system for biometric authentication

    Science.gov (United States)

    Woittennek, Franziska; Knobbe, Jens; Pügner, Tino; Schelinski, Uwe; Grüger, Heinrich

    2014-05-01

    There is an increasing need for reliable authentication for a number of applications such as e commerce. Common authentication methods based on ownership (ID card) or knowledge factors (password, PIN) are often prone to manipulations and may therefore be not safe enough. Various inherence factor based methods like fingerprint, retinal pattern or voice identifications are considered more secure. Retina scanning in particular offers both low false rejection rate (FRR) and low false acceptance rate (FAR) with about one in a million. Images of the retina with its characteristic pattern of blood vessels can be made with either a fundus camera or laser scanning methods. The present work describes the optical design of a new compact retina laser scanner which is based on MEMS (Micro Electric Mechanical System) technology. The use of a dual axis micro scanning mirror for laser beam deflection enables a more compact and robust design compared to classical systems. The scanner exhibits a full field of view of 10° which corresponds to an area of 4 mm2 on the retinal surface surrounding the optical disc. The system works in the near infrared and is designed for use under ambient light conditions, which implies a pupil diameter of 1.5 mm. Furthermore it features a long eye relief of 30 mm so that it can be conveniently used by persons wearing glasses. The optical design requirements and the optical performance are discussed in terms of spot diagrams and ray fan plots.

  17. Experimentation Using Short-Term Spectral Features for Secure Mobile Internet Voting Authentication

    Directory of Open Access Journals (Sweden)

    Surendra Thakur

    2015-01-01

    Full Text Available We propose a secure mobile Internet voting architecture based on the Sensus reference architecture and report the experiments carried out using short-term spectral features for realizing the voice biometric based authentication module of the architecture being proposed. The short-term spectral features investigated are Mel-Frequency Cepstral Coefficients (MFCCs, Mel-Frequency Discrete Wavelet Coefficients (MFDWC, Linear Predictive Cepstral Coefficients (LPCC, and Spectral Histogram of Oriented Gradients (SHOGs. The MFCC, MFDWC, and LPCC usually have higher dimensions that oftentimes lead to high computational complexity of the pattern matching algorithms in automatic speaker recognition systems. In this study, higher dimensions of each of the short-term features were reduced to an 81-element feature vector per Speaker using Histogram of Oriented Gradients (HOG algorithm while neural network ensemble was utilized as the pattern matching algorithm. Out of the four short-term spectral features investigated, the LPCC-HOG gave the best statistical results with R statistic of 0.9127 and mean square error of 0.0407. These compact LPCC-HOG features are highly promising for implementing the authentication module of the secure mobile Internet voting architecture we are proposing in this paper.

  18. Speaker-individuality in suprasegmental temporal features: Implications for forensic voice comparison.

    Science.gov (United States)

    Leemann, Adrian; Kolly, Marie-José; Dellwo, Volker

    2014-05-01

    Everyday experience tells us that it is often possible to identify a familiar speaker solely by his/her voice. Such observations reveal that speakers carry individual features in their voices. The present study examines how suprasegmental temporal features contribute to speaker-individuality. Based on data of a homogeneous group of Zurich German speakers, we conducted an experiment that included speaking style variability (spontaneous vs. read speech) and channel variability (high-quality vs. mobile phone-transmitted speech), both of which are characteristic of forensic casework. Speakers demonstrated high between-speaker variability in both read and spontaneous speech, and low within-speaker variability across the two speaking styles. Results further revealed that distortions of the type introduced by mobile telephony had little effect on suprasegmental temporal characteristics. Given this evidence of speaker-individuality, we discuss suprasegmental temporal features' potential for forensic voice comparison.

  19. CPK-based grid authentication: a step forward

    Institute of Scientific and Technical Information of China (English)

    WANG Hai-yan; WANG Ru-chuan

    2007-01-01

    Effective grid authentication plays a critical role in grid security, which has been recognized as a key issue in the designing and extension of grid technologies. At present, public key infrastructure (PKI) has been widely applied for grid authentication, and this article proposes a novel grid authentication mechanism, which is based on combined public key (CPK) employing elliptic curve cryptography (ECC). The designing structure of the new grid authentication mechanism and its implementation procedure are described in details.Property analysis of the new mechanism is also made in comparison with that of the globus security infrastructure (GSI) authentication, which leads to the conclusion that CPK-based grid authentication, may be applied as an optimized approach towards efficient and effective grid authentication.

  20. Examining the relationship between authenticity and self-handicapping.

    Science.gov (United States)

    Akin, Ahmet; Akin, Umran

    2014-12-01

    Self-handicapping includes strategies of externalization in which people excuse failure and internalize success, but which also prevents them from behaving in an authentic way. The goal was to investigate the relation of authenticity with self-handicapping. The study was conducted with 366 university students (176 men, 190 women; M age = 20.2 yr.). Participants completed the Turkish version of the Authenticity Scale and the Self-handicapping Scale. Self-handicapping was correlated positively with two factors of authenticity, accepting external influence and self-alienation, and negatively with the authentic living factor. A multiple regression analysis indicated that self-handicapping was predicted positively by self-alienation and accepting external influence and negatively by authentic living, accounting for 21% of the variance collectively. These results demonstrated the negative association of authenticity with self-handicapping.