Science.gov

Sample records for privacy-preserving context collection

  1. Privacy-Preserving Health Data Collection for Preschool Children

    PubMed Central

    Zhang, Yuan; Ji, Yue

    2013-01-01

    With the development of network technology, more and more data are transmitted over the network and privacy issues have become a research focus. In this paper, we study the privacy in health data collection of preschool children and present a new identity-based encryption protocol for privacy protection. The background of the protocol is as follows. A physical examination for preschool children is needed every year out of consideration for the children's health. After the examination, data are transmitted through the Internet to the education authorities for analysis. In the process of data collection, it is unnecessary for the education authorities to know the identities of the children. Based on this, we designed a privacy-preserving protocol, which delinks the children's identities from the examination data. Thus, the privacy of the children is preserved during data collection. We present the protocol in detail and prove the correctness of the protocol. PMID:24285984

  2. Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme.

    PubMed

    Zhu, Hui; Gao, Lijuan; Li, Hui

    2016-01-01

    With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users' personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users' query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users' queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs. PMID:26840319

  3. Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme

    PubMed Central

    Zhu, Hui; Gao, Lijuan; Li, Hui

    2016-01-01

    With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users’ personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users’ query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users’ queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs. PMID:26840319

  4. Data collection framework for energy efficient privacy preservation in wireless sensor networks having many-to-many structures.

    PubMed

    Bahşi, Hayretdin; Levi, Albert

    2010-01-01

    Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-to-many structures evolved due to the need for conveying collected event information to multiple sinks. Privacy preserved data collection models in the literature do not solve the problems of WSN applications in which network has multiple un-trusted sinks with different level of privacy requirements. This study proposes a data collection framework bases on k-anonymity for preventing record disclosure of collected event information in WSNs. Proposed method takes the anonymity requirements of multiple sinks into consideration by providing different levels of privacy for each destination sink. Attributes, which may identify an event owner, are generalized or encrypted in order to meet the different anonymity requirements of sinks at the same anonymized output. If the same output is formed, it can be multicasted to all sinks. The other trivial solution is to produce different anonymized outputs for each sink and send them to related sinks. Multicasting is an energy efficient data sending alternative for some sensor nodes. Since minimization of energy consumption is an important design criteria for WSNs, multicasting the same event information to multiple sinks reduces the energy consumption of overall network. PMID:22163660

  5. Data Collection Framework for Energy Efficient Privacy Preservation in Wireless Sensor Networks Having Many-to-Many Structures

    PubMed Central

    Bahşi, Hayretdin; Levi, Albert

    2010-01-01

    Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-to-many structures evolved due to the need for conveying collected event information to multiple sinks. Privacy preserved data collection models in the literature do not solve the problems of WSN applications in which network has multiple un-trusted sinks with different level of privacy requirements. This study proposes a data collection framework bases on k-anonymity for preventing record disclosure of collected event information in WSNs. Proposed method takes the anonymity requirements of multiple sinks into consideration by providing different levels of privacy for each destination sink. Attributes, which may identify an event owner, are generalized or encrypted in order to meet the different anonymity requirements of sinks at the same anonymized output. If the same output is formed, it can be multicasted to all sinks. The other trivial solution is to produce different anonymized outputs for each sink and send them to related sinks. Multicasting is an energy efficient data sending alternative for some sensor nodes. Since minimization of energy consumption is an important design criteria for WSNs, multicasting the same event information to multiple sinks reduces the energy consumption of overall network. PMID:22163660

  6. Privacy Preserving Nearest Neighbor Search

    NASA Astrophysics Data System (ADS)

    Shaneck, Mark; Kim, Yongdae; Kumar, Vipin

    Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privacy laws (e.g. HIPAA) or policies. Privacy preserving data mining techniques have been developed to address this issue by providing mechanisms to mine the data while giving certain privacy guarantees. In this chapter we address the issue of privacy preserving nearest neighbor search, which forms the kernel of many data mining applications. To this end, we present a novel algorithm based on secure multiparty computation primitives to compute the nearest neighbors of records in horizontally distributed data. We show how this algorithm can be used in three important data mining algorithms, namely LOF outlier detection, SNN clustering, and kNN classification. We prove the security of these algorithms under the semi-honest adversarial model, and describe methods that can be used to optimize their performance. Keywords: Privacy Preserving Data Mining, Nearest Neighbor Search, Outlier Detection, Clustering, Classification, Secure Multiparty Computation

  7. Target-Based Maintenance of Privacy Preserving Association Rules

    ERIC Educational Resources Information Center

    Ahluwalia, Madhu V.

    2011-01-01

    In the context of association rule mining, the state-of-the-art in privacy preserving data mining provides solutions for categorical and Boolean association rules but not for quantitative association rules. This research fills this gap by describing a method based on discrete wavelet transform (DWT) to protect input data privacy while preserving…

  8. Privacy-Preserving Restricted Boltzmann Machine

    PubMed Central

    Li, Yu

    2014-01-01

    With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model. PMID:25101139

  9. Privacy-preserving restricted boltzmann machine.

    PubMed

    Li, Yu; Zhang, Yuan; Ji, Yue

    2014-01-01

    With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model. PMID:25101139

  10. Privacy preserving RBF kernel support vector machine.

    PubMed

    Li, Haoran; Xiong, Li; Ohno-Machado, Lucila; Jiang, Xiaoqian

    2014-01-01

    Data sharing is challenging but important for healthcare research. Methods for privacy-preserving data dissemination based on the rigorous differential privacy standard have been developed but they did not consider the characteristics of biomedical data and make full use of the available information. This often results in too much noise in the final outputs. We hypothesized that this situation can be alleviated by leveraging a small portion of open-consented data to improve utility without sacrificing privacy. We developed a hybrid privacy-preserving differentially private support vector machine (SVM) model that uses public data and private data together. Our model leverages the RBF kernel and can handle nonlinearly separable cases. Experiments showed that this approach outperforms two baselines: (1) SVMs that only use public data, and (2) differentially private SVMs that are built from private data. Our method demonstrated very close performance metrics compared to nonprivate SVMs trained on the private data. PMID:25013805

  11. Privacy-preserving backpropagation neural network learning.

    PubMed

    Chen, Tingting; Zhong, Sheng

    2009-10-01

    With the development of distributed computing environment , many learning problems now have to deal with distributed input data. To enhance cooperations in learning, it is important to address the privacy concern of each data holder by extending the privacy preservation notion to original learning algorithms. In this paper, we focus on preserving the privacy in an important learning model, multilayer neural networks. We present a privacy-preserving two-party distributed algorithm of backpropagation which allows a neural network to be trained without requiring either party to reveal her data to the other. We provide complete correctness and security analysis of our algorithms. The effectiveness of our algorithms is verified by experiments on various real world data sets. PMID:19709975

  12. Privacy Preserving Publication of Moving Object Data

    NASA Astrophysics Data System (ADS)

    Bonchi, Francesco

    The increasing availability of space-time trajectories left by location-aware devices is expected to enable novel classes of applications where the discovery of consumable, concise, and actionable knowledge is the key step. However, the analysis of mobility data is a critic task by the privacy point of view: in fact, the peculiar nature of location data might enable intrusive inferences in the life of the individuals whose data is analyzed. It is thus important to develop privacy-preserving techniques for the publication and the analysis of mobility data.

  13. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    ERIC Educational Resources Information Center

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  14. Privacy-preserving Kruskal-Wallis test.

    PubMed

    Guo, Suxin; Zhong, Sheng; Zhang, Aidong

    2013-10-01

    Statistical tests are powerful tools for data analysis. Kruskal-Wallis test is a non-parametric statistical test that evaluates whether two or more samples are drawn from the same distribution. It is commonly used in various areas. But sometimes, the use of the method is impeded by privacy issues raised in fields such as biomedical research and clinical data analysis because of the confidential information contained in the data. In this work, we give a privacy-preserving solution for the Kruskal-Wallis test which enables two or more parties to coordinately perform the test on the union of their data without compromising their data privacy. To the best of our knowledge, this is the first work that solves the privacy issues in the use of the Kruskal-Wallis test on distributed data. PMID:23871682

  15. Privacy preserving interactive record linkage (PPIRL)

    PubMed Central

    Kum, Hye-Chung; Krishnamurthy, Ashok; Machanavajjhala, Ashwin; Reiter, Michael K; Ahalt, Stanley

    2014-01-01

    Objective Record linkage to integrate uncoordinated databases is critical in biomedical research using Big Data. Balancing privacy protection against the need for high quality record linkage requires a human–machine hybrid system to safely manage uncertainty in the ever changing streams of chaotic Big Data. Methods In the computer science literature, private record linkage is the most published area. It investigates how to apply a known linkage function safely when linking two tables. However, in practice, the linkage function is rarely known. Thus, there are many data linkage centers whose main role is to be the trusted third party to determine the linkage function manually and link data for research via a master population list for a designated region. Recently, a more flexible computerized third-party linkage platform, Secure Decoupled Linkage (SDLink), has been proposed based on: (1) decoupling data via encryption, (2) obfuscation via chaffing (adding fake data) and universe manipulation; and (3) minimum information disclosure via recoding. Results We synthesize this literature to formalize a new framework for privacy preserving interactive record linkage (PPIRL) with tractable privacy and utility properties and then analyze the literature using this framework. Conclusions Human-based third-party linkage centers for privacy preserving record linkage are the accepted norm internationally. We find that a computer-based third-party platform that can precisely control the information disclosed at the micro level and allow frequent human interaction during the linkage process, is an effective human–machine hybrid system that significantly improves on the linkage center model both in terms of privacy and utility. PMID:24201028

  16. Privacy-preserving matching of similar patients.

    PubMed

    Vatsalan, Dinusha; Christen, Peter

    2016-02-01

    The identification of similar entities represented by records in different databases has drawn considerable attention in many application areas, including in the health domain. One important type of entity matching application that is vital for quality healthcare analytics is the identification of similar patients, known as similar patient matching. A key component of identifying similar records is the calculation of similarity of the values in attributes (fields) between these records. Due to increasing privacy and confidentiality concerns, using the actual attribute values of patient records to identify similar records across different organizations is becoming non-trivial because the attributes in such records often contain highly sensitive information such as personal and medical details of patients. Therefore, the matching needs to be based on masked (encoded) values while being effective and efficient to allow matching of large databases. Bloom filter encoding has widely been used as an efficient masking technique for privacy-preserving matching of string and categorical values. However, no work on Bloom filter-based masking of numerical data, such as integer (e.g. age), floating point (e.g. body mass index), and modulus (numbers wrap around upon reaching a certain value, e.g. date and time), which are commonly required in the health domain, has been presented in the literature. We propose a framework with novel methods for masking numerical data using Bloom filters, thereby facilitating the calculation of similarities between records. We conduct an empirical study on publicly available real-world datasets which shows that our framework provides efficient masking and achieves similar matching accuracy compared to the matching of actual unencoded patient records. PMID:26707453

  17. NES++: number system for encryption based privacy preserving speaker verification

    NASA Astrophysics Data System (ADS)

    Xu, Lei; Feng, Tao; Zhao, Xi; Shi, Weidong

    2014-05-01

    As speech based operation becomes a main hand-free interaction solution between human and mobile devices (i.e., smartphones, Google Glass), privacy preserving speaker verification receives much attention nowadays. Privacy preserving speaker verification can be achieved through many different ways, such as fuzzy vault and encryption. Encryption based solutions are promising as cryptography is based on solid mathematic foundations and the security properties can be easily analyzed in a well established framework. Most current asymmetric encryption schemes work on finite algebraic structures, such as finite group and finite fields. However, the encryption scheme for privacy preserving speaker verification must handle floating point numbers. This gap must be filled to make the overall scheme practical. In this paper, we propose a number system that meets the requirements of both speaker verification and the encryption scheme used in the process. It also supports addition homomorphic property of Pailliers encryption, which is crucial for privacy preserving speaker verification. As asymmetric encryption is expensive, we propose a method of packing several numbers into one plain-text and the computation overhead is greatly reduced. To evaluate the performance of this method, we implement Pailliers encryption scheme over proposed number system and the packing technique. Our findings show that the proposed solution can fulfill the gap between speaker verification and encryption scheme very well, and the packing technique improves the overall performance. Furthermore, our solution is a building block of encryption based privacy preserving speaker verification, the privacy protection and accuracy rate are not affected.

  18. Privacy-preserving microbiome analysis using secure computation

    PubMed Central

    Wagner, Justin; Paulson, Joseph N.; Wang, Xiao; Bhattacharjee, Bobby; Corrada Bravo, Héctor

    2016-01-01

    Motivation: Developing targeted therapeutics and identifying biomarkers relies on large amounts of research participant data. Beyond human DNA, scientists now investigate the DNA of micro-organisms inhabiting the human body. Recent work shows that an individual’s collection of microbial DNA consistently identifies that person and could be used to link a real-world identity to a sensitive attribute in a research dataset. Unfortunately, the current suite of DNA-specific privacy-preserving analysis tools does not meet the requirements for microbiome sequencing studies. Results: To address privacy concerns around microbiome sequencing, we implement metagenomic analyses using secure computation. Our implementation allows comparative analysis over combined data without revealing the feature counts for any individual sample. We focus on three analyses and perform an evaluation on datasets currently used by the microbiome research community. We use our implementation to simulate sharing data between four policy-domains. Additionally, we describe an application of our implementation for patients to combine data that allows drug developers to query against and compensate patients for the analysis. Availability and implementation: The software is freely available for download at: http://cbcb.umd.edu/∼hcorrada/projects/secureseq.html Supplementary information: Supplementary data are available at Bioinformatics online. Contact: hcorrada@umiacs.umd.edu PMID:26873931

  19. A Robust Conditional Privacy-Preserving Authentication Protocol in VANET

    NASA Astrophysics Data System (ADS)

    Jung, Chae Duk; Sur, Chul; Park, Youngho; Rhee, Kyung-Hyune

    Recently, Lu et al. proposed an efficient conditional privacy preservation protocol, named ECPP, based on group signature scheme for secure vehicular communications. However, ECPP dose not provide unlinkability and traceability when multiple RSUs are compromised. In this paper, we make up for the limitations and propose a robust conditional privacy-preserving authentication protocol without loss of efficiency as compared with ECPP. Furthermore, in our protocol, RSUs can issue multiple anonymous certificates to an OBU to alleviate system overheads for validity check of RSUs. In order to achieve these goals, we consider a universal re-encryption scheme as our building block.

  20. A Secure and Privacy-Preserving Targeted Ad-System

    NASA Astrophysics Data System (ADS)

    Androulaki, Elli; Bellovin, Steven M.

    Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods violate consumers' privacy, which has engendered resistance to the ads. However, protecting privacy through anonymity seems to encourage click-fraud. In this paper, we define consumer's privacy and present a privacy-preserving, targeted ad system (PPOAd) which is resistant towards click fraud. Our scheme is structured to provide financial incentives to all entities involved.

  1. Quantifying the Correctness, Computational Complexity, and Security of Privacy-Preserving String Comparators for Record Linkage

    PubMed Central

    Durham, Elizabeth; Xue, Yuan; Kantarcioglu, Murat; Malin, Bradley

    2011-01-01

    Record linkage is the task of identifying records from disparate data sources that refer to the same entity. It is an integral component of data processing in distributed settings, where the integration of information from multiple sources can prevent duplication and enrich overall data quality, thus enabling more detailed and correct analysis. Privacy-preserving record linkage (PPRL) is a variant of the task in which data owners wish to perform linkage without revealing identifiers associated with the records. This task is desirable in various domains, including healthcare, where it may not be possible to reveal patient identity due to confidentiality requirements, and in business, where it could be disadvantageous to divulge customers' identities. To perform PPRL, it is necessary to apply string comparators that function in the privacy-preserving space. A number of privacy-preserving string comparators (PPSCs) have been proposed, but little research has compared them in the context of a real record linkage application. This paper performs a principled and comprehensive evaluation of six PPSCs in terms of three key properties: 1) correctness of record linkage predictions, 2) computational complexity, and 3) security. We utilize a real publicly-available dataset, derived from the North Carolina voter registration database, to evaluate the tradeoffs between the aforementioned properties. Among our results, we find that PPSCs that partition, encode, and compare strings yield highly accurate record linkage results. However, as a tradeoff, we observe that such PPSCs are less secure than those that map and compare strings in a reduced dimensional space. PMID:22904698

  2. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  3. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.

    PubMed

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  4. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    PubMed Central

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  5. Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey

    PubMed Central

    Bista, Rabindra; Chang, Jae-Woo

    2010-01-01

    Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs. PMID:22399893

  6. A comprehensive review on privacy preserving data mining.

    PubMed

    Aldeen, Yousra Abdul Alsahib S; Salleh, Mazleena; Razzaque, Mohammad Abdur

    2015-01-01

    Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publishing. Ever-escalating internet phishing posed severe threat on widespread propagation of sensitive information over the web. Conversely, the dubious feelings and contentions mediated unwillingness of various information providers towards the reliability protection of data from disclosure often results utter rejection in data sharing or incorrect information sharing. This article provides a panoramic overview on new perspective and systematic interpretation of a list published literatures via their meticulous organization in subcategories. The fundamental notions of the existing privacy preserving data mining methods, their merits, and shortcomings are presented. The current privacy preserving data mining techniques are classified based on distortion, association rule, hide association rule, taxonomy, clustering, associative classification, outsourced data mining, distributed, and k-anonymity, where their notable advantages and disadvantages are emphasized. This careful scrutiny reveals the past development, present research challenges, future trends, the gaps and weaknesses. Further significant enhancements for more robust privacy protection and preservation are affirmed to be mandatory. PMID:26587362

  7. A community assessment of privacy preserving techniques for human genomes

    PubMed Central

    2014-01-01

    To answer the need for the rigorous protection of biomedical data, we organized the Critical Assessment of Data Privacy and Protection initiative as a community effort to evaluate privacy-preserving dissemination techniques for biomedical data. We focused on the challenge of sharing aggregate human genomic data (e.g., allele frequencies) in a way that preserves the privacy of the data donors, without undermining the utility of genome-wide association studies (GWAS) or impeding their dissemination. Specifically, we designed two problems for disseminating the raw data and the analysis outcome, respectively, based on publicly available data from HapMap and from the Personal Genome Project. A total of six teams participated in the challenges. The final results were presented at a workshop of the iDASH (integrating Data for Analysis, 'anonymization,' and SHaring) National Center for Biomedical Computing. We report the results of the challenge and our findings about the current genome privacy protection techniques. PMID:25521230

  8. Privacy Preserving Facial and Fingerprint Multi-biometric Authentication

    NASA Astrophysics Data System (ADS)

    Anzaku, Esla Timothy; Sohn, Hosik; Ro, Yong Man

    The cases of identity theft can be mitigated by the adoption of secure authentication methods. Biohashing and its variants, which utilizes secret keys and biometrics, are promising methods for secure authentication; however, their shortcoming is the degraded performance under the assumption that secret keys are compromised. In this paper, we extend the concept of Biohashing to multi-biometrics - facial and fingerprint traits. We chose these traits because they are widely used, howbeit, little research attention has been given to designing privacy preserving multi-biometric systems using them. Instead of just using a single modality (facial or fingerprint), we presented a framework for using both modalities. The improved performance of the proposed method, using face and fingerprint, as against either facial or fingerprint trait used in isolation is evaluated using two chimerical bimodal databases formed from publicly available facial and fingerprint databases.

  9. Privacy-Preserving Evaluation of Generalization Error and Its Application to Model and Attribute Selection

    NASA Astrophysics Data System (ADS)

    Sakuma, Jun; Wright, Rebecca N.

    Privacy-preserving classification is the task of learning or training a classifier on the union of privately distributed datasets without sharing the datasets. The emphasis of existing studies in privacy-preserving classification has primarily been put on the design of privacy-preserving versions of particular data mining algorithms, However, in classification problems, preprocessing and postprocessing— such as model selection or attribute selection—play a prominent role in achieving higher classification accuracy. In this paper, we show generalization error of classifiers in privacy-preserving classification can be securely evaluated without sharing prediction results. Our main technical contribution is a new generalized Hamming distance protocol that is universally applicable to preprocessing and postprocessing of various privacy-preserving classification problems, such as model selection in support vector machine and attribute selection in naive Bayes classification.

  10. Digression and Value Concatenation to Enable Privacy-Preserving Regression

    PubMed Central

    Li, Xiao-Bai; Sarkar, Sumit

    2015-01-01

    Regression techniques can be used not only for legitimate data analysis, but also to infer private information about individuals. In this paper, we demonstrate that regression trees, a popular data-analysis and data-mining technique, can be used to effectively reveal individuals’ sensitive data. This problem, which we call a “regression attack,” has not been addressed in the data privacy literature, and existing privacy-preserving techniques are not appropriate in coping with this problem. We propose a new approach to counter regression attacks. To protect against privacy disclosure, our approach introduces a novel measure, called digression, which assesses the sensitive value disclosure risk in the process of building a regression tree model. Specifically, we develop an algorithm that uses the measure for pruning the tree to limit disclosure of sensitive data. We also propose a dynamic value-concatenation method for anonymizing data, which better preserves data utility than a user-defined generalization scheme commonly used in existing approaches. Our approach can be used for anonymizing both numeric and categorical data. An experimental study is conducted using real-world financial, economic and healthcare data. The results of the experiments demonstrate that the proposed approach is very effective in protecting data privacy while preserving data quality for research and analysis. PMID:26752802

  11. Privacy-preserving GWAS analysis on federated genomic datasets

    PubMed Central

    2015-01-01

    Background The biomedical community benefits from the increasing availability of genomic data to support meaningful scientific research, e.g., Genome-Wide Association Studies (GWAS). However, high quality GWAS usually requires a large amount of samples, which can grow beyond the capability of a single institution. Federated genomic data analysis holds the promise of enabling cross-institution collaboration for effective GWAS, but it raises concerns about patient privacy and medical information confidentiality (as data are being exchanged across institutional boundaries), which becomes an inhibiting factor for the practical use. Methods We present a privacy-preserving GWAS framework on federated genomic datasets. Our method is to layer the GWAS computations on top of secure multi-party computation (MPC) systems. This approach allows two parties in a distributed system to mutually perform secure GWAS computations, but without exposing their private data outside. Results We demonstrate our technique by implementing a framework for minor allele frequency counting and χ2 statistics calculation, one of typical computations used in GWAS. For efficient prototyping, we use a state-of-the-art MPC framework, i.e., Portable Circuit Format (PCF) [1]. Our experimental results show promise in realizing both efficient and secure cross-institution GWAS computations. PMID:26733045

  12. DPSynthesizer: Differentially Private Data Synthesizer for Privacy Preserving Data Sharing

    PubMed Central

    Li, Haoran; Xiong, Li; Zhang, Lifan; Jiang, Xiaoqian

    2015-01-01

    Differential privacy has recently emerged in private statistical data release as one of the strongest privacy guarantees. Releasing synthetic data that mimic original data with Differential privacy provides a promising way for privacy preserving data sharing and analytics while providing a rigorous privacy guarantee. However, to this date there is no open-source tools that allow users to generate differentially private synthetic data, in particular, for high dimensional and large domain data. Most of the existing techniques that generate differentially private histograms or synthetic data only work well for single dimensional or low-dimensional histograms. They become problematic for high dimensional and large domain data due to increased perturbation error and computation complexity. We propose DPSynthesizer, a toolkit for differentially private data synthesization. The core of DPSynthesizer is DPCopula designed for high-dimensional and large-domain data. DPCopula computes a differentially private copula function from which synthetic data can be sampled. Copula functions are used to describe the dependence between multivariate random vectors and allow us to build the multivariate joint distribution using one-dimensional marginal distributions. DPSynthesizer also implements a set of state-of-the-art methods for building differentially private histograms, suitable for low-dimensional data, from which synthetic data can be generated. We will demonstrate the system using DPCopula as well as other methods with various data sets and show the feasibility, utility, and efficiency of various methods. PMID:26167358

  13. Enabling Privacy-Preserving GWASs in Heterogeneous Human Populations.

    PubMed

    Simmons, Sean; Sahinalp, Cenk; Berger, Bonnie

    2016-07-01

    The proliferation of large genomic databases offers the potential to perform increasingly larger-scale genome-wide association studies (GWASs). Due to privacy concerns, however, access to these data is limited, greatly reducing their usefulness for research. Here, we introduce a computational framework for performing GWASs that adapts principles of differential privacy-a cryptographic theory that facilitates secure analysis of sensitive data-to both protect private phenotype information (e.g., disease status) and correct for population stratification. This framework enables us to produce privacy-preserving GWAS results based on EIGENSTRAT and linear mixed model (LMM)-based statistics, both of which correct for population stratification. We test our differentially private statistics, PrivSTRAT and PrivLMM, on simulated and real GWAS datasets and find they are able to protect privacy while returning meaningful results. Our framework can be used to securely query private genomic datasets to discover which specific genomic alterations may be associated with a disease, thus increasing the availability of these valuable datasets. PMID:27453444

  14. Infrastructure Aided Privacy Preserving-Authentication in VANETs

    NASA Astrophysics Data System (ADS)

    Chaurasia, Brijesh Kumar; Verma, Shekhar; Tomar, G. S.

    The paper presents a privacy preserving authentication protocol for vehicles in a VANET. The authentication process involves authentication of the vehicle and the corresponding RSU by a fixed infrastructure (CTA). Every RSU has a public key infrastructure and continuously broadcasts public key. The vehicle encrypts its identity, RSU Id and timestamp using its symmetric key. The encrypted bits along with the pseudonym of vehicle and timestamp are again encrypted by the public key of RSU and send to the RSU. RSU forwards the encrypted part to the CTA. CTA sends its verification to the RSU. The verification of the vehicle is encrypted by the vehicle symmetric key and sends along with authentication of the vehicle to the RSU. The encrypted portion is forwarded to the vehicle which confirms the authentication of the RSU after decryption. The CTA also sends a temporary short certificate to the vehicle for vehicle to vehicle communication. The whole process needs only one request and reply between different entities. Simulation results indicate the time taken (~ 223 ms) for the whole process is small and constitutes only a small portion of the stay time of a vehicle within an RSU region.

  15. EGPS: An Efficient Privacy Preserving Scheme for Vehicular ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Zhao, Baokang; Su, Xiangyu; Su, Jinshu; Song, Ziming; Sun, Yipin; Tao, Jing; Tang, Yong; Chen, Shuhui; Zhao, Guohong; Chen, Yijiao

    2010-09-01

    In this paper, we propose EGPS, an efficient privacy preserving scheme for vehicular ad hoc networks. The EGPS scheme is based on a very efficient group signature and Identity Based Cryptography(IBC) techniques. Several security properties of EGPS, including the correctness and unforgeability have been proved. Furthermore, EGPS is also proved to be more efficient than GSIS, which is currently one of the best state-of-the-art VANET privacy preserving schemes.

  16. Privacy-preserving search for chemical compound databases

    PubMed Central

    2015-01-01

    Background Searching for similar compounds in a database is the most important process for in-silico drug screening. Since a query compound is an important starting point for the new drug, a query holder, who is afraid of the query being monitored by the database server, usually downloads all the records in the database and uses them in a closed network. However, a serious dilemma arises when the database holder also wants to output no information except for the search results, and such a dilemma prevents the use of many important data resources. Results In order to overcome this dilemma, we developed a novel cryptographic protocol that enables database searching while keeping both the query holder's privacy and database holder's privacy. Generally, the application of cryptographic techniques to practical problems is difficult because versatile techniques are computationally expensive while computationally inexpensive techniques can perform only trivial computation tasks. In this study, our protocol is successfully built only from an additive-homomorphic cryptosystem, which allows only addition performed on encrypted values but is computationally efficient compared with versatile techniques such as general purpose multi-party computation. In an experiment searching ChEMBL, which consists of more than 1,200,000 compounds, the proposed method was 36,900 times faster in CPU time and 12,000 times as efficient in communication size compared with general purpose multi-party computation. Conclusion We proposed a novel privacy-preserving protocol for searching chemical compound databases. The proposed method, easily scaling for large-scale databases, may help to accelerate drug discovery research by making full use of unused but valuable data that includes sensitive information. PMID:26678650

  17. Image feature extraction in encrypted domain with privacy-preserving SIFT.

    PubMed

    Hsu, Chao-Yung; Lu, Chun-Shien; Pei, Soo-Chang

    2012-11-01

    Privacy has received considerable attention but is still largely ignored in the multimedia community. Consider a cloud computing scenario where the server is resource-abundant, and is capable of finishing the designated tasks. It is envisioned that secure media applications with privacy preservation will be treated seriously. In view of the fact that scale-invariant feature transform (SIFT) has been widely adopted in various fields, this paper is the first to target the importance of privacy-preserving SIFT (PPSIFT) and to address the problem of secure SIFT feature extraction and representation in the encrypted domain. As all of the operations in SIFT must be moved to the encrypted domain, we propose a privacy-preserving realization of the SIFT method based on homomorphic encryption. We show through the security analysis based on the discrete logarithm problem and RSA that PPSIFT is secure against ciphertext only attack and known plaintext attack. Experimental results obtained from different case studies demonstrate that the proposed homomorphic encryption-based privacy-preserving SIFT performs comparably to the original SIFT and that our method is useful in SIFT-based privacy-preserving applications. PMID:22711774

  18. Privacy-Preserving Data Aggregation in Two-Tiered Wireless Sensor Networks with Mobile Nodes

    PubMed Central

    Yao, Yonglei; Liu, Jingfa; Xiong, Neal N.

    2014-01-01

    Privacy-preserving data aggregation in wireless sensor networks (WSNs) with mobile nodes is a challenging problem, as an accurate aggregation result should be derived in a privacy-preserving manner, under the condition that nodes are mobile and have no pre-specified keys for cryptographic operations. In this paper, we focus on the SUM aggregation function and propose two privacy-preserving data aggregation protocols for two-tiered sensor networks with mobile nodes: Privacy-preserving Data Aggregation against non-colluded Aggregator and Sink (PDAAS) and Privacy-preserving Data Aggregation against Colluded Aggregator and Sink (PDACAS). Both protocols guarantee that the sink can derive the SUM of all raw sensor data but each sensor's raw data is kept confidential. In PDAAS, two keyed values are used, one shared with the sink and the other shared with the aggregator. PDAAS can protect the privacy of sensed data against external eavesdroppers, compromised sensor nodes, the aggregator or the sink, but fails if the aggregator and the sink collude. In PDACAS, multiple keyed values are used in data perturbation, which are not shared with the aggregator or the sink. PDACAS can protect the privacy of sensor nodes even the aggregator and the sink collude, at the cost of a little more overhead than PDAAS. Thorough analysis and experiments are conducted, which confirm the efficacy and efficiency of both schemes. PMID:25390407

  19. Privacy-preserving data aggregation in two-tiered wireless sensor networks with mobile nodes.

    PubMed

    Yao, Yonglei; Liu, Jingfa; Xiong, Neal N

    2014-01-01

    Privacy-preserving data aggregation in wireless sensor networks (WSNs) with mobile nodes is a challenging problem, as an accurate aggregation result should be derived in a privacy-preserving manner, under the condition that nodes are mobile and have no pre-specified keys for cryptographic operations. In this paper, we focus on the SUM aggregation function and propose two privacy-preserving data aggregation protocols for two-tiered sensor networks with mobile nodes: Privacy-preserving Data Aggregation against non-colluded Aggregator and Sink (PDAAS) and Privacy-preserving Data Aggregation against Colluded Aggregator and Sink (PDACAS). Both protocols guarantee that the sink can derive the SUM of all raw sensor data but each sensor's raw data is kept confidential. In PDAAS, two keyed values are used, one shared with the sink and the other shared with the aggregator. PDAAS can protect the privacy of sensed data against external eavesdroppers, compromised sensor nodes, the aggregator or the sink, but fails if the aggregator and the sink collude. In PDACAS, multiple keyed values are used in data perturbation, which are not shared with the aggregator or the sink. PDACAS can protect the privacy of sensor nodes even the aggregator and the sink collude, at the cost of a little more overhead than PDAAS. Thorough analysis and experiments are conducted, which confirm the efficacy and efficiency of both schemes. PMID:25390407

  20. A Neural-Network Clustering-Based Algorithm for Privacy Preserving Data Mining

    NASA Astrophysics Data System (ADS)

    Tsiafoulis, S.; Zorkadis, V. C.; Karras, D. A.

    The increasing use of fast and efficient data mining algorithms in huge collections of personal data, facilitated through the exponential growth of technology, in particular in the field of electronic data storage media and processing power, has raised serious ethical, philosophical and legal issues related to privacy protection. To cope with these concerns, several privacy preserving methodologies have been proposed, classified in two categories, methodologies that aim at protecting the sensitive data and those that aim at protecting the mining results. In our work, we focus on sensitive data protection and compare existing techniques according to their anonymity degree achieved, the information loss suffered and their performance characteristics. The ℓ-diversity principle is combined with k-anonymity concepts, so that background information can not be exploited to successfully attack the privacy of data subjects data refer to. Based on Kohonen Self Organizing Feature Maps (SOMs), we firstly organize data sets in subspaces according to their information theoretical distance to each other, then create the most relevant classes paying special attention to rare sensitive attribute values, and finally generalize attribute values to the minimum extend required so that both the data disclosure probability and the information loss are possibly kept negligible. Furthermore, we propose information theoretical measures for assessing the anonymity degree achieved and empirical tests to demonstrate it.

  1. Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm

    NASA Astrophysics Data System (ADS)

    Kim, Yoonjeong; Ohm, Seongyong; Yi, Kang

    In this letter, we propose a privacy-preserving authentication protocol with RSA cryptosystem in an RFID environment. For both overcoming the resource restriction and strengthening security, our protocol uses only modular exponentiation with exponent three at RFID tag side, with the padded random message whose length is greater than one-sixth of the whole message length.

  2. Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes

    NASA Astrophysics Data System (ADS)

    Su, Chunhua; Bao, Feng; Zhou, Jianying; Takagi, Tsuyoshi; Sakurai, Kouichi

    Due to the fast development of Internet and the related IT technologies, it becomes more and more easier to access a large amount of data. k-means clustering is a powerful and frequently used technique in data mining. Many research papers about privacy-preserving k-means clustering were published. In this paper, we analyze the existing privacy-preserving k-means clustering schemes based on the cryptographic techniques. We show those schemes will cause the privacy breach and cannot output the correct results due to the faults in the protocol construction. Furthermore, we analyze our proposal as an option to improve such problems but with intermediate information breach during the computation.

  3. Collusion-aware privacy-preserving range query in tiered wireless sensor networks.

    PubMed

    Zhang, Xiaoying; Dong, Lei; Peng, Hui; Chen, Hong; Zhao, Suyun; Li, Cuiping

    2014-01-01

    Wireless sensor networks (WSNs) are indispensable building blocks for the Internet of Things (IoT). With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromisedmaster nodes, but neglects the damage of node collusion. In this paper, we propose a series of collusion-aware privacy-preserving range query protocols in two-tiered WSNs. To the best of our knowledge, this paper is the first to consider collusion attacks for a range query in tiered WSNs while fulfilling the preservation of privacy and integrity. To preserve the privacy of data and queries, we propose a novel encoding scheme to conceal sensitive information. To preserve the integrity of the results, we present a verification scheme using the correlation among data. In addition, two schemes are further presented to improve result accuracy and reduce communication cost. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and privacy of our proposals. PMID:25615731

  4. Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks†

    PubMed Central

    Zhang, Xiaoying; Dong, Lei; Peng, Hui; Chen, Hong; Zhao, Suyun; Li, Cuiping

    2014-01-01

    Wireless sensor networks (WSNs) are indispensable building blocks for the Internet of Things (IoT). With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromised master nodes, but neglects the damage of node collusion. In this paper, we propose a series of collusion-aware privacy-preserving range query protocols in two-tiered WSNs. To the best of our knowledge, this paper is the first to consider collusion attacks for a range query in tiered WSNs while fulfilling the preservation of privacy and integrity. To preserve the privacy of data and queries, we propose a novel encoding scheme to conceal sensitive information. To preserve the integrity of the results, we present a verification scheme using the correlation among data. In addition, two schemes are further presented to improve result accuracy and reduce communication cost. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and privacy of our proposals. PMID:25615731

  5. Privacy-Preserving Data Exploration in Genome-Wide Association Studies

    PubMed Central

    Johnson, Aaron; Shmatikov, Vitaly

    2013-01-01

    Genome-wide association studies (GWAS) have become a popular method for analyzing sets of DNA sequences in order to discover the genetic basis of disease. Unfortunately, statistics published as the result of GWAS can be used to identify individuals participating in the study. To prevent privacy breaches, even previously published results have been removed from public databases, impeding researchers’ access to the data and hindering collaborative research. Existing techniques for privacy-preserving GWAS focus on answering specific questions, such as correlations between a given pair of SNPs (DNA sequence variations). This does not fit the typical GWAS process, where the analyst may not know in advance which SNPs to consider and which statistical tests to use, how many SNPs are significant for a given dataset, etc. We present a set of practical, privacy-preserving data mining algorithms for GWAS datasets. Our framework supports exploratory data analysis, where the analyst does not know a priori how many and which SNPs to consider. We develop privacy-preserving algorithms for computing the number and location of SNPs that are significantly associated with the disease, the significance of any statistical test between a given SNP and the disease, any measure of correlation between SNPs, and the block structure of correlations. We evaluate our algorithms on real-world datasets and demonstrate that they produce significantly more accurate results than prior techniques while guaranteeing differential privacy. PMID:26691928

  6. Privacy-Preserving and Usable Data Publishing and Analysis

    ERIC Educational Resources Information Center

    Shen, Entong

    2013-01-01

    In the current digital world, data is becoming an increasingly valuable resource and the demand for sharing or releasing data has never been higher. Organizations need to make available versions of the data they collected for business or legal reasons and at the same time they are under strong obligation to protect sensitive information about…

  7. Secure and Privacy-Preserving Distributed Information Brokering

    ERIC Educational Resources Information Center

    Li, Fengjun

    2010-01-01

    As enormous structured, semi-structured and unstructured data are collected and archived by organizations in many realms ranging from business to health networks to government agencies, the needs for efficient yet secure inter-organization information sharing naturally arise. Unlike early information sharing approaches that only involve a small…

  8. Differential Privacy Preserving in Big Data Analytics for Connected Health.

    PubMed

    Lin, Chi; Song, Zihao; Song, Houbing; Zhou, Yanhong; Wang, Yi; Wu, Guowei

    2016-04-01

    In Body Area Networks (BANs), big data collected by wearable sensors usually contain sensitive information, which is compulsory to be appropriately protected. Previous methods neglected privacy protection issue, leading to privacy exposure. In this paper, a differential privacy protection scheme for big data in body sensor network is developed. Compared with previous methods, this scheme will provide privacy protection with higher availability and reliability. We introduce the concept of dynamic noise thresholds, which makes our scheme more suitable to process big data. Experimental results demonstrate that, even when the attacker has full background knowledge, the proposed scheme can still provide enough interference to big sensitive data so as to preserve the privacy. PMID:26872779

  9. δ-dependency for privacy-preserving XML data publishing.

    PubMed

    Landberg, Anders H; Nguyen, Kinh; Pardede, Eric; Rahayu, J Wenny

    2014-08-01

    An ever increasing amount of medical data such as electronic health records, is being collected, stored, shared and managed in large online health information systems and electronic medical record systems (EMR) (Williams et al., 2001; Virtanen, 2009; Huang and Liou, 2007) [1-3]. From such rich collections, data is often published in the form of census and statistical data sets for the purpose of knowledge sharing and enabling medical research. This brings with it an increasing need for protecting individual people privacy, and it becomes an issue of great importance especially when information about patients is exposed to the public. While the concept of data privacy has been comprehensively studied for relational data, models and algorithms addressing the distinct differences and complex structure of XML data are yet to be explored. Currently, the common compromise method is to convert private XML data into relational data for publication. This ad hoc approach results in significant loss of useful semantic information previously carried in the private XML data. Health data often has very complex structure, which is best expressed in XML. In fact, XML is the standard format for exchanging (e.g. HL7 version 3(1)) and publishing health information. Lack of means to deal directly with data in XML format is inevitably a serious drawback. In this paper we propose a novel privacy protection model for XML, and an algorithm for implementing this model. We provide general rules, both for transforming a private XML schema into a published XML schema, and for mapping private XML data to the new privacy-protected published XML data. In addition, we propose a new privacy property, δ-dependency, which can be applied to both relational and XML data, and that takes into consideration the hierarchical nature of sensitive data (as opposed to "quasi-identifiers"). Lastly, we provide an implementation of our model, algorithm and privacy property, and perform an experimental analysis

  10. Privacy preserving protocol for detecting genetic relatives using rare variants

    PubMed Central

    Hormozdiari, Farhad; Joo, Jong Wha J; Wadia, Akshay; Guan, Feng; Ostrosky, Rafail; Sahai, Amit; Eskin, Eleazar

    2014-01-01

    Motivation: High-throughput sequencing technologies have impacted many areas of genetic research. One such area is the identification of relatives from genetic data. The standard approach for the identification of genetic relatives collects the genomic data of all individuals and stores it in a database. Then, each pair of individuals is compared to detect the set of genetic relatives, and the matched individuals are informed. The main drawback of this approach is the requirement of sharing your genetic data with a trusted third party to perform the relatedness test. Results: In this work, we propose a secure protocol to detect the genetic relatives from sequencing data while not exposing any information about their genomes. We assume that individuals have access to their genome sequences but do not want to share their genomes with anyone else. Unlike previous approaches, our approach uses both common and rare variants which provide the ability to detect much more distant relationships securely. We use a simulated data generated from the 1000 genomes data and illustrate that we can easily detect up to fifth degree cousins which was not possible using the existing methods. We also show in the 1000 genomes data with cryptic relationships that our method can detect these individuals. Availability: The software is freely available for download at http://genetics.cs.ucla.edu/crypto/. Contact: fhormoz@cs.ucla.edu or eeskin@cs.ucla.edu Supplementary information: Supplementary data are available at Bioinformatics online PMID:24931985

  11. Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks

    PubMed Central

    Thandava Meganathan, Navamani; Palanichamy, Yogesh

    2015-01-01

    Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, and anonymity are to be ensured during route discovery. These properties can be achieved by implementing group signature and ID-based encryption schemes during route discovery. Due to the characteristics of WMNs, it is more vulnerable to many network layer attacks. Hence, a strong protection is needed to avoid these attacks and this can be achieved by introducing a new Cross-Layer and Subject Logic based Dynamic Reputation (CLSL-DR) mechanism during route discovery. In this paper, we propose a new Privacy preserved and Secured Reliable Routing (PSRR) protocol for WMNs. This protocol incorporates group signature, ID-based encryption schemes, and CLSL-DR mechanism to ensure strong privacy, security, and reliability in WMNs. Simulation results prove this by showing better performance in terms of most of the chosen parameters than the existing protocols. PMID:26484361

  12. A Privacy Preservation Model for Health-Related Social Networking Sites.

    PubMed

    Li, Jingquan

    2015-01-01

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS. PMID:26155953

  13. A Privacy Preservation Model for Health-Related Social Networking Sites

    PubMed Central

    2015-01-01

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS. PMID:26155953

  14. An innovative privacy preserving technique for incremental datasets on cloud computing.

    PubMed

    Aldeen, Yousra Abdul Alsahib S; Salleh, Mazleena; Aljeroudi, Yazan

    2016-08-01

    Cloud computing (CC) is a magnificent service-based delivery with gigantic computer processing power and data storage across connected communications channels. It imparted overwhelming technological impetus in the internet (web) mediated IT industry, where users can easily share private data for further analysis and mining. Furthermore, user affable CC services enable to deploy sundry applications economically. Meanwhile, simple data sharing impelled various phishing attacks and malware assisted security threats. Some privacy sensitive applications like health services on cloud that are built with several economic and operational benefits necessitate enhanced security. Thus, absolute cyberspace security and mitigation against phishing blitz became mandatory to protect overall data privacy. Typically, diverse applications datasets are anonymized with better privacy to owners without providing all secrecy requirements to the newly added records. Some proposed techniques emphasized this issue by re-anonymizing the datasets from the scratch. The utmost privacy protection over incremental datasets on CC is far from being achieved. Certainly, the distribution of huge datasets volume across multiple storage nodes limits the privacy preservation. In this view, we propose a new anonymization technique to attain better privacy protection with high data utility over distributed and incremental datasets on CC. The proficiency of data privacy preservation and improved confidentiality requirements is demonstrated through performance evaluation. PMID:27369566

  15. An efficient reversible privacy-preserving data mining technology over data streams.

    PubMed

    Lin, Chen-Yi; Kao, Yuan-Hung; Lee, Wei-Bin; Chen, Rong-Chang

    2016-01-01

    With the popularity of smart handheld devices and the emergence of cloud computing, users and companies can save various data, which may contain private data, to the cloud. Topics relating to data security have therefore received much attention. This study focuses on data stream environments and uses the concept of a sliding window to design a reversible privacy-preserving technology to process continuous data in real time, known as a continuous reversible privacy-preserving (CRP) algorithm. Data with CRP algorithm protection can be accurately recovered through a data recovery process. In addition, by using an embedded watermark, the integrity of the data can be verified. The results from the experiments show that, compared to existing algorithms, CRP is better at preserving knowledge and is more effective in terms of reducing information loss and privacy disclosure risk. In addition, it takes far less time for CRP to process continuous data than existing algorithms. As a result, CRP is confirmed as suitable for data stream environments and fulfills the requirements of being lightweight and energy-efficient for smart handheld devices. PMID:27610326

  16. Privacy-preserving genomic testing in the clinic: a model using HIV treatment

    PubMed Central

    McLaren, Paul J.; Raisaro, Jean Louis; Aouri, Manel; Rotger, Margalida; Ayday, Erman; Bartha, István; Delgado, Maria B.; Vallet, Yannick; Günthard, Huldrych F.; Cavassini, Matthias; Furrer, Hansjakob; Doco-Lecompte, Thanh; Marzolini, Catia; Schmid, Patrick; Di Benedetto, Caroline; Decosterd, Laurent A.; Fellay, Jacques; Hubaux, Jean-Pierre; Telenti, Amalio

    2016-01-01

    Purpose: The implementation of genomic-based medicine is hindered by unresolved questions regarding data privacy and delivery of interpreted results to health-care practitioners. We used DNA-based prediction of HIV-related outcomes as a model to explore critical issues in clinical genomics. Genet Med 18 8, 814–822. Methods: We genotyped 4,149 markers in HIV-positive individuals. Variants allowed for prediction of 17 traits relevant to HIV medical care, inference of patient ancestry, and imputation of human leukocyte antigen (HLA) types. Genetic data were processed under a privacy-preserving framework using homomorphic encryption, and clinical reports describing potentially actionable results were delivered to health-care providers. Genet Med 18 8, 814–822. Results: A total of 230 patients were included in the study. We demonstrated the feasibility of encrypting a large number of genetic markers, inferring patient ancestry, computing monogenic and polygenic trait risks, and reporting results under privacy-preserving conditions. The average execution time of a multimarker test on encrypted data was 865 ms on a standard computer. The proportion of tests returning potentially actionable genetic results ranged from 0 to 54%. Genet Med 18 8, 814–822. Conclusions: The model of implementation presented herein informs on strategies to deliver genomic test results for clinical care. Data encryption to ensure privacy helps to build patient trust, a key requirement on the road to genomic-based medicine. Genet Med 18 8, 814–822. PMID:26765343

  17. Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks.

    PubMed

    Meganathan, Navamani Thandava; Palanichamy, Yogesh

    2015-01-01

    Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, and anonymity are to be ensured during route discovery. These properties can be achieved by implementing group signature and ID-based encryption schemes during route discovery. Due to the characteristics of WMNs, it is more vulnerable to many network layer attacks. Hence, a strong protection is needed to avoid these attacks and this can be achieved by introducing a new Cross-Layer and Subject Logic based Dynamic Reputation (CLSL-DR) mechanism during route discovery. In this paper, we propose a new Privacy preserved and Secured Reliable Routing (PSRR) protocol for WMNs. This protocol incorporates group signature, ID-based encryption schemes, and CLSL-DR mechanism to ensure strong privacy, security, and reliability in WMNs. Simulation results prove this by showing better performance in terms of most of the chosen parameters than the existing protocols. PMID:26484361

  18. A Lightweight Encryption Scheme Combined with Trust Management for Privacy-Preserving in Body Sensor Networks.

    PubMed

    Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N

    2015-12-01

    With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system. PMID:26490148

  19. A framework for privacy-preserving access to next-generation EHRs.

    PubMed

    Koufi, Vassiliki; Malamateniou, Flora; Tsohou, Aggeliki; Vassilacopoulos, George

    2014-01-01

    Although personalized medicine is optimizing the discovery, development and application of therapeutic advances, its full impact on patient and population healthcare management has yet to be realized. Electronic health Records (EHRs), integrated with data from other sources, such as social care data, Personal Healthcare Record (PHR) data and genetic information, are envisaged as having a pivotal role in realizing this individualized approach to healthcare. Thus, a new generation of EHRs will emerge which, in addition to supporting healthcare professionals in making well-informed clinical decisions, shows potential for novel discovery of associations between disease and genetic, environmental or process measures. However, a broad range of ethical, legal and technical reasons may hinder the realization of future EHRs due to potential security and privacy breaches. This paper presents a HIPAA-compliant framework that enables privacy-preserving access to next-generation EHRs. PMID:25160285

  20. EXpectation Propagation LOgistic REgRession (EXPLORER): Distributed Privacy-Preserving Online Model Learning

    PubMed Central

    Wang, Shuang; Jiang, Xiaoqian; Wu, Yuan; Cui, Lijuan; Cheng, Samuel; Ohno-Machado, Lucila

    2013-01-01

    We developed an EXpectation Propagation LOgistic REgRession (EXPLORER) model for distributed privacy-preserving online learning. The proposed framework provides a high level guarantee for protecting sensitive information, since the information exchanged between the server and the client is the encrypted posterior distribution of coefficients. Through experimental results, EXPLORER shows the same performance (e.g., discrimination, calibration, feature selection etc.) as the traditional frequentist Logistic Regression model, but provides more flexibility in model updating. That is, EXPLORER can be updated one point at a time rather than having to retrain the entire data set when new observations are recorded. The proposed EXPLORER supports asynchronized communication, which relieves the participants from coordinating with one another, and prevents service breakdown from the absence of participants or interrupted communications. PMID:23562651

  1. Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials

    NASA Astrophysics Data System (ADS)

    Park, Jun-Cheol

    User privacy preservation is critical to prevent many sophisticated attacks that are based on the user's server access patterns and ID-related information. We propose a password-based user authentication scheme that provides strong privacy protection using one-time credentials. It eliminates the possibility of tracing a user's authentication history and hides the user's ID and password even from servers. In addition, it is resistant against user impersonation even if both a server's verification database and a user's smart card storage are disclosed. We also provide a revocation scheme for a user to promptly invalidate the user's credentials on a server when the user's smart card is compromised. The schemes use lightweight operations only such as computing hashes and bitwise XORs.

  2. An analysis of random projection for changeable and privacy-preserving biometric verification.

    PubMed

    Wang, Yongjin; Plataniotis, Konstantinos N

    2010-10-01

    Changeability and privacy protection are important factors for widespread deployment of biometrics-based verification systems. This paper presents a systematic analysis of a random-projection (RP)-based method for addressing these problems. The employed method transforms biometric data using a random matrix with each entry an independent and identically distributed Gaussian random variable. The similarity- and privacy-preserving properties, as well as the changeability of the biometric information in the transformed domain, are analyzed in detail. Specifically, RP on both high-dimensional image vectors and dimensionality-reduced feature vectors is discussed and compared. A vector translation method is proposed to improve the changeability of the generated templates. The feasibility of the introduced solution is well supported by detailed theoretical analyses. Extensive experimentation on a face-based biometric verification problem shows the effectiveness of the proposed method. PMID:20083458

  3. A Framework for Privacy-preserving Classification of Next-generation PHR data.

    PubMed

    Koufi, Vassiliki; Malamateniou, Flora; Prentza, Andriana; Vassilacopoulos, George

    2014-01-01

    Personal Health Records (PHRs), integrated with data from various sources, such as social care data, Electronic Health Record data and genetic information, are envisaged as having a pivotal role in transforming healthcare. These data, lumped under the term 'big data', are usually complex, noisy, heterogeneous, longitudinal and voluminous thus prohibiting their meaningful use by clinicians. Deriving value from these data requires the utilization of innovative data analysis techniques, which, however, may be hindered due to potential security and privacy breaches that may arise from improper release of personal health information. This paper presents a HIPAA-compliant machine learning framework that enables privacy-preserving classification of next-generation PHR data. The predictive models acquired can act as supporting tools to clinical practice by enabling more effective prevention, diagnosis and treatment of new incidents. The proposed framework has a huge potential for complementing medical staff expertise as it outperforms the manual inspection of PHR data while protecting patient privacy. PMID:25000030

  4. Privacy of Value-Added Context-Aware Service Cloud

    NASA Astrophysics Data System (ADS)

    Huang, Xin; He, Yin; Hou, Yifan; Li, Lisi; Sun, Lan; Zhang, Sina; Jiang, Yang; Zhang, Tingting

    In the cloud computing era, service provider cloud and context service cloud store all your personal context data. This is a positive aspect for value-added context-aware service cloud as it makes that context information collection are easier than was the case previously. However, this computing environment does add a series of threats in relation to privacy protection. Whoever receives the context information is able to deduce the status of the owners and, generally owners are not happy to share this information. In this paper, we propose a privacy preserved framework which can be utilized by value-added context-aware service cloud. Context data and related services access privileges are determined by context-aware role-based access control (CRAC) extended from role-based access control (RAC). Privacy preserved context service protocol (PPCS) is designed to protect user privacy from exposed context information. Additionally, user network and information diffusion is combined to evaluate the privacy protection effect.

  5. Privacy-preserving photo sharing based on a public key infrastructure

    NASA Astrophysics Data System (ADS)

    Yuan, Lin; McNally, David; Küpçü, Alptekin; Ebrahimi, Touradj

    2015-09-01

    A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the best interest of many such services if their users restrict access to their shared pictures, most services keep users' photos unprotected which makes them available to all insiders. This paper presents an architecture for a privacy-preserving photo sharing based on an image scrambling scheme and a public key infrastructure. A secure JPEG scrambling is applied to protect regional visual information in photos. Protected images are still compatible with JPEG coding and therefore can be viewed by any one on any device. However, only those who are granted secret keys will be able to descramble the photos and view their original versions. The proposed architecture applies an attribute-based encryption along with conventional public key cryptography, to achieve secure transmission of secret keys and a fine-grained control over who may view shared photos. In addition, we demonstrate the practical feasibility of the proposed photo sharing architecture with a prototype mobile application, ProShare, which is built based on iOS platform.

  6. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    PubMed

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes. PMID:27337001

  7. TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs.

    PubMed

    Hu, Hao; Lu, Rongxing; Huang, Cheng; Zhang, Zonghua

    2016-01-01

    In this paper, we propose a trust-based vehicular platoon crowdsensing scheme, named TripSense, in VANET. The proposed TripSense scheme introduces a trust-based system to evaluate vehicles' sensing abilities and then selects the more capable vehicles in order to improve sensing results accuracy. In addition, the sensing tasks are accomplished by platoon member vehicles and preprocessed by platoon head vehicles before the data are uploaded to server. Hence, it is less time-consuming and more efficient compared with the way where the data are submitted by individual platoon member vehicles. Hence it is more suitable in ephemeral networks like VANET. Moreover, our proposed TripSense scheme integrates unlinkable pseudo-ID techniques to achieve PM vehicle identity privacy, and employs a privacy-preserving sensing vehicle selection scheme without involving the PM vehicle's trust score to keep its location privacy. Detailed security analysis shows that our proposed TripSense scheme not only achieves desirable privacy requirements but also resists against attacks launched by adversaries. In addition, extensive simulations are conducted to show the correctness and effectiveness of our proposed scheme. PMID:27258287

  8. Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way

    NASA Astrophysics Data System (ADS)

    Cui, Yank; Kobara, Kazukuni; Matsuura, Kanta; Imai, Hideki

    As pervasive computing technologies develop fast, the privacy protection becomes a crucial issue and needs to be coped with very carefully. Typically, it is difficult to efficiently identify and manage plenty of the low-cost pervasive devices like Radio Frequency Identification Devices (RFID), without leaking any privacy information. In particular, the attacker may not only eavesdrop the communication in a passive way, but also mount an active attack to ask queries adaptively, which is obviously more dangerous. Towards settling this problem, in this paper, we propose two lightweight authentication protocols which are privacy-preserving against active attack, in an asymmetric way. That asymmetric style with privacy-oriented simplification succeeds to reduce the load of low-cost devices and drastically decrease the computation cost for the management of server. This is because that, unlike the usual management of the identities, our approach does not require any synchronization nor exhaustive search in the database, which enjoys great convenience in case of a large-scale system. The protocols are based on a fast asymmetric encryption with specialized simplification and only one cryptographic hash function, which consequently assigns an easy work to pervasive devices. Besides, our results do not require the strong assumption of the random oracle.

  9. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks

    PubMed Central

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant’s profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes. PMID:27337001

  10. TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs

    PubMed Central

    Hu, Hao; Lu, Rongxing; Huang, Cheng; Zhang, Zonghua

    2016-01-01

    In this paper, we propose a trust-based vehicular platoon crowdsensing scheme, named TripSense, in VANET. The proposed TripSense scheme introduces a trust-based system to evaluate vehicles’ sensing abilities and then selects the more capable vehicles in order to improve sensing results accuracy. In addition, the sensing tasks are accomplished by platoon member vehicles and preprocessed by platoon head vehicles before the data are uploaded to server. Hence, it is less time-consuming and more efficient compared with the way where the data are submitted by individual platoon member vehicles. Hence it is more suitable in ephemeral networks like VANET. Moreover, our proposed TripSense scheme integrates unlinkable pseudo-ID techniques to achieve PM vehicle identity privacy, and employs a privacy-preserving sensing vehicle selection scheme without involving the PM vehicle’s trust score to keep its location privacy. Detailed security analysis shows that our proposed TripSense scheme not only achieves desirable privacy requirements but also resists against attacks launched by adversaries. In addition, extensive simulations are conducted to show the correctness and effectiveness of our proposed scheme. PMID:27258287

  11. Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification.

    PubMed

    Liu, Ximeng; Lu, Rongxing; Ma, Jianfeng; Chen, Le; Qin, Baodong

    2016-03-01

    Clinical decision support system, which uses advanced data mining techniques to help clinician make proper decisions, has received considerable attention recently. The advantages of clinical decision support system include not only improving diagnosis accuracy but also reducing diagnosis time. Specifically, with large amounts of clinical data generated everyday, naïve Bayesian classification can be utilized to excavate valuable information to improve a clinical decision support system. Although the clinical decision support system is quite promising, the flourish of the system still faces many challenges including information security and privacy concerns. In this paper, we propose a new privacy-preserving patient-centric clinical decision support system, which helps clinician complementary to diagnose the risk of patients' disease in a privacy-preserving way. In the proposed system, the past patients' historical data are stored in cloud and can be used to train the naïve Bayesian classifier without leaking any individual patient medical data, and then the trained classifier can be applied to compute the disease risk for new coming patients and also allow these patients to retrieve the top- k disease names according to their own preferences. Specifically, to protect the privacy of past patients' historical data, a new cryptographic tool called additive homomorphic proxy aggregation scheme is designed. Moreover, to leverage the leakage of naïve Bayesian classifier, we introduce a privacy-preserving top- k disease names retrieval protocol in our system. Detailed privacy analysis ensures that patient's information is private and will not be leaked out during the disease diagnosis phase. In addition, performance evaluation via extensive simulations also demonstrates that our system can efficiently calculate patient's disease risk with high accuracy in a privacy-preserving way. PMID:26960216

  12. Hiding in Plain Sight: Anonymity and Privacy Preserving Mechanisms for Data Collection and Collaboration

    ERIC Educational Resources Information Center

    Kumar, Rajeev

    2009-01-01

    This dissertation contributes to the society by providing mechanisms that can potentially increase the availability of valuable personal level information without sacrificing the privacy of citizens. We consider two settings by which personal level data can be made available to its users such as researchers, who then may use it for the benefit of…

  13. Information Spreading in Context

    NASA Astrophysics Data System (ADS)

    Wang, Dashun; Wen, Zhen; Tong, Hanghang; Lin, Ching-Yung; Song, Chaoming; Barabasi, Albert-Laszlo

    2012-02-01

    Information spreading processes are central to human interactions. Despite recent studies in online domains, little is known about factors that could affect the dissemination of a single piece of information. In this paper, we address this challenge by combining two related but distinct datasets, collected from a large scale privacy-preserving distributed social sensor system. We find that the social and organizational context significantly impacts to whom and how fast people forward information. Yet the structures within spreading processes can be well captured by a simple stochastic branching model, indicating surprising independence of context. Our results build the foundation of future predictive models of information flow and provide significant insights towards design of communication platforms.

  14. Design and implementation of a privacy preserving electronic health record linkage tool in Chicago

    PubMed Central

    Cashy, John P; Jackson, Kathryn L; Pah, Adam R; Goel, Satyender; Boehnke, Jörn; Humphries, John Eric; Kominers, Scott Duke; Hota, Bala N; Sims, Shannon A; Malin, Bradley A; French, Dustin D; Walunas, Theresa L; Meltzer, David O; Kaleba, Erin O; Jones, Roderick C; Galanter, William L

    2015-01-01

    Objective To design and implement a tool that creates a secure, privacy preserving linkage of electronic health record (EHR) data across multiple sites in a large metropolitan area in the United States (Chicago, IL), for use in clinical research. Methods The authors developed and distributed a software application that performs standardized data cleaning, preprocessing, and hashing of patient identifiers to remove all protected health information. The application creates seeded hash code combinations of patient identifiers using a Health Insurance Portability and Accountability Act compliant SHA-512 algorithm that minimizes re-identification risk. The authors subsequently linked individual records using a central honest broker with an algorithm that assigns weights to hash combinations in order to generate high specificity matches. Results The software application successfully linked and de-duplicated 7 million records across 6 institutions, resulting in a cohort of 5 million unique records. Using a manually reconciled set of 11 292 patients as a gold standard, the software achieved a sensitivity of 96% and a specificity of 100%, with a majority of the missed matches accounted for by patients with both a missing social security number and last name change. Using 3 disease examples, it is demonstrated that the software can reduce duplication of patient records across sites by as much as 28%. Conclusions Software that standardizes the assignment of a unique seeded hash identifier merged through an agreed upon third-party honest broker can enable large-scale secure linkage of EHR data for epidemiologic and public health research. The software algorithm can improve future epidemiologic research by providing more comprehensive data given that patients may make use of multiple healthcare systems. PMID:26104741

  15. A security and privacy preserving e-prescription system based on smart cards.

    PubMed

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations. PMID:22407399

  16. A review on the state-of-the-art privacy-preserving approaches in the e-health clouds.

    PubMed

    Abbas, Assad; Khan, Samee U

    2014-07-01

    Cloud computing is emerging as a new computing paradigm in the healthcare sector besides other business domains. Large numbers of health organizations have started shifting the electronic health information to the cloud environment. Introducing the cloud services in the health sector not only facilitates the exchange of electronic medical records among the hospitals and clinics, but also enables the cloud to act as a medical record storage center. Moreover, shifting to the cloud environment relieves the healthcare organizations of the tedious tasks of infrastructure management and also minimizes development and maintenance costs. Nonetheless, storing the patient health data in the third-party servers also entails serious threats to data privacy. Because of probable disclosure of medical records stored and exchanged in the cloud, the patients' privacy concerns should essentially be considered when designing the security and privacy mechanisms. Various approaches have been used to preserve the privacy of the health information in the cloud environment. This survey aims to encompass the state-of-the-art privacy-preserving approaches employed in the e-Health clouds. Moreover, the privacy-preserving approaches are classified into cryptographic and noncryptographic approaches and taxonomy of the approaches is also presented. Furthermore, the strengths and weaknesses of the presented approaches are reported and some open issues are highlighted. PMID:25014943

  17. Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks

    PubMed Central

    Wen, Qiaoyan; Zhang, Yudong; Li, Wenmin

    2014-01-01

    With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients' health information and doctors' diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions. PMID:25126107

  18. Privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks.

    PubMed

    Sun, Yi; Wen, Qiaoyan; Zhang, Yudong; Li, Wenmin

    2014-01-01

    With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients' health information and doctors' diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions. PMID:25126107

  19. Collective Contexts in Conversation: Grounding by Proxy

    ERIC Educational Resources Information Center

    Eshghi, Arash; Healey, Patrick G. T.

    2016-01-01

    Anecdotal evidence suggests that participants in conversation can sometimes act as a coalition. This implies a level of conversational organization in which groups of individuals form a coherent unit. This paper investigates the implications of this phenomenon for psycholinguistic and semantic models of shared context in dialog. We present a…

  20. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios. PMID:26409546

  1. Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Privacy Preserving Authentication Model by Features Matching

    PubMed Central

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration. PMID:22550398

  2. Using medical history embedded in biometrics medical card for user identity authentication: privacy preserving authentication model by features matching.

    PubMed

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration. PMID:22550398

  3. A smart-card-enabled privacy preserving E-prescription system.

    PubMed

    Yang, Yanjiang; Han, Xiaoxi; Bao, Feng; Deng, Robert H

    2004-03-01

    Within the overall context of protection of health care information, privacy of prescription data needs special treatment. First, the involvement of diverse parties, especially nonmedical parties in the process of drug prescription complicates the protection of prescription data. Second, both patients and doctors have privacy stakes in prescription, and their privacy should be equally protected. Third, the following facts determine that prescription should not be processed in a truly anonymous manner: certain involved parties conduct useful research on the basis of aggregation of prescription data that are linkable with respect to either the patients or the doctors; prescription data has to be identifiable in some extreme circumstances, e.g., under the court order for inspection and assign liability. In this paper, we propose an e-prescription system to address issues pertaining to the privacy protection in the process of drug prescription. In our system, patients' smart cards play an important role. For one thing, the smart cards are implemented to be portable repositories carrying up-to-date personal medical records and insurance information, providing doctors instant data access crucial to the process of diagnosis and prescription. For the other, with the secret signing key being stored inside, the smart card enables the patient to sign electronically the prescription pad, declaring his acceptance of the prescription. To make the system more realistic, we identify the needs for a patient to delegate his signing capability to other people so as to protect the privacy of information housed on his card. A strong proxy signature scheme achieving technologically mutual agreements on the delegation is proposed to implement the delegation functionality. PMID:15055801

  4. Scalable Privacy-Preserving Data Sharing Methodology for Genome-Wide Association Studies

    PubMed Central

    Yu, Fei; Fienberg, Stephen E.; Slavković, Aleksandra; Uhler, Caroline

    2014-01-01

    The protection of privacy of individual-level information in genome-wide association study (GWAS) databases has been a major concern of researchers following the publication of “an attack” on GWAS data by Homer et al. [1]. Traditional statistical methods for confidentiality and privacy protection of statistical databases do not scale well to deal with GWAS data, especially in terms of guarantees regarding protection from linkage to external information. The more recent concept of differential privacy, introduced by the cryptographic community, is an approach that provides a rigorous definition of privacy with meaningful privacy guarantees in the presence of arbitrary external information, although the guarantees may come at a serious price in terms of data utility. Building on such notions, Uhler et al. [2] proposed new methods to release aggregate GWAS data without compromising an individual's privacy. We extend the methods developed in [2] for releasing differentially-private χ2-statistics by allowing for arbitrary number of cases and controls, and for releasing differentially-private allelic test statistics. We also provide a new interpretation by assuming the controls’ data are known, which is a realistic assumption because some GWAS use publicly available data as controls. We assess the performance of the proposed methods through a risk-utility analysis on a real data set consisting of DNA samples collected by the Wellcome Trust Case Control Consortium and compare the methods with the differentially-private release mechanism proposed by Johnson and Shmatikov [3]. PMID:24509073

  5. A novel, privacy-preserving cryptographic approach for sharing sequencing data

    PubMed Central

    Cassa, Christopher A; Miller, Rachel A; Mandl, Kenneth D

    2013-01-01

    Objective DNA samples are often processed and sequenced in facilities external to the point of collection. These samples are routinely labeled with patient identifiers or pseudonyms, allowing for potential linkage to identity and private clinical information if intercepted during transmission. We present a cryptographic scheme to securely transmit externally generated sequence data which does not require any patient identifiers, public key infrastructure, or the transmission of passwords. Materials and methods This novel encryption scheme cryptographically protects participant sequence data using a shared secret key that is derived from a unique subset of an individual’s genetic sequence. This scheme requires access to a subset of an individual’s genetic sequence to acquire full access to the transmitted sequence data, which helps to prevent sample mismatch. Results We validate that the proposed encryption scheme is robust to sequencing errors, population uniqueness, and sibling disambiguation, and provides sufficient cryptographic key space. Discussion Access to a set of an individual’s genotypes and a mutually agreed cryptographic seed is needed to unlock the full sequence, which provides additional sample authentication and authorization security. We present modest fixed and marginal costs to implement this transmission architecture. Conclusions It is possible for genomics researchers who sequence participant samples externally to protect the transmission of sequence data using unique features of an individual’s genetic sequence. PMID:23125421

  6. Efficient privacy-preserving string search and an application in genomics

    PubMed Central

    Shimizu, Kana; Nuida, Koji; Rätsch, Gunnar

    2016-01-01

    Motivation: Personal genomes carry inherent privacy risks and protecting privacy poses major social and technological challenges. We consider the case where a user searches for genetic information (e.g. an allele) on a server that stores a large genomic database and aims to receive allele-associated information. The user would like to keep the query and result private and the server the database. Approach: We propose a novel approach that combines efficient string data structures such as the Burrows–Wheeler transform with cryptographic techniques based on additive homomorphic encryption. We assume that the sequence data is searchable in efficient iterative query operations over a large indexed dictionary, for instance, from large genome collections and employing the (positional) Burrows–Wheeler transform. We use a technique called oblivious transfer that is based on additive homomorphic encryption to conceal the sequence query and the genomic region of interest in positional queries. Results: We designed and implemented an efficient algorithm for searching sequences of SNPs in large genome databases. During search, the user can only identify the longest match while the server does not learn which sequence of SNPs the user queried. In an experiment based on 2184 aligned haploid genomes from the 1000 Genomes Project, our algorithm was able to perform typical queries within ≈ 4.6 s and ≈ 10.8 s for client and server side, respectively, on laptop computers. The presented algorithm is at least one order of magnitude faster than an exhaustive baseline algorithm. Availability and implementation: https://github.com/iskana/PBWT-sec and https://github.com/ratschlab/PBWT-sec. Contacts: shimizu-kana@aist.go.jp or Gunnar.Ratsch@ratschlab.org Supplementary information: Supplementary data are available at Bioinformatics online. PMID:27153731

  7. Privacy preserving, real-time and location secured biometrics for mCommerce authentication

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Al-Assam, Hisham; Jassim, Sabah; Lami, Ihsan A.

    2011-06-01

    Secure wireless connectivity between mobile devices and financial/commercial establishments is mature, and so is the security of remote authentication for mCommerce. However, the current techniques are open for hacking, false misrepresentation, replay and other attacks. This is because of the lack of real-time and current-precise-location in the authentication process. This paper proposes a new technique that includes freshly-generated real-time personal biometric data of the client and present-position of the mobile device used by the client to perform the mCommerce so to form a real-time biometric representation to authenticate any remote transaction. A fresh GPS fix generates the "time and location" to stamp the biometric data freshly captured to produce a single, real-time biometric representation on the mobile device. A trusted Certification Authority (CA) acts as an independent authenticator of such client's claimed realtime location and his/her provided fresh biometric data. Thus eliminates the necessity of user enrolment with many mCommerce services and application providers. This CA can also "independently from the client" and "at that instant of time" collect the client's mobile device "time and location" from the cellular network operator so to compare with the received information, together with the client's stored biometric information. Finally, to preserve the client's location privacy and to eliminate the possibility of cross-application client tracking, this paper proposes shielding the real location of the mobile device used prior to submission to the CA or authenticators.

  8. Resilience, Community, and Resilient Communities: Conditioning Contexts and Collective Action

    ERIC Educational Resources Information Center

    Chaskin, Robert J.

    2008-01-01

    This article explores the idea of community as it relates to the concept of resilience. It focuses on community both as context (local environments providing a set of risk and protective factors that have an influence on the well-being of community members) and as collective actors that can exhibit resilience in themselves by organizing and acting…

  9. Distributed Mentoring: Designing Contexts for Collective Support of Teacher Learning

    ERIC Educational Resources Information Center

    Khasnabis, Debi; Reischl, Catherine H.; Stull, Melissa; Boerst, Timothy

    2013-01-01

    There is an alternative to conventional teacher mentorship. The authors describe and analyze a promising model of mentorship where multiple mentees and mentors, each with varying levels of experience, engage collaboratively in the study of teaching practice. They have found that well-designed contexts in which beginning and experienced teachers…

  10. Building Digital Collections in the Algerian Context: Assets and Prospects.

    ERIC Educational Resources Information Center

    Bakelli, Yahia

    2002-01-01

    Analyzes access behavior of Algerian users of information and documentation, focusing on the imbalance between user demand and quality of library access. Topics include Internet connectivity problems; national bibliographic catalogs and databases; creating digital collections to improve access, especially scientific information; and advantages of…

  11. Collective secondary cremation in a pit grave: a unique funerary context in Portuguese Chalcolithic burial practices.

    PubMed

    Silva, A M; Leandro, I; Pereira, D; Costa, C; Valera, A C

    2015-02-01

    Perdigões is a large site with a set of ditched enclosures located at Reguengos de Monsaraz, Alentejo, South Portugal. Recently at the central area of this site burnt human remains were found in a pit (#16). This structure had inside human remains, animal bones (namely pig, sheep or goat, cattle, dog, deer and rabbit), shards, ivory idols and arrowheads. All have been subjected to fire and later deposited in that pit, resulting in a secondary disposal of human bones. The recovered fragmented human bones (4845.18 g) correspond to a minimal number of 9 individuals: 6 adults and 3 sub-adults. The aim of this work is to document and interpret this funerary context based on the study of the recovered human remains. For that purpose, observations of all alterations due to fire, such as colour change and type of bone distortion, as well as anthropological data were collected. The data obtained suggest that these human remains were probably intentionally cremated, carefully collected and finally deposited in this pit. The cremation was conducted on probably complete corpses, some of them still fairly fresh and fleshed, as some bones presented thumbnail fractures. The collective cremation of the pit 16 represents an unprecedented funerary context for Portuguese, and Iberian Peninsula, Chalcolithic burial practices. Moreover, it is an example of the increasing diversity of mortuary practices of Chalcolithic human populations described in present Portuguese territory, as well as, in the Iberian Peninsula. PMID:25500530

  12. Privacy-Preserving Location-Based Services

    ERIC Educational Resources Information Center

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  13. Privacy-Preserving Security for Vehicular Communications

    ERIC Educational Resources Information Center

    Weerasinghe, Hesiri Dhammika

    2011-01-01

    Because of the large number of deaths, severe injuries and huge financial loss due to auto accidents and poor traffic management, road safety and traffic management have become very important areas of interest among research community. As a result, Vehicular Ad-hoc Network (VANET) becomes a promising technology to improve road safety and quality…

  14. Towards Practical Privacy-Preserving Internet Services

    ERIC Educational Resources Information Center

    Wang, Shiyuan

    2012-01-01

    Today's Internet offers people a vast selection of data centric services, such as online query services, the cloud, and location-based services, etc. These internet services bring people a lot of convenience, but at the same time raise privacy concerns, e.g., sensitive information revealed by the queries, sensitive data being stored and…

  15. Privacy Preserving PCA on Distributed Bioinformatics Datasets

    ERIC Educational Resources Information Center

    Li, Xin

    2011-01-01

    In recent years, new bioinformatics technologies, such as gene expression microarray, genome-wide association study, proteomics, and metabolomics, have been widely used to simultaneously identify a huge number of human genomic/genetic biomarkers, generate a tremendously large amount of data, and dramatically increase the knowledge on human…

  16. Randomization Based Privacy Preserving Categorical Data Analysis

    ERIC Educational Resources Information Center

    Guo, Ling

    2010-01-01

    The success of data mining relies on the availability of high quality data. To ensure quality data mining, effective information sharing between organizations becomes a vital requirement in today's society. Since data mining often involves sensitive information of individuals, the public has expressed a deep concern about their privacy.…

  17. Perinatal data collection: current practice in the Australian nursing and midwifery healthcare context.

    PubMed

    Craswell, Alison; Moxham, Lorna; Broadbent, Marc

    2013-01-01

    The collection of perinatal data within Queensland, Australia, has traditionally been achieved via a paper form completed by midwives after each birth. Recently, with an increase in the use of e-health systems in healthcare, perinatal data collection has migrated to an online system. It is suggested that this move from paper to an ehealth platform has resulted in improvement to error rates, completion levels, timeliness of data transfer from healthcare institutions to the perinatal data collection and subsequent publication of data items. Worldwide, perinatal data are collected utilising a variety of methods, but essentially data are used for similar purposes: to monitor outcome patterns within obstetrics and midwifery. This paper discusses current practice in relation to perinatal data collection worldwide and within Australia, with a specific focus on Queensland, highlights relevant issues for midwives, and points to the need for further research into the efficient use of an e-health platform for perinatal data collection. PMID:23640918

  18. Campus Educational Contexts and Civic Participation: Organizational Links to Collective Action

    ERIC Educational Resources Information Center

    Barnhardt, Cassie L.

    2015-01-01

    Proponents of civic engagement extol the virtues of the college experience for enhancing students' capacities for democratic participation, yet few studies have examined the organizational contexts of such actions. This article applies theory regarding social movements in organizations to highlight the relationship between campus curricular…

  19. Collective Capacity Building of Academic Leaders: A University Model of Leadership and Learning in Context

    ERIC Educational Resources Information Center

    Debowski, Shelda; Blake, Vivienne

    2007-01-01

    Academic leaders face particular challenges when they assume formal leadership roles in higher education. For the most part, they have had little prior engagement with the political, economic and strategic context of their institution and limited leadership networks on which to draw. The University of Western Australia has trialled a number of…

  20. Performance of the ERTS data collection system in a total system context

    NASA Technical Reports Server (NTRS)

    Paulson, R. W. (Principal Investigator)

    1973-01-01

    The author has identified the following significant results. Approximately 70 percent of the DCP's being installed by Department of the Interior investigators have been successfully operated. These include DCP's operating in Iceland, Central America, Hawaii, and the Continental United States. The Data Collection System specifications are being met for frequency of data collection.

  1. Introducing the notion of social context of collective trauma to ESTSS

    PubMed Central

    Ajduković, Dean

    2013-01-01

    Living amidst war and mass suffering while grasping the opportunity for professional growth, intertwined into my life perspective. Along the years, ESTSS provided a backdrop for my contacts with mental health colleagues from whom I learned, and among whom many became my friends. These rich experiences guided me towards promoting awareness within ESTSS of the importance of social context in which healing of traumatized populations is expected to progress. Each incident of organized violence leaves behind new scores of traumatized individuals and family members, among whom many will need support that may stretch their resources beyond reasonable limits. We need to acknowledge the hindering effects of living in such a social context and that many people that we meet as professionals may carry the burden of unresolved trauma, which should not go by unattended. PMID:23755326

  2. Collective self-esteem: role of social context among Asian-American college students.

    PubMed

    Kim, Eunha; Lee, Donghyuck

    2011-12-01

    The present study explored several layers of individual and contextual variables as related to collective self-esteem among 304 Asian-American college students. The findings suggested that variables, such as immigration generation status and cultural identification, were significantly associated with Private collective self-esteem (personal evaluation of one's ethnic group), while contextual variables, including number of same-ethnicity peers and community ethnic composition, were associated with Public collective self-esteem (judgment of how other people evaluate one's ethnic group). In addition to these variables, age and fluency of heritage language were positively related to Membership esteem (how worthy one feels as a member of one's ethnic group). For the Importance of identity (the importance of ethnic group membership to one's self-concept), cultural identification, number of same-ethnicity peers, and perceived campus climate were statistically significant. The implication of the present findings for future research is discussed. PMID:22420129

  3. Preparing Teachers for Diverse Contexts: A Collective Case Study of Critical Reflection

    ERIC Educational Resources Information Center

    Ramirez, Laurie A.

    2009-01-01

    This collective case study focused on 4 novice teachers' reflections on diversity in their classrooms and schools. The 4 participants were followed throughout their final year of an undergraduate, secondary teacher education program and into their 1st year of teaching in public secondary schools. This research was an effort to engage…

  4. Capturing the Friendship Context with a Collective Property: Friendship Group Engagement vs. Disaffection

    ERIC Educational Resources Information Center

    Furrer, Carrie J.

    2010-01-01

    The purpose of this study was to introduce a motivational property of the group, friendship group engagement vs. disaffection, and to examine different composition models for combining individual reports into an indicator of a group-level property. Data were collected from 312 ninth grade students and their teachers. Self-reported friendship group…

  5. Teachers' Collective Efficacy, Job Satisfaction, and Job Stress in Cross-Cultural Context

    ERIC Educational Resources Information Center

    Klassen, Robert M.; Usher, Ellen L.; Bong, Mimi

    2010-01-01

    This study examines how teachers' collective efficacy (TCE), job stress, and the cultural dimension of collectivism are associated with job satisfaction for 500 teachers from Canada, Korea (South Korea or Republic of Korea), and the United States. Multigroup path analysis revealed that TCE predicted job satisfaction across settings. Job stress was…

  6. Taking Environmental Action: The Role of Local Composition, Context, and Collective

    NASA Astrophysics Data System (ADS)

    Wakefield, Sarah E. L.; Elliott, Susan J.; Eyles, John D.; Cole, Donald C.

    2006-01-01

    This article explores individual and community action taken in response to perceived environmental risks by investigating the determinants of environmental action across a range of action types. A conceptual framework is first presented, which provides a foundation for investigating the role of local compositional (i.e., individual characteristics), contextual (i.e., neighborhood environment), and collective (i.e., social networks) factors in environmental action. To test the utility of the conceptual framework, a quantitative survey was administered to a random sample of households (n = 512) in Hamilton, Canada. The results suggest that the predictors of environmental action vary by action type (i.e., personal change, individual civic action, and cooperative civic action), and that factors related to perceived environmental exposure and social capital generally play a stronger, more consistent role in civic environmental action than sociodemographic or neighborhood factors. The results underscore the role of social connection in responses to perceived environmental risks.

  7. Privacy and anonymity challenges when collecting data for public health purposes.

    PubMed

    El Emam, Khaled; Moher, Ester

    2013-03-01

    Two contemporary problems face public health professionals in collecting data from health care providers: the de-identification of geospatial information in a manner that still allows meaningful analysis, and ensuring that provider performance data (e.g., infection or screening rates) is complete and accurate. In this paper, we discuss new methods for de-identifying geographic information that will allow useful de-identified data to be disclosed to public health. In addition, we propose privacy preserving mechanisms that will likely encourage providers to disclose complete and accurate data. However, this must be accompanied by steps to grow trust between the providers and public health. PMID:23590738

  8. Literacies and the Workplace: A Collection of Original Essays. EAE646 Language and Literacies: Contexts and Challenges in the Workplace.

    ERIC Educational Resources Information Center

    Deakin Univ., Victoria (Australia).

    This book is part of the study materials for the distance education course, Language and Literacies: Contexts and Challenges in the Workplace, in the Open Campus Program at Deakin University. It contains five essays about literacies in the workplace. The "Introduction" (Mike Brown) discusses the following topics: literacies in the workplace:…

  9. Navigating the Tides of Change: Revisiting the Notion of Reflexivity in the Context of Social Learning for Transboundary Collective Experimentation

    ERIC Educational Resources Information Center

    Bastrup-Birk, Henriette; Wildemeersch, Danny

    2011-01-01

    Social learning theory in the context of multi-actor engagement tends to relate reflexivity primarily to critical questioning of theories-in-use. We argue that viewing suspensive dialogue and imaginative envisioning as additional stages of reflexivity will serve at least three purposes: prevent over-emphasis on instrumental rationality focusing on…

  10. Performance-Oriented Privacy-Preserving Data Integration

    SciTech Connect

    Pon, R K; Critchlow, T

    2004-09-15

    Current solutions to integrating private data with public data have provided useful privacy metrics, such as relative information gain, that can be used to evaluate alternative approaches. Unfortunately, they have not addressed critical performance issues, especially when the public database is very large. The use of hashes and noise yields better performance than existing techniques while still making it difficult for unauthorized entities to distinguish which data items truly exist in the private database. As we show here, leveraging the uncertainty introduced by collisions caused by hashing and the injection of noise, we present a technique for performing a relational join operation between a massive public table and a relatively smaller private one.

  11. Medical records. Enhancing privacy, preserving the common good.

    PubMed

    Etzioni, A

    1999-01-01

    Personal medical information is now bought and sold on the open market. Companies use it to make hiring and firing decisions and to identify customers for new products. The justification for providing such access to medical information is that doing so benefits the public by securing public safety, controlling costs, and supporting medical research. And individuals have supposedly consented to it. But we can achieve the common goods while better protecting privacy by making institutional changes in the way information is maintained and protected. PMID:10321335

  12. Data privacy preservation in telemedicine: the PAIRSE project.

    PubMed

    Nageba, Ebrahim; Defude, Bruno; Morvan, Franck; Ghedira, Chirine; Fayn, Jocelyne

    2011-01-01

    The preservation of medical data privacy and confidentiality is a major challenge in eHealth systems and applications. A technological solution based on advanced information and communication systems architectures is needed in order to retrieve and exchange the patient's data in a secure and reliable manner. In this paper, we introduce the project PAIRSE, Preserving Privacy in Peer to Peer (P2P) environments, which proposes an original web service oriented framework preserving the privacy and confidentiality of shared or exchanged medical data. PMID:21893830

  13. A Randomized Response Model For Privacy Preserving Smart Metering

    PubMed Central

    Cui, Lijuan; Que, Jialan; Choi, Dae-Hyun; Jiang, Xiaoqian; Cheng, Samuel; Xie, Le

    2012-01-01

    The adoption of smart meters may bring new privacy concerns to the general public. Given the fact that metering data of individual homes/factories is accumulated every 15 minutes, it is possible to infer the pattern of electricity consumption of individual users. In order to protect the privacy of users in a completely de-centralized setting (i.e., individuals do not communicate with one another), we propose a novel protocol, which allows individual meters to report the true electricity consumption reading with a pre-determinted probability. Load serving entities (LSE) can reconstruct the total electricity consumption of a region or a district through inference algorithm, but their ability of identifying individual users’ energy consumption pattern is significantly reduced. Using simulated data, we verify the feasibility of the proposed method and demonstrate performance advantages over existing approaches. PMID:23243488

  14. Privacy preserving processing of genomic data: A survey.

    PubMed

    Akgün, Mete; Bayrak, A Osman; Ozer, Bugra; Sağıroğlu, M Şamil

    2015-08-01

    Recently, the rapid advance in genome sequencing technology has led to production of huge amount of sensitive genomic data. However, a serious privacy challenge is confronted with increasing number of genetic tests as genomic data is the ultimate source of identity for humans. Lately, privacy threats and possible solutions regarding the undesired access to genomic data are discussed, however it is challenging to apply proposed solutions to real life problems due to the complex nature of security definitions. In this review, we have categorized pre-existing problems and corresponding solutions in more understandable and convenient way. Additionally, we have also included open privacy problems coming with each genomic data processing procedure. We believe our classification of genome associated privacy problems will pave the way for linking of real-life problems with previously proposed methods. PMID:26056074

  15. A Randomized Response Model For Privacy Preserving Smart Metering.

    PubMed

    Wang, Shuang; Cui, Lijuan; Que, Jialan; Choi, Dae-Hyun; Jiang, Xiaoqian; Cheng, Samuel; Xie, Le

    2012-09-01

    The adoption of smart meters may bring new privacy concerns to the general public. Given the fact that metering data of individual homes/factories is accumulated every 15 minutes, it is possible to infer the pattern of electricity consumption of individual users. In order to protect the privacy of users in a completely de-centralized setting (i.e., individuals do not communicate with one another), we propose a novel protocol, which allows individual meters to report the true electricity consumption reading with a pre-determinted probability. Load serving entities (LSE) can reconstruct the total electricity consumption of a region or a district through inference algorithm, but their ability of identifying individual users' energy consumption pattern is significantly reduced. Using simulated data, we verify the feasibility of the proposed method and demonstrate performance advantages over existing approaches. PMID:23243488

  16. Realizing privacy preserving genome-wide association studies

    PubMed Central

    Simmons, Sean; Berger, Bonnie

    2016-01-01

    Motivation: As genomics moves into the clinic, there has been much interest in using this medical data for research. At the same time the use of such data raises many privacy concerns. These circumstances have led to the development of various methods to perform genome-wide association studies (GWAS) on patient records while ensuring privacy. In particular, there has been growing interest in applying differentially private techniques to this challenge. Unfortunately, up until now all methods for finding high scoring SNPs in a differentially private manner have had major drawbacks in terms of either accuracy or computational efficiency. Results: Here we overcome these limitations with a substantially modified version of the neighbor distance method for performing differentially private GWAS, and thus are able to produce a more viable mechanism. Specifically, we use input perturbation and an adaptive boundary method to overcome accuracy issues. We also design and implement a convex analysis based algorithm to calculate the neighbor distance for each SNP in constant time, overcoming the major computational bottleneck in the neighbor distance method. It is our hope that methods such as ours will pave the way for more widespread use of patient data in biomedical research. Availability and implementation: A python implementation is available at http://groups.csail.mit.edu/cb/DiffPriv/. Contact: bab@csail.mit.edu Supplementary information: Supplementary data are available at Bioinformatics online. PMID:26769317

  17. Facilitating Trust in Privacy-Preserving E-Learning Environments

    ERIC Educational Resources Information Center

    Anwar, M.; Greer, J.

    2012-01-01

    This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants,…

  18. Collective Efficacy in the School Context: Does It Help Explain Victimization and Bullying among Greek Primary and Secondary School Students?

    ERIC Educational Resources Information Center

    Sapouna, Maria

    2010-01-01

    Collective efficacy, defined as informal social controls that operate under social norms of trust, is an emerging theoretical concept that has been applied to explain violence rates in neighborhoods, affiliation with deviant peers, partner violence, and adolescent delinquency. This study employed a multilevel design to examine the association…

  19. The Context of Collecting Family Health History: Examining Definitions of Family and Family Communication About Health Among African American Women

    PubMed Central

    THOMPSON, TESS; SEO, JOANN; GRIFFITH, JULIA; BAXTER, MELANIE; JAMES, AIMEE; KAPHINGST, KIMBERLY A.

    2015-01-01

    Public health initiatives encourage the public to discuss and record family health history (FHH) information, which can inform prevention and screening for a variety of conditions. Most research on FHH discussion and collection, however, has involved predominantly White participants and has not considered lay definitions of family or family communication patterns about health. This qualitative study of 32 African American women, 16 with a history of cancer, analyzed participants’ definitions of family, family communication about health, and collection of FHH information. “Family” was defined by biological relatedness, social ties, interactions, and proximity. Several participants noted using different definitions of family for different purposes (e.g. biomedical vs. social). Health discussions took place between and within generations and were influenced by structural relationships (e.g. sister) and characteristics of family members (e.g. trustworthiness). Participants described managing tensions between sharing health information and protecting privacy, especially related to generational differences in sharing information, fear of familial conflict or gossip, and denial (sometimes described as refusal to “own” or “claim” a disease). Few participants reported that anyone in their family kept formal FHH records. Results suggest FHH initiatives should address family tensions and communication patterns that affect discussion and collection of FHH information. PMID:25730634

  20. The context of collecting family health history: examining definitions of family and family communication about health among African American women.

    PubMed

    Thompson, Tess; Seo, Joann; Griffith, Julia; Baxter, Melanie; James, Aimee; Kaphingst, Kimberly A

    2015-04-01

    Public health initiatives encourage the public to discuss and record family health history information, which can inform prevention and screening for a variety of conditions. Most research on family health history discussion and collection, however, has predominantly involved White participants and has not considered lay definitions of family or family communication patterns about health. This qualitative study of 32 African American women-16 with a history of cancer-analyzed participants' definitions of family, family communication about health, and collection of family health history information. Family was defined by biological relatedness, social ties, interactions, and proximity. Several participants noted using different definitions of family for different purposes (e.g., biomedical vs. social). Health discussions took place between and within generations and were influenced by structural relationships (e.g., sister) and characteristics of family members (e.g., trustworthiness). Participants described managing tensions between sharing health information and protecting privacy, especially related to generational differences in sharing information, fear of familial conflict or gossip, and denial (sometimes described as refusal to "own" or "claim" a disease). Few participants reported that anyone in their family kept formal family health history records. Results suggest family health history initiatives should address family tensions and communication patterns that affect discussion and collection of family health history information. PMID:25730634

  1. Caliper Context Annotation Library

    Energy Science and Technology Software Center (ESTSC)

    2015-09-30

    To understand the performance of parallel programs, developers need to be able to relate performance measurement data with context information, such as the call path / line numbers or iteration numbers where measurements were taken. Caliper provides a generic way to specify and collect multi-dimensional context information across the software stack, and provide ti to third-party measurement tools or write it into a file or database in the form of context streams.

  2. Individual Participation in Collective Action in the Context of a Caribbean Island State: Testing the Effects of Multiple Dimensions of Social Capital

    ERIC Educational Resources Information Center

    Jicha, Karl A.; Thompson, Gretchen H.; Fulkerson, Gregory M.; May, Jonathan E.

    2011-01-01

    This article presents the findings of a case study examining the relationship between social capital and individual participation in collective action on a Caribbean island recovering from devastation inflicted by Hurricanes Ivan and Emily. Using data drawn from 114 residential surveys on the island of Carriacou, Grenada, over the summer of 2006,…

  3. Collective inquiry in the context of school-wide reform: Exploring science curriculum and instruction through team-based professional development

    NASA Astrophysics Data System (ADS)

    Eddy Spicer, David Henning

    Teacher collaboration and joint reflective inquiry have been viewed as central elements of progressive educational reform for more than two decades. More recently, researchers, policy-makers, and practitioners have heralded "blended" or "hybrid" approaches that combine online and on-site environments for collaborative learning as especially promising for "scaling up" instructional improvement. Yet, relatively little is known about how teachers working together navigate organizational and interpersonal constraints to develop and sustain conditions essential to collective inquiry. This in-depth study of meaning making about curriculum and instruction among a group of 11 physics teachers in a public, urban secondary school in the U.S. is an effort to explore collective inquiry as a resource for teacher learning and innovations in teaching practice. Through extended observations, multiple interviews, and close analyses of interaction, the study followed teachers for 7 months as they worked together across 3 settings organized in fundamentally different ways to promote joint inquiry into teaching practice. The explanatory framework of the study rests on the mutually-reinforcing conceptual underpinnings of sociocultural theory and systemic functional linguistics to establish connections between micro-social interactions and macro-social processes. Drawing on systemic functional linguistics, the study explores interpersonal meaning making through close analyses of speech function and speech role in 6 extended sequences of generative interaction. Concepts from activity theory elucidate those features of settings and school that directly impinged on or advanced teachers' collaborative work. Findings run counter to prevailing congenial views of teacher collegiality by identifying ways in which collective inquiry is inherently unstable. That instability makes itself apparent at two levels: (a) the dynamics of authority within the group, and (b) middle-level features of

  4. Open Content in Open Context

    ERIC Educational Resources Information Center

    Kansa, Sarah Whitcher; Kansa, Eric C.

    2007-01-01

    This article presents the challenges and rewards of sharing research content through a discussion of Open Context, a new open access data publication system for field sciences and museum collections. Open Context is the first data repository of its kind, allowing self-publication of research data, community commentary through tagging, and clear…

  5. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency. PMID:26084587

  6. Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity

    NASA Astrophysics Data System (ADS)

    Cheon, Jung Hee; Jarecki, Stanislaw; Seo, Jae Hong

    Secure computation of the set intersection functionality allows n parties to find the intersection between their datasets without revealing anything else about them. An efficient protocol for such a task could have multiple potential applications in commerce, health care, and security. However, all currently known secure set intersection protocols for n>2 parties have computational costs that are quadratic in the (maximum) number of entries in the dataset contributed by each party, making secure computation of the set intersection only practical for small datasets. In this paper, we describe the first multi-party protocol for securely computing the set intersection functionality with both the communication and the computation costs that are quasi-linear in the size of the datasets. For a fixed security parameter, our protocols require O(n2k) bits of communication and Õ(n2k) group multiplications per player in the malicious adversary setting, where k is the size of each dataset. Our protocol follows the basic idea of the protocol proposed by Kissner and Song, but we gain efficiency by using different representations of the polynomials associated with users' datasets and careful employment of algorithms that interpolate or evaluate polynomials on multiple points more efficiently. Moreover, the proposed protocol is robust. This means that the protocol outputs the desired result even if some corrupted players leave during the execution of the protocol.

  7. A Privacy-Preserved Analytical Method for eHealth Database with Minimized Information Loss

    PubMed Central

    Chen, Ya-Ling; Cheng, Bo-Chao; Chen, Hsueh-Lin; Lin, Chia-I; Liao, Guo-Tan; Hou, Bo-Yu; Hsu, Shih-Chun

    2012-01-01

    Digitizing medical information is an emerging trend that employs information and communication technology (ICT) to manage health records, diagnostic reports, and other medical data more effectively, in order to improve the overall quality of medical services. However, medical information is highly confidential and involves private information, even legitimate access to data raises privacy concerns. Medical records provide health information on an as-needed basis for diagnosis and treatment, and the information is also important for medical research and other health management applications. Traditional privacy risk management systems have focused on reducing reidentification risk, and they do not consider information loss. In addition, such systems cannot identify and isolate data that carries high risk of privacy violations. This paper proposes the Hiatus Tailor (HT) system, which ensures low re-identification risk for medical records, while providing more authenticated information to database users and identifying high-risk data in the database for better system management. The experimental results demonstrate that the HT system achieves much lower information loss than traditional risk management methods, with the same risk of re-identification. PMID:22969273

  8. Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption

    PubMed Central

    2015-01-01

    Objective Developed sequencing techniques are yielding large-scale genomic data at low cost. A genome-wide association study (GWAS) targeting genetic variations that are significantly associated with a particular disease offers great potential for medical improvement. However, subjects who volunteer their genomic data expose themselves to the risk of privacy invasion; these privacy concerns prevent efficient genomic data sharing. Our goal is to presents a cryptographic solution to this problem. Methods To maintain the privacy of subjects, we propose encryption of all genotype and phenotype data. To allow the cloud to perform meaningful computation in relation to the encrypted data, we use a fully homomorphic encryption scheme. Noting that we can evaluate typical statistics for GWAS from a frequency table, our solution evaluates frequency tables with encrypted genomic and clinical data as input. We propose to use a packing technique for efficient evaluation of these frequency tables. Results Our solution supports evaluation of the D′ measure of linkage disequilibrium, the Hardy-Weinberg Equilibrium, the χ2 test, etc. In this paper, we take χ2 test and linkage disequilibrium as examples and demonstrate how we can conduct these algorithms securely and efficiently in an outsourcing setting. We demonstrate with experimentation that secure outsourcing computation of one χ2 test with 10, 000 subjects requires about 35 ms and evaluation of one linkage disequilibrium with 10, 000 subjects requires about 80 ms. Conclusions With appropriate encoding and packing technique, cryptographic solutions based on fully homomorphic encryption for secure computations of GWAS can be practical. PMID:26732892

  9. MetaSeq: privacy preserving meta-analysis of sequencing-based association studies.

    PubMed

    Singh, Angad Pal; Zafer, Samreen; Pe'er, Itsik

    2013-01-01

    Human genetics recently transitioned from GWAS to studies based on NGS data. For GWAS, small effects dictated large sample sizes, typically made possible through meta-analysis by exchanging summary statistics across consortia. NGS studies groupwise-test for association of multiple potentially-causal alleles along each gene. They are subject to similar power constraints and therefore likely to resort to meta-analysis as well. The problem arises when considering privacy of the genetic information during the data-exchange process. Many scoring schemes for NGS association rely on the frequency of each variant thus requiring the exchange of identity of the sequenced variant. As such variants are often rare, potentially revealing the identity of their carriers and jeopardizing privacy. We have thus developed MetaSeq, a protocol for meta-analysis of genome-wide sequencing data by multiple collaborating parties, scoring association for rare variants pooled per gene across all parties. We tackle the challenge of tallying frequency counts of rare, sequenced alleles, for metaanalysis of sequencing data without disclosing the allele identity and counts, thereby protecting sample identity. This apparent paradoxical exchange of information is achieved through cryptographic means. The key idea is that parties encrypt identity of genes and variants. When they transfer information about frequency counts in cases and controls, the exchanged data does not convey the identity of a mutation and therefore does not expose carrier identity. The exchange relies on a 3rd party, trusted to follow the protocol although not trusted to learn about the raw data. We show applicability of this method to publicly available exome-sequencing data from multiple studies, simulating phenotypic information for powerful meta-analysis. The MetaSeq software is publicly available as open source. PMID:23424140

  10. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes. PMID:25750176

  11. Quantifying the costs and benefits of privacy-preserving health data publishing.

    PubMed

    Khokhar, Rashid Hussain; Chen, Rui; Fung, Benjamin C M; Lui, Siu Man

    2014-08-01

    Cost-benefit analysis is a prerequisite for making good business decisions. In the business environment, companies intend to make profit from maximizing information utility of published data while having an obligation to protect individual privacy. In this paper, we quantify the trade-off between privacy and data utility in health data publishing in terms of monetary value. We propose an analytical cost model that can help health information custodians (HICs) make better decisions about sharing person-specific health data with other parties. We examine relevant cost factors associated with the value of anonymized data and the possible damage cost due to potential privacy breaches. Our model guides an HIC to find the optimal value of publishing health data and could be utilized for both perturbative and non-perturbative anonymization techniques. We show that our approach can identify the optimal value for different privacy models, including K-anonymity, LKC-privacy, and ∊-differential privacy, under various anonymization algorithms and privacy parameters through extensive experiments on real-life data. PMID:24768775

  12. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    PubMed Central

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-01-01

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300

  13. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    PubMed

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS. PMID:25298362

  14. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system

    NASA Astrophysics Data System (ADS)

    Karabat, Cagatay; Kiraz, Mehmet Sabir; Erdogan, Hakan; Savas, Erkay

    2015-12-01

    In this paper, we introduce a new biometric verification and template protection system which we call THRIVE. The system includes novel enrollment and authentication protocols based on threshold homomorphic encryption where a private key is shared between a user and a verifier. In the THRIVE system, only encrypted binary biometric templates are stored in a database and verification is performed via homomorphically randomized templates, thus, original templates are never revealed during authentication. Due to the underlying threshold homomorphic encryption scheme, a malicious database owner cannot perform full decryption on encrypted templates of the users in the database. In addition, security of the THRIVE system is enhanced using a two-factor authentication scheme involving user's private key and biometric data. Using simulation-based techniques, the proposed system is proven secure in the malicious model. The proposed system is suitable for applications where the user does not want to reveal her biometrics to the verifier in plain form, but needs to prove her identity by using biometrics. The system can be used with any biometric modality where a feature extraction method yields a fixed size binary template and a query template is verified when its Hamming distance to the database template is less than a threshold. The overall connection time for the proposed THRIVE system is estimated to be 336 ms on average for 256-bit biometric templates on a desktop PC running with quad core 3.2 GHz CPUs at 10 Mbit/s up/down link connection speed. Consequently, the proposed system can be efficiently used in real-life applications.

  15. METASEQ: PRIVACY PRESERVING META-ANALYSIS OF SEQUENCING-BASED ASSOCIATION STUDIES*

    PubMed Central

    SINGH, ANGAD PAL; ZAFER, SAMREEN; PE’ER, ITSIK

    2013-01-01

    Human genetics recently transitioned from GWAS to studies based on NGS data. For GWAS, small effects dictated large sample sizes, typically made possible through meta-analysis by exchanging summary statistics across consortia. NGS studies groupwise-test for association of multiple potentially-causal alleles along each gene. They are subject to similar power constraints and therefore likely to resort to meta-analysis as well. The problem arises when considering privacy of the genetic information during the data-exchange process. Many scoring schemes for NGS association rely on the frequency of each variant thus requiring the exchange of identity of the sequenced variant. As such variants are often rare, potentially revealing the identity of their carriers and jeopardizing privacy. We have thus developed MetaSeq, a protocol for meta-analysis of genome-wide sequencing data by multiple collaborating parties, scoring association for rare variants pooled per gene across all parties. We tackle the challenge of tallying frequency counts of rare, sequenced alleles, for meta-analysis of sequencing data without disclosing the allele identity and counts, thereby protecting sample identity. This apparent paradoxical exchange of information is achieved through cryptographic means. The key idea is that parties encrypt identity of genes and variants. When they transfer information about frequency counts in cases and controls, the exchanged data does not convey the identity of a mutation and therefore does not expose carrier identity. The exchange relies on a 3rd party, trusted to follow the protocol although not trusted to learn about the raw data. We show applicability of this method to publicly available exome-sequencing data from multiple studies, simulating phenotypic information for powerful meta-analysis. The MetaSeq software is publicly available as open source. PMID:23424140

  16. A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking

    NASA Astrophysics Data System (ADS)

    Herrmann, Dominik; Scheuer, Florian; Feustel, Philipp; Nowey, Thomas; Federrath, Hannes

    We propose a centralised platform for quantitative benchmarking of key performance indicators (KPI) among mutually distrustful organisations. Our platform offers users the opportunity to request an ad-hoc benchmarking for a specific KPI within a peer group of their choice. Architecture and protocol are designed to provide anonymity to its users and to hide the sensitive KPI values from other clients and the central server. To this end, we integrate user-centric peer group formation, exchangeable secure multi-party computation protocols, short-lived ephemeral key pairs as pseudonyms, and attribute certificates. We show by empirical evaluation of a prototype that the performance is acceptable for reasonably sized peer groups.

  17. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    PubMed

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-01-01

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300

  18. Collective Enumeration

    PubMed Central

    Bahrami, Bahador; Didino, Daniele; Frith, Chris; Butterworth, Brian; Rees, Geraint

    2012-01-01

    Many joint decisions in everyday life (e.g., Which bar is less crowded?) depend on approximate enumeration, but very little is known about the psychological characteristics of counting together. Here we systematically investigated collective approximate enumeration. Pairs of participants made individual and collective enumeration judgments in a 2-alternative forced-choice task and when in disagreement, they negotiated joint decisions via verbal communication and received feedback about accuracy at the end of each trial. The results showed that two people could collectively count better than either one alone, but not as well as expected by previous models of collective sensory decision making in more basic perceptual domains (e.g., luminance contrast). Moreover, such collective enumeration benefited from prior, noninteractive practice showing that social learning of how to combine shared information about enumeration required substantial individual experience. Finally, the collective context had a positive but transient impact on an individual's enumeration sensitivity. This transient social influence may be explained as a motivational factor arising from the fact that members of a collective must take responsibility for their individual decisions and face the consequences of their judgments. PMID:22889187

  19. Terminal context in context-sensitive grammars.

    NASA Technical Reports Server (NTRS)

    Book, R. V.

    1972-01-01

    Investigation of the conditions whereunder context-sensitive grammars generate context-free languages. The obtained results indicate that, if every noncontext-free rewriting rule of a context-sensitive grammar has as left context a string of terminal symbols and the left context is at least as long as the right context, then the language generated is context-free. Likewise, if every noncontext-free rewriting rule of a context-sensitive grammar has strings of terminal symbols as left and right contexts, then the language generated is also context-free.

  20. Managing University Research Microdata Collections

    ERIC Educational Resources Information Center

    Woolfrey, Lynn; Fry, Jane

    2015-01-01

    This article examines the management of microdata collections in a university context. It is a cross-country analysis: Collection management at data services in Canada and South Africa are considered. The case studies are of two university sub-contexts: One collection is located in a library; the other at a Faculty-based Data Service. Stages in…

  1. Imagining Another Context during Encoding Offsets Context-Dependent Forgetting

    ERIC Educational Resources Information Center

    Masicampo, E. J.; Sahakyan, Lili

    2014-01-01

    We tested whether imagining another context during encoding would offset context-dependent forgetting. All participants studied a list of words in Context A. Participants who remained in Context A during the test recalled more than participants who were tested in another context (Context B), demonstrating the standard context-dependent forgetting…

  2. Possibilistic context identification for SAS imagery

    NASA Astrophysics Data System (ADS)

    Du, Xiaoxiao; Zare, Alina; Cobb, J. T.

    2015-05-01

    This paper proposes a possibilistic context identification approach for synthetic aperture sonar (SAS) imagery. SAS seabed imagery can display a variety of textures that can be used to identify seabed types such as sea grass, sand ripple and hard-packed sand, etc. Target objects in SAS imagery often have varying characteristics and features due to changing environmental context. Therefore, methods that can identify the seabed environment can be used to assist in target classification and detection in an environmentally adaptive or context-dependent approach. In this paper, a possibilistic context identification approach is used to identify the seabed contexts. Alternative methods, such as crisp, fuzzy or probabilistic methods, would force one type of context on every sample in the imagery, ignoring the possibility that the test imagery may include an environmental context that has not yet appeared in the training process. The proposed possibilistic approach has an advantage in that it can both identify known contexts as well as identify when an unknown context has been encountered. Experiments are conducted on a collection of SAS imagery that display a variety of environmental features.

  3. Collection Development.

    ERIC Educational Resources Information Center

    School Libraries in Canada, 2002

    2002-01-01

    Includes 21 articles that discuss collection development in Canadian school libraries. Topics include digital collections in school library media centers; print and electronic library resources; library collections; collaborative projects; print-disabled students; informing administrators of the importance of collection development; censorship;…

  4. Privacy-Preserving Discovery of Topic-Based Events from Social Sensor Signals: An Experimental Study on Twitter

    PubMed Central

    Nguyen, Duc T.; Jung, Jai E.

    2014-01-01

    Social network services (e.g., Twitter and Facebook) can be regarded as social sensors which can capture a number of events in the society. Particularly, in terms of time and space, various smart devices have improved the accessibility to the social network services. In this paper, we present a social software platform to detect a number of meaningful events from information diffusion patterns on such social network services. The most important feature is to process the social sensor signal for understanding social events and to support users to share relevant information along the social links. The platform has been applied to fetch and cluster tweets from Twitter into relevant categories to reveal hot topics. PMID:24955388

  5. User Situational Context: An Essential Challenge to Context Awareness

    ERIC Educational Resources Information Center

    Mowafi, Yaser Abdallah

    2009-01-01

    Existing research on context and context awareness has broadly focused on the technical aspects of context acquisition and interpretation of users' surroundings, also called physical or sensor-based context. Such an approach has lacked from reconciling the perception of real-world context exhibited by humans, also known as user context, and…

  6. Developing Collections to Empower Learners

    ERIC Educational Resources Information Center

    Kimmel, Sue C.

    2014-01-01

    "Developing Collections to Empower Learners" examines collection development in the context of today's shifts toward digital resources while emphasizing the foundational beliefs of the school library profession. Writer Sue Kimmel includes practical advice about needs assessment, planning, selection, acquisitions, evaluation, and…

  7. Collective neutrino oscillations in supernovae

    SciTech Connect

    Duan, Huaiyu

    2014-06-24

    In a dense neutrino medium neutrinos can experience collective flavor transformation through the neutrino-neutrino forward scattering. In this talk we present some basic features of collective neutrino flavor transformation in the context in core-collapse supernovae. We also give some qualitative arguments for why and when this interesting phenomenon may occur and how it may affect supernova nucleosynthesis.

  8. Nanotechnology and Social Context

    ERIC Educational Resources Information Center

    Sandler, Ronald

    2007-01-01

    The central claims defended in this article are the following: (a) The social and ethical challenges of nanotechnology can be fully identified only if both the characteristic features of nanotechnologies and the social contexts into which they are emerging are considered. (b) When this is done, a host of significant social context issues, or…

  9. Contexts as Shared Commitments

    PubMed Central

    García-Carpintero, Manuel

    2015-01-01

    Contemporary semantics assumes two influential notions of context: one coming from Kaplan (1989), on which contexts are sets of predetermined parameters, and another originating in Stalnaker (1978), on which contexts are sets of propositions that are “common ground.” The latter is deservedly more popular, given its flexibility in accounting for context-dependent aspects of language beyond manifest indexicals, such as epistemic modals, predicates of taste, and so on and so forth; in fact, properly dealing with demonstratives (perhaps ultimately all indexicals) requires that further flexibility. Even if we acknowledge Lewis (1980)'s point that, in a sense, Kaplanian contexts already include common ground contexts, it is better to be clear and explicit about what contexts constitutively are. Now, Stalnaker (1978, 2002, 2014) defines context-as-common-ground as a set of propositions, but recent work shows that this is not an accurate conception. The paper explains why, and provides an alternative. The main reason is that several phenomena (presuppositional treatments of pejoratives and predicates of taste, forces other than assertion) require that the common ground includes non-doxastic attitudes such as appraisals, emotions, etc. Hence the common ground should not be taken to include merely contents (propositions), but those together with attitudes concerning them: shared commitments, as I will defend. PMID:26733087

  10. Incest in Context.

    ERIC Educational Resources Information Center

    Taubman, Stan

    1984-01-01

    Presents a comprehensive view of the societal, cultural, familial, and personality factors that form the context of people at risk for incest and associated problems. Summarizes the consequences and the causal context of incest and describes an ecosystems approach to intervention. (Author/LLL)

  11. Contexts as Shared Commitments.

    PubMed

    García-Carpintero, Manuel

    2015-01-01

    Contemporary semantics assumes two influential notions of context: one coming from Kaplan (1989), on which contexts are sets of predetermined parameters, and another originating in Stalnaker (1978), on which contexts are sets of propositions that are "common ground." The latter is deservedly more popular, given its flexibility in accounting for context-dependent aspects of language beyond manifest indexicals, such as epistemic modals, predicates of taste, and so on and so forth; in fact, properly dealing with demonstratives (perhaps ultimately all indexicals) requires that further flexibility. Even if we acknowledge Lewis (1980)'s point that, in a sense, Kaplanian contexts already include common ground contexts, it is better to be clear and explicit about what contexts constitutively are. Now, Stalnaker (1978, 2002, 2014) defines context-as-common-ground as a set of propositions, but recent work shows that this is not an accurate conception. The paper explains why, and provides an alternative. The main reason is that several phenomena (presuppositional treatments of pejoratives and predicates of taste, forces other than assertion) require that the common ground includes non-doxastic attitudes such as appraisals, emotions, etc. Hence the common ground should not be taken to include merely contents (propositions), but those together with attitudes concerning them: shared commitments, as I will defend. PMID:26733087

  12. Quantificational logic of context

    SciTech Connect

    Buvac, Sasa

    1996-12-31

    In this paper we extend the Propositional Logic of Context, to the quantificational (predicate calculus) case. This extension is important in the declarative representation of knowledge for two reasons. Firstly, since contexts are objects in the semantics which can be denoted by terms in the language and which can be quantified over, the extension enables us to express arbitrary first-order properties of contexts. Secondly, since the extended language is no longer only propositional, we can express that an arbitrary predicate calculus formula is true in a context. The paper describes the syntax and the semantics of a quantificational language of context, gives a Hilbert style formal system, and outlines a proof of the system`s completeness.

  13. Collecting apparatus

    DOEpatents

    Duncan, Charles P.

    1983-01-01

    An improved collecting apparatus for small aquatic or airborne organisms such as plankton, larval fish, insects, etc. The improvement constitutes an apertured removal container within which is retained a collecting bag, and which is secured at the apex of a conical collecting net. Such collectors are towed behind a vessel or vehicle with the open end of the conical net facing forward for trapping the aquatic or airborne organisms within the collecting bag, while allowing the water or air to pass through the apertures in the container. The container is readily removable from the collecting net whereby the collecting bag can be quickly removed and replaced for further sample collection. The collecting bag is provided with means for preventing the bag from being pulled into the container by the water or air flowing therethrough.

  14. Collections Conservation.

    ERIC Educational Resources Information Center

    DeCandido, Robert

    Collections conservation is an approach to the preservation treatment of books and book-like materials that is conceptualized and organized in terms of large groups of materials. This guide is intended to enable a library to evaluate its current collections conservation activities. The introduction describes collections conservation and gives…

  15. Putting concepts into context.

    PubMed

    Yee, Eiling; Thompson-Schill, Sharon L

    2016-08-01

    At first glance, conceptual representations (e.g., our internal notion of the object "lemon") seem static; we have the impression that there is something that the concept lemon "means" (a sour, yellow, football-shaped citrus fruit) and that this meaning does not vary. Research in semantic memory has traditionally taken this "static" perspective. Consequently, only effects demonstrated across a variety of contexts have typically been considered informative regarding the architecture of the semantic system. In this review, we take the opposite approach: We review instances of context-dependent conceptual activation at many different timescales-from long-term experience, to recent experience, to the current task goals, to the unfolding process of conceptual activation itself-and suggest that the pervasive effects of context across all of these timescales indicate that rather than being static, conceptual representations are constantly changing and are inextricably linked to their contexts. PMID:27282993

  16. Collection Mapping and Collection Development.

    ERIC Educational Resources Information Center

    Murray, William; And Others

    1985-01-01

    Describes the use of collection mapping to assess media collections of Aurora, Colorado, Public Schools. Case studies of elementary, middle, and high school media centers describe materials selection and weeding and identify philosophies that library collections should support school curriculum, and teacher-library media specialist cooperation in…

  17. Loneliness in Chinese Children across Contexts

    ERIC Educational Resources Information Center

    Chen, Xinyin; Wang, Li; Li, Dan; Liu, Junsheng

    2014-01-01

    This study examined loneliness and its associations with social functioning in children across different historical times and contexts in China. We collected data from urban and rural groups of school-age children (N = 2,588; M age = 10 years) using self-reports and peer assessments. The results indicated that children in 2002 and 2005 urban…

  18. A Context Vector Model for Information Retrieval.

    ERIC Educational Resources Information Center

    Billhardt, Holger; Borrajo, Daniel; Maojo, Victor

    2002-01-01

    Presents an indexing and information retrieval method that, based on the vector space model, incorporates term dependencies and thus obtains semantically richer representations of documents. Highlights include term context vectors; techniques for estimating the dependencies among terms; term weights; experimental results on four text collections;…

  19. Beauty in the Context of Particular Lives

    ERIC Educational Resources Information Center

    Rautio, Pauliina

    2010-01-01

    This paper is based on empirical research by the author into the everyday lives of people living in a small village. Everyday life is approached as a subjective process in time and space, experienced by particular people in a particular environmental and social context. The data of this research has been collected through correspondence in which…

  20. Researching Language and Literacy in Social Context.

    ERIC Educational Resources Information Center

    Graddol, David, Ed.; And Others

    A collection of readings addresses issues in empirical investigation of language and literacy in a social context, and provide models useful to researchers undertaking small-scale studies. They include: "Introducing Ethnography" (Martyn Hammersley); "The Relations between Researcher and Researched: Ethics, Advocacy and Empowerment" (D. Cameron,…

  1. English in the Ecuadorian Commercial Context.

    ERIC Educational Resources Information Center

    Alm, Cecilia Ovesdotter

    2003-01-01

    Presents a study completed in Quito, Ecuador that investigates the attitudinal perceptions toward English in advertising in the Ecuadorian commercial context. Findings are the result of four data collection procedures; a questionnaire administered to advertising experts, an analysis of business names in ten shopping centers, an analysis of…

  2. Collecting Rocks.

    ERIC Educational Resources Information Center

    Barker, Rachel M.

    One of a series of general interest publications on science topics, the booklet provides those interested in rock collecting with a nontechnical introduction to the subject. Following a section examining the nature and formation of igneous, sedimentary, and metamorphic rocks, the booklet gives suggestions for starting a rock collection and using…

  3. Jay's Collectibles

    ERIC Educational Resources Information Center

    Cappel, James J.; Gillman, Jason R., Jr.

    2011-01-01

    There is growing interest in collectibles of many types, as indicated by the popularity of television programs such as the History Channel's "Pawn Stars" and "American Pickers" and the Public Broadcasting Service's "Antiques Road Show." The availability of online auction sites such as eBay has enabled many people to collect items of interest as a…

  4. Collective Enumeration

    ERIC Educational Resources Information Center

    Bahrami, Bahador; Didino, Daniele; Frith, Chris; Butterworth, Brian; Rees, Geraint

    2013-01-01

    Many joint decisions in everyday life (e.g., Which bar is less crowded?) depend on approximate enumeration, but very little is known about the psychological characteristics of counting together. Here we systematically investigated collective approximate enumeration. Pairs of participants made individual and collective enumeration judgments in a…

  5. Collective Bargaining.

    ERIC Educational Resources Information Center

    Zirkel, Perry A.

    This chapter discusses litigation touching on collective bargaining issues. The chapter is organized to follow the collective bargaining process, from cases dealing with union organizing to cases involving arbitration. Issues covered also include determination of bargaining units, scope of bargaining, union security, and unfair labor practices in…

  6. Culture, context, and behavior.

    PubMed

    Matsumoto, David

    2007-12-01

    In this article I propose a model that posits three major sources of influence on behavior-basic human nature (via universal psychological processes), culture (via social roles), and personality (via individual role identities) and argue that individual behaviors are the products of the interaction between the three. I discuss how culture emerges from the interaction of basic human nature and the ecological contexts in which groups exist, and how social roles are determined by culture-specific psychological meanings attributed to situational contexts. The model further suggests that situational context moderates the relative contributions of the three sources in influencing behavior. I provide examples of apparent contradictory findings in the study of emotion that can be explained by the model proposed. PMID:17995466

  7. Meaning in Context.

    PubMed

    Gerrig, Richard J

    2015-01-01

    People often encounter language in contexts that provide meanings that go beyond previous experience. For example, people recover metaphorical meanings that displace literal meanings for the same words. For such cases, researchers have addressed the question of whether contextual support allows people to truncate or eliminate consideration of meanings that precede specific contexts. The article reviews 3 domains in which this question has prompted research: recovery of metaphorical meanings, understanding of noun-noun combinations, and assimilation of actions within fantastic narrative worlds. PMID:26255435

  8. Culture collections.

    PubMed

    Smith, David

    2012-01-01

    Culture collections no matter their size, form, or institutional objectives play a role in underpinning microbiology, supplying the resources for study, innovation, and discovery. Their basic roles include providing a mechanism for ex situ conservation of organisms; they are repositories for strains subject to publication, taking in safe, confidential, and patent deposits from researchers. They supply strains for use; therefore, the microorganisms provided must be authentic and preserved well, and any associated information must be valid and sufficient to facilitate the confirmation of their identity and to facilitate their use. The organisms must be collected in compliance with international conventions, international and national legislation and distributed to users indicating clearly the terms and conditions under which they are received and can be used. Collections are harmonizing approaches and characterizing strains to meet user needs. No one single collection can carry out this task alone, and therefore, it is important that output and strategy are coordinated to ensure culture collections deliver the basic resources and services microbiological innovation requires. This chapter describes the types of collection and how they can implement quality management systems and operate to deliver their basic functions. The links to information sources given not only provide support for the practitioners within collections but also provide guidance to users on accessing the huge resource available and how they can help ensure microbiology has the resources and a solid platform for future development. PMID:22569518

  9. Mathematics in Indigenous Contexts

    ERIC Educational Resources Information Center

    Perry, Bob; Howard Peter

    2008-01-01

    From 1999-2005, the Mathematics in Indigenous Contexts (MIC) project was implemented by the Board of Studies, New South Wales (NSW), in conjunction with the NSW Department of Education and Training, and academics from two universities. MIC project members worked with schools and communities at two sites: a primary school in an urban community in…

  10. From Context to Core

    ERIC Educational Resources Information Center

    Campus Technology, 2008

    2008-01-01

    At Campus Technology 2008, Arizona State University Technology Officer Adrian Sannier mesmerized audiences with his mandate to become more efficient by doing only the "core" tech stuff--and getting someone else to slog through the context. This article presents an excerpt from Sannier's hour-long keynote address at Campus Technology '08. Sannier…

  11. Formative Assessment in Context

    ERIC Educational Resources Information Center

    Oxenford-O'Brian, Julie

    2013-01-01

    This dissertation responds to critical gaps in current research on formative assessment practice which could limit successful implementation of this practice within the K-12 classroom context. The study applies a socio cultural perspective of learning to interpret a cross-case analysis of formative assessment practice occurring during one…

  12. Context, Learning, and Extinction

    ERIC Educational Resources Information Center

    Gershman, Samuel J.; Blei, David M.; Niv, Yael

    2010-01-01

    A. Redish et al. (2007) proposed a reinforcement learning model of context-dependent learning and extinction in conditioning experiments, using the idea of "state classification" to categorize new observations into states. In the current article, the authors propose an interpretation of this idea in terms of normative statistical inference. They…

  13. Rural as Context.

    ERIC Educational Resources Information Center

    Howley, Craig B.; Howley, Aimee A.

    This essay explains two ways in which "the rural" serves as context. The common way interprets the rural lifeworld as an impediment to certain projects and goals, thus framing "the rural" as a subjugated and diminished reality. The other way is called "the rural circumstance" in order to situate the rural lifeworld as a center of attention, not as…

  14. Generation and Context Memory

    ERIC Educational Resources Information Center

    Mulligan, Neil W.; Lozito, Jeffrey P.; Rosner, Zachary A.

    2006-01-01

    Generation enhances memory for occurrence but may not enhance other aspects of memory. The present study further delineates the negative generation effect in context memory reported in N. W. Mulligan (2004). First, the negative generation effect occurred for perceptual attributes of the target item (its color and font) but not for extratarget…

  15. Contexts of Dance.

    ERIC Educational Resources Information Center

    Sparshott, Francis

    1990-01-01

    Questions who decides what a culturally literate person needs to know and its social implications. Comments on the lack of dance references in E. D. Hirsch's book, "Cultural Literacy." Discusses what a person needs to know about dance. Analyzes dance as art in the context of cultural literacy's requirements. (KM)

  16. Putting tumours in context

    SciTech Connect

    Bissell, Mina J.; Radisky, Derek

    2001-10-01

    The interactions between cancer cells and their micro- and macroenvironment create a context that promotes tumor growth and protects it from immune attack. The functional association of cancer cells with their surrounding tissues forms a new 'organ' that changes as malignancy progresses. Investigation of this process might provide new insights into the mechanisms of tumorigenesis and could also lead to new therapeutic targets. Under normal conditions, ORGANS are made up of TISSUES that exchange information with other cell types via cell-cell contact, cytokines and the EXTRACELLULAR MATRIX (ECM). The ECM, which is produced by collaboration between STROMAL fibroblasts and EPITHELIAL cells, provides structural scaffolding for cells, as well as contextual information. The endothelial vasculature provides nutrients and oxygen, and cells of the immune system combat pathogens and remove apoptotic cells. Epithelial cells associate into intact, polarized sheets. These tissues communicate through a complex network of interactions: physically, through direct contact or through the intervening ECM, and biochemically, through both soluble and insoluble signalling molecules. In combination, these interactions provide the information that is necessary to maintain cellular differentiation and to create complex tissue structures. Occasionally, the intercellular signals that define the normal context become disrupted. Alterations in epithelial tissues can lead to movement of epithelial sheets and proliferation - for example, after activation of mesenchymal fibroblasts due to wounding.Normally, these conditions are temporary and reversible, but when inflammation is sustained, an escalating feedback loop ensues.Under persistent inflammatory conditions, continual upregulation of enzymes such as matrix metalloproteinases (MMPs) by stromal fibroblasts can disrupt the ECM, and invading immune cells can overproduce factors that promote abnormal proliferation. As this process progresses

  17. The Cultural Context of Learning in International Joint Ventures.

    ERIC Educational Resources Information Center

    Liu, Shimin; Vince, Russ

    1999-01-01

    A study of Chinese-Western joint business ventures showed that cultural context and different modes of managing and organizing must be considered. Successful joint ventures involve a process of collective, two-way learning. (SK)

  18. Micrometeorite Collecting

    ERIC Educational Resources Information Center

    Toubes, Joe; Hoff, Darrel

    1974-01-01

    Describes how to collect micrometeorites and suggests a number of related activities such as determining the number of meteors entering the atmosphere and determining the composition of the micrometeorites. (BR)

  19. Context based gait recognition

    NASA Astrophysics Data System (ADS)

    Bazazian, Shermin; Gavrilova, Marina

    2012-06-01

    Gait recognition has recently become a popular topic in the field of biometrics. However, the main hurdle is the insufficient recognition rate in the presence of low quality samples. The main focus of this paper is to investigate how the performance of a gait recognition system can be improved using additional information about behavioral patterns of users and the context in which samples have been taken. The obtained results show combining the context information with biometric data improves the performance of the system at a very low cost. The amount of improvement depends on the distinctiveness of the behavioral patterns and the quality of the gait samples. Using the appropriate distinctive behavioral models it is possible to achieve a 100% recognition rate.

  20. Context Oriented Information Integration

    NASA Astrophysics Data System (ADS)

    Mohania, Mukesh; Bhide, Manish; Roy, Prasan; Chakaravarthy, Venkatesan T.; Gupta, Himanshu

    Faced with growing knowledge management needs, enterprises are increasingly realizing the importance of seamlessly integrating critical business information distributed across both structured and unstructured data sources. Academicians have focused on this problem but there still remain a lot of obstacles for its widespread use in practice. One of the key problems is the absence of schema in unstructured text. In this paper we present a new paradigm for integrating information which overcomes this problem - that of Context Oriented Information Integration. The goal is to integrate unstructured data with the structured data present in the enterprise and use the extracted information to generate actionable insights for the enterprise. We present two techniques which enable context oriented information integration and show how they can be used for solving real world problems.

  1. Image Acquisition Context

    PubMed Central

    Bidgood, W. Dean; Bray, Bruce; Brown, Nicolas; Mori, Angelo Rossi; Spackman, Kent A.; Golichowski, Alan; Jones, Robert H.; Korman, Louis; Dove, Brent; Hildebrand, Lloyd; Berg, Michael

    1999-01-01

    Objective: To support clinically relevant indexing of biomedical images and image-related information based on the attributes of image acquisition procedures and the judgments (observations) expressed by observers in the process of image interpretation. Design: The authors introduce the notion of “image acquisition context,” the set of attributes that describe image acquisition procedures, and present a standards-based strategy for utilizing the attributes of image acquisition context as indexing and retrieval keys for digital image libraries. Methods: The authors' indexing strategy is based on an interdependent message/terminology architecture that combines the Digital Imaging and Communication in Medicine (DICOM) standard, the SNOMED (Systematized Nomenclature of Human and Veterinary Medicine) vocabulary, and the SNOMED DICOM microglossary. The SNOMED DICOM microglossary provides context-dependent mapping of terminology to DICOM data elements. Results: The capability of embedding standard coded descriptors in DICOM image headers and image-interpretation reports improves the potential for selective retrieval of image-related information. This favorably affects information management in digital libraries. PMID:9925229

  2. User Experience Evaluation in the Mobile Context

    NASA Astrophysics Data System (ADS)

    Obrist, Marianna; Meschtscherjakov, Alexander; Tscheligi, Manfred

    Multimedia services on mobile devices are becoming increasingly popular. Whereas the mobile phone is the most likely platform for mobile TV, PDAs, portable game consoles, and music players are attractive alternatives. Mobile TV consumption on mobile phones allows new kinds of user experiences, but it also puts designers and researchers in front of new challenges. On the one hand, designers have to take these novel experience potentials into account. On the other hand, the right methods to collect user feedback to further improve services for the mobile context have to be applied. In this chapter the importance of user experience research for mobile TV within the mobile context is highlighted. We present how different experience levels can be evaluated taking different mobile context categories into account. In particular, we discuss the Experience Sampling Method (ESM), which seems to be a fruitful approach for investigating user TV experiences.

  3. Blood Collection

    NASA Technical Reports Server (NTRS)

    1999-01-01

    The method that is used for the collection, storage and real-time analysis of blood and other bodily fluids has been licensed to DBCD, Inc. by NASA. The result of this patent licensing agreement has been the development of a commercial product that can provide serum or plasma from whole blood volumes of 20 microliters to 4 milliliters. The device has a fibrous filter with a pore size of less than about 3 microns, and is coated with a mixture of mannitol and plasma fraction protein. The coating causes the cellular fraction to be trapped by the small pores, leaving the cellular fraction intact on the fibrous filter while the acellular fraction passes through the filter for collection in unaltered form from the serum sample collection chamber. The method used by this product is useful to NASA for blood analysis on manned space missions.

  4. Teacher Thinking in Cultural Contexts. SUNY Series, The Social Context of Education.

    ERIC Educational Resources Information Center

    Rios, Francisco A., Ed.

    This collection sheds light on current research on teacher thinking in cultural contexts and identifies promising practices in teacher education that take the most salient contextual variables into account. Teacher cognition as influenced by race, ethnicity, and culture is explored in: (1) "Teacher Thinking in Urban Schools: The Need for a…

  5. Collecting Artifacts

    ERIC Educational Resources Information Center

    Coffey, Natalie

    2004-01-01

    Fresh out of college, the author had only a handful of items worthy of displaying, which included some fossils she had collected in her paleontology class. She had binders filled with great science information, but kids want to see "real" science, not paper science. Then it came to her: she could fill the shelves with science artifacts with the…

  6. Wastewater Collection.

    ERIC Educational Resources Information Center

    Chatterjee, Samar; And Others

    1978-01-01

    Presents a literature review of wastewater collection systems and components. This review covers: (1) planning, (2) construction; (3) sewer system evaluation; (4) maintenance; (5) rehabilitation; (6) overview prevention; and (7) wastewater pumping. A list of 111 references is also presented. (HM)

  7. Collection Security.

    ERIC Educational Resources Information Center

    Boss, Richard W.

    1984-01-01

    Presents a systematic approach to the problem of security of library collections and facilities from theft and vandalism. Highlights include responses to losses, defining security needs, typical weaknesses of facilities, policies and procedures that weaken a library's security, conducting a security audit, cost of security, cost-effectiveness, and…

  8. Collective Bargaining.

    ERIC Educational Resources Information Center

    Goldschmidt, Steven M.

    This chapter summarizes recent state supreme court and federal court decisions involving collective bargaining for employees of public educational institutions. The cases discussed are generally limited to those decided during 1975 and reported in the General Digest as of March 1976. In his discussion, the author attempts to integrate related…

  9. Collective Bargaining.

    ERIC Educational Resources Information Center

    Goldschmidt, Steven M.

    This chapter deals with the legal process by which employers and employee organizations discuss matters related to employment. The chapter is organized to reflect the initial sequence of events in the collective bargaining process. Cases are reported and analyzed in nine sections: obligation and authority to bargain; unit determination and…

  10. Collective Bargaining.

    ERIC Educational Resources Information Center

    Zirkel, Perry A.

    Higher education collective bargaining cases reviewed in this chapter follow the basic sequence of steps in the negotiation process, from issues of the rights of organization and negotiation through scope of bargaining, bargaining conduct, and union security to the ultimate problems of strikes and contract enforcement. Within this common outline,…

  11. Context-dependent hierarchies in pigeons.

    PubMed

    Nagy, Máté; Vásárhelyi, Gábor; Pettit, Benjamin; Roberts-Mariani, Isabella; Vicsek, Tamás; Biro, Dora

    2013-08-01

    Hierarchical organization is widespread in the societies of humans and other animals, both in social structure and in decision-making contexts. In the case of collective motion, the majority of case studies report that dominant individuals lead group movements, in agreement with the common conflation of the terms "dominance" and "leadership." From a theoretical perspective, if social relationships influence interactions during collective motion, then social structure could also affect leadership in large, swarm-like groups, such as fish shoals and bird flocks. Here we use computer-vision-based methods and miniature GPS tracking to study, respectively, social dominance and in-flight leader-follower relations in pigeons. In both types of behavior we find hierarchically structured networks of directed interactions. However, instead of being conflated, dominance and leadership hierarchies are completely independent of each other. Although dominance is an important aspect of variation among pigeons, correlated with aggression and access to food, our results imply that the stable leadership hierarchies in the air must be based on a different set of individual competences. In addition to confirming the existence of independent and context-specific hierarchies in pigeons, we succeed in setting out a robust, scalable method for the automated analysis of dominance relationships, and thus of social structure, applicable to many species. Our results, as well as our methods, will help to incorporate the broader context of animal social organization into the study of collective behavior. PMID:23878247

  12. Context-dependent hierarchies in pigeons

    PubMed Central

    Nagy, Máté; Vásárhelyi, Gábor; Pettit, Benjamin; Roberts-Mariani, Isabella; Vicsek, Tamás; Biro, Dora

    2013-01-01

    Hierarchical organization is widespread in the societies of humans and other animals, both in social structure and in decision-making contexts. In the case of collective motion, the majority of case studies report that dominant individuals lead group movements, in agreement with the common conflation of the terms “dominance” and “leadership.” From a theoretical perspective, if social relationships influence interactions during collective motion, then social structure could also affect leadership in large, swarm-like groups, such as fish shoals and bird flocks. Here we use computer-vision–based methods and miniature GPS tracking to study, respectively, social dominance and in-flight leader–follower relations in pigeons. In both types of behavior we find hierarchically structured networks of directed interactions. However, instead of being conflated, dominance and leadership hierarchies are completely independent of each other. Although dominance is an important aspect of variation among pigeons, correlated with aggression and access to food, our results imply that the stable leadership hierarchies in the air must be based on a different set of individual competences. In addition to confirming the existence of independent and context-specific hierarchies in pigeons, we succeed in setting out a robust, scalable method for the automated analysis of dominance relationships, and thus of social structure, applicable to many species. Our results, as well as our methods, will help to incorporate the broader context of animal social organization into the study of collective behavior. PMID:23878247

  13. Collective instabilities

    SciTech Connect

    K.Y. Ng

    2003-08-25

    The lecture covers mainly Sections 2.VIII and 3.VII of the book ''Accelerator Physics'' by S.Y. Lee, plus mode-coupling instabilities and chromaticity-driven head-tail instability. Besides giving more detailed derivation of many equations, simple interpretations of many collective instabilities are included with the intention that the phenomena can be understood more easily without going into too much mathematics. The notations of Lee's book as well as the e{sup jwt} convention are followed.

  14. Mindfulness in cultural context.

    PubMed

    Kirmayer, Laurence J

    2015-08-01

    Mindfulness meditation and other techniques drawn from Buddhism have increasingly been integrated into forms of psychotherapeutic intervention. In much of this work, mindfulness is understood as a mode of awareness that is present-centered and nonevaluative. This form of awareness is assumed to have intrinsic value in promoting positive mental health and adaptation by interrupting discursive thoughts that give rise to suffering. However, in the societies where it originated, mindfulness meditation is part of a larger system of Buddhist belief and practice with strong ethical and moral dimensions. Extracting techniques like mindfulness meditation from the social contexts in which they originate may change the nature and effects of the practice. The papers in this issue of Transcultural Psychiatry explore the implications of a cultural and contextual view of mindfulness for continued dialogue between Buddhist thought and psychiatry. This introductory essay considers the meanings of mindfulness meditation in cultural context and the uses of mindfulness as a therapeutic intervention in contemporary psychiatry and psychology. PMID:26264787

  15. Putting teamwork in context.

    PubMed

    Boaden, N; Leaviss, J

    2000-11-01

    Multidisciplinary teamwork is becoming more important in both the delivery of health care and in the organization and management of that delivery. The first of these has been accepted but traditional professional education has done little to address the challenge it presents to professionals. Recent reforms in the British NHS have made the challenge more urgent. Professionals must work together but in increasingly flexible and innovatory ways. They are also required to play more formal roles in NHS management and policy. Where teamwork has been addressed in professional education it has concentrated on the inter-personal dynamics of working teams. This remains important but to respond effectively to the new challenges curricula and educational practice will have to be clearer about the variety of teams involved and the importance of the context within which teams work. One view is offered as to how that context might be understood in order to map team diversity. Two models are offered to help develop multidisciplinary team learning. One of these deals with key aspects of the organizational setting and the other with factors that affect team processes. It is argued that both should help to facilitate multidisciplinary curriculum development but also suggest learning needs to be met within unidisciplinary professional education. Concentration on team dynamics alone will not deliver the teamwork required in the new NHS. PMID:11107017

  16. The HFEA in context.

    PubMed

    Franklin, Sarah

    2013-04-01

    While the regulatory role of the HFEA, its independence and its shortcomings are debated in the context of a fiscal economic crisis, the larger sociological importance of the Authority may be overlooked. Harder to calculate than its annual budget and more elusive than its technical remit as a licensing body, the cultural value of the HFEA as a historical and symbolic entity that was born out of a pioneering debate unique to the UK must be included in a discussion of its future role. Against its perceived shortcomings as an expensive and outdated quango is the importance of the Authority as a public instrument for enhancing the future of translational bioscience. From this point of view, the HFEA is crucial not only to ensuring the successful realization of a domestic bioscience agenda but also to protecting the international reputation of UK Plc as a best-practice model of publicly supported bioinnovation. PMID:23415996

  17. Correlation, coherence and context

    NASA Astrophysics Data System (ADS)

    Eberly, J. H.

    2016-08-01

    The modern theory of coherence is based on correlation functions. A generic example could be written < {{V}\\ast}≤ft({{t}1}\\right)V≤ft({{t}2}\\right)> , denoting an average of products of the values of a signal V(t) at two specified times. Here we infer that t is a degree of freedom that the signal depends on. Typically, physical variables depend on more than one degree of freedom, and recognition of this has prompted attention to some interesting questions for the correlation functions and the several coherences that can be attributed to the same optical field. We examine some of the questions arising from the standpoint of experimental contexts. Degree of polarizability and degree of entanglement (classical non-separability) can serve as starting points for quantitative assignments.

  18. Collective motion

    NASA Astrophysics Data System (ADS)

    Vicsek, Tamás; Zafeiris, Anna

    2012-08-01

    We review the observations and the basic laws describing the essential aspects of collective motion - being one of the most common and spectacular manifestation of coordinated behavior. Our aim is to provide a balanced discussion of the various facets of this highly multidisciplinary field, including experiments, mathematical methods and models for simulations, so that readers with a variety of background could get both the basics and a broader, more detailed picture of the field. The observations we report on include systems consisting of units ranging from macromolecules through metallic rods and robots to groups of animals and people. Some emphasis is put on models that are simple and realistic enough to reproduce the numerous related observations and are useful for developing concepts for a better understanding of the complexity of systems consisting of many simultaneously moving entities. As such, these models allow the establishing of a few fundamental principles of flocking. In particular, it is demonstrated, that in spite of considerable differences, a number of deep analogies exist between equilibrium statistical physics systems and those made of self-propelled (in most cases living) units. In both cases only a few well defined macroscopic/collective states occur and the transitions between these states follow a similar scenario, involving discontinuity and algebraic divergences.

  19. The Challenging Academic Development (CAD) Collective

    ERIC Educational Resources Information Center

    Peseta, Tai

    2005-01-01

    This article discusses the Challenging Academic Development (CAD) Collective and describes how it came out of a symposium called "Liminality, identity, and hybridity: On the promise of new conceptual frameworks for theorising academic/faculty development." The CAD Collective is and represents a space where people can open up their contexts and…

  20. Context-specific control and context selection in conflict tasks.

    PubMed

    Schouppe, Nathalie; Ridderinkhof, K Richard; Verguts, Tom; Notebaert, Wim

    2014-02-01

    This study investigated whether participants prefer contexts with relatively little cognitive conflict and whether this preference is related to context-specific control. A conflict selection task was administered in which participants had to choose between two categories that contained different levels of conflict. One category was associated with 80% congruent Stroop trials and 20% incongruent Stroop trials, while the other category was associated with only 20% congruent Stroop trials and 80% incongruent Stroop trials. As predicted, participants selected the low-conflict category more frequently, indicating that participants avoid contexts with high-conflict likelihood. Furthermore, we predicted a correlation between this preference for the low-conflict category and the control implementation associated with the categories (i.e., context-specific proportion congruency effect, CSPC effect). Results however did not show such a correlation, thereby failing to support a relationship between context control and context selection. PMID:24384400

  1. Cell nucleus in context

    SciTech Connect

    Lelievre, Sophie A.; Bissell, Mina J.; Pujuguet, Philippe

    1999-11-11

    The molecular pathways that participate in regulation of gene expression are being progressively unraveled. Extracellular signals, including the binding of extracellular matrix and soluble molecules to cell membrane receptors, activate specific signal transducers that convey information inside the cell and can alter gene products. Some of these transducers when translocated to the cell nucleus may bind to transcription complexes and thereby modify the transcriptional activity of specific genes. However, the basic molecules involved in the regulation of gene expression are found in many different cell and tissue types; thus the mechanisms underlying tissue-specific gene expression are still obscure. In this review, we focus on the study of signals that are conveyed to the nucleus. We propose that the way in which extracellular signals are integrated may account for tissue-specific gene expression. We argue that the integration of signals depends on the structural organization of cells ( i.e., extracellular matrix, cell membrane, cytoskeleton, nucleus) which a particular cell type within a tissue. Putting the nuclei in context allows us to envision gene expression as being regulated not only by the communication between the extracellular environment and the nucleus, but also by the influence of organized assemblies of cells on extracellular-nuclear communications.

  2. Distributed Control with Collective Intelligence

    NASA Technical Reports Server (NTRS)

    Wolpert, David H.; Wheeler, Kevin R.; Tumer, Kagan

    1998-01-01

    We consider systems of interacting reinforcement learning (RL) algorithms that do not work at cross purposes , in that their collective behavior maximizes a global utility function. We call such systems COllective INtelligences (COINs). We present the theory of designing COINs. Then we present experiments validating that theory in the context of two distributed control problems: We show that COINs perform near-optimally in a difficult variant of Arthur's bar problem [Arthur] (and in particular avoid the tragedy of the commons for that problem), and we also illustrate optimal performance in the master-slave problem.

  3. Disagreeing in context

    PubMed Central

    Marques, Teresa

    2015-01-01

    This paper argues for contextualism about predicates of personal taste and evaluative predicates in general, and offers a proposal of how apparently resilient disagreements are to be explained. The present proposal is complementary to others that have been made in the recent literature. Several authors, for instance (López de Sa, 2008; Sundell, 2011; Huvenes, 2012; Marques and García-Carpintero, 2014; Marques, 2014a), have recently defended semantic contextualism for those kinds of predicates from the accusation that it faces the problem of lost disagreement. These authors have proposed that a proper account of the resilient disagreement in the cases studied is to be achieved by an appeal to pragmatic processes, and to conflicting non-doxastic attitudes. It is argued here that the existing contextualist solutions are incomplete as they stand, and are subject to objections because of this. A supplementation of contextualism is offered, together with an explanation of why failed presuppositions of commonality (López de Sa), disputes over the appropriateness of a contextually salient standard (Sundell), and differences in non-doxastic attitudes (Sundell, Huvenes, Marques, and García-Carpintero) give rise to conflicts. This paper claims that conflicts of attitudes are the reason why people still have impressions of disagreement in spite of failed commonality presuppositions, that those conflicts drive metalinguistic disputes over the selection of appropriate standards, and hence conflicting non-doxastic attitudes demand an explanation that is independent of those context dependent pragmatic processes. The paper further argues that the missing explanation is 2-fold: first, disagreement prevails where the properties expressed by taste and value predicates are response-dependent properties, and, secondly, it prevails where those response-dependent properties are involved in evolved systems of coordination that respond to evolutionarily recurrent situations. PMID

  4. Non-context-free grammars generating context-free languages

    NASA Technical Reports Server (NTRS)

    Baker, B. S.

    1974-01-01

    If G is a grammar such that in each non-context-free rule of G, the right side contains a string of terminals longer than any terminal string appearing between two nonterminals in the left side, then the language generated by G is context free. Six previous results follow as corollaries of this theorem.

  5. Integrating Risk Context into Risk Assessments: The Risk Context Scale

    ERIC Educational Resources Information Center

    Kroner, Daryl G.; Gray, Andrew L.; Goodrich, Ben

    2013-01-01

    The context in which offenders are released is an important component of conducting risk assessments. A sample of 257 supervised male parolees were followed in the community ("M" = 870 days) after an initial risk assessment. Drawing on community-based information, the purpose of this study was to evaluate the recently developed Risk Context Scale.…

  6. School Context, Gender, and Delinquency.

    ERIC Educational Resources Information Center

    Fiqueira-McDonough, Josefina

    1986-01-01

    Two high schools serving the same community are compared in order to examine how control/strain variables predict delinquency in two contexts. The school context characterized by a broader definition of success, more specialized discipline, and predictable supervision was found to have lower levels of delinquency for both genders. (Author/LMO)

  7. Popular Culture, Methods, and Context.

    ERIC Educational Resources Information Center

    Harmer, Jeremy

    2003-01-01

    Responds to an earlier article that argues that the dominance of communicative language teaching (CLT) has led to the neglect of one crucial aspect of language pedagogy, namely the context in which that pedagogy takes place. Suggests that it is time to replace CLT as the central paradigm in language teaching with a context approach. (Author/VWL)

  8. Putting the Context into Learning

    ERIC Educational Resources Information Center

    Edwards, Richard; Miller, Kate

    2007-01-01

    The article explores the conceptualization of learning and context from a number of perspectives and some of the theoretical and methodological issues raised when context is no longer considered as a container, but as a relational effect. It provides an introduction for the articles that follow, insofar as they take up lines of flight from the…

  9. Teaching Psychology: The Political Context

    ERIC Educational Resources Information Center

    Newland, John

    2008-01-01

    In this commentary, the author raises two critical aspects not adequately addressed in John Radford's (2008) wide ranging article on the teaching of psychology in higher education. The first aspect is the relevance of boundaries. The second aspect is the political context(s). These two issues, though artificially dissociated for current purposes,…

  10. The Context Oriented Training Method.

    ERIC Educational Resources Information Center

    Cavrini, Andrea

    The Context Oriented Training (COT) method is introduced and explored in this paper. COT is a means of improving the training process, beginning with the observation and analysis of current corporate experiences in the field. The learning context lies between the development of professional competencies in training and the operational side in the…

  11. Context-Enabled Business Intelligence

    SciTech Connect

    Troy Hiltbrand

    2012-04-01

    To truly understand context and apply it in business intelligence, it is vital to understand what context is and how it can be applied in addressing organizational needs. Context describes the facets of the environment that impact the way that end users interact with the system. Context includes aspects of location, chronology, access method, demographics, social influence/ relationships, end-user attitude/ emotional state, behavior/ past behavior, and presence. To be successful in making Business Intelligence content enabled, it is important to be able to capture the context of use user. With advances in technology, there are a number of ways in which this user based information can be gathered and exposed to enhance the overall end user experience.

  12. The neighborhood context of well-being.

    PubMed

    Sampson, Robert J

    2003-01-01

    Health-related problems are strongly associated with the social characteristics of communities and neighborhoods. We need to treat community contexts as important units of analysis in their own right, which in turn calls for new measurement strategies as well as theoretical frameworks that do not simply treat the neighborhood as a "trait" of the individual. Recent findings from the Project on Human Development in Chicago Neighborhoods support this thesis. Two major themes merit special attention: (1) the importance of collective efficacy for understanding health disparities in the modern city; and (2) the salience of spatial dynamics that go beyond the confines of local neighborhoods. Further efforts to explain the causes of variation in collective processes associated with healthy communities may provide innovative opportunities for preventive intervention. PMID:14563074

  13. 77 FR 20686 - 60-Day Notice of Proposed Information Collections: Two DDTC Brokering Collections

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-05

    ... comment on December 19, 2011 (see 76 FR 78578). On that occasion, public comment was sought in the context... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE 60-Day Notice of Proposed Information Collections: Two DDTC Brokering Collections ACTION: Notice of request...

  14. Context representations, context functions, and the parahippocampal–hippocampal system

    PubMed Central

    Rudy, Jerry W.

    2009-01-01

    Psychologists and neurobiologists have a long-standing interest in understanding how the context surrounding the events of our lives is represented and how it influences our behavior. The hippocampal formation emerged very early as a major contributor to how context is represented and functions. There is a large literature examining its contribution that on the surface reveals an array of conflicting outcomes and controversy. This review reveals that these conflicts can be resolved by building Nadel and Willner's dual-process theory of context representations. Two general conclusions emerge: (1) There are two neural systems that can support context representations and functions—a neocortical system composed primarily of perirhinal and postrhinal cortices and a hippocampal system that includes perirhinal, postrhinal, entorhinal cortices, and the hippocampal formation. (2) These two systems are not equivalent—some context representations and functions are uniquely supported by the hippocampal system. These conclusions are discussed in the context of canonical ideas about the special properties of the hippocampal system that enable it to make unique contributions to memory. PMID:19794181

  15. Context-driven automated target detection in 3D data

    NASA Astrophysics Data System (ADS)

    West, Karen F.; Webb, Brian N.; Lersch, James R.; Pothier, Steven; Triscari, Joseph M.; Iverson, A. E.

    2004-09-01

    This paper summarizes a system, and its component algorithms, for context-driven target vehicle detection in 3-D data that was developed under the Defense Advanced Research Projects Agency (DARPA) Exploitation of 3-D Data (E3D) Program. In order to determine the power of shape and geometry for the extraction of context objects and the detection of targets, our algorithm research and development concentrated on the geometric aspects of the problem and did not utilize intensity information. Processing begins with extraction of context information and initial target detection at reduced resolution, followed by a detailed, full-resolution analysis of candidate targets. Our reduced-resolution processing includes a probabilistic procedure for finding the ground that is effective even in rough terrain; a hierarchical, graph-based approach for the extraction of context objects and potential vehicle hide sites; and a target detection process that is driven by context-object and hide-site locations. Full-resolution processing includes statistical false alarm reduction and decoy mitigation. When results are available from previously collected data, we also perform object-level change detection, which affects the probabilities that objects are context objects or targets. Results are presented for both synthetic and collected LADAR data.

  16. Workforce Competitiveness Collection. "LINCS" Resource Collection News

    ERIC Educational Resources Information Center

    Literacy Information and Communication System, 2011

    2011-01-01

    This edition of "'LINCS' Resource Collection News" features the Workforce Competitiveness Collection, covering the topics of workforce education, English language acquisition, and technology. Each month Collections News features one of the three "LINCS" (Literacy Information and Communication System) Resource Collections--Basic Skills, Program…

  17. Program Management Collection. "LINCS" Resource Collection News

    ERIC Educational Resources Information Center

    Literacy Information and Communication System, 2011

    2011-01-01

    This edition of "'LINCS' Resource Collection News" features the Program Management Collection, which covers the topics of Assessment, Learning Disabilities, and Program Improvement. Each month Collections News features one of the three "LINCS" (Literacy Information and Communication System) Resource Collections--Basic Skills, Program Management,…

  18. Social Context in School: Its Relation to Adolescents' Depressive Mood

    ERIC Educational Resources Information Center

    Boulard, Aurore; Quertemont, Etienne; Gauthier, Jean-Marie; Born, Michel

    2012-01-01

    This study examined the impact of various school-related factors on adolescents' depressive mood, including prosocial behavior, verbal aggression, and relationships with teachers. The data used in this study were collected in the context of a larger survey on victimization in secondary schools from the French Community of Belgium. Participants…

  19. Schooling Closer to Home: Desegregation Policy and Neighborhood Contexts

    ERIC Educational Resources Information Center

    Goldring, Ellen; Cohen-Vogel, Lora; Smrekar, Claire; Taylor, Cynthia

    2006-01-01

    This article uses census data, information collected by health and police departments, and GIS mapping software to analyze the neighborhood contexts surrounding schools in one Southern school district. When courts lifted Nashville's desegregation order in 1999, the district agreed to implement a new student assignment plan geared toward…

  20. The Social Context of Young Children's Peer Victimization

    ERIC Educational Resources Information Center

    Hanish, Laura D.; Ryan, Patti; Martin, Carol Lynn; Fabes, Richard A.

    2005-01-01

    The goal of this study was to investigate differences in the social context of peer victimization for preschoolers and kindergarteners. Data were collected from 168 children. For preschoolers, neither social acceptance nor friendships were significantly related to peer victimization. Instead, playing with peers and exposure to aggressive peers…

  1. Learning in Authentic Contexts: Projects Integrating Spatial Technologies and Fieldwork

    ERIC Educational Resources Information Center

    Huang, Kuo-Hung

    2011-01-01

    In recent years, professional practice has been an issue of concern in higher education. The purpose of this study is to design students' projects to facilitate collaborative learning in authentic contexts. Ten students majoring in Management Information Systems conducted fieldwork with spatial technologies to collect data and provided information…

  2. Interactional Renegotiations of Educational Discourses in Recreational Learning Contexts

    ERIC Educational Resources Information Center

    Madsen, Lian Malai

    2011-01-01

    In this paper I focus on sequences of interaction among youth where the participants engage in classroom related activities (such as spelling, discussion of essays, etc.). My paper is based on interactional and ethnographic data collected among youth in two different leisure contexts. I discuss how the participants by employment of various…

  3. Special Collections, Primary Resources, and Information Literacy Pedagogy

    ERIC Educational Resources Information Center

    Hubbard, Melissa A.; Lotts, Megan

    2013-01-01

    This article reports on collaboration between an information literacy (IL) instructor and a special collections librarian to create a hands-on special collections experience for entry-level IL students within the context of a credit-bearing class. Data collected during this experience found that exposing students to these materials can increase…

  4. Collective Bargaining in Higher Education. The State of the Art.

    ERIC Educational Resources Information Center

    Julius, Daniel J., Ed.

    American higher education collective bargaining is addressed in 21 essays by administrators and academicians who are actively engaged in the process. Titles and authors are as follows: "The Context of Collective Bargaining in American Colleges and Universities" (Kenneth P. Mortimer); "Collective Bargaining in the Multi-Campus System" (Richard E.…

  5. Context Switch Effects and Context Experience in Rats' Conditioned Taste Aversion

    ERIC Educational Resources Information Center

    Leon, Samuel P.; Callejas-Aguilera, Jose E.; Rosas, Juan M.

    2012-01-01

    Context specificity of rats' conditioned taste aversion as a function of context experience was assessed in two experiments. Rats received a single pairing between a flavor X and a LiCl injection in a distinctive context (context A) being subsequently tested either in the same context or in a different but equally familiar context (context B).…

  6. Conceptions of Assessment When the Teaching Context and Learner Population Matter: Compulsory School versus Non-Compulsory Adult Education Contexts

    ERIC Educational Resources Information Center

    Remesal, Ana; Brown, Gavin T. L.

    2015-01-01

    This paper presents results of a study on teachers' conceptions of assessment carried out on a sample of 493 teachers of Spanish as foreign language from all over the world. At the moment of data collection, the participants were members of an international online teacher community and were teaching at different professional contexts: basic…

  7. Context-enhanced video understanding

    NASA Astrophysics Data System (ADS)

    Jaimes, Alejandro; Naphade, Milind R.; Nock, Harriet; Smith, John R.; Tseng, Belle L.

    2003-01-01

    Many recent efforts have been made to automatically index multimedia content with the aim of bridging the semantic gap between syntax and semantics. In this paper, we propose a novel framework to automatically index video using context for video understanding. First we discuss the notion of context and how it relates to video understanding. Then we present the framework we are constructing, which is modeled as an expert system that uses a rule-based engine, domain knowledge, visual detectors (for objects and scenes), and different data sources available with the video (metadata, text from automatic speech recognition, etc.). We also describe our approach to align text from speech recognition and video segments, and present experiments using a simple implementation of our framework. Our experiments show that context can be used to improve the performance of visual detectors.

  8. 78 FR 67847 - Debt Collection (Regulation F)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-12

    ... application in the context of debt collection. Trade Regulation Rule: Credit Practices, 49 FR 7740 (Mar. 1..., 50 FR 16696 (Apr. 29, 1985) (Board); Consumer Protections; Unfair or Deceptive Credit Practices, 50 FR 19325 (May 8, 1985) (FHLBB); Federal Credit Union; Prohibited Lending Practices, 52 FR 35060...

  9. Proximate Sources of Collective Teacher Efficacy

    ERIC Educational Resources Information Center

    Adams, Curt M.; Forsyth, Patrick B.

    2006-01-01

    Purpose: Recent scholarship has augmented Bandura's theory underlying efficacy formation by pointing to more proximate sources of efficacy information involved in forming collective teacher efficacy. These proximate sources of efficacy information theoretically shape a teacher's perception of the teaching context, operationalizing the difficulty…

  10. Student Loan Programs: Management and Collection.

    ERIC Educational Resources Information Center

    Dorian, James C.; Ward, Diane M.

    This guide to undergraduate and graduate student loan programs focuses primarily on program administration and management in the context of student loan repayment and collection. By incorporating regulatory requirements with practical suggestions on managing student loan programs, the book provides a framework and a guide for those who are…

  11. Collections Management, Collections Maintenance, and Conservation.

    ERIC Educational Resources Information Center

    American Association of Museums, Washington, DC.

    This national survey of the state of the nation's museum collections investigates collection care policies and practices, conservation issues, and private sector and federal support for museum needs. It consists of two major projects and four additional information gathering projects. The Museum Collection Survey is designed to examine all major…

  12. Estimating changing contexts in schizophrenia.

    PubMed

    Kaplan, Claire M; Saha, Debjani; Molina, Juan L; Hockeimer, William D; Postell, Elizabeth M; Apud, Jose A; Weinberger, Daniel R; Tan, Hao Yang

    2016-07-01

    SEE STEPHAN ET AL DOI101093/AWW120 FOR A SCIENTIFIC COMMENTARY ON THIS WORK: Real world information is often abstract, dynamic and imprecise. Deciding if changes represent random fluctuations, or alterations in underlying contexts involve challenging probability estimations. Dysfunction may contribute to erroneous beliefs, such as delusions. Here we examined brain function during inferences about context change from noisy information. We examined cortical-subcortical circuitry engaging anterior and dorsolateral prefrontal cortex, and midbrain. We hypothesized that schizophrenia-related deficits in prefrontal function might overestimate context change probabilities, and that this more chaotic worldview may subsequently gain familiarity and be over-reinforced, with implications for delusions. We then examined these opposing information processing biases against less expected versus familiar information patterns in relation to genetic risk for schizophrenia in unaffected siblings. In one experiment, 17 patients with schizophrenia and 24 normal control subjects were presented in 3 T magnetic resonance imaging with numerical information varying noisily about a context integer, which occasionally shifted up or down. Subjects were to indicate when the inferred numerical context had changed. We fitted Bayesian models to estimate probabilities associated with change inferences. Dynamic causal models examined cortical-subcortical circuitry interactions at context change inference, and at subsequent reduced uncertainty. In a second experiment, genetic risk for schizophrenia associated with similar cortical-subcortical findings were explored in an independent sample of 36 normal control subjects and 35 unaffected siblings during processing of intuitive number sequences along the number line, or during the inverse, less familiar, sequence. In the first experiment, reduced Bayesian models fitting subject behaviour suggest that patients with schizophrenia overestimated context

  13. The social context of well-being.

    PubMed

    Helliwell, John F; Putnam, Robert D

    2004-09-29

    Large samples of data from the World Values Survey, the US Benchmark Survey and a comparable Canadian survey are used to estimate equations designed to explore the social context of subjective evaluations of well-being, of happiness, and of health. Social capital, as measured by the strength of family, neighbourhood, religious and community ties, is found to support both physical health and subjective well-being. Our new evidence confirms that social capital is strongly linked to subjective well-being through many independent channels and in several different forms. Marriage and family, ties to friends and neighbours, workplace ties, civic engagement (both individually and collectively), trustworthiness and trust: all appear independently and robustly related to happiness and life satisfaction, both directly and through their impact on health. PMID:15347534

  14. Migration of cells in a social context.

    PubMed

    Vedel, Søren; Tay, Savaş; Johnston, Darius M; Bruus, Henrik; Quake, Stephen R

    2013-01-01

    In multicellular organisms and complex ecosystems, cells migrate in a social context. Whereas this is essential for the basic processes of life, the influence of neighboring cells on the individual remains poorly understood. Previous work on isolated cells has observed a stereotypical migratory behavior characterized by short-time directional persistence with long-time random movement. We discovered a much richer dynamic in the social context, with significant variations in directionality, displacement, and speed, which are all modulated by local cell density. We developed a mathematical model based on the experimentally identified "cellular traffic rules" and basic physics that revealed that these emergent behaviors are caused by the interplay of single-cell properties and intercellular interactions, the latter being dominated by a pseudopod formation bias mediated by secreted chemicals and pseudopod collapse following collisions. The model demonstrates how aspects of complex biology can be explained by simple rules of physics and constitutes a rapid test bed for future studies of collective migration of individual cells. PMID:23251032

  15. Loneliness in Chinese children across contexts.

    PubMed

    Chen, Xinyin; Wang, Li; Li, Dan; Liu, Junsheng

    2014-10-01

    This study examined loneliness and its associations with social functioning in children across different historical times and contexts in China. We collected data from urban and rural groups of school-age children (N = 2,588; M age = 10 years) using self-reports and peer assessments. The results indicated that children in 2002 and 2005 urban groups had lower scores on loneliness than did children in 1992 and 1998 urban groups, suggesting that as urban China became a more modernized, self-oriented society, children tended to report lower levels of loneliness. Consistent with this trend, urban children reported lower levels of loneliness than did their rural counterparts in recent years. The analysis of associations between social functioning and loneliness revealed that across groups, sociability was negatively associated with loneliness, and aggression was positively associated with loneliness. The association between shyness and loneliness differed among the groups; it was negative in the 1992 urban group, positive in the 2002 and 2005 urban groups, and nonsignificant in the 1998 urban and 2007 rural groups. The different associations suggest that whether shy children feel lonely might depend on context. PMID:25181650

  16. Classification of Tumor Histology via Morphometric Context.

    PubMed

    Chang, Hang; Borowsky, Alexander; Spellman, Paul; Parvin, Bahram

    2013-06-23

    Image-based classification of tissue histology, in terms of different components (e.g., normal signature, categories of aberrant signatures), provides a series of indices for tumor composition. Subsequently, aggregation of these indices in each whole slide image (WSI) from a large cohort can provide predictive models of clinical outcome. However, the performance of the existing techniques is hindered as a result of large technical and biological variations that are always present in a large cohort. In this paper, we propose two algorithms for classification of tissue histology based on robust representations of morphometric context, which are built upon nuclear level morphometric features at various locations and scales within the spatial pyramid matching (SPM) framework. These methods have been evaluated on two distinct datasets of different tumor types collected from The Cancer Genome Atlas (TCGA), and the experimental results indicate that our methods are (i) extensible to different tumor types; (ii) robust in the presence of wide technical and biological variations; (iii) invariant to different nuclear segmentation strategies; and (iv) scalable with varying training sample size. In addition, our experiments suggest that enforcing sparsity, during the construction of morphometric context, further improves the performance of the system. PMID:24319324

  17. Suicide prevention in the genetic counseling context.

    PubMed

    Peters, J A

    1994-09-01

    Utilizing a case report, this paper explores psychosocial aspects of suicidal intent in a woman seeking prenatal diagnosis. Using knowledge and practice of appropriate assessment, referral, and intervention procedures, the therapy team of genetic counselor and psychotherapist facilitated successful identification and management of this potentially suicidal client. The main counseling goals for the genetic counselor are to assess the situation adequately, decrease the immediate danger, and, with supervision and/or consultation, stabilize the seriously suicidal person until that individual can be triaged to mental health or medical professionals for treatment. The prevalence of suicide issues in genetic counseling contexts is unknown and reports mentioning suicidal ideation unusual in the genetic counseling literature. Is this reported case a rarity among genetic counseling referrals? Systematically collected information on the prevalence and resolution of suicidal issues in genetic counseling contexts would be helpful for those setting curricula for genetic counseling training programs, standards for professional certification exams, and policy and procedures manuals for clinical units. PMID:24234007

  18. Houston, 2001: Context and Legacy

    ERIC Educational Resources Information Center

    Fouad, Nadya A.; McPherson, Robert H.; Gerstein, Larry; Blustein, David L.; Elman, Nancy; Helledy, Kristin Ihle; Metz, A. J.

    2004-01-01

    This article presents an overview of the Houston 2001 National Counseling Psychology Conference. The authors discuss the context for the 4th National Counseling Psychology Conference, document the process of decision making about the conference, and examine the content of the conference. The authors also examine a unique feature of the conference,…

  19. Creativity in a Cultural Context.

    ERIC Educational Resources Information Center

    Irwin, Rita L.; Reynolds, J. Karen

    1992-01-01

    Interviews with 20 Ojibwa artists and teachers in isolated and urban Ontario communities suggest that creative expression is tied to and defined by social, cultural, ethical, and historical contexts. Conditions necessary for fostering creativity include time; materials; and an atmosphere of cooperation, psychological safety, and psychological…

  20. Towards Context Sensitive Information Inference.

    ERIC Educational Resources Information Center

    Song, D.; Bruza, P. D.

    2003-01-01

    Discusses information inference from a psychologistic stance and proposes an information inference mechanism that makes inferences via computations of information flow through an approximation of a conceptual space. Highlights include cognitive economics of information processing; context sensitivity; and query models for information retrieval.…

  1. School Grading and Institutional Contexts

    ERIC Educational Resources Information Center

    Dardanoni, Valentino; Modica, Salvatore; Pennisi, Aline

    2011-01-01

    We study how the relationship between students' cognitive ability and their school grades depends on institutional contexts. In a simple abstract model, we show that unless competence standards are set at above-school level or the variation of competence across schools is low, students' competence valuation will be heterogeneous, with weaker…

  2. Motivational Interviewing in Relational Context

    ERIC Educational Resources Information Center

    Miller, William R.; Rose, Gary S.

    2010-01-01

    Responds to M. Stanton's comments on the current author's original article. One of the puzzles of motivational interviewing is why it works at all. How can it be that an individual interview or two yields change in a long-standing problem behavior even without any effort to alter social context? The time involved is such a tiny part of the…

  3. Teaching Context in Information Security

    ERIC Educational Resources Information Center

    Bishop, Matt

    2006-01-01

    This article investigates teaching the application of technical ideas by non-technical means, especially by using puzzles to engage students. After discussing the need to teach students to evaluate contexts in which decisions about computer security must be made, we suggest questions and scenarios drawn from political science, history, as well as…

  4. Context Orientated Teaching in Praxis

    ERIC Educational Resources Information Center

    Nikos, Klaoudatos; Stavros, Papastavridis

    2004-01-01

    In this paper, we describe the skeleton of two teaching units, based on a Model for teaching mathematics, Context Orientated Teaching (COT). The first teaching unit concerns the proof of a mathematical proposition, while the second one concerns the solution of an open problem. Both are taught in the 10th grade, under the specific conditions of the…

  5. Health Behavior in Ecological Context

    ERIC Educational Resources Information Center

    Simons-Morton, Bruce

    2013-01-01

    Health is best understood within an ecological context. Accordingly, health promotion involves processes that foster supportive environments and healthful behavior. Thus, effective health promotion programs are typically multilevel, focusing not only on the population at risk but also on the environmental conditions that contribute so importantly…

  6. The Quest for Historical Context.

    ERIC Educational Resources Information Center

    Aronson, Marc

    2000-01-01

    Explains how the author put a young adult book on Sir Walter Raleigh into the proper historical context. Describes reading other authors about the Elizabethan period and discovering the passions that motivated explorers, and suggests further reading on Sir Walter Raleigh and this period in history. (LRW)

  7. Digital Citizenship within Global Contexts

    ERIC Educational Resources Information Center

    Searson, Michael; Hancock, Marsali; Soheil, Nusrat; Shepherd, Gregory

    2015-01-01

    EduSummIT 2013 featured a working group that examined digital citizenship within a global context. Group members recognized that, given today's international, regional, political, and social dynamics, the notion of "global" might be more aspirational than practical. The development of informed policies and practices serving and involving…

  8. Understanding Career Choices in Context.

    ERIC Educational Resources Information Center

    Minor, Carole W.; Vermeulen, Mary E.; Coy, Doris Rhea

    Over several years, challenges have been made to traditional theories of career choice. One of these challenges has been to consider the contexts in which individuals live and how this can influence career choices. The purpose of this model is to create a framework to explain the influences on career choices over the lifespan. The term "career…

  9. Evangelization in the American Context.

    ERIC Educational Resources Information Center

    Burrell, David B., Ed.; Kane, Franzita, Ed.

    Proceedings of a symposium held at the University of Notre Dame, January 11-13, 1976 are presented. Subjects of discussion included: partoral issues for the church today; Christian scholars and the work of the church; the role of a Catholic university or college in advancing evangelization in the American context; relation between the American…

  10. Contexts of Social Studies Education.

    ERIC Educational Resources Information Center

    Lunstrum, John P.

    1990-01-01

    Examines the "Handbook of Research on Social Studies Teaching and Learning's" section on context effect. Reviews influences that shape social studies, including research, student groups, family environment, mass media (especially television), testing, curriculum mandates, and local-to-national community pressures. (CH)

  11. Contexts of Music Classroom Management.

    ERIC Educational Resources Information Center

    Russell, Joan

    2000-01-01

    Presents a case study that focuses on the classroom management strategies of a music specialist teacher during a music lesson analyzing the structure, content, and pace of teaching as contextual factors. Explores the teacher's lesson in terms of individual, institutional, and cultural contexts and argues that the subject matter (music) is a…

  12. Collection Directions: The Evolution of Library Collections and Collecting

    ERIC Educational Resources Information Center

    Dempsey, Lorcan; Malpas, Constance; Lavoie, Brian

    2014-01-01

    This article takes a broad view of the evolution of collecting behaviors in a network environment and suggests some future directions based on various simple models. The authors look at the changing dynamics of print collections, at the greater engagement with research and learning behaviors, and at trends in scholarly communication. The goal is…

  13. Linked Micromaps: Statistical Summaries of Aquatic Monitoring Data in a Spatial Context

    EPA Science Inventory

    Communicating summaries of spatial data to decision makers and the public is challenging. Linked micromaps provide a way to simultaneously present geographic context and statistical summaries of data. Monitoring data collected over areal units, such as watersheds or ecoregions,...

  14. Effects of similarity on environmental context cueing.

    PubMed

    Smith, Steven M; Handy, Justin D; Angello, Genna; Manzano, Isabel

    2014-01-01

    Three experiments examined the prediction that context cues which are similar to study contexts can facilitate episodic recall, even if those cues are never seen before the recall test. Environmental context cueing effects have typically produced such small effect sizes that influences of moderating factors, such as the similarity between encoding and retrieval contexts, would be difficult to observe experimentally. Videos of environmental contexts, however, can be used to produce powerful context-dependent memory effects, particularly when only one memory target is associated with each video context, intentional item-context encoding is encouraged, and free recall tests are used. Experiment 1 showed that a not previously viewed video of the study context provided an effective recall cue, although it was not as effective as the originally viewed video context. Experiments 2 and 3 showed that videos of environments that were conceptually similar to encoding contexts (e.g., both were videos of ball field games) also cued recall, but not as well if the encoding contexts were given specific labels (e.g., "home run") incompatible with test contexts (e.g., a soccer scene). A fourth experiment that used incidental item-context encoding showed that video context reinstatement has a robust effect on paired associate memory, indicating that the video context reinstatement effect does not depend on interactive item-context encoding or free recall testing. PMID:23721293

  15. Integration of electronic patient record context with message context.

    PubMed

    De Clercq, Etienne; Bangels, Marc; France, Francis Roger

    2004-01-01

    A methodology to construct specific messages with clear objectives inside clinical processes, while simultaneously including contextual information, remains a problem today. This paper addresses the issue of combining specific message context (process driven) with the context of a patient record (patient centered). In Belgium, simplified conceptual models for Electronic Patient Record (EPR) architecture and for message architecture, based on previous comprehensive and international work, have been produced, validated and mapped into an integrated message format. The resulting model described in this paper highlights the main conceptual links between both basic models: at the action level and at the Transaction level. Using XML, some parts of the model have already been implemented in various national projects. Key lessons learned may be imported at the international level. PMID:15360968

  16. Instructional Context and Student Motivation, Learning, and Development: Commentary and Implications for School Psychologists

    ERIC Educational Resources Information Center

    Pendergast, Laura L.; Kaplan, Avi

    2015-01-01

    From an ecological perspective, learning and development in childhood and throughout the lifespan occur in the context of interactions within complex social networks. Collectively, the articles in this special issue illuminate three important themes related to teacher-student interactions within instructional contexts: relationships, competence,…

  17. Arc-An OAI Service Provider for Digital Library Federation; Kepler-An OAI Data/Service Provider for the Individual; Information Objects and Rights Management: A Mediation-Based Approach to DRM Interoperability; Automated Name Authority Control and Enhanced Searching in the Levy Collection; Renardus Project Developments and the Wider Digital Library Context.

    ERIC Educational Resources Information Center

    Liu, Xiaoming; Maly, Kurt; Zubair, Mohammad; Nelson, Michael L.; Erickson, John S.; DiLauro, Tim; Choudhury, G. Sayeed; Patton, Mark; Warner, James W.; Brown, Elizabeth W.; Heery, Rachel; Carpenter, Leona; Day, Michael

    2001-01-01

    Includes five articles that discuss the OAI (Open Archive Initiative), an interface between data providers and service providers; information objects and digital rights management interoperability; digitizing library collections, including automated name authority control, metadata, and text searching engines; and building digital library services…

  18. Human collective reactions to threat.

    PubMed

    Dezecache, Guillaume

    2015-01-01

    A common assumption regarding mass emergency situations is that individuals in such contexts behave in a way that maximizes their likelihood to escape, at the expense, or with little concern for, the welfare and survival of their neighbors. Doing so, they might even compromise the effectiveness of group evacuation. This conception follows the views of early works on crowd psychology, a tradition born with Gustave Le Bon's The Crowd: a study of the Popular Mind, first published in 1895, and which has had a tremendous impact on scientific representations of people's behavior in mass emergency contexts. Indeed, this work has greatly contributed to the idea that, in such situations, people revert to a primitive, impulsive, irrational, and antisocial nature, causing the breakdown of social order. However, more empirically oriented studies have consistently reported little collective panic, as well as a great deal of solidarity and pro-social behavior during mass emergency situations. Because of institutional barriers, such views have remained largely unknown to cognitive psychologists. Yet these are important results in that they show that human individual and collective reactions to threat are primarily affiliative. Indeed, far from leading to the breakdown of the social fabrics, the presence of a common threat can strengthen social bonds. PMID:26263225

  19. Influence of Contexts on Vocabulary Testing

    ERIC Educational Resources Information Center

    Gao, Chun-mei

    2007-01-01

    In vocabulary testing, whether to adopt context is a heat-debated topic. In the article, an experiment is designed to investigate what is the effect of zero context and sentence context on the vocabulary testing? And how do the different kinds of context in vocabulary affect the subjects' performance? The experimental result demonstrates that…

  20. Context effects on auditory distraction

    PubMed Central

    Chen, Sufen; Sussman, Elyse S.

    2014-01-01

    The purpose of the study was to test the hypothesis that sound context modulates the magnitude of auditory distraction, indexed by behavioral and electrophysiological measures. Participants were asked to identify tone duration, while irrelevant changes occurred in tone frequency, tone intensity, and harmonic structure. Frequency deviants were randomly intermixed with standards (Uni-Condition), with intensity deviants (Bi-Condition), and with both intensity and complex deviants (Tri-Condition). Only in the Tri-Condition did the auditory distraction effect reflect the magnitude difference among the frequency and intensity deviants. The mixture of the different types of deviants in the Tri-Condition modulated the perceived level of distraction, demonstrating that the sound context can modulate the effect of deviance level on processing irrelevant acoustic changes in the environment. These findings thus indicate that perceptual contrast plays a role in change detection processes that leads to auditory distraction. PMID:23886958

  1. Minimalism context-aware displays.

    PubMed

    Cai, Yang

    2004-12-01

    Despite the rapid development of cyber technologies, today we still have very limited attention and communication bandwidth to process the increasing information flow. The goal of the study is to develop a context-aware filter to match the information load with particular needs and capacities. The functions include bandwidth-resolution trade-off and user context modeling. From the empirical lab studies, it is found that the resolution of images can be reduced in order of magnitude if the viewer knows that he/she is looking for particular features. The adaptive display queue is optimized with real-time operational conditions and user's inquiry history. Instead of measuring operator's behavior directly, ubiquitous computing models are developed to anticipate user's behavior from the operational environment data. A case study of the video stream monitoring for transit security is discussed in the paper. In addition, the author addresses the future direction of coherent human-machine vision systems. PMID:15687797

  2. Creating a Context for Chemistry

    NASA Astrophysics Data System (ADS)

    Truman Schwartz, A.

    Until relatively recently, the teaching of chemistry at the college and university level in the United States has been quite traditional and oriented primarily toward the preparation of chemists. Students not concentrating in the sciences have often been poorly served by existing courses. Chemistry in Context: Applying Chemistry to Society, a textbook for nonscience majors developed under the sponsorship of the American Chemical Society, is an effort to address the needs and interests of this audience. The book introduces the phenomena and principles of chemistry within the context of socially significant issues such as global warming, ozone depletion, alternate energy sources, nutrition, and genetic engineering. The chemistry is presented as needed to inform an understanding of the central topics, and the text features student-centered activities designed to promote critical thinking and risk-benefit analysis as well as an understanding of chemical principles. This paper summarizes the origin, development, content, pedagogy, evaluation, and influence of Chemistry in Context and considers its potential implications for other disciplines and the instruction of science majors.

  3. Lesbian body image perceptions: the context of body silence.

    PubMed

    Kelly, Laura

    2007-09-01

    As are all women, lesbians are influenced by Western society's expectations of what a woman should look like. However, they are also influenced by the lesbian subculture. One of the author's aims was to explore how the sociocultural contexts in which lesbians belong influence their perceptions of body image. She purposively selected 20 lesbians and used constant comparative analysis to guide data collection and analyze the resulting transcribed interviews. The internalization of the dominant culture's beauty expectations coupled with the adoption of a lesbian identity caused the participants to contend with a multitude of oppressive mandates from both sociocultural contexts. The author interpreted the outcomes of these oppressions through the lens of stigma theory. The results of the stigma assisted in the development of the context of Body Silence. The study results might serve to provide a better understanding of lesbian body image as an important component of lesbians' mental health. PMID:17724099

  4. Effects of extended context discrimination training and context extinction on transfer of context dependency of conditioned flavor aversion.

    PubMed

    Iguchi, Yoshio; Fukumoto, Kazuya; Sawa, Kosuke; Ishii, Kiyoshi

    2014-03-01

    We trained rats in a context discrimination paradigm by pairing a sucrose solution with lithium chloride in one context (conditioning context) and simple exposure to the same fluid in a second (neutral) context to establish a context-dependent aversion to the conditioned fluid. We then investigated whether transfer of the context dependency to a test fluid (a sodium chloride solution) was affected by two post-discrimination training treatments, an extended context discrimination training, and non-reinforced exposure to the conditioning context (context extinction). We found that the context-dependent flavor aversion that had been specific to sucrose transferred to the test fluid after the extensive training (Experiment 1). Context extinction eliminated the transfer effect that had been observed immediately after the context discrimination training (Experiment 2). In addition, an aversion acquired by sucrose through a simple conditioning of sucrose-LiCl pairings did not generalize to the test fluid (Experiment 3). These results emphasize the importance of a Pavlovian excitatory association between the conditioning context and nausea as a primary source of transfer of the context dependency, rather than a generalization of aversion acquired by the conditioned fluid to the test fluid. PMID:24412730

  5. Context Aware Middleware Architectures: Survey and Challenges

    PubMed Central

    Li, Xin; Eckert, Martina; Martinez, José-Fernán; Rubio, Gregorio

    2015-01-01

    Context aware applications, which can adapt their behaviors to changing environments, are attracting more and more attention. To simplify the complexity of developing applications, context aware middleware, which introduces context awareness into the traditional middleware, is highlighted to provide a homogeneous interface involving generic context management solutions. This paper provides a survey of state-of-the-art context aware middleware architectures proposed during the period from 2009 through 2015. First, a preliminary background, such as the principles of context, context awareness, context modelling, and context reasoning, is provided for a comprehensive understanding of context aware middleware. On this basis, an overview of eleven carefully selected middleware architectures is presented and their main features explained. Then, thorough comparisons and analysis of the presented middleware architectures are performed based on technical parameters including architectural style, context abstraction, context reasoning, scalability, fault tolerance, interoperability, service discovery, storage, security & privacy, context awareness level, and cloud-based big data analytics. The analysis shows that there is actually no context aware middleware architecture that complies with all requirements. Finally, challenges are pointed out as open issues for future work. PMID:26307988

  6. Context Aware Middleware Architectures: Survey and Challenges.

    PubMed

    Li, Xin; Eckert, Martina; Martinez, José-Fernán; Rubio, Gregorio

    2015-01-01

    Context aware applications, which can adapt their behaviors to changing environments, are attracting more and more attention. To simplify the complexity of developing applications, context aware middleware, which introduces context awareness into the traditional middleware, is highlighted to provide a homogeneous interface involving generic context management solutions. This paper provides a survey of state-of-the-art context aware middleware architectures proposed during the period from 2009 through 2015. First, a preliminary background, such as the principles of context, context awareness, context modelling, and context reasoning, is provided for a comprehensive understanding of context aware middleware. On this basis, an overview of eleven carefully selected middleware architectures is presented and their main features explained. Then, thorough comparisons and analysis of the presented middleware architectures are performed based on technical parameters including architectural style, context abstraction, context reasoning, scalability, fault tolerance, interoperability, service discovery, storage, security & privacy, context awareness level, and cloud-based big data analytics. The analysis shows that there is actually no context aware middleware architecture that complies with all requirements. Finally, challenges are pointed out as open issues for future work. PMID:26307988

  7. Visualising Cultures: The "European Picture Book Collection" Moves "Down Under"

    ERIC Educational Resources Information Center

    Cotton, Penni; Daly, Nicola

    2015-01-01

    The potential for picture books in national collections to act as mirrors reflecting the reader's cultural identity, is widely accepted. This paper shows that the books in a New Zealand Picture Book Collection can also become windows into unfamiliar worlds for non-New Zealand readers, giving them the opportunity to learn more about a context in…

  8. Collective Learning: Interaction and a Shared Action Arena

    ERIC Educational Resources Information Center

    Doos, Marianne; Wilhelmson, Lena

    2011-01-01

    Purpose: The paper seeks to argue for a theoretical contribution that deals with the detection of collective learning. The aim is to examine and clarify the genesis processes of collective learning. The empirical basis is a telecoms context with task-driven networking across both internal and external organisational borders.…

  9. High School Accountability: The Role of Perceived Collective Efficacy

    ERIC Educational Resources Information Center

    Goddard, Roger D.; LoGerfo, Laura; Hoy, Wayne K.

    2004-01-01

    This study examined the relationship between collective efficacy and high school student achievement in a state with an accountability system heavily focused on achievement, measured by mandatory assessments in multiple content areas. Using social cognitive theory, a theoretical model was developed linking school context and collective efficacy to…

  10. Emotional conflict and social context

    PubMed Central

    FitzGerald, Chloë

    2011-01-01

    This paper aims to move the debate over the status of the conflict between emotion and judgement forward by refuting three implicit claims: that conflict between emotion and judgement is always to be avoided; that any conflict should always be resolved and, moreover, that it should be resolved immediately; that judgement should usually take priority in any resolution. Refutation of these three claims leads to recognition of the wide variety of different cases of conflict between emotion and judgement; examination of these cases is aided by consideration of the social context in which the conflicts occur. PMID:22661905

  11. Context representation and fusion: advancements and opportunities.

    PubMed

    Khattak, Asad Masood; Akbar, Noman; Aazam, Mohammad; Ali, Taqdir; Khan, Adil Mehmood; Jeon, Seokhee; Hwang, Myunggwon; Lee, Sungyoung

    2014-01-01

    The acceptance and usability of context-aware systems have given them the edge of wide use in various domains and has also attracted the attention of researchers in the area of context-aware computing. Making user context information available to such systems is the center of attention. However, there is very little emphasis given to the process of context representation and context fusion which are integral parts of context-aware systems. Context representation and fusion facilitate in recognizing the dependency/relationship of one data source on another to extract a better understanding of user context. The problem is more critical when data is emerging from heterogeneous sources of diverse nature like sensors, user profiles, and social interactions and also at different timestamps. Both the processes of context representation and fusion are followed in one way or another; however, they are not discussed explicitly for the realization of context-aware systems. In other words most of the context-aware systems underestimate the importance context representation and fusion. This research has explicitly focused on the importance of both the processes of context representation and fusion and has streamlined their existence in the overall architecture of context-aware systems' design and development. Various applications of context representation and fusion in context-aware systems are also highlighted in this research. A detailed review on both the processes is provided in this research with their applications. Future research directions (challenges) are also highlighted which needs proper attention for the purpose of achieving the goal of realizing context-aware systems. PMID:24887042

  12. Context Representation and Fusion: Advancements and Opportunities

    PubMed Central

    Khattak, Asad Masood; Akbar, Noman; Aazam, Mohammad; Ali, Taqdir; Khan, Adil Mehmood; Jeon, Seokhee; Hwang, Myunggwon; Lee, Sungyoung

    2014-01-01

    The acceptance and usability of context-aware systems have given them the edge of wide use in various domains and has also attracted the attention of researchers in the area of context-aware computing. Making user context information available to such systems is the center of attention. However, there is very little emphasis given to the process of context representation and context fusion which are integral parts of context-aware systems. Context representation and fusion facilitate in recognizing the dependency/relationship of one data source on another to extract a better understanding of user context. The problem is more critical when data is emerging from heterogeneous sources of diverse nature like sensors, user profiles, and social interactions and also at different timestamps. Both the processes of context representation and fusion are followed in one way or another; however, they are not discussed explicitly for the realization of context-aware systems. In other words most of the context-aware systems underestimate the importance context representation and fusion. This research has explicitly focused on the importance of both the processes of context representation and fusion and has streamlined their existence in the overall architecture of context-aware systems’ design and development. Various applications of context representation and fusion in context-aware systems are also highlighted in this research. A detailed review on both the processes is provided in this research with their applications. Future research directions (challenges) are also highlighted which needs proper attention for the purpose of achieving the goal of realizing context-aware systems. PMID:24887042

  13. The shading cue in context

    PubMed Central

    Wagemans, Johan; van Doorn, Andrea J; Koenderink, Jan J

    2010-01-01

    The shading cue is supposed to be a major factor in monocular stereopsis. However, the hypothesis is hardly corroborated by available data. For instance, the conventional stimulus used in perception research, which involves a circular disk with monotonic luminance gradient on a uniform surround, is theoretically ‘explained’ by any quadric surface, including spherical caps or cups (the conventional response categories), cylindrical ruts or ridges, and saddle surfaces. Whereas cylindrical ruts or ridges are reported when the outline is changed from circular to square, saddle surfaces are never reported. We introduce a method that allows us to differentiate between such possible responses. We report observations on a number of variations of the conventional stimulus, including variations of shape and quality of the boundary, and contexts that allow the observer to infer illumination direction. We find strong and expected influences of outline shape, but, perhaps surprisingly, we fail to find any influence of context, and only partial influence of outline quality. Moreover, we report appreciable differences within the generic population. We trace some of the idiosyncrasies (as compared to shape from shading algorithms) of the human observer to generic properties of the environment, in particular the fact that many objects are limited in size and elliptically convex over most of their boundaries. PMID:23145221

  14. Motor interference in interactive contexts.

    PubMed

    Chinellato, Eris; Castiello, Umberto; Sartori, Luisa

    2015-01-01

    Action observation and execution share overlapping neural substrates, so that simultaneous activation by observation and execution modulates motor performance. Previous literature on simple prehension tasks has revealed that motor influence can be two-sided: facilitation for observed and performed congruent actions and interference for incongruent actions. But little is known of the specific modulations of motor performance in complex forms of interaction. Is it possible that the very same observed movement can lead either to interference or facilitation effects on a temporally overlapping congruent executed action, depending on the context? To answer this question participants were asked to perform a reach-to-grasp movement adopting a precision grip (PG) while: (i) observing a fixation cross, (ii) observing an actor performing a PG with interactive purposes, (iii) observing an actor performing a PG without interactive purposes. In particular, in the interactive condition the actor was shown trying to pour some sugar on a large cup located out of her reach but close to the participant watching the video, thus eliciting in reaction a complementary whole-hand grasp. Notably, fine-grained kinematic analysis for this condition revealed a specific delay in the grasping and reaching components and an increased trajectory deviation despite the observed and executed movement's congruency. Moreover, early peaks of trajectory deviation seem to indicate that socially relevant stimuli are acknowledged by the motor system very early. These data suggest that interactive contexts can determine a prompt modulation of stimulus-response compatibility effects. PMID:26113835

  15. Focus+context metro maps.

    PubMed

    Wang, Yu-Shuen; Chi, Ming-Te

    2011-12-01

    We introduce a focus+context method to visualize a complicated metro map of a modern city on a small displaying area. The context of our work is with regard the popularity of mobile devices. The best route to the destination, which can be obtained from the arrival time of trains, is highlighted. The stations on the route enjoy larger spaces, whereas the other stations are rendered smaller and closer to fit the whole map into a screen. To simplify the navigation and route planning for visitors, we formulate various map characteristics such as octilinear transportation lines and regular station distances into energy terms. We then solve for the optimal layout in a least squares sense. In addition, we label the names of stations that are on the route of a passenger according to human preferences, occlusions, and consistencies of label positions using the graph cuts method. Our system achieves real-time performance by being able to report instant information because of the carefully designed energy terms. We apply our method to layout a number of metro maps and show the results and timing statistics to demonstrate the feasibility of our technique. PMID:22034374

  16. Context-Aware Recommender Systems

    NASA Astrophysics Data System (ADS)

    Adomavicius, Gediminas; Tuzhilin, Alexander

    The importance of contextual information has been recognized by researchers and practitioners in many disciplines, including e-commerce personalization, information retrieval, ubiquitous and mobile computing, data mining, marketing, and management. While a substantial amount of research has already been performed in the area of recommender systems, most existing approaches focus on recommending the most relevant items to users without taking into account any additional contextual information, such as time, location, or the company of other people (e.g., for watching movies or dining out). In this chapter we argue that relevant contextual information does matter in recommender systems and that it is important to take this information into account when providing recommendations. We discuss the general notion of context and how it can be modeled in recommender systems. Furthermore, we introduce three different algorithmic paradigms - contextual prefiltering, post-filtering, and modeling - for incorporating contextual information into the recommendation process, discuss the possibilities of combining several contextaware recommendation techniques into a single unifying approach, and provide a case study of one such combined approach. Finally, we present additional capabilities for context-aware recommenders and discuss important and promising directions for future research.

  17. The Cognitive Context of Argument.

    ERIC Educational Resources Information Center

    Hample, Dale

    A study focusing on argument as a receiver-contained phenomenon assessed the differential importance of (new) arguments stimulated by a message, as opposed to (old) arguments previously integrated. Data were collected from 207 college students in a pretest, posttest, and delayed posttest design. The subjects provided information on their attitudes…

  18. False Context Fear Memory in Rats

    ERIC Educational Resources Information Center

    Bae, Sarah; Holmes, Nathan M.; Westbrook, R. Frederick

    2015-01-01

    Four experiments used rats to study false context fear memories. In Experiment 1, rats were pre-exposed to a distinctive chamber (context A) or to a control environment (context C), shocked after a delay in a second chamber (context B) and tested either in B or A. Rats pre-exposed to A froze just as much as control rats in B but more than control…

  19. Collection Mode Lens System

    DOEpatents

    Fletcher, Daniel A.; Kino, Gordon S.

    2002-11-05

    A lens system including a collection lens and a microlens spaced from the collection lens adjacent the region to be observed. The diameter of the observablel region depends substantially on the radius of the microlens.

  20. Improved collecting apparatus

    SciTech Connect

    Duncan, C.P.

    1981-03-05

    An improved collecting apparatus for small aquatic or airborne organisms such as plankton, larval fish, insects, etc. The improvement constitutes an apertured removal container within which is retained a collecting bag, and which is secured at the apex of a conical collecting net. Such collectors are towed behind a vessel or vehicle with the open end of the conical net facing forward for trapping the aquatic or airborne organisms within the collecting bag, while allowing the water or air to pass through the apertures in the container. The container is readily removable from the collecting net whereby the collecting bag can be quickly removed and replaced for further sample collection. The collecting bag is provided with means for preventing the bag from being pulled into the container by the water or air following therethrough.

  1. Guide to data collection

    NASA Technical Reports Server (NTRS)

    1981-01-01

    Guidelines and recommendations are presented for the collection of software development data. Motivation and planning for, and implementation and management of, a data collection effort are discussed. Topics covered include types, sources, and availability of data; methods and costs of data collection; types of analyses supported; and warnings and suggestions based on software engineering laboratory (SEL) experiences. This document is intended as a practical guide for software managers and engineers, abstracted and generalized from 5 years of SEL data collection.

  2. Context management platform for tourism applications.

    PubMed

    Buján, David; Martín, David; Torices, Ortzi; López-de-Ipiña, Diego; Lamsfus, Carlos; Abaitua, Joseba; Alzua-Sorzabal, Aurkene

    2013-01-01

    The notion of context has been widely studied and there are several authors that have proposed different definitions of context. However, context has not been widely studied in the framework of human mobility and the notion of context has been imported directly from other computing fields without specifically addressing the tourism domain requirements. In order to store and manage context information a context data model and a context management platform are needed. Ontologies have been widely used in context modelling, but many of them are designed to be applied in general ubiquitous computing environments, do not contain specific concepts related to the tourism domain or some approaches do not contain enough concepts to represent context information related to the visitor on the move. That is why we propose a new approach to provide a better solution to model context data in tourism environments, adding more value to our solution reusing data about tourist resources from an Open Data repository and publishing it as Linked Data. We also propose the architecture for a context information management platform based on this context data model. PMID:23797739

  3. Context Utilization in Young and Old Adults.

    ERIC Educational Resources Information Center

    Hess, Thomas M.; Higgins, James N.

    1983-01-01

    Examined adult age differences in use of context to study and retrieve information. Young and old adults were presented with a series of homographs (targets). Recognition memory for targets was tested. Recognition decreased in both groups as the retrieval context became more dissimilar to the study context. (Author/JAC)

  4. A First Step Forward: Context Assessment

    ERIC Educational Resources Information Center

    Conner, Ross F.; Fitzpatrick, Jody L.; Rog, Debra J.

    2012-01-01

    In this chapter, we revisit and expand the context framework of Debra Rog, informed by three cases and by new aspects that we have identified. We then propose a way to move the framework into action, making context explicit. Based on the framework's components, we describe and illustrate a process we label context assessment (CA), which provides a…

  5. Stress Disrupts Context-Dependent Memory

    ERIC Educational Resources Information Center

    Schwabe, Lars; Bohringer, Andreas; Wolf, Oliver T.

    2009-01-01

    Memory is facilitated when the retrieval context resembles the learning context. The brain structures underlying contextual influences on memory are susceptible to stress. Whether stress interferes with context-dependent memory is still unknown. We exposed healthy adults to stress or a control procedure before they learned an object-location task…

  6. Context Management Platform for Tourism Applications

    PubMed Central

    Buján, David; Martín, David; Torices, Ortzi; López-de-Ipiña, Diego; Lamsfus, Carlos; Abaitua, Joseba; Alzua-Sorzabal, Aurkene

    2013-01-01

    The notion of context has been widely studied and there are several authors that have proposed different definitions of context. However, context has not been widely studied in the framework of human mobility and the notion of context has been imported directly from other computing fields without specifically addressing the tourism domain requirements. In order to store and manage context information a context data model and a context management platform are needed. Ontologies have been widely used in context modelling, but many of them are designed to be applied in general ubiquitous computing environments, do not contain specific concepts related to the tourism domain or some approaches do not contain enough concepts to represent context information related to the visitor on the move. That is why we propose a new approach to provide a better solution to model context data in tourism environments, adding more value to our solution reusing data about tourist resources from an Open Data repository and publishing it as Linked Data. We also propose the architecture for a context information management platform based on this context data model. PMID:23797739

  7. Collective excitation spectra of transitional even nuclei

    SciTech Connect

    Quentin, P. Paris-11 Univ., 91 - Orsay . Centre de Spectrometrie Nucleaire et de Spectrometrie de Masse); Deloncle, I.; Libert, J. . Centre de Spectrometrie Nucleaire et de Spectrometrie de Masse); Sauvage, J. . Inst. de Physique Nucleaire)

    1990-11-06

    This talk is dealing with the nuclear low energy collective motion as described in the context of microscopic versions of the Bohr Hamiltonian. Two different ways of building microscopically Bohr collective Hamiltonians will be sketched; one within the framework of the Generator Coordinate Method, the other using the Adiabatic Time-Dependent Hartree-Fock-Boholyubov approximation. A sample of recent results will be presented which pertains to the description of transitional even nuclei and to the newly revisited phenomenon of superdeformation at low spin.

  8. The Undergraduate Library Collection.

    ERIC Educational Resources Information Center

    Stewart, Rolland C.

    The development of undergraduate library collections is shown under two aspects: (1) the formation of the basic collection of the Undergraduate Library of the University of Michigan, and (2) the problems, practical and theoretial, encountered in the day-to-day effort to maintain the collection. The budget is the sire of all selection criteria.…

  9. Student Loan Collection Procedures.

    ERIC Educational Resources Information Center

    National Association of College and University Business Officers, Washington, DC.

    This manual on the collection of student loans is intended for the use of business officers and loan collection personnel of colleges and universities of all sizes. The introductory chapter is an overview of sound collection practices and procedures. It discusses the making of a loan, in-school servicing of the accounts, the exit interview, the…

  10. Collection Assessment Manual.

    ERIC Educational Resources Information Center

    Hall, Blaine H.

    This manual is designed to help bibliographers, librarians, and other materials selectors plan and conduct systematic collection evaluations using both collection centered and client centered techniques. Topics covered in five chapters are: (1) planning the assessment; (2) collection-centered techniques, comprising the compilation of statistics,…

  11. [The contradictory contexts of interdisciplinarity].

    PubMed

    Schilling, T; Haverich, A

    2012-04-01

    The benefits of interdisciplinary approaches in patient care, research and education are quite obvious and set the trend for more interdisciplinary structures. In order to achieve sustained success, however, there are numerous risks of interdisciplinary collaboration that have to be considered. Interdisciplinarity leads to an increasing degree of specialization and consequently to a greater experience of specialists in highly specific procedures. Nevertheless, this is accompanied by a loss of experience of those who do not perform these procedures anymore. Not least, due to the high specialization, the surgeon's profession is changing from generalist to specialist. Hence, the education of young physicians, students and researchers has to be adapted to this reality. It remains unanswered if these changes contribute to the decline in the number of applicants in surgery. In conclusion, the risks of the contradictory contexts of interdisciplinarity can be counteracted with simple principles of fair and cooperative partnership. PMID:22434364

  12. Context and the human microbiome.

    PubMed

    McDonald, Daniel; Birmingham, Amanda; Knight, Rob

    2015-01-01

    Human microbiome reference datasets provide epidemiological context for researchers, enabling them to uncover new insights into their own data through meta-analyses. In addition, large and comprehensive reference sets offer a means to develop or test hypotheses and can pave the way for addressing practical study design considerations such as sample size decisions. We discuss the importance of reference sets in human microbiome research, limitations of existing resources, technical challenges to employing reference sets, examples of their usage, and contributions of the American Gut Project to the development of a comprehensive reference set. Through engaging the general public, the American Gut Project aims to address many of the issues present in existing reference resources, characterizing health and disease, lifestyle, and dietary choices of the participants while extending its efforts globally through international collaborations. PMID:26530830

  13. Social Capital in an Outdoor Recreation Context

    NASA Astrophysics Data System (ADS)

    Mann, Marilynne; Leahy, Jessica

    2010-02-01

    This study examined social capital development in three all-terrain vehicles (ATV) clubs in Maine using an adapted version of Lin’s (2001) social capital theory model. The structural components of social capital identified included collective assets and individual assets in the form of normative behavior and trust relationships. Also identified were counter-norms for individual ATV riders identified as having divergent norms from club members. The second component of social capital is access to and mobilization of network contacts and resources. Access networks in the context of the ATV clubs studied were identified as community and landowner relations while mobilization of resources was existent in club membership attempts toward self-governance and efforts of the statewide “umbrella” organization. Instrumental outcomes benefit society and expressive outcomes benefit the individual. Both types of returns are present in the data suggesting that ATV clubs are creating social capital. This is important information to clubs who desire to market themselves, improve their reputations, and enhance their volunteer association. It is of further interest to state governments who fund clubs through trail grants as proof that a return on investment is being realized. Theoretical and applied implications for these and other types of recreation-based volunteer associations (e.g., clubs, friends groups, advocacy groups) are presented.

  14. Social capital in an outdoor recreation context.

    PubMed

    Mann, Marilynne; Leahy, Jessica

    2010-02-01

    This study examined social capital development in three all-terrain vehicles (ATV) clubs in Maine using an adapted version of Lin's (2001) social capital theory model. The structural components of social capital identified included collective assets and individual assets in the form of normative behavior and trust relationships. Also identified were counter-norms for individual ATV riders identified as having divergent norms from club members. The second component of social capital is access to and mobilization of network contacts and resources. Access networks in the context of the ATV clubs studied were identified as community and landowner relations while mobilization of resources was existent in club membership attempts toward self-governance and efforts of the statewide "umbrella" organization. Instrumental outcomes benefit society and expressive outcomes benefit the individual. Both types of returns are present in the data suggesting that ATV clubs are creating social capital. This is important information to clubs who desire to market themselves, improve their reputations, and enhance their volunteer association. It is of further interest to state governments who fund clubs through trail grants as proof that a return on investment is being realized. Theoretical and applied implications for these and other types of recreation-based volunteer associations (e.g., clubs, friends groups, advocacy groups) are presented. PMID:20016986

  15. Context based configuration management system

    NASA Technical Reports Server (NTRS)

    Gawdiak, Yuri O. (Inventor); Gurram, Mohana M. (Inventor); Maluf, David A. (Inventor); Mederos, Luis A. (Inventor)

    2010-01-01

    A computer-based system for configuring and displaying information on changes in, and present status of, a collection of events associated with a project. Classes of icons for decision events, configurations and feedback mechanisms, and time lines (sequential and/or simultaneous) for related events are displayed. Metadata for each icon in each class is displayed by choosing and activating the corresponding icon. Access control (viewing, reading, writing, editing, deleting, etc.) is optionally imposed for metadata and other displayed information.

  16. Use of Context in Video Processing

    NASA Astrophysics Data System (ADS)

    Wu, Chen; Aghajan, Hamid

    Interpreting an event or a scene based on visual data often requires additional contextual information. Contextual information may be obtained from different sources. In this chapter, we discuss two broad categories of contextual sources: environmental context and user-centric context. Environmental context refers to information derived from domain knowledge or from concurrently sensed effects in the area of operation. User-centric context refers to information obtained and accumulated from the user. Both types of context can include static or dynamic contextual elements. Examples from a smart home environment are presented to illustrate how different types of contextual data can be applied to aid the decision-making process.

  17. A spatial planetary image database in the context of processing

    NASA Astrophysics Data System (ADS)

    Willner, K.; Tasdelen, E.

    2015-10-01

    Planetary image data is collected and archived by e.g. the European Planetary Science Archive (PSA) or its US counterpart the Planetary Data System (PDS). These archives usually organize the data according to missions and their respective instruments. Search queries can be posted to retrieve data of interest for a specific instrument data set. In the context of processing data of a number of sensors and missions this is not practical. In the scope of the EU FP7 project PRoViDE meta-data from imaging sensors were collected from PSA as well as PDS and were rearranged and restructured according to the processing needs. Exemplary image data gathered from rover and lander missions operated on the Martian surface was organized into a new unique data base. The data base is a core component of the PRoViDE processing and visualization system as it enables multi-mission and -sensor searches to fully exploit the collected data.

  18. Language context modulates reading route: an electrical neuroimaging study

    PubMed Central

    Buetler, Karin A.; de León Rodríguez, Diego; Laganaro, Marina; Müri, René; Spierer, Lucas; Annoni, Jean-Marie

    2014-01-01

    Introduction: The orthographic depth hypothesis (Katz and Feldman, 1983) posits that different reading routes are engaged depending on the type of grapheme/phoneme correspondence of the language being read. Shallow orthographies with consistent grapheme/phoneme correspondences favor encoding via non-lexical pathways, where each grapheme is sequentially mapped to its corresponding phoneme. In contrast, deep orthographies with inconsistent grapheme/phoneme correspondences favor lexical pathways, where phonemes are retrieved from specialized memory structures. This hypothesis, however, lacks compelling empirical support. The aim of the present study was to investigate the impact of orthographic depth on reading route selection using a within-subject design. Method: We presented the same pseudowords (PWs) to highly proficient bilinguals and manipulated the orthographic depth of PW reading by embedding them among two separated German or French language contexts, implicating respectively, shallow or deep orthography. High density electroencephalography was recorded during the task. Results: The topography of the ERPs to identical PWs differed 300–360 ms post-stimulus onset when the PWs were read in different orthographic depth context, indicating distinct brain networks engaged in reading during this time window. The brain sources underlying these topographic effects were located within left inferior frontal (German > French), parietal (French > German) and cingular areas (German > French). Conclusion: Reading in a shallow context favors non-lexical pathways, reflected in a stronger engagement of frontal phonological areas in the shallow versus the deep orthographic context. In contrast, reading PW in a deep orthographic context recruits less routine non-lexical pathways, reflected in a stronger engagement of visuo-attentional parietal areas in the deep versus shallow orthographic context. These collective results support a modulation of reading route by orthographic

  19. Context-specific adaptation of saccade gain

    NASA Technical Reports Server (NTRS)

    Shelhamer, Mark; Clendaniel, Richard A.

    2002-01-01

    Previous studies established that vestibular reflexes can have two adapted states (e.g., gain) simultaneously, and that a context cue (e.g., vertical eye position) can switch between the two states. The present study examined this phenomenon of context-specific adaptationfor horizontal saccades, using a variety of contexts. Our overall goal was to assess the efficacy of different context cues in switching between adapted states. A standard double-step paradigm was used to adapt saccade gain. In each experiment, we asked for a simultaneous gain decrease in one context and gain increase in another context, and then determined if a change in the context would invoke switching between the adapted states. Horizontal eye position worked well as a context cue: saccades with the eyes deviated to the right could be made to have higher gains while saccades with the eyes deviated to the left could be made to have lower gains. Vertical eye position was less effective. This suggests that the more closely related a context cue is to the response being adapted, the more effective it is. Roll tilt of the head, and upright versus supine orientations, were somewhat effective in context switching; these paradigms contain orientation of gravity with respect to the head as part of the context.

  20. Concepts of context in music therapy

    PubMed Central

    Rolvsjord, Randi; Stige, Brynjulf

    2015-01-01

    In contemporary music therapy as well as in related interdisciplinary fields, the importance of context in relation to theory, research, and practice has been emphasized. However, the word context seems to be used in several different ways and conceptualizations of contextual approaches vary too. The objective of this theoretical article is to clarify traditions of language use in relation to context in music therapy. In reviewing and discussing the literature, we focus on the field of mental health care. When discussing issues related to context, this literature partly focuses on the surroundings of music therapy practice, partly on the ecology of reciprocal influences within and between situations or systems. On this basis, three types of context awareness in music therapy are identified: music therapy in context; music therapy as context; and music therapy as interacting contexts. The identified types of context awareness are exemplified through references to music therapy literature and then discussed in relation to two very different metaphors, namely context as frame and context as link. Implications for practice, research, and theory development in music therapy are suggested. PMID:26157199

  1. Determinants of Prosocial Behavior in Included Versus Excluded Contexts

    PubMed Central

    Cuadrado, Esther; Tabernero, Carmen; Steinel, Wolfgang

    2016-01-01

    Prosocial behavior (PSB) is increasingly becoming necessary as more and more individuals experience exclusion. In this context it is important to understand the motivational determinants of PSB. Here we report two experiments which analyzed the influence of dispositional (prosocialness; rejection sensitivity) and motivational variables (prosocial self-efficacy; prosocial collective efficacy; trust; anger; social affiliation motivation) on PSB under neutral contexts (Study 1), and once under inclusion or exclusion conditions (Study 2). Both studies provided evidence for the predicted mediation of PSB. Results in both neutral and inclusion and exclusion conditions supported our predictive model of PSB. In the model dispositional variables predicted motivational variables, which in turn predicted PSB. We showed that the investigated variables predicted PSB; this suggests that to promote PSB one could (1) foster prosocialness, prosocial self and collective efficacy, trust in others and affiliation motivation and (2) try to reduce negative feelings and the tendency to dread rejection in an attempt to reduce the negative impact that these variables have on PSB. Moreover, the few differences that emerged in the model between the inclusion and exclusion contexts suggested that in interventions with excluded individuals special care emphasis should be placed on addressing rejection sensitivity and lack of trust. PMID:26779103

  2. Dynamics of Context-Dependent Recall: An Examination of Internal and External Context Change

    ERIC Educational Resources Information Center

    Unsworth, Nash; Spillers, Gregory J.; Brewer, Gene A.

    2012-01-01

    Retrieval dynamics in context-dependent recall were explored via manipulations of external and internal context in two experiments. Participants were tested in either the same or different context as the material was learned in and correct recalls, errors, and recall latency measures were examined. In both experiments changes in context resulted…

  3. Environmental Indicators of Biofuel Sustainability: What About Context?

    NASA Astrophysics Data System (ADS)

    Efroymson, Rebecca A.; Dale, Virginia H.; Kline, Keith L.; McBride, Allen C.; Bielicki, Jeffrey M.; Smith, Raymond L.; Parish, Esther S.; Schweizer, Peter E.; Shaw, Denice M.

    2013-02-01

    Indicators of the environmental sustainability of biofuel production, distribution, and use should be selected, measured, and interpreted with respect to the context in which they are used. The context of a sustainability assessment includes the purpose, the particular biofuel production and distribution system, policy conditions, stakeholder values, location, temporal influences, spatial scale, baselines, and reference scenarios. We recommend that biofuel sustainability questions be formulated with respect to the context, that appropriate indicators of environmental sustainability be developed or selected from more generic suites, and that decision makers consider context in ascribing meaning to indicators. In addition, considerations such as technical objectives, varying values and perspectives of stakeholder groups, indicator cost, and availability and reliability of data need to be understood and considered. Sustainability indicators for biofuels are most useful if adequate historical data are available, information can be collected at appropriate spatial and temporal scales, organizations are committed to use indicator information in the decision-making process, and indicators can effectively guide behavior toward more sustainable practices.

  4. Sensory, motor, and combined contexts for context-specific adaptation of saccade gain in humans

    NASA Technical Reports Server (NTRS)

    Shelhamer, Mark; Clendaniel, Richard

    2002-01-01

    Saccadic eye movements can be adapted in a context-specific manner such that their gain can be made to depend on the state of a prevailing context cue. We asked whether context cues are more effective if their nature is primarily sensory, motor, or a combination of sensory and motor. Subjects underwent context-specific adaptation using one of three different context cues: a pure sensory context (head roll-tilt right or left); a pure motor context (changes in saccade direction); or a combined sensory-motor context (head roll-tilt and changes in saccade direction). We observed context-specific adaptation in each condition; the greatest degree of context-specificity occurred in paradigms that used the motor cue, alone or in conjunction with the sensory cue. Copyright 2002 Elsevier Science Ireland Ltd.

  5. Cloud Computing with Context Cameras

    NASA Astrophysics Data System (ADS)

    Pickles, A. J.; Rosing, W. E.

    2016-05-01

    We summarize methods and plans to monitor and calibrate photometric observations with our autonomous, robotic network of 2m, 1m and 40cm telescopes. These are sited globally to optimize our ability to observe time-variable sources. Wide field "context" cameras are aligned with our network telescopes and cycle every ˜2 minutes through BVr'i'z' filters, spanning our optical range. We measure instantaneous zero-point offsets and transparency (throughput) against calibrators in the 5-12m range from the all-sky Tycho2 catalog, and periodically against primary standards. Similar measurements are made for all our science images, with typical fields of view of ˜0.5 degrees. These are matched against Landolt, Stetson and Sloan standards, and against calibrators in the 10-17m range from the all-sky APASS catalog. Such measurements provide pretty good instantaneous flux calibration, often to better than 5%, even in cloudy conditions. Zero-point and transparency measurements can be used to characterize, monitor and inter-compare sites and equipment. When accurate calibrations of Target against Standard fields are required, monitoring measurements can be used to select truly photometric periods when accurate calibrations can be automatically scheduled and performed.

  6. Electronic health records: Context matters!

    PubMed

    Ventres, William B; Frankel, Richard M

    2016-06-01

    Comments on the article by Kotay, Huang, Jordan, and Korin (see record 2016-22430-001). They tackle how to document patients' social histories in a way that is useful in real-time clinical practice-and explore the implementation of a new electronic health record (EHR) template specifically built to support their residency practice's commitment to addressing the social dimensions of patients' lives. For all of us convinced that the simultaneous integration of the biological, social, psychological, and existential dimensions of care is key to the practice of primary care, there are many questions to explore in relation to using EHRs. How are we going to do this in an environment that preferentially supports particularized data over an engaged awareness of context? How are we going to convince those with the technological expertise and administrative power that the transmission of information alone is not a substitute for insight, meaning, and relationships (Ventres & Frankel, 2010)? And ultimately, how are we going to make sure the EHR works for us instead of against us? Kotay and her colleagues have not answered all these questions in their study-such a task is beyond the abilities of one person or group of researchers- but along with others they have begun to illuminate a way forward (Cifuentes et al., 2015; Glowa-Kollisch et al., 2014). May we all now strive to continue the work that these authors have started. (PsycINFO Database Record PMID:27270249

  7. Vygotsky's Crisis: Argument, context, relevance.

    PubMed

    Hyman, Ludmila

    2012-06-01

    Vygotsky's The Historical Significance of the Crisis in Psychology (1926-1927) is an important text in the history and philosophy of psychology that has only become available to scholars in 1982 in Russian, and in 1997 in English. The goal of this paper is to introduce Vygotsky's conception of psychology to a wider audience. I argue that Vygotsky's argument about the "crisis" in psychology and its resolution can be fully understood only in the context of his social and political thinking. Vygotsky shared the enthusiasm, widespread among Russian leftist intelligentsia in the 1920s, that Soviet society had launched an unprecedented social experiment: The socialist revolution opened the way for establishing social conditions that would let the individual flourish. For Vygotsky, this meant that "a new man" of the future would become "the first and only species in biology that would create itself." He envisioned psychology as a science that would serve this humanist teleology. I propose that The Crisis is relevant today insofar as it helps us define a fundamental problem: How can we systematically account for the development of knowledge in psychology? I evaluate how Vygotsky addresses this problem as a historian of the crisis. PMID:22520196

  8. Multiperspective Focus+Context Visualization.

    PubMed

    Wu, Meng-Lin; Popescu, Voicu

    2016-05-01

    Occlusions are a severe bottleneck for the visualization of large and complex datasets. Conventional images only show dataset elements to which there is a direct line of sight, which significantly limits the information bandwidth of the visualization. Multiperspective visualization is a powerful approach for alleviating occlusions to show more than what is visible from a single viewpoint. However, constructing and rendering multiperspective visualizations is challenging. We present a framework for designing multiperspective focus+context visualizations with great flexibility by manipulating the underlying camera model. The focus region viewpoint is adapted to alleviate occlusions. The framework supports multiperspective visualization in three scenarios. In a first scenario, the viewpoint is altered independently for individual image regions to avoid occlusions. In a second scenario, conventional input images are connected into a multiperspective image. In a third scenario, one or several data subsets of interest (i.e., targets) are visualized where they would be seen in the absence of occluders, as the user navigates or the targets move. The multiperspective images are rendered at interactive rates, leveraging the camera model's fast projection operation. We demonstrate the framework on terrain, urban, and molecular biology geometric datasets, as well as on volume rendered density datasets. PMID:27045911

  9. Mutual information analysis of JPEG2000 contexts

    NASA Astrophysics Data System (ADS)

    Liu, Zhen; Karam, Lina J.

    2003-05-01

    Context-based arithmetic coding has been widely adopted in image and video compression and is a key component of the new JPEG2000 image compression standard. In this paper, the contexts used in JPEG2000 are analyzed using the mutual information, which has a direct link with the compression performance. We first show that, when combining the contexts, the mutual information between the contexts and the encoded data will decrease unless the conditional probability distributions of the combined contexts are the same. Given I, the initial number of contexts, and F, the final desired number of contexts, there are S(I, F) possible context classification schemes where S(I, F) is called the Stirling number of the second kind. The optimal classification scheme is the one that gives the maximum mutual information. Instead of exhaustive search, the optimal classification scheme can be obtained through a modified Generalized Lloyd algorithm with the relative entropy as the distortion metric. For binary arithmetic coding, the search complexity can be reduced by using the dynamic programming. Our experimental results show that the JPEG2000 contexts capture very well the correlations among the wavelet coefficients. At the same time, the number of contexts used as part of the standard can be reduced without loss in the coding performance.

  10. Seawater sampling and collection.

    PubMed

    Zaikova, Elena; Hawley, Alyse; Walsh, David A; Hallam, Steven J

    2009-01-01

    This video documents methods for collecting coastal marine water samples and processing them for various downstream applications including biomass concentration. nucleic acid purification, cell abundance, nutrient and trace gas analyses. For today's demonstration samples were collected from the deck of the HMS John Strickland operating in Saanich Inlet. An A-frame derrick, with a multi-purpose winch and cable system, is used in combination with Niskin or Go-Flo water sampling bottles. A Conductivity, Temperature, and Depth (CTD) sensor is also be used to sample the underlying water mass. To minimize outgassing, trace gas samples are collected first. Then, nutrients, chemistry, and cell counts are determined. Finally, waters are collected for biomass filtration. The set-up and collection time for a single cast is approximately 1.5 hours at a maximum depth of 215 meters. Therefore, a total of 6 hours is generally needed to complete the four-part collection series described here. PMID:19536065

  11. Processing relative clauses in supportive contexts.

    PubMed

    Fedorenko, Evelina; Piantadosi, Steve; Gibson, Edward

    2012-04-01

    Results from two self-paced reading experiments in English are reported in which subject- and object-extracted relative clauses (SRCs and ORCs, respectively) were presented in contexts that support both types of relative clauses (RCs). Object-extracted versions were read more slowly than subject-extracted versions across both experiments. These results are not consistent with a decay-based working memory account of dependency formation where the amount of decay is a function of the number of new discourse referents that intervene between the dependents (Gibson, 1998; Warren & Gibson, 2002). Rather, these results support interference-based accounts and decay-based accounts where the amount of decay depends on the number of words or on the type of noun phrases that intervene between the dependents. In Experiment 2, presentation in supportive contexts was directly contrasted with presentation in null contexts. Whereas in the null context the extraction effect was only observed during the RC region, in a supportive context the extraction effect was numerically larger and persisted into the following region, thus showing that extraction effects are enhanced in supportive contexts. A sentence completion study demonstrated that the rate of SRCs versus ORCs was similar across null and supportive contexts (with most completions being subject-extractions), ruling out the possibility that an enhanced extraction effect in supportive contexts is due to ORCs being less expected in such contexts. However, the content of the RCs differed between contexts in the completions, such that the RCs produced in supportive contexts were more constrained, reflecting the lexical and semantic content of the preceding context. This effect, which we discuss in terms of expectations/lexico-syntactic priming, suggests that the enhancement of the extraction effect in supportive contexts is due to the facilitation of the subject-extracted condition. PMID:22256956

  12. Solar energy collection system

    NASA Technical Reports Server (NTRS)

    Selcuk, M. K. (Inventor)

    1977-01-01

    An improved solar energy collection system, having enhanced energy collection and conversion capabilities, is delineated. The system is characterized by a plurality of receivers suspended above a heliostat field comprising a multiplicity of reflector surfaces, each being adapted to direct a concentrated beam of solar energy to illuminate a target surface for a given receiver. A magnitude of efficiency, suitable for effectively competing with systems employed in collecting and converting energy extracted from fossil fuels, is indicated.

  13. Collective decision-making in microbes

    PubMed Central

    Ross-Gillespie, Adin; Kümmerli, Rolf

    2014-01-01

    Microbes are intensely social organisms that routinely cooperate and coordinate their activities to express elaborate population level phenotypes. Such coordination requires a process of collective decision-making, in which individuals detect and collate information not only from their physical environment, but also from their social environment, in order to arrive at an appropriately calibrated response. Here, we present a conceptual overview of collective decision-making as it applies to all group-living organisms; we introduce key concepts and principles developed in the context of animal and human group decisions; and we discuss, with appropriate examples, the applicability of each of these concepts in microbial contexts. In particular, we discuss the roles of information pooling, control skew, speed vs. accuracy trade-offs, local feedbacks, quorum thresholds, conflicts of interest, and the reliability of social information. We conclude that collective decision-making in microbes shares many features with collective decision-making in higher taxa, and we call for greater integration between this fledgling field and other allied areas of research, including in the humanities and the physical sciences. PMID:24624121

  14. Modeling Users, Context and Devices for Ambient Assisted Living Environments

    PubMed Central

    Castillejo, Eduardo; Almeida, Aitor; López-de-Ipiña, Diego; Chen, Liming

    2014-01-01

    The participation of users within AAL environments is increasing thanks to the capabilities of the current wearable devices. Furthermore, the significance of considering user's preferences, context conditions and device's capabilities help smart environments to personalize services and resources for them. Being aware of different characteristics of the entities participating in these situations is vital for reaching the main goals of the corresponding systems efficiently. To collect different information from these entities, it is necessary to design several formal models which help designers to organize and give some meaning to the gathered data. In this paper, we analyze several literature solutions for modeling users, context and devices considering different approaches in the Ambient Assisted Living domain. Besides, we remark different ongoing standardization works in this area. We also discuss the used techniques, modeled characteristics and the advantages and drawbacks of each approach to finally draw several conclusions about the reviewed works. PMID:24643006

  15. Abortion and politics in Mexico: 'context is all'.

    PubMed

    Lamas, M; Bissell, S

    2000-11-01

    A strong collective pro-choice mentality was recently manifested in Mexico when a legislative initiative to revoke the legal right of rape survivor to abortion in the state of Guanajuato awakened national indignation. Pro-choice values were expressed in public opinion with such force that it sparked off the passage of liberalising law reforms in Mexico City and the state of Morelos. In this paper we trace the development of these manifestations of pro-choice views, beginning with the Democratic Revolution Party's (PRD) refusal in 1999 to modify abortion legislation within the context of penal code reform, and moving through the events surrounding the Guanajuato reform, and the pro-choice response of Mexico City and Morelos legislators. This analysis allows us to recognise the emergence of a pro-choice consciousness and to understand that, when it comes to abortion, 'context is all'. PMID:11424237

  16. [Experiencing care in the birthing center context: the users' perspective].

    PubMed

    Gonçalves, Roselane; de Azevedo Aguiar, Cláudia; Merighi, Miriam Aparecida Barbosa; de Jesus, Maria Cristina Pinto

    2011-03-01

    In Brazil, the delivery and birth care model in Brazil has been the topic of many studies and discussions about introducing obstetric practices that take women's autonomy into account in the parturition process. Birthing Centers propose models that represent a new scenario to deliver such care. The objective of this was to understand the experience of women in labor in the context of a Birthing Center located in the city of São Paulo. Data was collected from March to October 2007 and analyzed according to the Alfred Schütz social phenomenology framework. Seven women participated in this study. Results showed that women choose the Birthing Center expecting to receive humanized care and that, within this context, they have positive and negative experiences. It is imperative to discuss public policies for delivery care, as well as its implementation and impact on perinatal health indicators. PMID:21445490

  17. Infant speech recognition in multisyllabic contexts.

    PubMed

    Goodsitt, J V; Morse, P A; Ver Hoeve, J N; Cowan, N

    1984-06-01

    In 2 infant speech recognition experiments using trisyllabic sequences, the amount of redundancy within nontarget, context syllables was manipulated. Infants 6 1/2 months old were trained to discriminate the syllables [ba] versus [du] in contexts that were either redundant (e.g., [ko ba ko] or [ti ba ti]) or mixed (e.g., [ko ba ti] or [ti ba ko]) A visually reinforced head-turning procedure was employed. In Experiment 1, context was manipulated between subjects, but in Experiment 2 each subject received all 4 contexts (2 redundant, 2 mixed). Infants consistently recognized the familiar target in all contexts, but did so more successfully in redundant than in mixed trisyllablic contexts. These results suggest that amount of speech redundancy may be an important factor in infants' perceptual capabilities. PMID:6734325

  18. The Neighborhood Context of Homelessness

    PubMed Central

    Pollio, David E.; North, Carol S.

    2013-01-01

    Objectives. We examined and compared the changing neighborhood characteristics of a group of homeless adults over time. Methods. We collected the addresses of previous housing and sleep locations from a longitudinal study of 400 homeless adults in the St. Louis, Missouri, region and compared census measures of housing and economic opportunities at different points along individual pathways from housing to homelessness and at 1- and 2-year follow-up interviews. Results. Sleep locations of homeless adults were much more concentrated in the urban core at baseline than were their previous housed and follow-up locations. These core areas had higher poverty, unemployment, and rent-to-income ratios and lower median incomes. Conclusions. The spatial concentration of homeless adults in areas with fewer opportunities and more economic and housing distress may present additional barriers to regaining stable housing and employment. A big-picture spatial and time-course viewpoint is critical for both policymakers and future homelessness researchers. PMID:23409889

  19. A Tasteful Collection.

    ERIC Educational Resources Information Center

    Canadian Architect, 2003

    2003-01-01

    Describes the design of the Canadian Wine Library at the University of British Columbia, including the educational context and design goals. Includes information on the architects, manufacturers/suppliers, and construction team; a general building description; and commentary on the design. Also includes the floor plan and photographs. (EV)

  20. 77 FR 6573 - Agency Information Collection Activities: Proposed Collection; Comment Request; Collection of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-08

    ... Collection; Comment Request; Collection of Qualitative Feedback Through Focus Groups AGENCY: U.S. Citizenship... Generic Information Collection Request (Generic ICR): ``Collection of Qualitative Feedback through Focus... Feedback through Focus Groups'' in the subject box. SUPPLEMENTARY INFORMATION: Title: Collection...

  1. Collective Intelligence Generation from User Contributed Content

    NASA Astrophysics Data System (ADS)

    Solachidis, Vassilios; Mylonas, Phivos; Geyer-Schulz, Andreas; Hoser, Bettina; Chapman, Sam; Ciravegna, Fabio; Lanfranchi, Vita; Scherp, Ansgar; Staab, Steffen; Contopoulos, Costis; Gkika, Ioanna; Bakaimis, Byron; Smrz, Pavel; Kompatsiaris, Yiannis; Avrithis, Yannis

    In this paper we provide a foundation for a new generation of services and tools. We define new ways of capturing, sharing and reusing information and intelligence provided by single users and communities, as well as organizations by enabling the extraction, generation, interpretation and management of Collective Intelligence from user generated digital multimedia content. Different layers of intelligence are generated, which together constitute the notion of Collective Intelligence. The automatic generation of Collective Intelligence constitutes a departure from traditional methods for information sharing, since information from both the multimedia content and social aspects will be merged, while at the same time the social dynamics will be taken into account. In the context of this work, we present two case studies: an Emergency Response and a Consumers Social Group case study.

  2. Adaptation and Validation of the Course Experience Questionnaire in the Context of Post-Secondary Education in Hong Kong

    ERIC Educational Resources Information Center

    Law, Dennis C. S.; Meyer, Jan H. F.

    2011-01-01

    Purpose: The Course Experience Questionnaire (CEQ) is a quantitative instrument for collecting student feedback on programme quality that has been tested and practically used in Western university response-contexts. The purpose of this paper is to adapt and partially validate a Chinese translation of the CEQ, for application in the new context of…

  3. To Learn and to Construct Knowledge in the Context of Work with Adult Education: A Portuguese Case Study

    ERIC Educational Resources Information Center

    Loureiro, Armando; Caria, Telmo H.

    2013-01-01

    Work contexts are frequently referred to as spaces of learning and production of individual and/or collective knowledge. In such contexts specific dynamics are developed which cause the processes of learning and of knowledge production to have particularities. This paper aims at accounting for some dynamics that are associated with those…

  4. A Systematic Mapping on the Learning Analytics Field and Its Analysis in the Massive Open Online Courses Context

    ERIC Educational Resources Information Center

    Moissa, Barbara; Gasparini, Isabela; Kemczinski, Avanilde

    2015-01-01

    Learning Analytics (LA) is a field that aims to optimize learning through the study of dynamical processes occurring in the students' context. It covers the measurement, collection, analysis and reporting of data about students and their contexts. This study aims at surveying existing research on LA to identify approaches, topics, and needs for…

  5. Context in Mathematics Learning: Problems and Possibilities

    ERIC Educational Resources Information Center

    Lee, Ji-Eun

    2007-01-01

    This article presents an instructional idea that facilitates the students' active participation in the problem analysis process using insufficient or contradictory problem contexts. (Contains 1 figure.)

  6. Context dependent anti-aliasing image reconstruction

    NASA Technical Reports Server (NTRS)

    Beaudet, Paul R.; Hunt, A.; Arlia, N.

    1989-01-01

    Image Reconstruction has been mostly confined to context free linear processes; the traditional continuum interpretation of digital array data uses a linear interpolator with or without an enhancement filter. Here, anti-aliasing context dependent interpretation techniques are investigated for image reconstruction. Pattern classification is applied to each neighborhood to assign it a context class; a different interpolation/filter is applied to neighborhoods of differing context. It is shown how the context dependent interpolation is computed through ensemble average statistics using high resolution training imagery from which the lower resolution image array data is obtained (simulation). A quadratic least squares (LS) context-free image quality model is described from which the context dependent interpolation coefficients are derived. It is shown how ensembles of high-resolution images can be used to capture the a priori special character of different context classes. As a consequence, a priori information such as the translational invariance of edges along the edge direction, edge discontinuity, and the character of corners is captured and can be used to interpret image array data with greater spatial resolution than would be expected by the Nyquist limit. A Gibb-like artifact associated with this super-resolution is discussed. More realistic context dependent image quality models are needed and a suggestion is made for using a quality model which now is finding application in data compression.

  7. Average: the juxtaposition of procedure and context

    NASA Astrophysics Data System (ADS)

    Watson, Jane; Chick, Helen; Callingham, Rosemary

    2014-09-01

    This paper presents recent data on the performance of 247 middle school students on questions concerning average in three contexts. Analysis includes considering levels of understanding linking definition and context, performance across contexts, the relative difficulty of tasks, and difference in performance for male and female students. The outcomes lead to a discussion of the expectations of the curriculum and its implementation, as well as assessment, in relation to students' skills in carrying out procedures and their understanding about the meaning of average in context.

  8. Profiling a Periodicals Collection

    ERIC Educational Resources Information Center

    Bolgiano, Christina E.; King, Mary Kathryn

    1978-01-01

    Libraries need solid information upon which to base collection development decisions. Specific evaluative methods for determining scope, access, and usefullness are described. Approaches used for data collection include analysis of interlibrary loan requests, comparison with major bibliographies, and analysis of accessibility through available…

  9. Collecting Best Practices

    ERIC Educational Resources Information Center

    Tedford, Jennifer

    2008-01-01

    How many beginning teachers struggle to create new lessons despite the fact that experienced teachers have already designed effective lessons for the same content? Shulman (1987) used the term "collective amnesia" to describe the failure of school leaders to design professional development that included the collection of its best practices.…

  10. ARS Culture Collection

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The internationally recognized Agricultural Research Service (ARS) Culture Collection will be described to include the microorganisms maintained by the collection, preservation methods and worldwide distribution of cultures. The impact of the germplasm will be described to include discovery of the f...

  11. Children's Collective Training Manual.

    ERIC Educational Resources Information Center

    Kimbrough, Jackie; And Others

    This children's collective manual describes a training program for parents and teachers of preschool children which is designed to encourage cooperative, community-oriented styles of group interaction in black preschool children. Developed by the Children's Collective of the Coordinated Child Care Council of South Los Angeles, the program is based…

  12. UNO's Afghanistan Collection.

    ERIC Educational Resources Information Center

    McKernan, M. D.

    This paper explores the background history and sources of the Afghanistan collection at the University Library, University of Nebraska at Omaha (UNO). Credit for the impetus behind the development of the collection is given to Chris Jung, a former UNO geography/geology faculty member; Ronald Roskens, then UNO chancellor; and the Afghanistan…

  13. Visualizing context through theory deconstruction: a content analysis of three bodies of evaluation theory literature.

    PubMed

    Vo, Anne T

    2013-06-01

    While the evaluation field collectively agrees that contextual factors bear on evaluation practice and related scholarly endeavors, the discipline does not yet have an explicit framework for understanding evaluation context. To address this gap in the knowledge base, this paper explores the ways in which evaluation context has been addressed in the practical-participatory, values-engaged, and emergent realist evaluation literatures. Five primary dimensions that constitute evaluation context were identified for this purpose: (1) stakeholder; (2) program; (3) organization; (4) historical/political; and (5) evaluator. Journal articles, book chapters, and conference papers rooted in the selected evaluation approaches were compared along these dimensions in order to explore points of convergence and divergence in the theories. Study results suggest that the selected prescriptive theories most clearly explicate stakeholder and evaluator contexts. Programmatic, organizational, and historical/political contexts, on the other hand, require further clarification. PMID:22469338

  14. Urine collection device

    NASA Technical Reports Server (NTRS)

    Michaud, R. B. (Inventor)

    1981-01-01

    A urine collection device for females is described. It is comprised of a collection element defining a urine collection chamber and an inlet opening into the chamber and is adapted to be disposed in surrounding relation to the urethral opening of the user. A drainage conduit is connected to the collection element in communication with the chamber whereby the chamber and conduit together comprise a urine flow pathway for carrying urine generally away from the inlet. A first body of wicking material is mounted adjacent the collection element and extends at least partially into the flow pathway. The device preferably also comprise a vaginal insert element including a seal portion for preventing the entry of urine into the vagina.

  15. Student Behaviour Problems: Context, Initiatives and Programs. Selected Papers from the National Conference on Student Behaviour Problems: Context, Initiatives and Programs (3rd, Brisbane, Queensland, Australia, October 1991).

    ERIC Educational Resources Information Center

    Elkins, John, Ed.; Izard, John, Ed.

    The conference papers in this collection are grouped under the following topics: behavior problems in context; interpersonal relationships; initiatives by systems and schools; and programs in special settings. Papers included are: (1) National Trends in Discipline Policy Development (Roger Slee); (2) Balancing: The Protocols of Discipline (William…

  16. Lightweight Adaptation of Classifiers to Users and Contexts: Trends of the Emerging Domain

    PubMed Central

    Vildjiounaite, Elena; Gimel'farb, Georgy; Kyllönen, Vesa; Peltola, Johannes

    2015-01-01

    Intelligent computer applications need to adapt their behaviour to contexts and users, but conventional classifier adaptation methods require long data collection and/or training times. Therefore classifier adaptation is often performed as follows: at design time application developers define typical usage contexts and provide reasoning models for each of these contexts, and then at runtime an appropriate model is selected from available ones. Typically, definition of usage contexts and reasoning models heavily relies on domain knowledge. However, in practice many applications are used in so diverse situations that no developer can predict them all and collect for each situation adequate training and test databases. Such applications have to adapt to a new user or unknown context at runtime just from interaction with the user, preferably in fairly lightweight ways, that is, requiring limited user effort to collect training data and limited time of performing the adaptation. This paper analyses adaptation trends in several emerging domains and outlines promising ideas, proposed for making multimodal classifiers user-specific and context-specific without significant user efforts, detailed domain knowledge, and/or complete retraining of the classifiers. Based on this analysis, this paper identifies important application characteristics and presents guidelines to consider these characteristics in adaptation design. PMID:26473165

  17. The development of science process skills in authentic contexts

    NASA Astrophysics Data System (ADS)

    Roth, Wolff-Michael; Roychoudhury, Anita

    Instructional strategies and curriculum sequences aimed at teaching process skills have received considerable attention in science education. On the other hand, the teaching of domain-independent, context-free skills has been subject to criticism on the ground that important aspects of cognitive activities are functions of meaningful contexts. The intent of this study was to examine the development of integrated process skills in the context of open-inquiry laboratory sessions. The data-collection approach was qualitative and included videotapes of laboratory sessions, laboratory reports of students, and the reflective journals kept by the two teachers involved in the study. Forty-eight students from the Grade 11 introductory physics course, 29 students from the Grade 12 physics course, and 60 students from the Grade 8 general science course from an all-boys private school participated in the study. An interpretive research methodology was adopted for construction of meaning from the data. Students worked in collaborative groups during all of the open-inquiry laboratory sessions. Findings from the study indicate that students develop higher-order process skills through nontraditional laboratory experiences that provided the students with freedom to perform experiments of personal relevance in authentic contexts. Students learned to (a) identify and define pertinent variables, (b) interpret, transform, and analyze data, (c) plan and design an experiment, and (d) formulate hypotheses. Findings of this study suggest that process skills need not be taught separately. Integrated process skills develop gradually and reach a high level of sophistication when experiments are performed in meaningful context.

  18. 1. Copy photo of context view taken in 1917 looking ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    1. Copy photo of context view taken in 1917 looking east along Farragut Avenue, then called Main Street, showing construction of double tracking. On right is Building 78 with original smoke stack. Building 59 is visible as third building from left. This photograph was taken from a hill that was later cut away in order to expand the shipyard. See photo for original caption. HABS negative is a 4x5' copy negative made from a print in the collection of the Photographic Branch, Puget Sound Naval Shipyard, Bremerton, WA. Photographer unknown. - Puget Sound Naval Shipyard, Administration Building, Farragut Avenue, Bremerton, Kitsap County, WA

  19. Systems and context modeling approach to requirements analysis

    NASA Astrophysics Data System (ADS)

    Ahuja, Amrit; Muralikrishna, G.; Patwari, Puneet; Subhrojyoti, C.; Swaminathan, N.; Vin, Harrick

    2014-08-01

    Ensuring completeness and correctness of the requirements for a complex system such as the SKA is challenging. Current system engineering practice includes developing a stakeholder needs definition, a concept of operations, and defining system requirements in terms of use cases and requirements statements. We present a method that enhances this current practice into a collection of system models with mutual consistency relationships. These include stakeholder goals, needs definition and system-of-interest models, together with a context model that participates in the consistency relationships among these models. We illustrate this approach by using it to analyze the SKA system requirements.

  20. Effects of simple- and complex-place contexts in the multiple-context paradigm.

    PubMed

    Isarida, Takeo; Isarida, Toshiko K

    2010-12-01

    In four experiments, a total of 384 undergraduates incidentally learned a list of 24 nouns twice in the same context (same-context repetition) or different contexts (different-context repetition). Free recall was measured in a neutral context. Experiments 1, 2, and 3 used a context repetition (same- or different-context repetition) × inter-study and retention intervals (10 min or 1 day) between-participants design. Context was manipulated by the combination of place, social environment, and encoding task (Experiment 1), place and social environment (Experiment 2), or place alone (Experiment 3). Experiment 4 used a context repetition × type of context (context manipulated by place or by place, social environment, and encoding task) between-participants design, with a 10-min inter-study interval and a one-day retention interval. The present results indicate that the determinant of the superiority of same- or different-context repetition in recall is the type of context. Implications of the results were discussed. PMID:20446185

  1. Using context to resolve temporal ambiguity.

    PubMed

    Molet, Mikaël; Urcelay, Gonzalo P; Miguez, Gonzalo; Miller, Ralph R

    2010-01-01

    Three conditioned lick suppression experiments with rats examined the role of the context in the selection and integration of independently acquired interval relationships. In Experiment 1, rats were exposed to separate conditioned stimuli 1 and 2 (CS1-CS2) pairings with 2 different interval relationships, each in its own distinctive context, X or Y. The resultant integration was determined by the training context (X or Y) in which unconditioned stimulus (US)-CS2 backward pairings occurred, as assessed in a third neutral context (Z). In Experiment 2, rats experienced CS1-CS2 pairings with 2 different interval relationships as in Experiment 1, and then received US-CS2 pairings in both contexts X and Y. The testing context (i.e., X or Y) determined the resultant integration. In Experiment 3, rats were exposed to CS1-CS2 pairings in 2 different interval relationships each in different phases (i.e., Phases 1 and 2), and then in Phase 3 received US-CS2 pairings. The temporal context of testing (i.e., short or long retention interval) determined the resultant integration. Thus, both physical and temporal context can be used to disambiguate conflicting temporal information. PMID:20141323

  2. The Large Context Problem (LCP) Approach

    ERIC Educational Resources Information Center

    Stinner, Arthur

    2006-01-01

    This article traces the development of a contextual approach to the teaching of science (physics) subsequently called the Large Context Problem (LCP) approach. This approach is based on the general observation that learning could be well motivated by a context with one unifying central idea capable of capturing the imagination of the students. The…

  3. Learning Logo: The Social Context of Cognition.

    ERIC Educational Resources Information Center

    Emihovich, Catherine; And Others

    This paper presents research on a theoretical approach to Logo as a programming language that creates a context for learning in which the process by which children learn and develop, using computers, is of greater interest than the products, or outcomes, of learning. Concerned with the cultural context of Logo learning and principles upon which it…

  4. Classifying the Context Clues in Children's Text

    ERIC Educational Resources Information Center

    Dowds, Susan J. Parault; Haverback, Heather Rogers; Parkinson, Meghan M.

    2016-01-01

    This study aimed to determine which types of context clues exist in children's texts and whether it is possible for experts to identify reliably those clues. Three experienced coders used Ames' clue set as a foundation for a system to classify context clues in children's text. Findings showed that the adjustments to Ames' system resulted in 15…

  5. Philosophy in Context: Reply to Trohler

    ERIC Educational Resources Information Center

    Smith, Richard

    2007-01-01

    This paper responds to Trohler's charge that my paper "As if by Machinery: The levelling of educational research" takes Francis Bacon's vision of scientific research out of context. I distinguish four senses of "decontextualisation": as ignorance, as belief in "timeless truths", as comparison of contexts, and as genealogy. I argue that Trohler has…

  6. Student Reasoning about Graphs in Different Contexts

    ERIC Educational Resources Information Center

    Ivanjek, Lana; Susac, Ana; Planinic, Maja; Andrasevic, Aneta; Milin-Sipus, Zeljka

    2016-01-01

    This study investigates university students' graph interpretation strategies and difficulties in mathematics, physics (kinematics), and contexts other than physics. Eight sets of parallel (isomorphic) mathematics, physics, and other context questions about graphs, which were developed by us, were administered to 385 first-year students at the…

  7. Context Improves Comprehension of Fronted Objects

    ERIC Educational Resources Information Center

    Kristensen, Line Burholt; Engberg-Pedersen, Elisabeth; Poulsen, Mads

    2014-01-01

    Object-initial clauses (OCs) are associated with more processing difficulties than subject-initial clauses (SCs) in a number of languages (e.g. English, German and Finnish), but a supportive context can reduce or neutralize the difference between SCs and OCs with respect to reading times. Still, it is unresolved how context can affect the…

  8. Operational Context Training in Individual Technical Skills.

    ERIC Educational Resources Information Center

    Hoehn, Arthur J.; And Others

    Four papers were presented at a conference dealing with the objectives and problems of operational context training (OCT) sponsored by HumRRO in June 1958. The first paper (by William McCleland) outlines the objectives of the conference and its general goals. The second paper (by Arthur J. Hoehn) describes the use of operational context training…

  9. Bilingual Lexical Activation in Sentence Context

    ERIC Educational Resources Information Center

    Schwartz, Ana I.; Kroll, Judith F.

    2006-01-01

    The present study investigated the cognitive nature of second language (L2) lexical processing in sentence context. We examined bilinguals' L2 word recognition performance for language-ambiguous words [cognates (e.g., "piano") and homographs (e.g., "pan")] in two sentence context experiments with highly proficient Spanish-English bilinguals living…

  10. Authoring of Learning Objects in Context

    ERIC Educational Resources Information Center

    Specht, Marcus; Kravcik, Milos

    2006-01-01

    Learning objects and content interchange standards provide new possibilities for e-learning. Nevertheless the content often lacks context data to find appropriate use for adaptive learning on demand and personalized learning experiences. In the Remotely Accessible Field Trips (RAFT) project mobile authoring of learning content in context has shown…

  11. Completion Mindsets and Contexts in Doctoral Supervision

    ERIC Educational Resources Information Center

    Green, Pam; Bowden, John

    2012-01-01

    Purpose: Doctoral candidates are now located within a research context of performativity where the push to successfully complete in a timely manner is central. The purpose of this paper is to develop a model of completion mindset within a completion context to assist research students and supervisors. Design/methodology/approach: The research was…

  12. Dimensions of Leadership in the Childcare Context

    ERIC Educational Resources Information Center

    Hujala, Eeva

    2004-01-01

    The contextual leadership theory provides a frame to investigate the leadership phenomenon in a childcare context. According to the contextual leadership theory, leadership is perceived of as a socially constructed, situational and interpretive phenomenon. The purpose of the study was to investigate leadership in a Finnish childcare context based…

  13. The Functional Context Method of Instruction.

    ERIC Educational Resources Information Center

    Shoemaker, Harry A.

    1967-01-01

    The functional context method of instruction for radio repair training is described. Although limited to electronics here, it is applicable in other types of training. The basic premise of the method is twofold: the context of the material to be learned must be meaningful to the learner and must, at the same time, be directly relevant to the goals…

  14. Play in Cultural Contexts = Mang Kultuurikontekstis.

    ERIC Educational Resources Information Center

    Saar, Aino, Ed.; Hakkarainen, Pentti, Ed.

    1998-01-01

    This volume compiles articles based on the presentations delivered at two conferences. The conferences presented a multidisciplinary overview of research on children's play in different cultural contexts. The articles are grouped under six subheadings: play in the family context, play in the zone of proximal development, play in the kindergarten,…

  15. Context Sensitivity in the Force Concept Inventory

    ERIC Educational Resources Information Center

    Stewart, John; Griffin, Heather; Stewart, Gay

    2007-01-01

    The force concept inventory and a 10-question context-modified test were given to 647 students enrolled in introductory physics classes at the University of Arkansas. Context changes had an effect ranging from -3% to 10% on the individual questions. The average student score on the ten transformed questions was 3% higher than the average student…

  16. Language Proficiency, Reading Development, and Learning Context

    ERIC Educational Resources Information Center

    Li, Liu

    2014-01-01

    In the era of globalization, the number of students studying abroad is increasing dramatically. Accordingly, there is an increasing interest among researchers in students' language gains in the study-abroad (SA) context. To deepen our understanding of second language (L2) reading acquisition in different contexts, it is necessary to examine…

  17. Social Context Effects on School Effects.

    ERIC Educational Resources Information Center

    Hallinger, Philip; Murphy, Joseph

    In this two-part paper, an attempt is made to examine the relationship between social contexts and effective schools and specifically to contribute to the development of a conceptual model for understanding how social contexts influence the operation of effective schools and student learning. In the first part, school effects research is drawn…

  18. Context Strengthens Initial Misinterpretations of Text

    ERIC Educational Resources Information Center

    Christianson, Kiel; Luke, Steven G.

    2011-01-01

    Three self-paced reading experiments examined the effect of context on interpreting subsequent sentences and in the difficulty of revising initial misinterpretations of subsequent temporarily ambiguous sentences. Target sentences containing noun phrase/sentence (NP/S) coordination ambiguities were preceded by contexts that either did or did not…

  19. Children's Context Inappropriate Anger and Salivary Cortisol

    ERIC Educational Resources Information Center

    Locke, Robin L.; Davidson, Richard J.; Kalin, Ned H.; Goldsmith, H. Hill

    2009-01-01

    Some children show emotion that is not consistent with normative appraisal of the context and can therefore be defined as context inappropriate (CI). The authors used individual growth curve modeling and hierarchical multiple regression analyses to examine whether CI anger predicts differences in hypothalamic-pituitary-adrenal axis activity, as…

  20. Enhancing Vocabulary Development in Multiple Classroom Contexts.

    ERIC Educational Resources Information Center

    Harmon, Janis M.; Staton, Denise G.

    1999-01-01

    Describes ways teachers can enhance students' vocabulary development through multiple contexts available in typical middle school classroom settings. Addresses questions about vocabulary learning and offers suggestions for enhancing vocabulary with narrative and expository texts that involve multiple classroom contexts. Considers the Vocab-o-gram…

  1. Language in Development Constrained: Three Contexts.

    ERIC Educational Resources Information Center

    Appleby, Roslyn; Copley, Kath; Sithirajvongsa, Sisamone; Pennycook, Alastair

    2002-01-01

    Explores the political, ethical, and professional dilemmas faced by English-as-a-Second-Language professionals working in the context of Australian language aid projects in Laos, East Timor, and Cambodia. Illuminates how language aid practitioners have to deal with issues of language choice, ownership, and political context. (Author/VWL)

  2. F. M. Courtis Collection: A Window on Teacher Education at Bendigo, Australia

    ERIC Educational Resources Information Center

    Collet, Penelope

    2009-01-01

    For the best part of the last millennium collections have been used in universities in Europe to support teaching and research. European authors have referred to university collections as "windows on the university". This article uses the European context to historically situate art collections in Australian teacher education institutions. The…

  3. Context improves comprehension of fronted objects.

    PubMed

    Kristensen, Line Burholt; Engberg-Pedersen, Elisabeth; Poulsen, Mads

    2014-04-01

    Object-initial clauses (OCs) are associated with more processing difficulties than subject-initial clauses (SCs) in a number of languages (e.g. English, German and Finnish), but a supportive context can reduce or neutralize the difference between SCs and OCs with respect to reading times. Still, it is unresolved how context can affect the comprehension of OCs. In the present self-paced reading study of Danish, we therefore investigated both reading times, comprehension accuracy and response times for OCs and SCs. In line with previous studies on word order processing, OCs in an unsupportive context showed longer reading times than SCs, longer response times and a comprehension accuracy as poor as chance level. A manipulation of context showed no effect of reading time, but a supportive context had a stronger facilitating effect on comprehension (response accuracy and response time) for OCs than for SCs. PMID:23504556

  4. Generating Personalized Web Search Using Semantic Context

    PubMed Central

    Xu, Zheng; Chen, Hai-Yan; Yu, Jie

    2015-01-01

    The “one size fits the all” criticism of search engines is that when queries are submitted, the same results are returned to different users. In order to solve this problem, personalized search is proposed, since it can provide different search results based upon the preferences of users. However, existing methods concentrate more on the long-term and independent user profile, and thus reduce the effectiveness of personalized search. In this paper, the method captures the user context to provide accurate preferences of users for effectively personalized search. First, the short-term query context is generated to identify related concepts of the query. Second, the user context is generated based on the click through data of users. Finally, a forgetting factor is introduced to merge the independent user context in a user session, which maintains the evolution of user preferences. Experimental results fully confirm that our approach can successfully represent user context according to individual user information needs. PMID:26000335

  5. Dependent Record Types for Dynamic Context Representation

    NASA Astrophysics Data System (ADS)

    Dapoigny, Richard; Barlatier, Patrick

    The context paradigm emerges from different areas of Artificial Intelligence (AI). However, while significative formalizations have been proposed, contexts are either mapped on independent micro-theories or considered as different concurrent viewpoints with mappings between contexts to export/import knowledge. These logical formalisms focus on the semantic level and do not take into account dynamic low-level information such as those available from sensors via physical variables. This information is a key element of contexts in pervasive computing environments. In this paper, we introduce a formal framework where the knowledge representation of context bridges the gap between semantic high-level and low-level knowledge. The logical reasoning based on intuitionistic type theory and the Curry-Howard isomorphism is able to incorporate expert knowledge as well as technical resources such as computing variable properties.

  6. Generating personalized web search using semantic context.

    PubMed

    Xu, Zheng; Chen, Hai-Yan; Yu, Jie

    2015-01-01

    The "one size fits the all" criticism of search engines is that when queries are submitted, the same results are returned to different users. In order to solve this problem, personalized search is proposed, since it can provide different search results based upon the preferences of users. However, existing methods concentrate more on the long-term and independent user profile, and thus reduce the effectiveness of personalized search. In this paper, the method captures the user context to provide accurate preferences of users for effectively personalized search. First, the short-term query context is generated to identify related concepts of the query. Second, the user context is generated based on the click through data of users. Finally, a forgetting factor is introduced to merge the independent user context in a user session, which maintains the evolution of user preferences. Experimental results fully confirm that our approach can successfully represent user context according to individual user information needs. PMID:26000335

  7. Sweat collection capsule

    NASA Technical Reports Server (NTRS)

    Delaplaine, R. W.; Greenleaf, J. E.

    1979-01-01

    Capsule, with filter paper insert, is used to collect sweat for rate monitoring, chromatographic analysis, or active sweat gland location within specified area. Construction of capsule allows change of inserts while device remains strapped in place.

  8. Weeding Your Collection.

    ERIC Educational Resources Information Center

    Kerby, Ramona

    2002-01-01

    Offers guidelines for weeding as part of school library collection development. Highlights include developing a weeding policy; and the CREW (Continuous Review Evaluation and Weeding) method, including reasons for weeding, scheduling, and guidelines for fiction and for nonfiction. (LRW)

  9. Vectorized garbage collection

    SciTech Connect

    Appel, A.W.; Bendiksen, A.

    1988-01-01

    Garbage collection can be done in vector mode on supercomputers like the Cray-2 and the Cyber 205. Both copying collection and mark-and-sweep can be expressed as breadth-first searches in which the queue can be processed in parallel. The authors have designed a copying garbage collector whose inner loop works entirely in vector mode. The only significant limitation of the algorithm is that if the size of the records is not constant, the implementation becomes much more complicated. The authors give performance measurements of the algorithm as implemented for Lisp CONS cells on the Cyber 205. Vector-mode garbage collection performs up to 9 times faster than scalar-mode collection.

  10. Sweat collection capsule

    NASA Technical Reports Server (NTRS)

    Greenleaf, J. E.; Delaplaine, R. W. (Inventor)

    1980-01-01

    A sweat collection capsule permitting quantitative collection of sweat is described. The device consists of a frame held immobile on the skin, a closure secured to the frame and absorbent material located next to the skin in a cavity formed by the frame and the closure. The absorbent material may be removed from the device by removing the closure from the frame while the frame is held immobile on the skin.

  11. Sparse matrix test collections

    SciTech Connect

    Duff, I.

    1996-12-31

    This workshop will discuss plans for coordinating and developing sets of test matrices for the comparison and testing of sparse linear algebra software. We will talk of plans for the next release (Release 2) of the Harwell-Boeing Collection and recent work on improving the accessibility of this Collection and others through the World Wide Web. There will only be three talks of about 15 to 20 minutes followed by a discussion from the floor.

  12. Collective field accelerator

    DOEpatents

    Luce, John S.

    1978-01-01

    A collective field accelerator which operates with a vacuum diode and utilizes a grooved cathode and a dielectric anode that operates with a relativistic electron beam with a .nu./.gamma. of .about. 1, and a plurality of dielectric lenses having an axial magnetic field thereabout to focus the collectively accelerated electrons and ions which are ejected from the anode. The anode and lenses operate as unoptimized r-f cavities which modulate and focus the beam.

  13. A Survey of Collectives

    NASA Technical Reports Server (NTRS)

    Tumer, Kagan; Wolpert, David

    2004-01-01

    Due to the increasing sophistication and miniaturization of computational components, complex, distributed systems of interacting agents are becoming ubiquitous. Such systems, where each agent aims to optimize its own performance, but where there is a well-defined set of system-level performance criteria, are called collectives. The fundamental problem in analyzing/designing such systems is in determining how the combined actions of self-interested agents leads to 'coordinated' behavior on a iarge scale. Examples of artificial systems which exhibit such behavior include packet routing across a data network, control of an array of communication satellites, coordination of multiple deployables, and dynamic job scheduling across a distributed computer grid. Examples of natural systems include ecosystems, economies, and the organelles within a living cell. No current scientific discipline provides a thorough understanding of the relation between the structure of collectives and how well they meet their overall performance criteria. Although still very young, research on collectives has resulted in successes both in understanding and designing such systems. It is eqected that as it matures and draws upon other disciplines related to collectives, this field will greatly expand the range of computationally addressable tasks. Moreover, in addition to drawing on them, such a fully developed field of collective intelligence may provide insight into already established scientific fields, such as mechanism design, economics, game theory, and population biology. This chapter provides a survey to the emerging science of collectives.

  14. Improving data collection strategies.

    PubMed Central

    Delgado, J L; Estrada, L

    1993-01-01

    The authors examined 21 major health data systems of the U.S. Department of Health and Human Services (DHHS) and concluded that data on Hispanics are not included in several Departmental national health data collection systems, and that even when collected, data on Hispanic subpopulations are found in few of the systems. Of the 21 data systems, 6 do not collect Hispanic population data, including the Medicare statistical system. Only the National Vital Statistics System was found to collect data for all major Hispanic subpopulation groups. Seventeen of the 21 data systems do not collect sample sizes adequate for analyzing any one of the four major Hispanic subpopulation groups. To address that lack, Hispanic health leadership agendas have recommended collecting data on Hispanics in all systems, where possible, to provide samples of a size adequate for detailed analysis of Hispanic subpopulation groups, for support of researchers and a Hispanic research infrastructure, and for broad dissemination of data findings, including dissemination in useful formats to Hispanic community-based organizations. PMID:8416111

  15. Context-Outcome Associations Underlie Context-Switch Effects after Partial Reinforcement in Human Predictive Learning

    ERIC Educational Resources Information Center

    Moreno-Fernandez, Maria M.; Abad, Maria J. F.; Ramos-Alvarez, Manuel M.; Rosas, Juan M.

    2011-01-01

    Predictive value for continuously reinforced cues is affected by context changes when they are trained within a context in which a different cue undergoes partial reinforcement. An experiment was conducted with the goal of exploring the mechanisms underlying this context-switch effect. Human participants were trained in a predictive learning…

  16. Context-Outcome Associations Mediate Context-Switch Effects in a Human Predictive Learning Task

    ERIC Educational Resources Information Center

    Leon, Samuel P.; Abad, Maria J. F.; Rosas, Juan M.

    2011-01-01

    Four experiments explored the role of contexts in information retrieval after different levels of acquisition training in human predictive learning. Participants were trained where cue (X) was followed by an outcome in context A while a different cue (Y) was followed by the absence of the outcome in context B. When 4 training trials with each cue…

  17. Social Context as an Indirect Trigger in EFL Contexts: Issues and Solutions

    ERIC Educational Resources Information Center

    Gholami, Reza; Rahman, Sharifah Zainab Abd; Mustapha, Ghazali

    2012-01-01

    This paper investigates the value of the social context and its role in learning a second language in different contexts. Social context is believed to be able to influence attitude and motivation. It also provides learning opportunities which give rise to learner's outcomes. In fact, students acquire a language by using it in social interaction…

  18. Academic Success in Context-Based Chemistry: Demonstrating Fluid Transitions between Concepts and Context

    ERIC Educational Resources Information Center

    King, Donna Therese; Ritchie, Stephen M.

    2013-01-01

    Curriculum developers and researchers have promoted context-based programmes to arrest waning student interest and participation in the enabling sciences at high school and university. Context-based programmes aim for student connections between scientific discourse and real-world contexts to elevate curricular relevance without diminishing…

  19. The Ecological Context of Interpersonal Violence: From Culture to Collective Efficacy

    ERIC Educational Resources Information Center

    Almgren, Gunnar

    2005-01-01

    This brief essay outlines the progression over the last 20 years of ecological theories of interpersonal violence. The period between the present and the early 1980s began with a revival of cultural explanations of violence that paralleled the introduction of the neo-conservative social science and then witnessed a rediscovery of deficits-based…

  20. Microscopic description of large amplitude collective motion in the nuclear astrophysics context

    NASA Astrophysics Data System (ADS)

    Lacroix, Denis; Tanimura, Yusuke; Scamps, Guillaume; Simenel, Cédric

    2015-08-01

    In the last 10 years, we have observed an important increase of interest in the application of time-dependent energy density functional (TD-EDF) theory. This approach allows to treat nuclear structure and nuclear reaction from small to large amplitude dynamics in a unified framework. The possibility to perform unrestricted three-dimensional simulations using state-of-the-art effective interactions has opened new perspectives. In the present paper, an overview of applications where the predictive power of TD-EDF has been benchmarked is given. A special emphasize is made on processes that are of astrophysical interest. Illustrations discussed here include giant resonances, fission, binary and ternary collisions leading to fusion, transfer and deep inelastic processes.

  1. Personal Self and Collective Self: When Academic Choices Depend on the Context of Social Comparison

    ERIC Educational Resources Information Center

    Chazal, Sebastien; Guimond, Serge; Darnon, Celine

    2012-01-01

    This research examines the impact of same-sex versus opposite-sex social comparisons on the perception of one's own abilities at school and subsequent reported marks and academic choices. During their final year, male and female high school students were asked to describe themselves either in comparison with boys in their class, in comparison with…

  2. Information in context: integrating information specialists into practice settings

    PubMed Central

    Florance, Valerie; Giuse, Nunzia Bettinsoli; Ketchell, Debra S.

    2002-01-01

    An information need (the problem) cannot be divorced from its context. The problem context determines the urgency, granularity of detail, authority, and level of certainty required for an acceptable answer and dictates the expertise and resources that can be brought to bear. The size and diversity of the sources that can be marshaled during clinical problem solving is cognitively unmanageable—too large and too complex for a single person to process effectively in a constrained timeframe. Can the clinical team, as currently constituted, collectively handle this information-processing task, or is there a need for special information expertise on the team? If there is such a need, what is the best way to prepare information specialists to participate in context-based problem solving? This article explores preparation for work in information-rich, problem-solving environments. The authors provide two case studies, one clinical and one bioscientific, that elucidate knowledge and training requirements for information specialists who work as peers in patient care and research settings. PMID:11838460

  3. How visual and semantic information influence learning in familiar contexts.

    PubMed

    Goujon, Annabelle; Brockmole, James R; Ehinger, Krista A

    2012-10-01

    Previous research using the contextual cuing paradigm has revealed both quantitative and qualitative differences in learning depending on whether repeated contexts are defined by letter arrays or real-world scenes. To clarify the relative contributions of visual features and semantic information likely to account for such differences, the typical contextual cuing procedure was adapted to use meaningless but nevertheless visually complex images. The data in reaction time and in eye movements show that, like scenes, such repeated contexts can trigger large, stable, and explicit cuing effects, and that those effects result from facilitated attentional guidance. Like simpler stimulus arrays, however, those effects were impaired by a sudden change of a repeating image's color scheme at the end of the learning phase (Experiment 1), or when the repeated images were presented in a different and unique color scheme across each presentation (Experiment 2). In both cases, search was driven by explicit memory. Collectively, these results suggest that semantic information is not required for conscious awareness of context-target covariation, but it plays a primary role in overcoming variability in specific features within familiar displays. PMID:22612057

  4. Environmental indicators of biofuel sustainability: What about context?

    SciTech Connect

    Efroymson, Rebecca Ann; Dale, Virginia H; Kline, Keith L; McBride, Allen; Bielicki, Jeffrey M; Smith, Raymond; Parish, Esther S; Schweizer, Peter E; Shaw, Denice

    2013-01-01

    Indicators of the environmental sustainability of biofuel production, distribution, and use should be selected, measured, and interpreted with respect to the context in which they are used. These indicators include measures of soil quality, water quality and quantity, greenhouse-gas emissions, biodiversity, air quality, and vegetation productivity. Contextual considerations include the purpose for the sustainability analysis, the particular biofuel production and distribution system (including supply chain, management aspects, and system viability), policy conditions, stakeholder values, location, temporal influences, spatial scale, baselines, and reference scenarios. Recommendations presented in this paper include formulating the problem for particular analyses, selecting appropriate context-specific indicators of environmental sustainability, and developing indicators that can reflect multiple environmental properties at low cost within a defined context. In addition, contextual considerations such as technical objectives, varying values and perspectives of stakeholder groups, and availability and reliability of data need to be understood and considered. Sustainability indicators for biofuels are most useful if adequate historical data are available, information can be collected at appropriate spatial and temporal scales, organizations are committed to use indicator information in the decision-making process, and indicators can effectively guide behavior toward more sustainable practices.

  5. Context awareness and sensitivity in SEA implementation

    SciTech Connect

    Hilding-Rydevik, Tuija Bjarnadottir, Holmfridur

    2007-10-15

    The Impact Assessment research community repeatedly asserts that the implementation of Strategic Environmental Assessment (SEA) should take the issue of context into consideration. The primary aim of this paper then is to attempt to give substance to the concept of 'context' in relation to the implementation of SEA. The second aim is to discuss the relevance of context consciousness and sensitivity in relation to one of the main aims given to SEA implementation i.e. to contribute to the 'integration' of environmental perspectives in planning processes. Context must be defined in relation to a certain question. In this paper the question in focus is the assumption that SEA implementation will contribute to integration of environmental issues in planning processes. Research results relating to the use of environmental tools, like for example SEA, and experiences of integration efforts, strongly indicate that the use of a single tool like SEA is not enough to achieve this integration. The current 'context free' normative and procedural assumptions concerning the aim of SEA implementation and 'best practice' in term of SEA can be criticised on the same grounds as normative and procedural planning theories, as being context free. The assumptions behind the current formulations of the aim and best practice of SEA need to be revisited. A firm empirical and theoretical knowledge and discussion is needed, especially in relation to the issue of context and integration. This paper provides a starting point in this direction.

  6. Deep belief networks learn context dependent behavior.

    PubMed

    Raudies, Florian; Zilli, Eric A; Hasselmo, Michael E

    2014-01-01

    With the goal of understanding behavioral mechanisms of generalization, we analyzed the ability of neural networks to generalize across context. We modeled a behavioral task where the correct responses to a set of specific sensory stimuli varied systematically across different contexts. The correct response depended on the stimulus (A,B,C,D) and context quadrant (1,2,3,4). The possible 16 stimulus-context combinations were associated with one of two responses (X,Y), one of which was correct for half of the combinations. The correct responses varied symmetrically across contexts. This allowed responses to previously unseen stimuli (probe stimuli) to be generalized from stimuli that had been presented previously. By testing the simulation on two or more stimuli that the network had never seen in a particular context, we could test whether the correct response on the novel stimuli could be generated based on knowledge of the correct responses in other contexts. We tested this generalization capability with a Deep Belief Network (DBN), Multi-Layer Perceptron (MLP) network, and the combination of a DBN with a linear perceptron (LP). Overall, the combination of the DBN and LP had the highest success rate for generalization. PMID:24671178

  7. Stimulus generalization and operant context renewal.

    PubMed

    Podlesnik, Christopher A; Miranda-Dukoski, Ludmila

    2015-10-01

    Context renewal is the relapse of an extinguished response due to changing the stimulus context following extinction. Reinforcing operant responding in Context A and extinguishing in Context B results in relapse when either returning to Context A (ABA renewal) or introducing a novel Context C (ABC renewal). ABA renewal typically is greater than ABC renewal. The present study assessed whether renewal might be conceptualized through excitatory and inhibitory generalization gradients inferred from studies of stimulus generalization. We arranged one keylight-color alternation frequency for pigeons to signal reinforcement in Phase 1 and a different alternation frequency to signal extinction in Phase 2. During a subsequent test in extinction, we presented a range of keylight-alternation frequencies and found renewal to be a function of keylight-alternation frequency. Specifically, Phase-3 responding increased as keylight-alternation frequency differed from that arranged during extinction in Phase 2. Moreover, we observed a shift in the function beyond the originally reinforced keylight-alternation frequency arranged in training (i.e., peak shift). We discuss the relevance of these findings for conceptualizing stimulus-control processes governing generalization gradients for understanding the processes underlying context renewal. PMID:26241660

  8. Theory of Collective Intelligence

    NASA Technical Reports Server (NTRS)

    Wolpert, David H.

    2003-01-01

    In this chapter an analysis of the behavior of an arbitrary (perhaps massive) collective of computational processes in terms of an associated "world" utility function is presented We concentrate on the situation where each process in the collective can be viewed as though it were striving to maximize its own private utility function. For such situations the central design issue is how to initialize/update the collective's structure, and in particular the private utility functions, so as to induce the overall collective to behave in a way that has large values of the world utility. Traditional "team game" approaches to this problem simply set each private utility function equal to the world utility function. The "Collective Intelligence" (COIN) framework is a semi-formal set of heuristics that recently have been used to construct private utility. functions that in many experiments have resulted in world utility values up to orders of magnitude superior to that ensuing from use of the team game utility. In this paper we introduce a formal mathematics for analyzing and designing collectives. We also use this mathematics to suggest new private utilities that should outperform the COIN heuristics in certain kinds of domains. In accompanying work we use that mathematics to explain previous experimental results concerning the superiority of COIN heuristics. In that accompanying work we also use the mathematics to make numerical predictions, some of which we then test. In this way these two papers establish the study of collectives as a proper science, involving theory, explanation of old experiments, prediction concerning new experiments, and engineering insights.

  9. Bacterial Population Genetics in a Forensic Context

    SciTech Connect

    Velsko, S P

    2009-11-02

    This report addresses the recent Department of Homeland Security (DHS) call for a Phase I study to (1) assess gaps in the forensically relevant knowledge about the population genetics of eight bacterial agents of concern, (2) formulate a technical roadmap to address those gaps, and (3) identify new bioinformatics tools that would be necessary to analyze and interpret population genetic data in a forensic context. The eight organisms that were studied are B. anthracis, Y. pestis, F. tularensis, Brucella spp., E. coli O157/H7, Burkholderia mallei, Burkholderia pseudomallei, and C. botulinum. Our study focused on the use of bacterial population genetics by forensic investigators to test hypotheses about the possible provenance of an agent that was used in a crime or act of terrorism. Just as human population genetics underpins the calculations of match probabilities for human DNA evidence, bacterial population genetics determines the level of support that microbial DNA evidence provides for or against certain well-defined hypotheses about the origins of an infecting strain. Our key findings are: (1) Bacterial population genetics is critical for answering certain types of questions in a probabilistic manner, akin (but not identical) to 'match probabilities' in DNA forensics. (2) A basic theoretical framework for calculating likelihood ratios or posterior probabilities for forensic hypotheses based on microbial genetic comparisons has been formulated. This 'inference-on-networks' framework has deep but simple connections to the population genetics of mtDNA and Y-STRs in human DNA forensics. (3) The 'phylogeographic' approach to identifying microbial sources is not an adequate basis for understanding bacterial population genetics in a forensic context, and has limited utility, even for generating 'leads' with respect to strain origin. (4) A collection of genotyped isolates obtained opportunistically from international locations augmented by phylogenetic representations

  10. Mechanosensory interactions drive collective behaviour in Drosophila.

    PubMed

    Ramdya, Pavan; Lichocki, Pawel; Cruchet, Steeve; Frisch, Lukas; Tse, Winnie; Floreano, Dario; Benton, Richard

    2015-03-12

    Collective behaviour enhances environmental sensing and decision-making in groups of animals. Experimental and theoretical investigations of schooling fish, flocking birds and human crowds have demonstrated that simple interactions between individuals can explain emergent group dynamics. These findings indicate the existence of neural circuits that support distributed behaviours, but the molecular and cellular identities of relevant sensory pathways are unknown. Here we show that Drosophila melanogaster exhibits collective responses to an aversive odour: individual flies weakly avoid the stimulus, but groups show enhanced escape reactions. Using high-resolution behavioural tracking, computational simulations, genetic perturbations, neural silencing and optogenetic activation we demonstrate that this collective odour avoidance arises from cascades of appendage touch interactions between pairs of flies. Inter-fly touch sensing and collective behaviour require the activity of distal leg mechanosensory sensilla neurons and the mechanosensory channel NOMPC. Remarkably, through these inter-fly encounters, wild-type flies can elicit avoidance behaviour in mutant animals that cannot sense the odour--a basic form of communication. Our data highlight the unexpected importance of social context in the sensory responses of a solitary species and open the door to a neural-circuit-level understanding of collective behaviour in animal groups. PMID:25533959

  11. THE CULTURAL CONTEXT OF POLIO BIOGRAPHIES

    PubMed Central

    Scheer, Jessica; Luborsky, Mark L.

    2014-01-01

    Cultural contexts influence the ways individuals interpret and experience functional losses associated with post-polio sequelae. Using in-depth multiple interview case studies from two National Institute on Aging projects, the concept of “biographies” is presented to place the individuals’ polio-related experiences within the context of their lives. Two major cultural contexts shape the construction of polio biographies: normative life course expectations and developmental tasks; and traditions associated with polio recovery and rehabilitation. The authors identify key dimensions of personal concern among polio survivors that can be used as entrance points for effective clinical intervention and to promote treatment compliance. PMID:1758785

  12. Context-dependent feature selection using unsupervised contexts applied to GPR-based landmine detection

    NASA Astrophysics Data System (ADS)

    Ratto, Christopher R.; Torrione, Peter A.; Collins, Leslie M.

    2010-04-01

    Context-dependent classification techniques applied to landmine detection with ground-penetrating radar (GPR) have demonstrated substantial performance improvements over conventional classification algorithms. Context-dependent algorithms compute a decision statistic by integrating over uncertainty in the unknown, but probabilistically inferable, context of the observation. When applied to GPR, contexts may be defined by differences in electromagnetic properties of the subsurface environment, which are due to discrepancies in soil composition, moisture levels, and surface texture. Context-dependent Feature Selection (CDFS) is a technique developed for selecting a unique subset of features for classifying landmines from clutter in different environmental contexts. In past work, context definitions were assumed to be soil moisture conditions which were known during training. However, knowledge of environmental conditions could be difficult to obtain in the field. In this paper, we utilize an unsupervised learning algorithm for defining contexts which are unknown a priori. Our method performs unsupervised context identification based on similarities in physics-based and statistical features that characterize the subsurface environment of the raw GPR data. Results indicate that utilizing this contextual information improves classification performance, and provides performance improvements over non-context-dependent approaches. Implications for on-line context identification will be suggested as a possible avenue for future work.

  13. The extinction context enables extinction performance after a change in context

    PubMed Central

    Nelson, James Byron; Gregory, Pamela; Sanjuan, Maria del Carmen

    2012-01-01

    One experiment with human participants determined the extent to which recovery of extinguished responding with a context switch was due to a failure to retrieve contextually-controlled learning, or some other process such as participants learning that context changes signal reversals in the meaning of stimulus – outcome relationships. In a video game, participants learned to suppress mouse clicking in the presence of a stimulus that predicted an attack. Then, that stimulus underwent extinction in a different context (environment within the game). Following extinction, suppression was recovered and then extinguished again during testing in the conditioning context. In a final test, participants that were tested in the context where extinction first took place showed less of a recovery than those tested in a neutral context, but they showed a recovery of suppression nevertheless. A change in context tended to cause a change in the meaning of the stimulus, leading to recovery in both the neutral and extinction contexts. The extinction context attenuated that recovery, perhaps by enabling retrieval of the learning that took place in extinction. Recovery outside an extinction context is due to a failure of the context to enable the learning acquired during extinction, but only in part. PMID:22521549

  14. The Geneva brain collection

    PubMed Central

    Kövari, Enikö; Hof, Patrick R.; Bouras, Constantin

    2011-01-01

    The University of Geneva brain collection was founded at the beginning of the 20th century. Today, it consists of 10,154 formaldehyde- or buffered formaldehyde–fixed brains obtained from the autopsies of the Department of Psychiatry and, since 1971, from the Department of Geriatrics as well. More than 100,000 paraffin-embedded blocks and 200,000 histological slides have also been collected since 1901. From the time of its creation, this collection has served as an important resource for pathological studies and clinicopathological correlations, primarily in the field of dementing illnesses and brain aging research. These materials have permitted a number of original neuropathological observations, such as the classification of Pick’s disease by Constantinidis, or the description of dyshoric angiopathy and laminar sclerosis by Morel. The large number of cases, including some very rare conditions, provides a unique resource and an opportunity for worldwide collaborations. PMID:21599692

  15. Curating Virtual Data Collections

    NASA Technical Reports Server (NTRS)

    Lynnes, Chris; Leon, Amanda; Ramapriyan, Hampapuram; Tsontos, Vardis; Shie, Chung-Lin; Liu, Zhong

    2015-01-01

    NASAs Earth Observing System Data and Information System (EOSDIS) contains a rich set of datasets and related services throughout its many elements. As a result, locating all the EOSDIS data and related resources relevant to particular science theme can be daunting. This is largely because EOSDIS data's organizing principle is affected more by the way they are produced than around the expected end use. Virtual collections oriented around science themes can overcome this by presenting collections of data and related resources that are organized around the user's interest, not around the way the data were produced. Virtual collections consist of annotated web addresses (URLs) that point to data and related resource addresses, thus avoiding the need to copy all of the relevant data to a single place. These URL addresses can be consumed by a variety of clients, ranging from basic URL downloaders (wget, curl) and web browsers to sophisticated data analysis programs such as the Integrated Data Viewer.

  16. Exploring Trainers' Engaging Instructional Practices: A Collective Case Study

    ERIC Educational Resources Information Center

    Arghode, Vishal; Wang, Jia

    2016-01-01

    Purpose: This study aims to explore the phenomenon of training engagement from the trainers' perspective. Specifically, two questions guided this inquiry. First, how do trainers define engagement in the training context? and What strategies do trainers use to engage trainees? Design/methodology/approach: The collective case study approach was…

  17. A Collective Bargaining Contract Analyzer for Community Colleges.

    ERIC Educational Resources Information Center

    Lovell, Ned B.; And Others

    This monograph provides comparative data to assist community colleges in analyzing, planning, and negotiating collective bargaining agreements within the context of a comprehensive Contract Item Analysis (CIA) model. In the monograph, the CIA model is applied to agreements reached in the Illinois Community College System (ICCS), although it…

  18. Fieldwork Methods Involved in Collecting, for Scholarly Research.

    ERIC Educational Resources Information Center

    McInnis, Mac

    2000-01-01

    Collecting outdoor adventurers' stories for research is best done using the naturalistic inquiry paradigm. This type of hypothesis-free investigation, used in the study of folklore, requires maintaining the normal storytelling context while meeting scholarly demands for reliability and validity. Choice of focus and site, the participant-observer…

  19. Fostering Collective and Individual Learning through Knowledge Building

    ERIC Educational Resources Information Center

    Zhao, Ke; Chan, Carol K. K.

    2014-01-01

    The purpose of this study was to design and examine a computer-supported knowledge-building environment and to investigate both collective knowledge-building dynamics and individual learning in the context of a tertiary education course in mainland China. The participants were 102 students in four intact Year-one tertiary business classes. Two…

  20. Strategic Choice and Collective Action: Organizational Determinants of Teachers Militancy.

    ERIC Educational Resources Information Center

    Bacharach, Samuel B.; And Others

    Conceptualizing militant behavior as a strategic choice involving collective action and occurring within a specific organizational context, this paper examines the impact of various organizational factors on elementary and secondary school teachers' willingness to engage in militant behavior. Teachers in 83 New York districts were surveyed as to…

  1. Exclusivity of Collective Bargaining Arbitration in Canadian Academia.

    ERIC Educational Resources Information Center

    Khan, A. N.

    1990-01-01

    Examines the labor relations context and the labor law affecting school personnel in Canada. Discusses a Manitoba court ruling that plaintiff was restricted to the provisions of the legislation and of the collective agreement as applied to him; therefore, the court declined to hear his case. (41 references) (MLF)

  2. Talks with Teachers of Young Children: A Collection.

    ERIC Educational Resources Information Center

    Katz, Lilian G.

    Expanding on previous collections, this book compiles 16 essays on pedagogical and child development issues stimulated by interaction with teachers, child caregivers, and early childhood teacher educators during the preceding 20 years. The essays were written in response and reaction to particular educational events or contexts that were…

  3. Ubiquitous Geo-Sensing for Context-Aware Analysis: Exploring Relationships between Environmental and Human Dynamics

    PubMed Central

    Sagl, Günther; Blaschke, Thomas; Beinat, Euro; Resch, Bernd

    2012-01-01

    Ubiquitous geo-sensing enables context-aware analyses of physical and social phenomena, i.e., analyzing one phenomenon in the context of another. Although such context-aware analysis can potentially enable a more holistic understanding of spatio-temporal processes, it is rarely documented in the scientific literature yet. In this paper we analyzed the collective human behavior in the context of the weather. We therefore explored the complex relationships between these two spatio-temporal phenomena to provide novel insights into the dynamics of urban systems. Aggregated mobile phone data, which served as a proxy for collective human behavior, was linked with the weather data from climate stations in the case study area, the city of Udine, Northern Italy. To identify and characterize potential patterns within the weather-human relationships, we developed a hybrid approach which integrates several spatio-temporal statistical analysis methods. Thereby we show that explanatory factor analysis, when applied to a number of meteorological variables, can be used to differentiate between normal and adverse weather conditions. Further, we measured the strength of the relationship between the ‘global’ adverse weather conditions and the spatially explicit effective variations in user-generated mobile network traffic for three distinct periods using the Maximal Information Coefficient (MIC). The analyses result in three spatially referenced maps of MICs which reveal interesting insights into collective human dynamics in the context of weather, but also initiate several new scientific challenges. PMID:23012571

  4. Portable data collection device

    DOEpatents

    French, Patrick D.

    1996-01-01

    The present invention provides a portable data collection device that has a variety of sensors that are interchangeable with a variety of input ports in the device. The various sensors include a data identification feature that provides information to the device regarding the type of physical data produced by each sensor and therefore the type of sensor itself. The data identification feature enables the device to locate the input port where the sensor is connected and self adjust when a sensor is removed or replaced. The device is able to collect physical data, whether or not a function of a time.

  5. Portable data collection device

    DOEpatents

    French, P.D.

    1996-06-11

    The present invention provides a portable data collection device that has a variety of sensors that are interchangeable with a variety of input ports in the device. The various sensors include a data identification feature that provides information to the device regarding the type of physical data produced by each sensor and therefore the type of sensor itself. The data identification feature enables the device to locate the input port where the sensor is connected and self adjust when a sensor is removed or replaced. The device is able to collect physical data, whether or not a function of a time. 7 figs.

  6. Context Effects and Retrieval in Recognition Memory

    ERIC Educational Resources Information Center

    Paul, Lawrence M.; And Others

    1975-01-01

    Describes an experiment designed to test predictions derived from a model of recognition memory that assumes no retrieval processes. It is argued that context effects do not necessarily imply retrieval processes in recognition. (Author/AM)

  7. Context Matters in Child and Family Policy

    PubMed Central

    Dodge, Kenneth A.

    2010-01-01

    The traditional model of translation from basic laboratory science to efficacy trials to effectiveness trials to community dissemination has flaws that arise from false assumptions that context changes little or matters little. One of the most important findings in developmental science is that context matters, but this fact is not sufficiently taken into account in many translation efforts. Studies reported in this special issue highlight both the potential of systematic interventions in parenting, peer relations, and social-cognitive skills training, and the problems that will be encountered in trying to bring these interventions to a community context. It is advocated that developmental scientists start from within the community context itself so that translation to policy is only a small step. It is also advocated that this research be conducted through rigorous community randomized controlled trials. PMID:21291450

  8. Physics Learning through a Telecommunications Context.

    ERIC Educational Resources Information Center

    Edwards, Christopher

    2000-01-01

    Describes the Physics Phones Home unit which is context-led and developed by the Supported Learning in Physics Projects. Teaches introductory magnetism; electric, magnetic and gravitational fields; and electricity and circular motion. (YDS)

  9. Emotional context, maternal behavior and emotion regulation.

    PubMed

    Roque, Lisa; Veríssimo, Manuela

    2011-12-01

    This study investigated the importance of emotion-eliciting context (positive and negative) and mother's behaviors (constrained and involved) on toddlers' emotion regulation behavioral strategies, emotional expressiveness and intensity, during three episodes eliciting fear, frustration/anger and positive affect. Fifty-five children between 18 and 26 months of age and their mothers participated in the study. Toddlers' regulatory strategies varied as function of emotion-eliciting context (children exhibited behavioral strategies more frequently during positive affect and frustration/anger episodes and less frequently during fear episodes) and maternal involvement. Toddlers' expression of emotion varied as function of emotion-eliciting context (children exhibited more emotional expressions, both negative and positive during fear and frustration/anger episodes compared to positive affect episodes). Toddlers' expression of emotion was not strongly related to maternal involvement, however, the intensity of emotional expression was related to the interaction of context and maternal involvement. PMID:21764459

  10. Theorizing Social Context: Rethinking Behavioral Theory

    PubMed Central

    Burke, Nancy J.; Joseph, Galen; Pasick, Rena J.; Barker, Judith C.

    2013-01-01

    Major behavioral theories focus on proximal influences on behavior that are considered to be predominantly cognitive characteristics of the individual largely uninfluenced by social context. Social ecological models integrate multiple levels of influence on health behavior and are noted for emphasizing the interdependence of environmental settings and life domains. This theory-based article explains how social context is conceptualized in the social sciences and how the social science conceptualization differs from and can broaden the analytic approach to health behavior. The authors use qualitative data from the “Behavioral Constructs and Culture in Cancer Screening” study to illustrate our conceptualization of social context. We conclude that the incorporation into health behavior theory of a multidimensional socio-culturally oriented, theoretical approach to social context is critical to understand and redress health disparities in multicultural societies like that in the United States. PMID:19805791

  11. The Texts and Contexts of Writing.

    ERIC Educational Resources Information Center

    Lotto, Edward

    1988-01-01

    Uses case studies of intensive writing courses in government, history, and computer science to explain the differences between the disciplinary contexts for writing, and to help tutors in their work with students from those disciplines. (RS)

  12. Leadership in entrepreneurial organizations: context and motives.

    PubMed

    Martí Ripoll, Margarita; Gil Rodríguez, Francisco; Barrasa, Angel; Antino, Mirko

    2010-11-01

    Although organizational contexts have an influence on leadership, and some of their characteristics may facilitate (through weak structures) or inhibit (through strong structures) the leaders' behaviors, the extent of their influence has rarely been studied. Indeed, research of the influence of some types of contexts (entrepreneurial vs. non-entrepreneurial) on the emergence of certain variables (leaders' motives) is even scarcer. This paper analyses this influence in 40 companies, interviewing their leaders to obtain a qualitative register of their motives, and administering questionnaires to members of their respective management teams. The hypothesis considered was that, in 'weak' contexts (entrepreneurial), the leaders' motives would be more salient than in 'strong' contexts (non-entrepreneurial). The results largely confirm this hypothesis with respect to behaviors that are directly related to three main motives (power, affiliation and achievement). These results are discussed, and practical suggestions are provided for future research. PMID:21044527

  13. Formative Evaluation in the Performance Context.

    ERIC Educational Resources Information Center

    Dick, Walter; King, Debby

    1994-01-01

    Reviews the traditional formative evaluation model used by instructional designers; summarizes Kirkpatrick's model of evaluation; proposes the integration of part of Kirkpatrick's model with traditional formative evaluation; and discusses performance-context formative evaluation. (three references) (LRW)

  14. The Role and Role Context of the Lebanese School Principal: Toward a Culturally Grounded Understanding of the Principalship

    ERIC Educational Resources Information Center

    Akkary, Rima Karami

    2014-01-01

    This study provides empirical data about the role and work context of the school principal in the Lebanon. The study applied grounded theory methods in collecting and analysing the data. The data were collected through a series of open-ended interviews with 53 secondary school principals, and focus group interviews with 8 principals from public as…

  15. Agriculture as an Upholder of Cultural Heritage? Conceptualizations and Value Judgements--A Norwegian Perspective in International Context

    ERIC Educational Resources Information Center

    Daugstad, Karoline; Ronningen, Katrina; Skar, Birgitte

    2006-01-01

    The multifunctional role of agriculture as a producer of collective goods in addition to food and fibre, has been stressed within the context of negotiations on the liberalization of the world market for food (WTO) and in general in discussions concerning restructuring of the agricultural sector. One of these collective goods, cultural heritage,…

  16. Medical futility and the social context.

    PubMed Central

    Halliday, R

    1997-01-01

    The concept of medical futility has come to be seen in some quarters as a value-neutral trump card when dealing with issues of power and conflicting values in medicine. I argue that this concept is potentially useful, but only in a social context that provides a normative framework for its use. This social context needs to include a broad consensus about the purpose of medicine and the nature of the physician-patient relationship. PMID:9220326

  17. The attentional boost effect and context memory.

    PubMed

    Mulligan, Neil W; Smith, S Adam; Spataro, Pietro

    2016-04-01

    Stimuli co-occurring with targets in a detection task are better remembered than stimuli co-occurring with distractors-the attentional boost effect (ABE). The ABE is of interest because it is an exception to the usual finding that divided attention during encoding impairs memory. The effect has been demonstrated in tests of item memory but it is unclear if context memory is likewise affected. Some accounts suggest enhanced perceptual encoding or associative binding, predicting an ABE on context memory, whereas other evidence suggests a more abstract, amodal basis of the effect. In Experiment 1, context memory was assessed in terms of an intramodal perceptual detail, the font and color of the study word. Experiment 2 examined context memory cross-modally, assessing memory for the modality (visual or auditory) of the study word. Experiments 3 and 4 assessed context memory with list discrimination, in which 2 study lists are presented and participants must later remember which list (if either) a test word came from. In all experiments, item (recognition) memory was also assessed and consistently displayed a robust ABE. In contrast, the attentional-boost manipulation did not enhance context memory, whether defined in terms of visual details, study modality, or list membership. There was some evidence that the mode of responding on the detection task (motoric response as opposed to covert counting of targets) may impact context memory but there was no evidence of an effect of target detection, per se. In sum, the ABE did not occur in context memory with verbal materials. (PsycINFO Database Record PMID:26348201

  18. Adolescent neurobiological susceptibility to social context.

    PubMed

    Schriber, Roberta A; Guyer, Amanda E

    2016-06-01

    Adolescence has been characterized as a period of heightened sensitivity to social contexts. However, adolescents vary in how their social contexts affect them. According to neurobiological susceptibility models, endogenous, biological factors confer some individuals, relative to others, with greater susceptibility to environmental influences, whereby more susceptible individuals fare the best or worst of all individuals, depending on the environment encountered (e.g., high vs. low parental warmth). Until recently, research guided by these theoretical frameworks has not incorporated direct measures of brain structure or function to index this sensitivity. Drawing on prevailing models of adolescent neurodevelopment and a growing number of neuroimaging studies on the interrelations among social contexts, the brain, and developmental outcomes, we review research that supports the idea of adolescent neurobiological susceptibility to social context for understanding why and how adolescents differ in development and well-being. We propose that adolescent development is shaped by brain-based individual differences in sensitivity to social contexts - be they positive or negative - such as those created through relationships with parents/caregivers and peers. Ultimately, we recommend that future research measure brain function and structure to operationalize susceptibility factors that moderate the influence of social contexts on developmental outcomes. PMID:26773514

  19. Disentangling Metaphor from Context: An ERP Study.

    PubMed

    Bambini, Valentina; Bertini, Chiara; Schaeken, Walter; Stella, Alessandra; Di Russo, Francesco

    2016-01-01

    A large body of electrophysiological literature showed that metaphor comprehension elicits two different event-related brain potential responses, namely the so-called N400 and P600 components. Yet most of these studies test metaphor in isolation while in natural conversation metaphors do not come out of the blue but embedded in linguistic and extra-linguistic context. This study aimed at assessing the role of context in the metaphor comprehension process. We recorded EEG activity while participants were presented with metaphors and equivalent literal expressions in a minimal context (Experiment 1) and in a supportive context where the word expressing the ground between the metaphor's topic and vehicle was made explicit (Experiment 2). The N400 effect was visible only in minimal context, whereas the P600 was visible both in the absence and in the presence of contextual cues. These findings suggest that the N400 observed for metaphor is related to contextual aspects, possibly indexing contextual expectations on upcoming words that guide lexical access and retrieval, while the P600 seems to reflect truly pragmatic interpretative processes needed to make sense of a metaphor and derive the speaker's meaning, also in the presence of contextual cues. In sum, previous information in the linguistic context biases toward a metaphorical interpretation but does not suppress interpretative pragmatic mechanisms to establish the intended meaning. PMID:27199799

  20. Disentangling Metaphor from Context: An ERP Study

    PubMed Central

    Bambini, Valentina; Bertini, Chiara; Schaeken, Walter; Stella, Alessandra; Di Russo, Francesco

    2016-01-01

    A large body of electrophysiological literature showed that metaphor comprehension elicits two different event-related brain potential responses, namely the so-called N400 and P600 components. Yet most of these studies test metaphor in isolation while in natural conversation metaphors do not come out of the blue but embedded in linguistic and extra-linguistic context. This study aimed at assessing the role of context in the metaphor comprehension process. We recorded EEG activity while participants were presented with metaphors and equivalent literal expressions in a minimal context (Experiment 1) and in a supportive context where the word expressing the ground between the metaphor's topic and vehicle was made explicit (Experiment 2). The N400 effect was visible only in minimal context, whereas the P600 was visible both in the absence and in the presence of contextual cues. These findings suggest that the N400 observed for metaphor is related to contextual aspects, possibly indexing contextual expectations on upcoming words that guide lexical access and retrieval, while the P600 seems to reflect truly pragmatic interpretative processes needed to make sense of a metaphor and derive the speaker's meaning, also in the presence of contextual cues. In sum, previous information in the linguistic context biases toward a metaphorical interpretation but does not suppress interpretative pragmatic mechanisms to establish the intended meaning. PMID:27199799

  1. Renewal, resurgence, and alternative reinforcement context.

    PubMed

    Sweeney, Mary M; Shahan, Timothy A

    2015-07-01

    Resurgence, relapse induced by the removal of alternative reinforcement, and renewal, relapse induced by a change in contextual stimuli, are typically studied separately in operant conditioning paradigms. In analogous treatments of operant problem behavior, aspects of both relapse phenomena can operate simultaneously. Therefore, the purpose of this study was to examine a novel method for studying resurgence and renewal in the same experimental preparation. An alternative source of reinforcement was available during extinction for one group of rats (a typical resurgence preparation). Another group experienced an operant renewal preparation in which the extinction context was distinguished via olfactory and visual stimuli. A third group experienced alternative reinforcement delivery in the new context, a novel combination of typical resurgence and renewal preparations. Removal of alternative reinforcement and/or a change in context induced relapse relative to an extinction-only control group. When alternative reinforcement was delivered in a novel context, the alternative response was less persistent relative to when extinction of the alternative response took place in the context in which it was trained. This methodology might be used to illustrate shared (or distinct) mechanisms of resurgence and renewal, and to determine how delivering alternative reinforcement in another context may affect persistence and relapse. PMID:25936876

  2. The functions of contexts in associative learning

    PubMed Central

    Urcelay, Gonzalo P.; Miller, Ralph R.

    2014-01-01

    Although contexts play many roles during training and also during testing, over the last four decades theories of learning have predominantly focused on one or the other of two families of functions served by contexts. In this selective review, we summarize recent data concerning these two functions and their interrelationship. The first function is similar to that of discrete cues, and allows contexts to elicit conditioned responses and compete with discrete events for behavioral control. The second function is modulatory, and similar to that of discrete occasion setters in that in this role contexts do not elicit conditioned responses by themselves, but rather modulate instrumental responding or responding to Pavlovian cues. We first present evidence for these two functions, and then suggest that the spacing of trials, amount of training, and contiguity are three determinants of the degree to which the context will play each function. We also conclude that these two functions are not mutually exclusive, and that future research would benefit from identifying the conditions under which their functions dominate behavioral control. We close by discussing some misconceptions concerning contexts. PMID:24614400

  3. Of Mother Tongues and Other Tongues: The Stakes of Linguistically Inclusive Pedagogy in Minority Contexts

    ERIC Educational Resources Information Center

    Taylor, Lisa K.

    2008-01-01

    This article addresses two key challenges that globalization poses to literacy research: the need for new models of literacy and literacy education, and the stakes of adopting multiliteracies pedagogies in different contexts--that is, the tensions between competing hegemonic discourses of collective identity in the public sphere of ethnolinguistic…

  4. Struggling with Involuntary Expressive Behaviours: Chinese Doctors' Professional Learning in Working Contexts

    ERIC Educational Resources Information Center

    Ma, Songge

    2012-01-01

    Purpose: This paper aims to explore what Chinese doctors have learned in authentic medical practice, what they want to learn, and the dynamics behind their professional learning in working contexts. Design/methodology/approach: The paper uses Narrative Inquiry, qualitative data which were collected by open-ended face-to-face interviews and…

  5. Using CALL in a Formal Learning Context to Develop Oral Language Awareness in ESL: An Assessment

    ERIC Educational Resources Information Center

    Vincent-Durroux, Laurence; Poussard, Cecile; Lavaur, Jean-Marc; Aparicio, Xavier

    2011-01-01

    French learners at university meet difficulties in the comprehension of oral English. Being in a formal context of language learning, they need to develop language awareness to compensate for insufficient exposure to the English language. To meet the students' needs, data was collected in order to pinpoint the main errors made by French learners…

  6. The Nature and Development of Teachers' Metastrategic Knowledge in the Context of Teaching Higher Order Thinking

    ERIC Educational Resources Information Center

    Zohar, Anat

    2006-01-01

    This study examines the development of teachers' metastrategic knowledge (MSK), a component of metacognitive knowledge, in the context of higher order thinking. Participants were 14 junior high school and high school science teachers who attended a professional development course. Data collection was carried out by triangulation of several data…

  7. Patterns of Change in Willingness to Communicate in Public Speaking Contexts: A Latent Growth Modeling Analysis

    ERIC Educational Resources Information Center

    Hodis, Georgeta M.; Bardhan, Nilanjana R.; Hodis, Flaviu A.

    2010-01-01

    This study offers a comprehensive analysis of change in willingness to communicate (WTC) in public speaking contexts (i.e., PS-WTC). The proposed conceptualization of change was tested using longitudinal data collected from a sample of 706 undergraduate students enrolled in an introductory communication course in a US university. Results of latent…

  8. Epistemic Beliefs about Justification Employed by Physics Students and Faculty in Two Different Problem Contexts

    ERIC Educational Resources Information Center

    Mercan, Fatih Caglayan

    2012-01-01

    This study examines the epistemic beliefs about justification employed by physics undergraduate and graduate students and faculty in the context of solving a standard classical physics problem and a frontier physics problem. Data were collected by a think-aloud problem solving session followed by a semi-structured interview conducted with 50…

  9. The Effects of Using Peer and Teacher Feedback into Saudi Writing Context

    ERIC Educational Resources Information Center

    Alhaisoni, Eid; Alzuoud, Khalid

    2012-01-01

    This paper aims to investigate the efficacy of two commonly used techniques of feedback in teaching writing: teachers' feedback and peers' feedback in the Saudi educational context. The study was comprised of 132 Saudi EFL students enrolled at the Department of English in the University of Hai'l. The data collection was carried out…

  10. The Eye of the Hurricane: Autoethnography in the Southern Brazilian School Context

    ERIC Educational Resources Information Center

    Bossle, Fabiano; Molina Neto, Vicente; Molina, Rosane Kreusburg

    2014-01-01

    The article systematizes the results of an autoethnography that aimed at understanding the difficulties of the collective work of teachers, their culture and their experience in the context of a municipal public school in Porto Alegre, Brazil. The autoreflexive exercise showed that urban violence leaves profound marks on the culture of the local…

  11. Diversified Professionalism of Physical Education Teachers in the Asian Context of Hong Kong

    ERIC Educational Resources Information Center

    Sum, Raymond Kim Wai; Dimmock, Clive

    2014-01-01

    This study investigates the socialization and professional experiences of primary school physical education teachers (PSPETs) in the Asian context of Hong Kong. A qualitative research design is adopted. The researcher used semi-structured interviews, supplemented by documentary sources (diaries) for conducting data collection. Eleven PSPETs…

  12. Oral Fluency, Accuracy, and Complexity in Formal Instruction and Study Abroad Learning Contexts

    ERIC Educational Resources Information Center

    Mora, Joan C.; Valls-Ferrer, Margalida

    2012-01-01

    This study investigates the differential effects of two learning contexts, formal instruction (FI) at home and a study abroad period (SA), on the oral production skills of advanced-level Catalan-Spanish undergraduate learners of English. Speech samples elicited through an interview at three data collection times over a 2-year period were…

  13. Use of Social Media in Different Contexts of Information Seeking: Effects of Sex and Problemsolving Style

    ERIC Educational Resources Information Center

    Kim, Kyung­-Sun; Sin, Sei­-Ching Joanna

    2015-01-01

    Introduction: Social media are increasingly popular and emerging as important information sources. The study investigates how users' sex and problem-solving style affect their use and evaluation of social media in two contexts. Method: A Web survey including the problem solving inventory (problem solving inventory) was used to collect data. Over…

  14. The Care and Education of Young Children: Expanding Contexts, Sharpening Focus.

    ERIC Educational Resources Information Center

    Rust, Frances O'Connell, Ed.; Willliams, Leslie R., Ed.

    This collection of essays by child advocates explores three interconnected facets of the child care and education field: the broad sociocultural contexts influencing the development of young children and their families, the evolution of specific settings or programs where care and education occur, and the emerging consciousness of early childhood…

  15. Reliability and Validity of Information about Student Achievement: Comparing Large-Scale and Classroom Testing Contexts

    ERIC Educational Resources Information Center

    Cizek, Gregory J.

    2009-01-01

    Reliability and validity are two characteristics that must be considered whenever information about student achievement is collected. However, those characteristics--and the methods for evaluating them--differ in large-scale testing and classroom testing contexts. This article presents the distinctions between reliability and validity in the two…

  16. College Students' Conceptions of Context-Aware Ubiquitous Learning: A Phenomenographic Analysis

    ERIC Educational Resources Information Center

    Tsai, Pei-Shan; Tsai, Chin-Chung; Hwang, Gwo-Haur

    2011-01-01

    The purpose of this study was to explore students' conceptions of context-aware ubiquitous learning (u-learning). The students participated in a u-learning exercise using PDAs equipped with RFID readers. The data were collected from individual interviews with each of the students by a trained researcher, and the responses of the interviewees were…

  17. The Long-Day Childcare Context: Implications for Toddlers' Pretend Play

    ERIC Educational Resources Information Center

    Kowalski, Helen S.; Wyver, Shirley R.; Masselos, Grace; de Lacey, Philip

    2005-01-01

    Forty-eight toddlers aged 17 to 31 months attending long-day childcare participated in this project, which examined some of the influences of the day-care context on their emerging pretend play. Ninety minutes of video-taped observations were collected for each participant as they engaged in free play with their same-age peers and their…

  18. Teacher Leadership Enactment in Professional Learning Community Contexts: Towards a Better Understanding of the Phenomenon

    ERIC Educational Resources Information Center

    Hairon, Salleh; Goh, Jonathan Wee Pin; Chua, Catherine Siew Kheng

    2015-01-01

    Professional learning communities (PLCs) have gained considerable attention in education. However, PLCs are dependent on how group members collectively work and learn towards shared goals on improving teaching and learning. This would require leadership to support meaningful and productive interactions within PLC contexts, and hence, the…

  19. The Documentation of Kindergarten Children's Interactional Competency in an Informal Context of the Classroom.

    ERIC Educational Resources Information Center

    Black, Janet K.

    The interactional competence of 12 kindergarten children was studied through naturalistic research of their sociodramatic play in a classroom context. Data were collected by both videotape and trained observers. Contextual and interactional information was analyzed according to an Interactional Competency Checklist (ICC) designed by the author.…

  20. The Fall Collection.

    ERIC Educational Resources Information Center

    VanDeman, Barry A.

    1984-01-01

    Presents ideas for collecting objects on the school grounds or in the surrounding neighborhood. Objects include feathers/fur, leaves, galls, seeds, shells, spiderwebs, and litter. Also presents procedures for making impressions of bark, leaves, fossils, flora, and shadows. All activities can be adopted for students in kindergarten through grade…

  1. A DIY Collection

    ERIC Educational Resources Information Center

    Freedman, Jenna

    2006-01-01

    Chris Dodge, a renowned alternative pressologist and the librarian at "Utne" magazine, has been known to say, "Every library should be a special library." In order to meet this challenge, the librarians at Barnard College decided to start a collection of underground publications known as zines. In this article, the author describes how librarians…

  2. Preparing for Collective Bargaining

    ERIC Educational Resources Information Center

    Gardiner, Richard A.

    1976-01-01

    During collective bargaining negotiations at the Community College of Philadelphia, the board of trustees responded to external agents (i.e., legal counsel and professional negotiators), while ignoring the proposals of the administration. This resulted in stress in the authority system and in a closing-off of some of the available human resources…

  3. Deterritorializing Collective Biography

    ERIC Educational Resources Information Center

    Gannon, Susanne; Walsh, Susan; Byers, Michele; Rajiva, Mythili

    2014-01-01

    This paper proposes a new move in the methodological practice of collective biography, by provoking a shift beyond any remnant attachment to the speaking/writing subject towards her dispersal and displacement via textual interventions that stress multivocality. These include the use of photographs, drama, and various genres of writing. Using a…

  4. The Pyramid Collection

    ERIC Educational Resources Information Center

    Neville, Gary

    2004-01-01

    In this article the author presents readers with some very useful activities, ideas and problems. He has used these at various times over the years and together they make a very interesting collection. These pieces have come together from different sources, but like a jigsaw, they complete the picture of understanding of the numbers inside the…

  5. Authentic Assessment: A Collection.

    ERIC Educational Resources Information Center

    Burke, Kay, Ed.

    The essays in this collection consider the meaning of authentic assessment and the implications of its use. "Section 1: Assessing Assessment" includes the following essays: (1) "The Nation's Report Card Goes Home: Good News and Bad about Trends in Achievement" (Robert L. Linn and Stephen B. Dunbar); (2) "Budgets, Politics, and Testing" (Chris…

  6. Digital Collections Inventory Report.

    ERIC Educational Resources Information Center

    McClung, Patricia A.

    This report is intended to inform and stimulate discussion on digital library programs as well as the potential usefulness, scope, and desired features of future inventories of online digital collections. It describes a joint project by the Commission on Preservation and Access and the Council on Library Resources to determine the extent to which…

  7. Collections Define Cataloging's Future

    ERIC Educational Resources Information Center

    Simpson, Betsy

    2007-01-01

    The role of catalogers within academic libraries is evolving to meet new demands and cultivating a broader understanding of cataloging--one that focuses on collections, not the catalog, and applies cataloger expertise across metadata activities. Working collaboratively as never before, catalogers are reinventing their place within the library.

  8. RIF and Collective Bargaining.

    ERIC Educational Resources Information Center

    Zirkel, Perry A.

    1994-01-01

    Focuses on the modern case-law intersection between state legislation for school districts that applies to reduction-in-force (RIF) and other state legislation that applies to collective bargaining. One conclusion is that the implementation of RIF is more likely to be negotiable and arbitrable than the reasons for RIF. (96 footnotes) (MLF)

  9. Television's New Humane Collectivity.

    ERIC Educational Resources Information Center

    Schrag, Robert L.; And Others

    1981-01-01

    Analyzes "Taxi,""Barney Miller,""Lou Grant," and "M*A*S*H" in terms of three fantasy themes: the realization of significant others, the alliance in action, and membership into personhood. From these themes emerges a rhetorical vision of the new humane collectivity. (PD)

  10. Materials and Collections

    ERIC Educational Resources Information Center

    Hinseth, Lois

    1978-01-01

    This discussion of collection development considers (1) special problems as they relate to specific types of institutions--nursing, long term residential, psychiatric and developmental; (2) acquisition; (3) organization--classification, cataloging, and physical arrangement; (4) use--circulation, special methods, and the role of librarians; and (5)…

  11. Charge collection spectroscopy

    SciTech Connect

    Reed, R.A.; McNulty, P.J.; Beauvais, W.J.; Roth, D.R. . Dept. of Physics and Astronomy)

    1993-12-01

    Monitoring pulses measured between the power pins of a microelectronic device exposed to high LET ions yields important information on the SEU response of the circuit. Analysis is complicated for p-well CMOS devices by the possibility of competition between unctions, but the results suggest that charge collection measurements are still sufficient to determine SEU parameters accurately.

  12. Quick Fixes: Collection Development

    ERIC Educational Resources Information Center

    Nabb, Alicia

    2010-01-01

    The Do It Yourself (DIY) section is an essential and well-used part of the public library's collection and must be kept up-to-date to remain valuable, since tools, materials, and building codes are always changing. Current economic decline has increased the topic's popularity as homeowners choose to remodel rather than buy, or attempt to make…

  13. Universities and Collective Bargaining.

    ERIC Educational Resources Information Center

    Savage, Donald C.

    1994-01-01

    Responds to David Cameron's "More than an Academic Question" and to the review by Barbara Anderson disagreeing with Cameron's suggestion that democratization and decentralization were a mistake, and arguing for collective bargaining. The paper counters Cameron's support of the continuation of mandatory retirement with reference to the United…

  14. Surface reference data collection

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Applications of remote sensing must define relationships between image data and conditions at corresponding points on the ground. Unfortunately, many published remote sensing reports focus on image processing techniques with little detail regarding the methods used for collecting ground truth data....

  15. Genealogy Collection III.

    ERIC Educational Resources Information Center

    Illinois Libraries, 1992

    1992-01-01

    Identified and discussed are little known Illinois collections of ethnic and religious records valuable for genealogical research. Holdings and sources are described as well as problems in researching specific ethnic or religious groups. European, African, and religious immigrants' records are highlighted. (EA)

  16. Research using biocultural collections

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The purpose of this article is to provide a sampling of the wide breadth of research conducted with biocultural collections. Because of its breadth it is clearly not comprehensive, but rather a sampling simply meant to illustrate the variation and depth of the field and to illustrate reasons why it ...

  17. Octupole collectivity in nuclei

    NASA Astrophysics Data System (ADS)

    Butler, P. A.

    2016-07-01

    The experimental and theoretical evidence for octupole collectivity in nuclei is reviewed. Recent theoretical advances, covering a wide spectrum from mean-field theory to algebraic and cluster approaches, are discussed. The status of experimental data on the behaviour of energy levels and electric dipole and electric octupole transition moments is reviewed. Finally, an outlook is given on future prospects for this field.

  18. Recommendations for Collection Development.

    ERIC Educational Resources Information Center

    Wesley, Threasa L.; Bratcher, Perry

    This document reports the work and conclusions of a task force appointed to plan for the reorganization of collection development at Steely Library, a primarily undergraduate library with 13 professional librarians on its staff located at Northern Kentucky University (NKU). Task force activities included a thorough review of the relevant…

  19. Collective Negotiations in Education.

    ERIC Educational Resources Information Center

    Piele, Philip

    1968-01-01

    This literature review examines current documents on collective negotiations in education that were processed by the Clearinghouse on Educational Administration. Principal topics discussed are negotiating procedures, the role of the superintendent, teacher organization-school administrator relations, causes of teacher militancy, negotiation laws,…

  20. Collection Development Policy.

    ERIC Educational Resources Information Center

    Wright, Dianne H., Ed.

    This detailed written guide of the Valdosta State College Library coordinates the library's collection development policies with specific teaching and research needs of the college. It identifies subject subdivisions supporting the work of the departments, guides daily book selection, and provides guidance in the duplication of materials, location…

  1. Effects of a Context Shift and Multiple Context Extinction on Reactivity to Alcohol Cues

    PubMed Central

    MacKillop, James; Lisman, Stephen A.

    2008-01-01

    Cue exposure treatment (CET) attempts to reduce the influence of conditioned substance cues on addictive behavior via prolonged cue exposure with response prevention (i.e., extinction), but has received only modest empirical support in clinical trials. This may be because extinction learning appears to be context dependent and a change in context may result in a return of conditioned responding (i.e., renewal), although this has received only limited empirical examination. The current study used a four-session laboratory analogue of CET to examine whether a change in context following three sessions of alcohol cue exposure with response prevention would result in renewal of conditioned responding. In addition, this study examined whether conducting extinction in multiple contexts would attenuate renewal of conditioned responding. In a one-way between-subjects design, 73 heavy drinkers (71% male) were randomized to three conditions: 1) single context extinction (extinction to alcohol cues in the same context for three sessions followed by a context shift at the fourth session); 2) multiple context extinction (extinction to alcohol cues in different contexts each day for all four sessions); and 3) pseudo-extinction control condition (exposure to neutral cues in the same context for three sessions followed by exposure to alcohol cues at the fourth session). The results revealed the predicted cue reactivity and extinction effects, but the hypotheses that a context shift would generate renewed cue reactivity and that multiple contexts would enhance extinction were not supported. Methodological aspects of the study and the need for parametric data on the context dependency of extinction to alcohol cues are discussed. PMID:18729687

  2. Power differentials in bullying: individuals in a community context.

    PubMed

    Schumann, Lyndall; Craig, Wendy; Rosu, Andrei

    2014-03-01

    Central to the definition of bullying is the abuse of power. Power relationships are inherent in social groups, by virtue of differing size, strength, age, socioeconomic status (SES), or social connectedness of individuals. Beyond the influence of these individual characteristics, environmental factors have the potential to affect the power dynamic in bullying and victimization, but are a relatively unexplored research area. In particular, we know little about how the community-level factors relate to bullying in the adolescent population. The present study is guided by a social ecological perspective to gain a deeper understanding of the individual and built community characteristics (e.g., parks, recreational spaces, buildings that facilitate social interaction and community connectedness) that contribute to the power dynamics related to victimization or bullying in traditional and electronic contexts. Data were collected from 17,777 students in Grades 6 to 10 as part of the 2009/2010 Health Behavior in School-aged Children (HBSC) Survey, from Geographical Information Systems (GIS) data, and from 2006 Canadian Census data. Two nested models were run using HLM with age, gender, ethnicity, SES, social inclusion factors (e.g., collective efficacy), and community resource factors (e.g., access to recreation) as predictors. Characteristics of individuals that placed them at a power disadvantage (being younger, female, and having low SES) were linked to higher rates of victimization. Lower individual collective efficacy was also associated with higher rates of traditional and electronic victimization. Community recreational opportunities were associated with decreased victimization in both contexts. The relative importance of individual and built environmental factors and conceptualization of bullying interactions within a social ecology model are discussed. PMID:24203985

  3. Ensemble coding of context-dependent fear memory in the amygdala

    PubMed Central

    Orsini, Caitlin A.; Yan, Chen; Maren, Stephen

    2013-01-01

    After fear conditioning, presenting the conditioned stimulus (CS) alone yields a context-specific extinction memory; fear is suppressed in the extinction context, but renews in any other context. The context-dependence of extinction is mediated by a brain circuit consisting of the hippocampus, prefrontal cortex (PFC) and amygdala. In the present work, we sought to determine at what level of this circuit context-dependent representations of the CS emerge. To explore this question, we used cellular compartment analysis of temporal activity by fluorescent in situ hybridization (catFISH). This method exploits the intracellular expression profile of the immediate early gene (IEG), Arc, to visualize neuronal activation patterns to two different behavioral experiences. Rats were fear conditioned in one context and extinguished in another; 24 h later, they were sequentially exposed to the CS in the extinction context and another context. Control rats were also tested in each context, but were never extinguished. We assessed Arc mRNA expression within the basal amygdala (BA), lateral amygdala (LA), ventral hippocampus (VH), prelimbic cortex (PL) and infralimbic cortex (IL). We observed that the sequential retention tests induced context-dependent patterns of Arc expression in the BA, LA, and IL of extinguished rats; this was not observed in non-extinguished controls. In general, non-extinguished animals had proportionately greater numbers of non-selective (double-labeled) neurons than extinguished animals. Collectively, these findings suggest that extinction learning results in pattern separation, particularly within the BA, in which unique neuronal ensembles represent fear memories after extinction. PMID:24379767

  4. A Study on Automated Context-aware Access Control Model Using Ontology

    NASA Astrophysics Data System (ADS)

    Jang, Bokman; Jang, Hyokyung; Choi, Euiin

    Applications in context-aware computing environment will be connected wireless network and various devices. According to, recklessness access of information resource can make trouble of system. So, access authority management is very important issue both information resource and adapt to system through founding security policy of needed system. But, existing security model is easy of approach to resource through simply user ID and password. This model has a problem that is not concerned about user's environment information. In this paper, propose model of automated context-aware access control using ontology that can more efficiently control about resource through inference and judgment of context information that collect user's information and user's environment context information in order to ontology modeling.

  5. Contextual Control of Fluid Consumption: The Effects of Context Extinction

    ERIC Educational Resources Information Center

    Murphy, M.; Skinner, D.M.

    2005-01-01

    Rats were trained on a conditional discrimination task in which saccharin was paired with LiCl in one context but paired with saline in another context. Rats drank less saccharin in the danger context than in the safe context, and consumption in the home cage was intermediate to consumption in the two training contexts. Rats also avoided the…

  6. The Application of Context Theory in English Teaching of Reading

    ERIC Educational Resources Information Center

    Zhu, Jiang; Han, Lemeng

    2010-01-01

    Context theory is a very important theory in English teaching, especially the teaching of reading. This paper first analyzes the theory of context, including the features of context and some principles in context theory. Then the paper discusses the application of context theory in English teaching of reading, including some problems met in…

  7. Context Dependency of Conditioned Aversions to Familiar and Novel Fluids

    ERIC Educational Resources Information Center

    Ishii, Kiyoshi; Iguchi, Yoshio; Sawa, Kosuke

    2006-01-01

    Using a context discrimination procedure and rats as the subjects, the formation of context-dependent aversions to novel and familiar fluids was investigated. Experiment 1 revealed that context dependency could be established to a novel fluid (saccharin) after three cycles of context discrimination training and that the acquired context dependency…

  8. Engaging young children in collective curriculum design

    NASA Astrophysics Data System (ADS)

    Goulart, Maria Inês Mafra; Roth, Wolff-Michael

    2010-09-01

    In this study we investigate how 5-year-old children in Brazil and their teachers collectively design science curriculum. More specifically, we develop an agency|structure dialectic as a framework to describe this collective praxis in which science curriculum may emerge as the result of children-teacher transactions rather than as a result of being predetermined and controlled by the latter. We draw on a cultural-historical approach and on the theory of structure and agency to analyze the events showing the complexity of the activity inside a classroom of very young children by science education standards. Data were collected in the context of a science unit in an early-childhood education program in Belo Horizonte. Our study suggests that (a) throughout the movement of agency|passivity || schema|resources one can observe participative thinking, a form of collective consciousness that arises in and from lived experience; (b) learning is a process in which a group is invested in searching for solutions while they create schemas and rearrange resources to evolve a new structure; and (c) the emergent curriculum is a powerful form of praxis that develops children's participation from early childhood on.

  9. Computerizing natural history collections.

    PubMed

    Sunderland, Mary E

    2013-09-01

    Computers are ubiquitous in the life sciences and are associated with many of the practical and conceptual changes that characterize biology's twentieth-century transformation. Yet comparatively little has been written about how scientists use computers. Despite this relative lack of scholarly attention, the claim that computers revolutionized the life sciences by making the impossible possible is widespread, and relatively unchallenged. How did the introduction of computers into research programs shape scientific practice? The Museum of Vertebrate Zoology (MVZ) at the University of California, Berkeley provides a tractable way into this under-examined question because it is possible to follow the computerization of data in the context of long-term research programs. PMID:23664113

  10. 78 FR 7463 - Information Collection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-01

    ... SPACE ADMINISTRATION Information Collection AGENCY: National Aeronautics and Space Administration (NASA... to take this opportunity to comment on proposed and/or continuing information collections, as... INFORMATION CONTACT: Requests for additional information or copies of the information collection...

  11. Sports Reference: A Core Collection.

    ERIC Educational Resources Information Center

    Safford, Barbara Ripp

    2003-01-01

    Discusses reasons for including sports books in school library reference collections, explains why they should not be found only in public library collections, and provides six annotated bibliographies of sports books suitable for intermediate or middle school library collections. (LRW)

  12. Collecting Passion with a Purpose.

    ERIC Educational Resources Information Center

    Vandergrift, Kay E.

    1986-01-01

    Explores collecting of children's books and discusses the motivations of collectors, various levels of collecting, bibliographic tools, sources of books, collection patterns, facsimiles, and cataloging. Lists of selected bibliographic tools and selected rare book dealers are included. (EM)

  13. Collectivity of 98Pd

    NASA Astrophysics Data System (ADS)

    Fransen, C.; Blazhev, A.; Dewald, A.; Jolie, J.; Mü; cher, D.; Möller, O.; Pissulla, T.

    2009-01-01

    The N = 52 nucleus 98Pd was investigated at the Cologne TANDEM accelerator both with the Cologne plunger using the recoil distance Doppler-shift method (RDDS) and with the Cologne HORUS spectrometer for a γγ angular correlation experiment. For the first time lifetimes of yrast states and highly excited low-spin states were measured in 98Pd and the low-spin level scheme was extended. From our data we were able to interpret 98Pd as a nucleus that exhibits some collective features, but is obviously much less collective than the neighboring N = 52 isotones 94Mo and 96Ru due to its closeness to doubly-magic 100Sn.

  14. Collective network routing

    DOEpatents

    Hoenicke, Dirk

    2014-12-02

    Disclosed are a unified method and apparatus to classify, route, and process injected data packets into a network so as to belong to a plurality of logical networks, each implementing a specific flow of data on top of a common physical network. The method allows to locally identify collectives of packets for local processing, such as the computation of the sum, difference, maximum, minimum, or other logical operations among the identified packet collective. Packets are injected together with a class-attribute and an opcode attribute. Network routers, employing the described method, use the packet attributes to look-up the class-specific route information from a local route table, which contains the local incoming and outgoing directions as part of the specifically implemented global data flow of the particular virtual network.

  15. Preserving the Context of Science Data

    NASA Astrophysics Data System (ADS)

    Janée, G.; Frew, J.

    2008-12-01

    Preserving any type of digital information requires preserving both the "bits" comprising the information, and sufficient context (metadata) to support interpreting the bits in the future. Unfortunately, this context is often implicit or embedded in organizations (e.g., communities of practice) or artifacts (e.g., computing platforms) that are not as survivable as the information itself. Therefore, digital preservation must explicitly preserve context. Two necessary components of digital scientific information context are formats and provenance. Formats describe the syntax and low-level semantics of digital information objects (e.g., files). The library community has promulgated format registries (e.g, PRONOM, GDFR, digitalpreservation.gov) that allow archival objects to refer to format definitions using standardized persistent identifiers. Format registries maintain this context separately from the information that references it, but make no archival guarantees about the context's survival. Meanwhile, the scientific community has focused on capturing the provenance of scientific information, typically as a formal workflow specification of the processing steps that created the information. Unfortunately, there is as yet no standard for scientific workflows, nor any guarantee that a specification that can reproduce information is sufficient for understanding it. We describe new technologies that may prove a better fit for preserving scientific information context. The National Geospatial Digital Archive (NGDA) data model represents formats as archival objects containing specifications, software implementations, and other documentation. A format registry is simply an archive that happens to hold archival objects representing formats. Both format and provenance relationships are represented by typed references. Any archival object may reference any other object for its interpretation: the referenced object may be a "file format" object or an object containing dataset

  16. Wastewater Collection Systems.

    PubMed

    Vallabhaneni, Srinivas

    2016-10-01

    This chapter presents a review of the literature published in 2015 on topics relating to wastewater collection systems. It presents noteworthy advances in research and industry experiences selected from major literature sources. This review is divided into the following sections: sewer system planning; sewer condition assessment/rehabilitation; pump stations/force mains/ system design; operation and maintenance; asset management; and regulatory issues/ integrated planning. PMID:27620080

  17. Collecting rare diseases

    PubMed Central

    Ekins, Sean

    2014-01-01

    This editorial introduces the F1000Research rare disease collection. It is common knowledge that for new treatments to be successful there has to be a partnership between the many interested parties such as the patient, advocate, disease foundations, the academic scientists, venture funding organizations, biotech companies, pharmaceutical companies, NIH, and the FDA. Our intention is to provide a forum for discussion and dissemination of any rare disease related topics that will advance scientific understanding and progress to treatments. PMID:25580231

  18. Curating Virtual Data Collections

    NASA Astrophysics Data System (ADS)

    Lynnes, C.; Ramapriyan, H.; Leon, A.; Tsontos, V. M.; Liu, Z.; Shie, C. L.

    2015-12-01

    NASA's Earth Observing System Data and Information System (EOSDIS) contains a rich set of datasets and related services throughout its many elements. As a result, locating all the EOSDIS data and related resources relevant to particular science theme can be daunting. This is largely because EOSDIS data's organizing principle is affected more by the way they are produced than around the expected end use.Virtual collections oriented around science themes can overcome this by presenting collections of data and related resources that are organized around the user's interest, not around the way the data were produced. Science themes can be: Specific applications (uses) of the data, e.g., landslide prediction Geophysical events (e.g., Hurricane Sandy) A specific science research problem Virtual collections consist of annotated web addresses (URLs) that point to data and related resource addresses, thus avoiding the need to copy all of the relevant data to a single place. These URL addresses can be consumed by a variety of clients, ranging from basic URL downloaders (wget, curl) and web browsers to sophisticated data analysis programs such as the Integrated Data Viewer. Eligible resources include anything accessible via URL: data files: data file URLs data subsets: OPeNDAP, webification or Web Coverage Service URLs data visualizations: Web Map Service data search results: OpenSearch Atom response custom analysis workflows: e.g., Giovanni analysis URL

  19. Collection of cometary dust

    NASA Astrophysics Data System (ADS)

    Lell, P.; Igenbergs, E.; Kuczera, H.; Pailer, N.

    Rendezvous Missions to Comets lead to low velocities at the nucleus of the comet. The resulting impact velocity of the cometary dust on a target will range between 10 and 400 m/s. The dust particle which impacts on a target can be collected for a subsequent in-situ analysis. The collection efficiency of a target depends in addition to obvious geometrical conditions upon the surface of the target. The surface characteristics can be divided into two groups: ``dirty'' surfaces, covered with silicate or hydrocarbon compounds (for example vacuum grease), ``clean'' surfaces, like gold (with additional sputtering). This paper deals with the experimental and theoretical investigation of the collection efficiency of ``clean'' targets. Laboratory experiments are described which were conducted at the Technische Universität München, Lehrstuhl für Raumfahrttechnik, and the Max-Planck-Institut für Kernphysik, Heidelberg. In both experiments an electromagnetic accelerator is used to accelerate different types of dust in vacuum to velocities between 10 and 400 m/s. The target is then examined under the microscope and a secondary ion mass spectrometer (which is a model of the laboratory carried on board of the spacecraft for ``in situ'' analysis). The adhesion of the dust grains at the target is evaluated experimentally in an ultracentrifuge.

  20. Student reasoning about graphs in different contexts

    NASA Astrophysics Data System (ADS)

    Ivanjek, Lana; Susac, Ana; Planinic, Maja; Andrasevic, Aneta; Milin-Sipus, Zeljka

    2016-06-01

    This study investigates university students' graph interpretation strategies and difficulties in mathematics, physics (kinematics), and contexts other than physics. Eight sets of parallel (isomorphic) mathematics, physics, and other context questions about graphs, which were developed by us, were administered to 385 first-year students at the Faculty of Science, University of Zagreb. Students were asked to provide explanations and/or mathematical procedures with their answers. Students' main strategies and difficulties identified through the analysis of those explanations and procedures are described. Student strategies of graph interpretation were found to be largely context dependent and domain specific. A small fraction of students have used the same strategy in all three domains (mathematics, physics, and other contexts) on most sets of parallel questions. Some students have shown indications of transfer of knowledge in the sense that they used techniques and strategies developed in physics for solving (or attempting to solve) other context problems. In physics, the preferred strategy was the use of formulas, which sometimes seemed to block the use of other, more productive strategies which students displayed in other domains. Students' answers indicated the presence of slope-height confusion and interval-point confusion in all three domains. Students generally better interpreted graph slope than the area under a graph, although the concept of slope still seemed to be quite vague for many. The interpretation of the concept of area under a graph needs more attention in both physics and mathematics teaching.

  1. Randomized spatial context for object search.

    PubMed

    Jiang, Yuning; Meng, Jingjing; Yuan, Junsong; Luo, Jiebo

    2015-06-01

    Searching visual objects in large image or video data sets is a challenging problem, because it requires efficient matching and accurate localization of query objects that often occupy a small part of an image. Although spatial context has been shown to help produce more reliable detection than methods that match local features individually, how to extract appropriate spatial context remains an open problem. Instead of using fixed-scale spatial context, we propose a randomized approach to deriving spatial context, in the form of spatial random partition. The effect of spatial context is achieved by averaging the matching scores over multiple random patches. Our approach offers three benefits: 1) the aggregation of the matching scores over multiple random patches provides robust local matching; 2) the matched objects can be directly identified on the pixelwise confidence map, which results in efficient object localization; and 3) our algorithm lends itself to easy parallelization and also allows a flexible tradeoff between accuracy and speed through adjusting the number of partition times. Both theoretical studies and experimental comparisons with the state-of-the-art methods validate the advantages of our approach. PMID:25781874

  2. Ontological System for Context Artifacts and Resources

    NASA Astrophysics Data System (ADS)

    Huang, T.; Chung, N. T.; Mukherjee, R. M.

    2012-12-01

    The Adaptive Vehicle Make (AVM) program is a portfolio of programs, managed by the Defense Advanced Research Projects Agency (DARPA). It was established to revolutionize how DoD designs, verifies, and manufactures complex defense systems and vehicles. The Component, Context, and Manufacturing Model Library (C2M2L; pronounced "camel") seeks to develop domain-specific models needed to enable design, verification, and fabrication of the Fast Adaptable Next-Generation (FANG) infantry fighting vehicle using in its overall infrastructure. Terrain models are being developed to represent the surface/fluid that an amphibious infantry fighting vehicle would traverse, ranging from paved road surfaces to rocky, mountainous terrain, slope, discrete obstacles, mud, sand snow, and water fording. Context models are being developed to provide additional data for environmental factors, such as: humidity, wind speed, particulate presence and character, solar radiation, cloud cover, precipitation, and more. The Ontological System for Context Artifacts and Resources (OSCAR) designed and developed at the Jet Propulsion Laboratory is semantic web data system that enables context artifacts to be registered and searched according to their meaning, rather than indexed according to their syntactic structure alone (as in the case for traditional search engines). The system leverages heavily on the Semantic Web for Earth and Environmental Terminology (SWEET) ontologies to model physical terrain environment and context model characteristics. In this talk, we focus on the application of the SWEET ontologies and the design of the OSCAR system architecture.

  3. Geomorphology in context: Dispatches from the field

    NASA Astrophysics Data System (ADS)

    Harden, Carol P.

    2013-10-01

    Field research enables a researcher to view geomorphic systems in broader contexts than those envisioned while at a desk and can yield unanticipated insights that change the course of an investigation or affect the interpretation of results. Geomorphological field research often produces 'aha!' moments, epiphanies that enhance understanding and lead toward more complete explanation of the processes and landforms under study. This paper uses examples from 'aha!' moments in the field to demonstrate the importance of field observation as a way of gaining information about the broader contexts of research sites, especially in process geomorphology. Spatial contexts include the scales of processes and features, linkages between a study site and its surroundings, and information observed in the field about other processes, anthropogenic activities, or unexpected factors that might affect a study. Temporal contexts, not as evident in the field, place a research site in a longer term history of changes and adjustments. Finally, exploring an abstract set of mental contexts reveals reasons that expectations differ from the realities encountered in the field—constraints and biases that a researcher may not have noted—and the possibility that the unexpected can potentially advance geomorphic research. Time spent in the field complements scientific reductionism and provides opportunities to appreciate the richness and complexity of Earth surface systems.

  4. 77 FR 71640 - Agency Information Collection Activities; Proposed Collection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-03

    ... BOARD Agency Information Collection Activities; Proposed Collection AGENCY: Merit Systems Protection... a revised information collection from the Office of Management and Budget (OMB) under the Paperwork... before February 1, 2013. ADDRESSES: Submit written comments on the collection of information to William...

  5. Context aware adaptive security service model

    NASA Astrophysics Data System (ADS)

    Tunia, Marcin A.

    2015-09-01

    Present systems and devices are usually protected against different threats concerning digital data processing. The protection mechanisms consume resources, which are either highly limited or intensively utilized by many entities. The optimization of these resources usage is advantageous. The resources that are saved performing optimization may be utilized by other mechanisms or may be sufficient for longer time. It is usually assumed that protection has to provide specific quality and attack resistance. By interpreting context situation of business services - users and services themselves, it is possible to adapt security services parameters to countermeasure threats associated with current situation. This approach leads to optimization of used resources and maintains sufficient security level. This paper presents architecture of adaptive security service, which is context-aware and exploits quality of context data issue.

  6. The schizophrenic experience: taken out of context?

    PubMed

    Hemsley, David R

    2005-01-01

    A currently favored cognitive model of the abnormal behaviors and experiences characteristic of schizophrenia suggests that they may be linked to a disturbance in the effects of context. The present article reviews some of the relevant literature, noting the wide range of experimental paradigms that have been employed. This range of paradigms is both a strength and a potential weakness of the literature because it raises complex issues of definition and the need to distinguish the various ways that context may influence behaviors. This influence may be crucially dependent on specific task parameters. Despite this, a number of phenomena can be plausibly related to changes in the way that context operates: delusions, disorganization, hallucinations, and the loss of a sense of personal identity. Potential links with the neural bases of the disorder are indicated. PMID:15888424

  7. Management challenges of context-aware learning

    NASA Astrophysics Data System (ADS)

    Pankowska, Malgorzata

    2015-02-01

    The work covers different definitions of context and the explanation of the context value for university learning organization and management. The thesis of the paper is as follows: students' focus on sources of context has impact on their knowledge acquisition and determines students' profiles and learning process, within which the teachers support de-contextualization, i.e., generalization of experience and knowledge. The work emphasizes the meaning of mobile devices in university learning process. The paper presents the value of BYOD (bring-your-own-device) strategy at universities and opportunities for m-education. The student survey results are presented to emphasize the value of that strategy. Beyond that, the students' preferences towards open source software and open learning materials are also discussed and evaluated by student survey. Finally, the process of contextualization and de-contextualization is developed for support the learning at university level.

  8. Social contexts influence ethical considerations of research.

    PubMed

    Gordon, Judith B; Levine, Robert J; Mazure, Carolyn M; Rubin, Philip E; Schaller, Barry R; Young, John L

    2011-05-01

    This article argues that we could improve the design of research protocols by developing an awareness of and a responsiveness to the social contexts of all the actors in the research enterprise, including subjects, investigators, sponsors, and members of the community in which the research will be conducted. "Social context" refers to the settings in which the actors are situated, including, but not limited to, their social, economic, political, cultural, and technological features. The utility of thinking about social contexts is introduced and exemplified by the presentation of a hypothetical case in which one central issue is limitation of the probability of injury to subjects by selection of individuals who are not expected to live long enough for the known risks of the study to become manifest as harms. Benefits of such considerations may include enhanced subject satisfaction and cooperation, community acceptance, and improved data quality, among other desirable consequences. PMID:21534146

  9. False context fear memory in rats.

    PubMed

    Bae, Sarah E; Holmes, Nathan M; Westbrook, R Frederick

    2015-10-01

    Four experiments used rats to study false context fear memories. In Experiment 1, rats were pre-exposed to a distinctive chamber (context A) or to a control environment (context C), shocked after a delay in a second chamber (context B) and tested either in B or A. Rats pre-exposed to A froze just as much as control rats in B but more than control rats in A. In Experiment 2, rats were pre-exposed to A or C, subjected to an immediate shock in B and tested in B or A. Rats pre-exposed to A froze when tested in A but did not freeze when tested in B and control rats did not freeze in either A or B. The false fear memory to the pre-exposed A was contingent on its similarity with the shocked B. In Experiment 3, rats pre-exposed to A and subjected to immediate shock in B froze when tested in A but did not freeze when tested in C and rats pre-exposed to C did not freeze when tested either in A or C. In Experiment 4, rats pre-exposed to A and subjected to immediate shock in B froze more when tested in A than rats whose pre-exposure to A began with an immediate shock. The results were discussed in terms of a dual systems explanation of context fear conditioning: a hippocampal-dependent process that forms a unitary representation of context and an amygdala-based process which associates this representation with shock. PMID:26373831

  10. The Role of Social Contexts in Adolescence: Context Protection and Context Risk in the United States and China

    ERIC Educational Resources Information Center

    Costa, Frances M.; Jessor, Richard; Turbin, Mark S.; Dong, Qi; Zhang, Hongchuan; Wang, Changhai

    2005-01-01

    A theoretical framework about protective factors (models protection, controls protection, support protection) and risk factors (models risk, opportunity risk, vulnerability risk) was employed to articulate the content of 4 key contexts of adolescent life--family, peers, school, and neighborhood--in a cross-national study of problem behavior among…

  11. Global Contexts for Learning: Exploring the Relationship between Low-Context Online Learning and High-Context Learners

    ERIC Educational Resources Information Center

    Westbrook, Timothy Paul

    2014-01-01

    Current research on culture and distance education suggests that cultural variables influence student success online. When online courses are writing-based, they may provide easy information dissemination; however, the low-context medium may restrict the learning experience and class dynamic due to the lack of nonverbal communication. Students who…

  12. Context, Context, Context: New Gene Programs Linked to Bad Behavior in MLL-AF9-Initiated Leukemia.

    PubMed

    Watanabe, Tatsuro; Ernst, Patricia

    2016-07-11

    In this issue of Cancer Cell, Stavropoulou et al. report that expression of the MLL-AF9 fusion results in acute myelogenous leukemia (AML) with different behaviors depending on cell context, which leads them to identify a transcriptional signature surprisingly resembling that of the epithelial-to-mesenchymal (EMT) transition, correlating with aggressiveness of disease. PMID:27411579

  13. Information compression in the context model

    NASA Technical Reports Server (NTRS)

    Gebhardt, Joerg; Kruse, Rudolf; Nauck, Detlef

    1992-01-01

    The Context Model provides a formal framework for the representation, interpretation, and analysis of vague and uncertain data. The clear semantics of the underlying concepts make it feasible to compare well-known approaches to the modeling of imperfect knowledge like that given in Bayes Theory, Shafer's Evidence Theory, the Transferable Belief Model, and Possibility Theory. In this paper we present the basic ideas of the Context Model and show its applicability as an alternative foundation of Possibility Theory and the epistemic view of fuzzy sets.

  14. A Comparative Evaluation of Full-text, Concept-based, and Context-sensitive Search

    PubMed Central

    Moskovitch, Robert; Martins, Susana B.; Behiri, Eytan; Weiss, Aviram; Shahar, Yuval

    2007-01-01

    Objectives Study comparatively (1) concept-based search, using documents pre-indexed by a conceptual hierarchy; (2) context-sensitive search, using structured, labeled documents; and (3) traditional full-text search. Hypotheses were: (1) more contexts lead to better retrieval accuracy; and (2) adding concept-based search to the other searches would improve upon their baseline performances. Design Use our Vaidurya architecture, for search and retrieval evaluation, of structured documents classified by a conceptual hierarchy, on a clinical guidelines test collection. Measurements Precision computed at different levels of recall to assess the contribution of the retrieval methods. Comparisons of precisions done with recall set at 0.5, using t-tests. Results Performance increased monotonically with the number of query context elements. Adding context-sensitive elements, mean improvement was 11.1% at recall 0.5. With three contexts, mean query precision was 42% ± 17% (95% confidence interval [CI], 31% to 53%); with two contexts, 32% ± 13% (95% CI, 27% to 38%); and one context, 20% ± 9% (95% CI, 15% to 24%). Adding context-based queries to full-text queries monotonically improved precision beyond the 0.4 level of recall. Mean improvement was 4.5% at recall 0.5. Adding concept-based search to full-text search improved precision to 19.4% at recall 0.5. Conclusions The study demonstrated usefulness of concept-based and context-sensitive queries for enhancing the precision of retrieval from a digital library of semi-structured clinical guideline documents. Concept-based searches outperformed free-text queries, especially when baseline precision was low. In general, the more ontological elements used in the query, the greater the resulting precision. PMID:17213502

  15. Collective Intelligence. Chapter 17

    NASA Technical Reports Server (NTRS)

    Wolpert, David H.

    2003-01-01

    Many systems of self-interested agents have an associated performance criterion that rates the dynamic behavior of the overall system. This chapter presents an introduction to the science of such systems. Formally, collectives are defined as any system having the following two characteristics: First, the system must contain one or more agents each of which we view as trying to maximize an associated private utility; second, the system must have an associated world utility function that rates the possible behaviors of that overall system. In practice, collectives are often very large, distributed, and support little, if any, centralized communication and control, although those characteristics are not part of their formal definition. A naturally occurring example of a collective is a human economy. One can identify the agents and their private utilities as the human individuals in the economy and the associated personal rewards they are each trying to maximize. One could then identify the world utility as the time average of the gross domestic product. ("World utility" per se is not a construction internal to a human economy, but rather something defined from the outside.) To achieve high world utility it is necessary to avoid having the agents work at cross-purposes lest phenomena like liquidity traps or the Tragedy of the Commons (TOC) occur, in which agents' individually pursuing their private utilities lowers world utility. The obvious way to avoid such phenomena is by modifying the agents utility functions to be "aligned" with the world utility. This can be done via punitive legislation. A real-world example of an attempt to do this was the creation of antitrust regulations designed to prevent monopolistic practices.

  16. Context-specificity of relapse: effects of therapist and environmental context on return of fear.

    PubMed

    Rodriguez, B I; Craske, M G; Mineka, S; Hladek, D

    1999-09-01

    Context-specificity of fear extinction was tested among 65 participants who were fearful of spiders by manipulating the contexts used for exposure treatment and two-week follow-up assessment. Context was defined by both meaningful (presence of a particular therapist) and incidental (room location and furnishings) environmental cues. Distinct phobic stimuli were used to examine interactions of context with stimulus. Physiological, behavioral and verbal indices of fear were measured. Results provided modest support for context-specific return of fear. With one stimulus, participants assessed in a non-treatment context at follow-up exhibited greater returns in heart rate levels. In addition, three of four participants who could not touch the stimulus at follow-up had been tested in a non-treatment context. Future investigations may benefit from greater distinctions between contexts or manipulation of contextual features more directly relevant to fear. Finally, post hoc analyses identified high trait anxiety, slow treatment response, recovery of phobic cognitions and long duration/high intensity phobic encounters post-treatment as significant predictors of increased return of fear. PMID:10458048

  17. The Role of Attention for Context-Context Binding of Intrinsic and Extrinsic Features

    ERIC Educational Resources Information Center

    Boywitt, C. Dennis; Meiser, Thorsten

    2012-01-01

    There is converging evidence that the feeling of conscious recollection is usually accompanied by the bound retrieval of context features of the encoding episode (e.g., Meiser, Sattler, & Weiber, 2008). Recently, however, important limiting conditions have been identified for the binding between context features in memory. For example, focusing on…

  18. Analysing Policy in the Context(s) of Practice: A Theoretical Puzzle

    ERIC Educational Resources Information Center

    Grimaldi, Emiliano

    2012-01-01

    This essay contributes to the construction of a critically informed toolbox of diverse concepts for education policy analysis. Focusing on the context(s) of practice of the policy cycle, the article outlines an interpretative framework to grasp policy enactment across different localities, the influences bearing upon those enactments as well as…

  19. Putting Actions in Context: Visual Action Adaptation Aftereffects Are Modulated by Social Contexts

    PubMed Central

    de la Rosa, Stephan; Streuber, Stephan; Giese, Martin; Bülthoff, Heinrich H.; Curio, Cristóbal

    2014-01-01

    The social context in which an action is embedded provides important information for the interpretation of an action. Is this social context integrated during the visual recognition of an action? We used a behavioural visual adaptation paradigm to address this question and measured participants’ perceptual bias of a test action after they were adapted to one of two adaptors (adaptation after-effect). The action adaptation after-effect was measured for the same set of adaptors in two different social contexts. Our results indicate that the size of the adaptation effect varied with social context (social context modulation) although the physical appearance of the adaptors remained unchanged. Three additional experiments provided evidence that the observed social context modulation of the adaptation effect are owed to the adaptation of visual action recognition processes. We found that adaptation is critical for the social context modulation (experiment 2). Moreover, the effect is not mediated by emotional content of the action alone (experiment 3) and visual information about the action seems to be critical for the emergence of action adaptation effects (experiment 4). Taken together these results suggest that processes underlying visual action recognition are sensitive to the social context of an action. PMID:24466123

  20. "Professional Contexts for Modern Languages": Work Experience and Academic Reflection in a Multilingual Context

    ERIC Educational Resources Information Center

    Gomez-Cash, Olga

    2016-01-01

    In the second year module "Professional Contexts for Modern Languages" at Lancaster University, students take 20-25 hour placements, and using a multimodal forum, they articulate their challenges, development and understanding of the varying contexts in which they are working. In summative assessment, students across languages and types…