Sample records for varying talker identity

  1. Learning Individual Talkers' Structural Preferences

    ERIC Educational Resources Information Center

    Kamide, Yuki

    2012-01-01

    Listeners are often capable of adjusting to the variability contained in individual talkers' (speakers') speech. The vast majority of findings on talker adaptation are concerned with learning the contingency between "phonological" characteristics and talker identity. In contrast, the present study investigates representations at a more abstract…

  2. Audio-visual speech intelligibility benefits with bilateral cochlear implants when talker location varies.

    PubMed

    van Hoesel, Richard J M

    2015-04-01

    One of the key benefits of using cochlear implants (CIs) in both ears rather than just one is improved localization. It is likely that in complex listening scenes, improved localization allows bilateral CI users to orient toward talkers to improve signal-to-noise ratios and gain access to visual cues, but to date, that conjecture has not been tested. To obtain an objective measure of that benefit, seven bilateral CI users were assessed for both auditory-only and audio-visual speech intelligibility in noise using a novel dynamic spatial audio-visual test paradigm. For each trial conducted in spatially distributed noise, first, an auditory-only cueing phrase that was spoken by one of four talkers was selected and presented from one of four locations. Shortly afterward, a target sentence was presented that was either audio-visual or, in another test configuration, audio-only and was spoken by the same talker and from the same location as the cueing phrase. During the target presentation, visual distractors were added at other spatial locations. Results showed that in terms of speech reception thresholds (SRTs), the average improvement for bilateral listening over the better performing ear alone was 9 dB for the audio-visual mode, and 3 dB for audition-alone. Comparison of bilateral performance for audio-visual and audition-alone showed that inclusion of visual cues led to an average SRT improvement of 5 dB. For unilateral device use, no such benefit arose, presumably due to the greatly reduced ability to localize the target talker to acquire visual information. The bilateral CI speech intelligibility advantage over the better ear in the present study is much larger than that previously reported for static talker locations and indicates greater everyday speech benefits and improved cost-benefit than estimated to date. PMID:25582430

  3. Neural Bases of Talker Normalization

    Microsoft Academic Search

    Patrick C. M. Wong; Howard C. Nusbaum; Steven L. Small

    2004-01-01

    To recognize phonemes across variation in talkers, listeners can use information about vocal characteristics, a process referred to as talker normalization. The present study investigates the cortical mechanisms underlying talker normalization using fMRI. Listeners recognized target words presented in either a spoken list produced by a single talker or a mix of different talkers. It was found that both conditions

  4. Cross-lingual talker discrimination 

    E-print Network

    Wester, Mirjam

    2010-01-01

    This paper describes a talker discrimination experiment in which native English listeners were presented with two sentences spoken by bilingual talkers (English/German and English/Finnish) and were asked to judge whether they thought the sentences...

  5. Cross-lingual talker discrimination 

    E-print Network

    Wester, Mirjam

    This paper describes a talker discrimination experiment in which native English listeners were presented with two sentences spoken by bilingual talkers (English/German and English/Finnish) and were asked to judge whether they thought the sentences...

  6. Talker Identification across Source Mechanisms: Experiments with Laryngeal and Electrolarynx Speech

    ERIC Educational Resources Information Center

    Perrachione, Tyler K.; Stepp, Cara E.; Hillman, Robert E.; Wong, Patrick C. M.

    2014-01-01

    Purpose: The purpose of this study was to determine listeners' ability to learn talker identity from speech produced with an electrolarynx, explore source and filter differentiation in talker identification, and describe acoustic-phonetic changes associated with electrolarynx use. Method: Healthy adult control listeners learned to identify…

  7. Famous talker effects in spoken word recognition.

    PubMed

    Maibauer, Alisa M; Markis, Teresa A; Newell, Jessica; McLennan, Conor T

    2014-01-01

    Previous work has demonstrated that talker-specific representations affect spoken word recognition relatively late during processing. However, participants in these studies were listening to unfamiliar talkers. In the present research, we used a long-term repetition-priming paradigm and a speeded-shadowing task and presented listeners with famous talkers. In Experiment 1, half the words were spoken by Barack Obama, and half by Hillary Clinton. Reaction times (RTs) to repeated words were shorter than those to unprimed words only when repeated by the same talker. However, in Experiment 2, using nonfamous talkers, RTs to repeated words were shorter than those to unprimed words both when repeated by the same talker and when repeated by a different talker. Taken together, the results demonstrate that talker-specific details can affect the perception of spoken words relatively early during processing when words are spoken by famous talkers. PMID:24366633

  8. Understanding College Students' Spiritual Identities: Different Faiths, Varied Worldviews

    ERIC Educational Resources Information Center

    Stewart, Dafina Lazarus

    2012-01-01

    This critical essay reviews Small's (2011) book reporting research on the spiritual identities and discursive practices of college students in intrafaith and interfaith dialogue. Small's recommendations and research methods are instructive and helpful to both scholars and practitioners in higher education and student affairs. This research opens…

  9. Talker variability in audio-visual speech perception

    PubMed Central

    Heald, Shannon L. M.; Nusbaum, Howard C.

    2014-01-01

    A change in talker is a change in the context for the phonetic interpretation of acoustic patterns of speech. Different talkers have different mappings between acoustic patterns and phonetic categories and listeners need to adapt to these differences. Despite this complexity, listeners are adept at comprehending speech in multiple-talker contexts, albeit at a slight but measurable performance cost (e.g., slower recognition). So far, this talker variability cost has been demonstrated only in audio-only speech. Other research in single-talker contexts have shown, however, that when listeners are able to see a talker’s face, speech recognition is improved under adverse listening (e.g., noise or distortion) conditions that can increase uncertainty in the mapping between acoustic patterns and phonetic categories. Does seeing a talker’s face reduce the cost of word recognition in multiple-talker contexts? We used a speeded word-monitoring task in which listeners make quick judgments about target word recognition in single- and multiple-talker contexts. Results show faster recognition performance in single-talker conditions compared to multiple-talker conditions for both audio-only and audio-visual speech. However, recognition time in a multiple-talker context was slower in the audio-visual condition compared to audio-only condition. These results suggest that seeing a talker’s face during speech perception may slow recognition by increasing the importance of talker identification, signaling to the listener a change in talker has occurred. PMID:25076919

  10. Talker-specific auditory imagery during reading

    NASA Astrophysics Data System (ADS)

    Nygaard, Lynne C.; Duke, Jessica; Kawar, Kathleen; Queen, Jennifer S.

    2001-05-01

    The present experiment was designed to determine if auditory imagery during reading includes talker-specific characteristics such as speaking rate. Following Kosslyn and Matt (1977), participants were familiarized with two talkers during a brief prerecorded conversation. One talker spoke at a fast speaking rate and one spoke at a slow speaking rate. During familiarization, participants were taught to identify each talker by name. At test, participants were asked to read two passages and told that either the slow or fast talker wrote each passage. In one condition, participants were asked to read each passage aloud, and in a second condition, they were asked to read each passage silently. Participants pressed a key when they had completed reading the passage, and reading times were collected. Reading times were significantly slower when participants thought they were reading a passage written by the slow talker than when reading a passage written by the fast talker. However, the effects of speaking rate were only present in the reading-aloud condition. Additional experiments were conducted to investigate the role of attention to talker's voice during familiarization. These results suggest that readers may engage in auditory imagery while reading that preserves perceptual details of an author's voice.

  11. WindTalker: A P2P-Based Low-Latency Anonymous Communication Network

    NASA Astrophysics Data System (ADS)

    Zhang, Jia; Duan, Haixin; Liu, Wu; Wu, Jianping

    Compared with traditional static anonymous communication networks, the P2P architecture can provide higher anonymity in communication. However, the P2P architecture also leads to more challenges, such as route, stability, trust and so on. In this paper, we present WindTalker, a P2P-based low-latency anonymous communication network. It is a pure decentralized mix network and can provide low-latency services which help users hide their real identity in communication. In order to ensure stability and reliability, WindTalker imports “seed nodes” to help a peer join in the P2P network and the peer nodes can use gossip-based protocol to exchange active information. Moreover, WindTalker uses layer encryption to ensure the information of relayed messages cannot be leaked. In addition, malicious nodes in the network are the major threat to anonymity of P2P anonymous communication, so WindTalker imports a trust mechanism which can help the P2P network exclude malicious nodes and optimize the strategy of peer discovery, tunnel construction, and relaying etc. in anonymous communications. We deploy peer nodes of WindTalker in our campus network to test reliability and analyze anonymity in theory. The network measurement and simulation analysis shows that WindTalker can provide low-latency and reliable anonymous communication services.

  12. Neural processing of phonetic and talker information in a tone language: An fMRI study Caicai Zhang1, 2, Kenneth R. Pugh3,4,5, W. Einar Mencl3,5, Peter J. Molfese3, Stephen J. Frost3, James S. Magnuson3 ,4, Gang Peng1, 2, and W. S-Y. Wang1, 2

    E-print Network

    Neural processing of phonetic and talker information in a tone language of Linguistics, Yale University · 1. Interdependence of phonetic and talker processing (Green, Tomiak & Kuhl). - Variability of talker identity (e.g. female/male) in speech stimuli interferes with phonetic classification (e

  13. Honoring Native American Code Talkers: The Road to the Code Talkers Recognition Act of 2008 (Public Law 110-420)

    ERIC Educational Resources Information Center

    Meadows, William C.

    2011-01-01

    Interest in North American Indian code talkers continues to increase. In addition to numerous works about the Navajo code talkers, several publications on other groups of Native American code talkers--including the Choctaw, Comanche, Hopi, Meskwaki, Canadian Cree--and about code talkers in general have appeared. This article chronicles recent…

  14. Relative roles of consonants and vowels in perceiving phonetic versus talker cues in speech

    NASA Astrophysics Data System (ADS)

    Cardillo, Gina; Owren, Michael J.

    2002-05-01

    Perceptual experiments tested whether consonants and vowels differentially contribute to phonetic versus indexical cueing in speech. In 2 experiments, 62 total participants each heard 128 American-English word pairs recorded by 8 male and 8 female talkers. Half the pairs were synonyms, while half were nonsynonyms. Further, half the pairs were words from the same talker, and half from different, same-sex talkers. The first word heard was unaltered, while the second was edited by setting either all vowels (``Consonants-Only'') or all consonants (``Vowels-Only'') to silence. Each participant responded to half Consonants-Only and half Vowels-Only trials, always hearing the unaltered word once and the edited word twice. In experiment 1, participants judged whether the two words had the same or different meanings. Participants in experiment 2 indicated whether the word pairs were from the same or different talkers. Performance was measured as latencies and d values, and indicated significantly greater sensitivity to phonetic content when consonants rather than vowels were heard, but the converse when talker identity was judged. These outcomes suggest important functional differences in the roles played by consonants and vowels in normative speech.

  15. Effects of Talker Variability on Perceptual Learning of Dialects

    PubMed Central

    Clopper, Cynthia G.; Pisoni, David B.

    2012-01-01

    Two groups of listeners learned to categorize a set of unfamiliar talkers by dialect region using sentences selected from the TIMIT speech corpus. One group learned to categorize a single talker from each of six American English dialect regions. A second group learned to categorize three talkers from each dialect region. Following training, both groups were asked to categorize new talkers using the same categorization task. While the single-talker group was more accurate during initial training and test phases when familiar talkers produced the sentences, the three-talker group performed better on the generalization task with unfamiliar talkers. This cross-over effect in dialect categorization suggests that while talker variation during initial perceptual learning leads to more difficult learning of specific exemplars, exposure to intertalker variability facilitates robust perceptual learning and promotes better categorization performance of unfamiliar talkers. The results suggest that listeners encode and use acoustic-phonetic variability in speech to reliably perceive the dialect of unfamiliar talkers. PMID:15697151

  16. Culturally Consistent Treatment for Late Talkers

    ERIC Educational Resources Information Center

    Wing, Christine; Kohnert, Kathryn; Pham, Giang; Cordero, Kelly Nett; Ebert, Kerry Danahy; Kan, Pui Fong; Blaiser, Kristina

    2007-01-01

    The authors discuss cultural influences on clinical interactions when treating late talkers, 2- to 3-year-old children with primary language delays. They use the literature to examine the cultural relevance of core components of early language treatment and propose alternative professional actions in the cases of cultural mismatches. Alternative…

  17. Intelligibility of normal speech I: Global and fine-grained acoustic-phonetic talker characteristics

    Microsoft Academic Search

    Ann R. Bradlow; Gina M. Torretta; David B. Pisoni

    1996-01-01

    This study used a multi-talker database containing intelligibility scores for 2000 sentences (20 talkers, 100 sentences), to identify talker-related correlates of speech intelligibility. We first investigated \\

  18. Tuned with a Tune: Talker Normalization via General Auditory Processes

    PubMed Central

    Laing, Erika J. C.; Liu, Ran; Lotto, Andrew J.; Holt, Lori L.

    2012-01-01

    Voices have unique acoustic signatures, contributing to the acoustic variability listeners must contend with in perceiving speech, and it has long been proposed that listeners normalize speech perception to information extracted from a talker’s speech. Initial attempts to explain talker normalization relied on extraction of articulatory referents, but recent studies of context-dependent auditory perception suggest that general auditory referents such as the long-term average spectrum (LTAS) of a talker’s speech similarly affect speech perception. The present study aimed to differentiate the contributions of articulatory/linguistic versus auditory referents for context-driven talker normalization effects and, more specifically, to identify the specific constraints under which such contexts impact speech perception. Synthesized sentences manipulated to sound like different talkers influenced categorization of a subsequent speech target only when differences in the sentences’ LTAS were in the frequency range of the acoustic cues relevant for the target phonemic contrast. This effect was true both for speech targets preceded by spoken sentence contexts and for targets preceded by non-speech tone sequences that were LTAS-matched to the spoken sentence contexts. Specific LTAS characteristics, rather than perceived talker, predicted the results suggesting that general auditory mechanisms play an important role in effects considered to be instances of perceptual talker normalization. PMID:22737140

  19. Perceptual learning of a talker resolves lexical ambiguity

    NASA Astrophysics Data System (ADS)

    Piorkowski, Rebecca L.; Badecker, William

    2005-09-01

    Recent evidence [Allen and Miller, J. Acoust. Soc. Am. 115, 3171 (2004)] suggests that listeners are sensitive to talker-specific acoustic-phonetic properties. The present study examines whether experience with a particular talker's realization of place of articulation can eliminate the ambiguity that arises when a word like ``hen'' assimilates in place of articulation to ``hem'' in a labial context (hen best). Using a cross-modal priming paradigm, the priming effect of words that assimilate to other words was measured in two conditions. In the first condition, listeners heard examples of the talker's assimilation style in the form of words that assimilate to nonwords in a labial context (green beer) before the critical trials were heard. In the second condition, listeners did not hear any examples of the talker's assimilation style before the critical trials were heard. Evidence will be presented showing that, without previous experience with the talker's assimilation style, words that assimilate to other words create a lexical ambiguity for the listener. Additionally, evidence will be presented showing that experience with the talker's assimilation style eliminates this lexical ambiguity and allows the listener to perceive the talker's intended lexical form.

  20. Training to Use Voice Onset Time as a Cue to Talker Identification Induces a Left-Ear/Right-Hemisphere Processing Advantage

    ERIC Educational Resources Information Center

    Francis, Alexander L.; Driscoll, Courtney

    2006-01-01

    We examined the effect of perceptual training on a well-established hemispheric asymmetry in speech processing. Eighteen listeners were trained to use a within-category difference in voice onset time (VOT) to cue talker identity. Successful learners (n = 8) showed faster response times for stimuli presented only to the left ear than for those…

  1. Children's Perception of Speech Produced in a Two-Talker Background

    ERIC Educational Resources Information Center

    Baker, Mallory; Buss, Emily; Jacks, Adam; Taylor, Crystal; Leibold, Lori J.

    2014-01-01

    Purpose: This study evaluated the degree to which children benefit from the acoustic modifications made by talkers when they produce speech in noise. Method: A repeated measures design compared the speech perception performance of children (5-11 years) and adults in a 2-talker masker. Target speech was produced in a 2-talker background or in…

  2. Courtship attention in sagebrush lizards varies with male identity and female reproductive state

    Microsoft Academic Search

    Mayté Ruiz; Erica Davis; Emília P. Martins

    2008-01-01

    Previous experiments suggest that males spend more time with the more receptive of 2 novel females or the one with the higher fitness potential. However, males often court individual females repeatedly over a season; for example, male lizards sequentially visit familiar females as they patrol territorial boundaries. It may benefit males to vary display intensity as they move between multiple

  3. Age-Related Changes to Spectral Voice Characteristics Affect Judgments of Prosodic, Segmental, and Talker Attributes for Child and Adult Speech

    ERIC Educational Resources Information Center

    Dilley, Laura C.; Wieland, Elizabeth A.; Gamache, Jessica L.; McAuley, J. Devin; Redford, Melissa A.

    2013-01-01

    Purpose: As children mature, changes in voice spectral characteristics co-vary with changes in speech, language, and behavior. In this study, spectral characteristics were manipulated to alter the perceived ages of talkers' voices while leaving critical acoustic-prosodic correlates intact, to determine whether perceived age differences were…

  4. Courtship attention in sagebrush lizards varies with male identity and female reproductive state.

    PubMed

    Ruiz, Mayté; Davis, Erica; Martins, Emília P

    2008-11-01

    Previous experiments suggest that males spend more time with the more receptive of 2 novel females or the one with the higher fitness potential. However, males often court individual females repeatedly over a season; for example, male lizards sequentially visit familiar females as they patrol territorial boundaries. It may benefit males to vary display intensity as they move between multiple females. In this study, we explored the factors influencing amount of male courtship to familiar females in the sagebrush lizard, Sceloporus graciosus. We tested whether males vary the amount of courtship exhibited due to individual differences among males, female reproductive state, or female fitness potential. Each male was allowed to interact separately, but repeatedly, with 2 females until both females laid eggs. Male courtship behavior with each of the 2 females was assayed at an intermediate point, after 3 weeks of interaction. We found that individual differences among males were considerable. The number of male courtship displays was also positively correlated with female latency to lay eggs, with males displaying more often toward females with eggs that had not yet been fertilized. Courtship behavior was not well predicted by the number of eggs laid or by female width, both measures of female quality. Thus, male S. graciosus appear to alter courtship intensity more in response to signals of female reproductive state than in response to variation in potential female fitness. PMID:19458780

  5. Courtship attention in sagebrush lizards varies with male identity and female reproductive state

    PubMed Central

    Davis, Erica; Martins, Emília P.

    2008-01-01

    Previous experiments suggest that males spend more time with the more receptive of 2 novel females or the one with the higher fitness potential. However, males often court individual females repeatedly over a season; for example, male lizards sequentially visit familiar females as they patrol territorial boundaries. It may benefit males to vary display intensity as they move between multiple females. In this study, we explored the factors influencing amount of male courtship to familiar females in the sagebrush lizard, Sceloporus graciosus. We tested whether males vary the amount of courtship exhibited due to individual differences among males, female reproductive state, or female fitness potential. Each male was allowed to interact separately, but repeatedly, with 2 females until both females laid eggs. Male courtship behavior with each of the 2 females was assayed at an intermediate point, after 3 weeks of interaction. We found that individual differences among males were considerable. The number of male courtship displays was also positively correlated with female latency to lay eggs, with males displaying more often toward females with eggs that had not yet been fertilized. Courtship behavior was not well predicted by the number of eggs laid or by female width, both measures of female quality. Thus, male S. graciosus appear to alter courtship intensity more in response to signals of female reproductive state than in response to variation in potential female fitness. PMID:19458780

  6. Pragmatic Functions of Toddlers Who Are Late Talkers

    ERIC Educational Resources Information Center

    MacRoy-Higgins, Michelle; Kaufman, Ilana

    2012-01-01

    Toddlers who are "late talkers" demonstrate reduced expressive vocabulary in the absence of physical, social, cognitive, or sensory impairment; they are usually identified at age 2, when they produce fewer than 50 words and do not combine words (Rescorla, 1989). This study analyzed spontaneous language samples of 10 late talking toddlers and 11…

  7. Preschoolers' Use of Talker Information in On-Line Comprehension

    ERIC Educational Resources Information Center

    Creel, Sarah C.

    2012-01-01

    A crucial part of language development is learning how various social and contextual language-external factors constrain an utterance's meaning. This learning process is poorly understood. Five experiments addressed one hundred thirty-one 3- to 5-year-old children's use of one such socially relevant information source: talker characteristics.…

  8. Bimodal Hearing and Speech Perception with a Competing Talker

    ERIC Educational Resources Information Center

    Pyschny, Verena; Landwehr, Markus; Hahn, Moritz; Walger, Martin; von Wedel, Hasso; Meister, Hartmut

    2011-01-01

    Purpose: The objective of the study was to investigate the influence of bimodal stimulation upon hearing ability for speech recognition in the presence of a single competing talker. Method: Speech recognition was measured in 3 listening conditions: hearing aid (HA) alone, cochlear implant (CI) alone, and both devices together (CI + HA). To examine…

  9. HMM-based Speech Synthesis Adapted to Listeners' & Talkers' conditions

    E-print Network

    Edinburgh, University of

    HMM-based Speech Synthesis Adapted to Listeners' & Talkers' conditions Dr Junichi Yamagishi The Centre for Speech Technology Research University of Edinburgh www.cstr.ed.ac.uk Centre for Speech Technology Research R T S C 1 #12;Agenda 1. Text-to-speech synthesis (TTS) - Hidden Markov model (HMM

  10. Integration of current identity-based district-varied health insurance schemes in China: implications and challenges.

    PubMed

    Wang, Hai-Qiang; Liu, Zhi-Heng; Zhang, Yong-Zhao; Luo, Zhuo-Jing

    2012-03-01

    With China's great efforts to improve public health insurance, clear progress has been achieved toward the ambitious full health insurance coverage strategy for all. The current health insurance schemes in China fall into three categories: urban employee basic health insurance scheme, urban resident scheme, and new rural cooperative medical system. Despite their phasic success, these substantially identity-based, district-varied health insurance schemes have separate operation mechanisms, various administrative institutions, and consequently poor connections. On the other hand, the establishment and implementation of various health insurance schemes provide the preconditioning of more sophisticated social health insurance schemes, the increase in the income of urban and rural people, and the great importance attached by the government. Moreover, the reform of the "Hukou" (household register) system provides economical, official, and institutional bases. Therefore, the establishment of an urban-rural integrated, citizen-based, and nationwide-universal health insurance scheme by the government is critically important to attain equality and national connection. Accordingly, the differences between urban and rural areas should be minimized. In addition, the current schemes, administrative institutions, and networks should be integrated and interconnected. Moreover, more expenditure on health insurance might be essential for the integration despite the settings of global financial crisis. Regardless of the possible challenges in implementation, the proposed new scheme is promising and may be applied in the near future for the benefit of the Chinese people and global health. PMID:22460451

  11. Listen to Your Mother!: The Role of Talker Familiarity in Infant Streaming

    ERIC Educational Resources Information Center

    Barker, Brittan A.; Newman, Rochelle S.

    2004-01-01

    Little is known about the acoustic cues infants might use to selectively attend to one talker in the presence of background noise. This study examined the role of talker familiarity as a possible cue. Infants either heard their own mothers (maternal-voice condition) or a different infant's mother (novel-voice condition) repeating isolated words…

  12. Assertive and Responsive Conversational Skills of Italian-Speaking Late Talkers

    ERIC Educational Resources Information Center

    Bonifacio, Serena; Girolametto, Luigi; Bulligan, Manuela; Callegari, Monica; Vignola, Sandra; Zocconi, Elisabetta

    2007-01-01

    Background: Previous research on the pragmatic abilities of late talkers at 24 months of age indicates that they have difficulties initiating conversational interactions, but possess intact responsiveness skills. This study uses a parent-administered questionnaire for evaluating the conversational skills of late talkers and suggesting pragmatic…

  13. Talker Differences in Clear and Conversational Speech: Vowel Intelligibility for Older Adults with Hearing Loss

    ERIC Educational Resources Information Center

    Ferguson, Sarah Hargus

    2012-01-01

    Purpose: To establish the range of talker variability for vowel intelligibility in clear versus conversational speech for older adults with hearing loss and to determine whether talkers who produced a clear speech benefit for young listeners with normal hearing also did so for older adults with hearing loss. Method: Clear and conversational vowels…

  14. Influence of Phonotactic Probability/Neighbourhood Density on Lexical Learning in Late Talkers

    ERIC Educational Resources Information Center

    MacRoy-Higgins, Michelle; Schwartz, Richard G.; Shafer, Valerie L.; Marton, Klara

    2013-01-01

    Background: Toddlers who are late talkers demonstrate delays in phonological and lexical skills. However, the influence of phonological factors on lexical acquisition in toddlers who are late talkers has not been examined directly. Aims: To examine the influence of phonotactic probability/neighbourhood density on word learning in toddlers who were…

  15. Heeding the Voice of Experience: The Role of Talker Variation in Lexical Access

    ERIC Educational Resources Information Center

    Creel, Sarah C.; Aslin, Richard N.; Tanenhaus, Michael K.

    2008-01-01

    Two experiments used the head-mounted eye-tracking methodology to examine the time course of lexical activation in the face of a non-phonemic cue, talker variation. We found that lexical competition was attenuated by consistent talker differences between words that would otherwise be lexical competitors. In Experiment 1, some English cohort…

  16. Perceptual learning of talker-specific vowel space

    NASA Astrophysics Data System (ADS)

    Queen, Jennifer S.; Nygaard, Lynne C.

    2001-05-01

    Previous research suggests that as listeners become familiar with a speaker's vocal style, they are better able to understand that speaker. This study investigated one possible mechanism by which this talker familiarity benefit arises. Listeners' vowel spaces were measured using a perceptual discrimination test both before and after they were trained to identify a group of speakers by name. Listeners identified either the same speakers whose vowels they discriminated or a different group of speakers. Differences in the learnability and the intelligibility of the two speaking groups were observed. The speaker group that was harder to identify also had vowels that were harder to discriminate. Changes in the listeners' vowel spaces were determined by examining multidimensional scaling solutions of their responses during the discrimination tests. All listeners became better at discriminating vowels. However, only listeners who heard different speakers during identification training and vowel discrimination exhibited a shift in their vowel spaces after training. This suggests that encountering new voices in an unrelated, nonlinguistic task acts to alter the perceptual context and may affect the structure of linguistic representation. Together, these results suggest a link between linguistic and nonlinguistic information in representations for spoken language.

  17. Differential neural contributions to native- and foreign-language talker identification

    PubMed Central

    Perrachione, Tyler K.; Pierrehumbert, Janet B.; Wong, Patrick C.M.

    2009-01-01

    Humans are remarkably adept at identifying individuals by the sound of their voice, a behavior supported by the nervous system’s ability to integrate information from voice and speech perception. Talker-identification abilities are significantly impaired when listeners are unfamiliar with the language being spoken. Recent behavioral studies describing the language-familiarity effect implicate functionally integrated neural systems for speech and voice perception, yet specific neuroscientific evidence demonstrating the basis for such integration has not yet been shown. Listeners in the present study learned to identify voices speaking a familiar (native) or unfamiliar (foreign) language. The talker-identification performance of neural circuitry in each cerebral hemisphere was assessed using dichotic listening. To determine the relative contribution of circuitry in each hemisphere to ecological (binaural) talker identification abilities, we compared the predictive capacity of dichotic performance on binaural performance across languages. We found listeners’ right-ear (left hemisphere) performance to be a better predictor of overall accuracy in their native language than a foreign one. The enhanced predictive capacity of the classically language-dominant left-hemisphere on overall talker-identification accuracy demonstrates functionally integrated neural systems for speech and voice perception during natural talker identification. PMID:19968445

  18. Children's Identification of Consonants in a Speech-Shaped Noise or a Two-Talker Masker

    ERIC Educational Resources Information Center

    Leibold, Lori J.; Buss, Emily

    2013-01-01

    Purpose: To evaluate child-adult differences for consonant identification in a noise or a 2-talker masker. Error patterns were compared across age and masker type to test the hypothesis that errors with the noise masker reflect limitations in the peripheral encoding of speech, whereas errors with the 2-talker masker reflect target-masker…

  19. The Effect of Talker- And Listener-Related Factors on Intelligibility for a Real-Word, Open-Set Perception Test.

    ERIC Educational Resources Information Center

    Markham, Duncan; Hazan, Valerie

    2004-01-01

    The aims of this study were to evaluate whether talker intelligibility is consistent across listeners differing in age and gender and to investigate the process of attunement to talker characteristics in children and adults. Word intelligibility rates were obtained from 135 listeners (adults, 11-12-year-olds, and 7-8-year-olds) for 45 talkers from…

  20. Multi-talker background and semantic priming effect

    PubMed Central

    Dekerle, Marie; Boulenger, Véronique; Hoen, Michel; Meunier, Fanny

    2014-01-01

    The reported studies have aimed to investigate whether informational masking in a multi-talker background relies on semantic interference between the background and target using an adapted semantic priming paradigm. In 3 experiments, participants were required to perform a lexical decision task on a target item embedded in backgrounds composed of 1–4 voices. These voices were Semantically Consistent (SC) voices (i.e., pronouncing words sharing semantic features with the target) or Semantically Inconsistent (SI) voices (i.e., pronouncing words semantically unrelated to each other and to the target). In the first experiment, backgrounds consisted of 1 or 2 SC voices. One and 2 SI voices were added in Experiments 2 and 3, respectively. The results showed a semantic priming effect only in the conditions where the number of SC voices was greater than the number of SI voices, suggesting that semantic priming depended on prime intelligibility and strategic processes. However, even if backgrounds were composed of 3 or 4 voices, reducing intelligibility, participants were able to recognize words from these backgrounds, although no semantic priming effect on the targets was observed. Overall this finding suggests that informational masking can occur at a semantic level if intelligibility is sufficient. Based on the Effortfulness Hypothesis, we also suggest that when there is an increased difficulty in extracting target signals (caused by a relatively high number of voices in the background), more cognitive resources were allocated to formal processes (i.e., acoustic and phonological), leading to a decrease in available resources for deeper semantic processing of background words, therefore preventing semantic priming from occurring. PMID:25400572

  1. Talker Adaptation in Speech Perception: Adjusting the Signal or the Representations?

    ERIC Educational Resources Information Center

    Dahan, Delphine; Drucker, Sarah J.; Scarborough, Rebecca A.

    2008-01-01

    Past research has established that listeners can accommodate a wide range of talkers in understanding language. How this adjustment operates, however, is a matter of debate. Here, listeners were exposed to spoken words from a speaker of an American English dialect in which the vowel /ae/ is raised before /g/, but not before /k/. Results from two…

  2. Differential Neural Contributions to Native- and Foreign-Language Talker Identification

    ERIC Educational Resources Information Center

    Perrachione, Tyler K.; Pierrehumbert, Janet B.; Wong, Patrick C. M.

    2009-01-01

    Humans are remarkably adept at identifying individuals by the sound of their voice, a behavior supported by the nervous system's ability to integrate information from voice and speech perception. Talker-identification abilities are significantly impaired when listeners are unfamiliar with the language being spoken. Recent behavioral studies…

  3. Edinburgh Research Explorer The listening talker: A review of human and algorithmic context-

    E-print Network

    Edinburgh, University of

    , identifies which factors appear to be beneficial, and goes on to examine previous computational attemptsEdinburgh Research Explorer The listening talker: A review of human and algorithmic context- induced modifications of speech Citation for published version: Cooke, M, King, S, Garnier, M & Aubanel, V

  4. HMM-BASED AND SVM-BASED RECOGNITION OF THE SPEECH OF TALKERS WITH SPASTIC DYSARTHRIA

    E-print Network

    Hasegawa-Johnson, Mark

    This paper studies the speech of three talkers with spastic dysarthria caused by cerebral palsy. All three of disabilities such as, but not limited to, cerebral palsy and traumatic brain injury [1]. Adults with cerebral palsy are able to perform most of the tasks required of a college student, including reading, listening

  5. Talker Differences in Clear and Conversational Speech: Acoustic Characteristics of Vowels

    ERIC Educational Resources Information Center

    Ferguson, Sarah Hargus; Kewley-Port, Diane

    2007-01-01

    Purpose: To determine the specific acoustic changes that underlie improved vowel intelligibility in clear speech. Method: Seven acoustic metrics were measured for conversational and clear vowels produced by 12 talkers--6 who previously were found (S. H. Ferguson, 2004) to produce a large clear speech vowel intelligibility effect for listeners with…

  6. Behavior of DNS' Top Talkers, a .com/.net View Eric Osterweil1

    E-print Network

    California at Los Angeles, University of

    counts and do not include any large attack traffic. To the best of our knowledge, this is the largest study of resolver traffic and query patterns to date. We use this query traffic to create empirical set of resolvers (i.e. the top-talkers) constitute 90% of the overall traffic. The results provide

  7. Influence of Stuttering Variation on Talker Group Classification in Preschool Children: Preliminary Findings

    ERIC Educational Resources Information Center

    Johnson, Kia N.; Karrass, Jan; Conture, Edward G.; Walden, Tedra

    2009-01-01

    The purpose of this study was to investigate whether variations in disfluencies of young children who do (CWS) and do not stutter (CWNS) significantly change their talker group classification or diagnosis from stutterer to nonstutterer, and vice versa. Participants consisted of seventeen 3- to 5-year-old CWS and nine 3- to 5-year-old CWNS, with no…

  8. The Role of Single Talker Acoustic Variation in Early Word Learning

    ERIC Educational Resources Information Center

    Galle, Marcus E.; Apfelbaum, Keith S.; McMurray, Bob

    2015-01-01

    Recent work has demonstrated that the addition of multiple talkers during habituation improves 14-month-olds' performance in the switch task (Rost & McMurray, 2009). While the authors suggest that this boost in performance is due to the increase in acoustic variability (Rost & McMurray, 2010), it is also possible that there is…

  9. Comparison of bimodal and bilateral cochlear implant users on speech recognition with competing talker, music perception, affective prosody discrimination and talker identification

    PubMed Central

    Cullington, Helen E; Zeng, Fan-Gang

    2010-01-01

    Objectives Despite excellent performance in speech recognition in quiet, most cochlear implant users have great difficulty with speech recognition in noise, music perception, identifying tone of voice, and discriminating different talkers. This may be partly due to the pitch coding in cochlear implant speech processing. Most current speech processing strategies use only the envelope information; the temporal fine structure is discarded. One way to improve electric pitch perception is to utilize residual acoustic hearing via a hearing aid on the non-implanted ear (bimodal hearing). This study aimed to test the hypothesis that bimodal users would perform better than bilateral cochlear implant users on tasks requiring good pitch perception. Design Four pitch-related tasks were used: Hearing in Noise Test (HINT) sentences spoken by a male talker with a competing female, male, or child talker. Montreal Battery of Evaluation of Amusia. This is a music test with six subtests examining pitch, rhythm and timing perception, and musical memory. Aprosodia Battery. This has five subtests evaluating aspects of affective prosody and recognition of sarcasm. Talker identification using vowels spoken by ten different talkers (three male, three female, two boys, and two girls). Bilateral cochlear implant users were chosen as the comparison group. Thirteen bimodal and thirteen bilateral adult cochlear implant users were recruited; all had good speech perception in quiet. Results There were no significant differences between the mean scores of the bimodal and bilateral groups on any of the tests, although the bimodal group did perform better than the bilateral group on almost all tests. Performance on the different pitch-related tasks was not correlated, meaning that if a subject performed one task well they would not necessarily perform well on another. The correlation between the bimodal users' hearing threshold levels in the aided ear and their performance on these tasks was weak. Conclusions Although the bimodal cochlear implant group performed better than the bilateral group on most parts of the four pitch-related tests, the differences were not statistically significant. The lack of correlation between test results shows that the tasks used are not simply providing a measure of pitch ability. Even if the bimodal users have better pitch perception, the real-world tasks used are reflecting more diverse skills than pitch. This research adds to the existing speech perception, language, and localization studies that show no significant difference between bimodal and bilateral cochlear implant users. PMID:21178567

  10. Aided speech-identification performance in single-talker competition by older adults with impaired hearing

    PubMed Central

    HUMES, LARRY E.; COUGHLIN, MAUREEN

    2010-01-01

    This study examined the effects of increased processing load on the closed-set speech-identification performance of young and older adults in a one-talker background. Since the older adults had impaired hearing, speech-identification performance was measured for spectrally shaped stimuli comparable to those experienced when wearing well-fit hearing aids. There were three groups of listeners: (1) 19 older adults with high-frequency sensorineural hearing loss; (2) 10 young adults with normal hearing who were assessed with the same spectrally shaped stimuli as the older adults; (3) 9 young adults with normal hearing who were assessed without spectral shaping and at a poorer target-to-competition ratio in an effort to equate overall performance to that of the older adults. In addition to this group factor, there were three within-participant repeated-measures independent variables designed to increase the demands on processing for the target and competing speech stimuli. These were: (1) competition meaningfulness (played in forward or reverse direction); (2) gender match between target and competing talkers (same or different gender); and (3) talker uncertainty (either the same target/competition talker pair or one of many such pairs on each trial). These three repeated-measures independent variables were examined in a 2 × 2 × 2 factorial design. They showed roughly independent and additive effects on speech-identification such that combinations of these variables decreased performance cumulatively. Older adults performed worse than young adults across the board, but also showed diminished relative improvement as the processing load was decreased. Individual differences in performance among the older adults were also examined. PMID:19778396

  11. Talker-identification training using simulations of binaurally combined electric and acoustic hearing: generalization to speech and emotion recognition.

    PubMed

    Krull, Vidya; Luo, Xin; Iler Kirk, Karen

    2012-04-01

    Understanding speech in background noise, talker identification, and vocal emotion recognition are challenging for cochlear implant (CI) users due to poor spectral resolution and limited pitch cues with the CI. Recent studies have shown that bimodal CI users, that is, those CI users who wear a hearing aid (HA) in their non-implanted ear, receive benefit for understanding speech both in quiet and in noise. This study compared the efficacy of talker-identification training in two groups of young normal-hearing adults, listening to either acoustic simulations of unilateral CI or bimodal (CI+HA) hearing. Training resulted in improved identification of talkers for both groups with better overall performance for simulated bimodal hearing. Generalization of learning to sentence and emotion recognition also was assessed in both subject groups. Sentence recognition in quiet and in noise improved for both groups, no matter if the talkers had been heard during training or not. Generalization to improvements in emotion recognition for two unfamiliar talkers also was noted for both groups with the simulated bimodal-hearing group showing better overall emotion-recognition performance. Improvements in sentence recognition were retained a month after training in both groups. These results have potential implications for aural rehabilitation of conventional and bimodal CI users. PMID:22501080

  12. Not so fast! Talker variability in serial recall at standard presentation rates.

    PubMed

    Mogensen, Claire; Miller, Leonie M; Roodenrys, Steven

    2015-03-01

    In serial recall tasks, presenting items in alternating female and male voices impairs performance relative to the single-voice presentation. This phenomenon, termed the talker-variability effect (TVE), was recently reexamined by Hughes, Marsh, and Jones (2009, 2011), who used the effect as confirmatory evidence for their perceptual-gestural account of serial recall performance. Despite the authors' claim of generalisability, the serial recall paradigm employed did not reflect the standard parameters more generally adopted in verbal short-term memory research. Specifically, the presentation rate of the stimuli was almost 3 times that typically used. We sought to determine if the TVE, as observed by Hughes et al., was generalisable to the standard serial recall task by directly comparing recall performance in talker-variable conditions at fast and slow stimulus presentation rates. Experiment 1 employed a systematic replication of the foundational study undertaken by Hughes et al. (2009). Utilising a novel stimulus set, Experiment 2 provided a subsequent test of the generalisability of the TVE, examining the influence of item properties. Both experiments showed a robust TVE at the atypical fast presentation rate; however, for the slower item presentation, the TVE was unreliable. Furthermore, error analysis suggests that item recall also contributes to the TVE, contrary to the current explanation proposed by Hughes et al. (2009, 2011). The challenge of the present data to the perceptual-gestural account of the TVE is explored. Alternative accounts that focus on the resource cost of categorical speech perception in the context of talker variability are posited. (PsycINFO Database Record (c) 2015 APA, all rights reserved). PMID:25730639

  13. Lexical Training through Modeling and Elicitation Procedures with Late Talkers Who Have Specific Language Impairment and Developmental Delays

    ERIC Educational Resources Information Center

    Kouri, Theresa A.

    2005-01-01

    Late talkers with specific language impairment and developmental delay make up a large portion of our early childhood caseloads; therefore, an understanding of best clinical practices for these populations is essential. Early lexical learning was examined in 2 interactive treatment approaches with 29 late-talking preschoolers with language and…

  14. Navajo Code Talker Joe Morris, Sr. shared insights from his time as a secret World War Two messenger

    NASA Technical Reports Server (NTRS)

    2002-01-01

    Navajo Code Talker Joe Morris, Sr. shared insights from his time as a secret World War Two messenger with his audience at NASA's Dryden Flight Research Center on Nov. 26, 2002. NASA Dryden is located on Edwards Air Force Base in California's Mojave Desert.

  15. Perception of Speech Produced by Native and Nonnative Talkers by Listeners with Normal Hearing and Listeners with Cochlear Implants

    ERIC Educational Resources Information Center

    Ji, Caili; Galvin, John J.; Chang, Yi-ping; Xu, Anting; Fu, Qian-Jie

    2014-01-01

    Purpose: The aim of this study was to evaluate the understanding of English sentences produced by native (English) and nonnative (Spanish) talkers by listeners with normal hearing (NH) and listeners with cochlear implants (CIs). Method: Sentence recognition in noise was measured in adult subjects with CIs and subjects with NH, all of whom were…

  16. Recognition of spoken words by native and non-native listeners: Talker-, listener-, and item-related factors

    PubMed Central

    Bradlow, Ann R.; Pisoni, David B.

    2012-01-01

    In order to gain insight into the interplay between the talker-, listener-, and item-related factors that influence speech perception, a large multi-talker database of digitally recorded spoken words was developed, and was then submitted to intelligibility tests with multiple listeners. Ten talkers produced two lists of words at three speaking rates. One list contained lexically “easy” words (words with few phonetically similar sounding “neighbors” with which they could be confused), and the other list contained lexically “hard” (wordswords with many phonetically similar sounding “neighbors”). An analysis of the intelligibility data obtained with native speakers of English (experiment 1) showed a strong effect of lexical similarity. Easy words had higher intelligibility scores than hard words. A strong effect of speaking rate was also found whereby slow and medium rate words had higher intelligibility scores than fast rate words. Finally, a relationship was also observed between the various stimulus factors whereby the perceptual difficulties imposed by one factor, such as a hard word spoken at a fast rate, could be overcome by the advantage gained through the listener's experience and familiarity with the speech of a particular talker. In experiment 2, the investigation was extended to another listener population, namely, non-native listeners. Results showed that the ability to take advantage of surface phonetic information, such as a consistent talker across items, is a perceptual skill that transfers easily from first to second language perception. However, non-native listeners had particular difficulty with lexically hard words even when familiarity with the items was controlled, suggesting that non-native word recognition may be compromised when fine phonetic discrimination at the segmental level is required. Taken together, the results of this study provide insight into the signal-dependent and signal-independent factors that influence spoken language processing in native and non-native listeners. PMID:10530030

  17. Toddlers' ability to map the meaning of new words in multi-talker environments.

    PubMed

    Dombroski, Justine; Newman, Rochelle S

    2014-11-01

    Whether in a noisy daycare center, home, or classroom, many of the environments children are exposed to are, undoubtedly, not acoustically ideal for speech processing. Yet, somehow, these toddlers are still able to acquire vocabularies consisting of hundreds of words. The current study explores the effect of background speech noise on children's early word learning (specifically, their ability to map a label onto an object). Three groups of children aged 32-36 months were taught two new words either in quiet, or in the presence of multi-talker babble at a +5 or 0?dB signal-to-noise ratio (SNR). They were then tested on their learning of these new word-to-object mappings. Children showed similar accuracy in all three conditions, suggesting that even at a 0?dB SNR, children were successfully able to learn new words. PMID:25373980

  18. Talker sex mediates the influence of neighborhood density on vowel articulation

    NASA Astrophysics Data System (ADS)

    Munson, Benjamin

    2005-09-01

    Words with high phonological neighborhood densities (ND) are more difficult to perceive than words with low NDs [P. Luce and D. Pisoni (1998)]. Previous research has shown that the F1/F2 acoustic vowel space is larger for vowels in words with high ND relative to words with low NDs [B. Munson and N.P. Solomon (2004); R. Wright (2004)]. This may represent talkers' tacit attempts to partially counter the perception difficulties associated with high-ND words. If so, then we would expect to see a larger effect of ND on vowel articulation in women, who have been observed to produce more intelligible speech than men, and to accommodate more to conversational partners than men [V. Hazan and D. Markham (2004); L. Namy et al. (2002)]. This hypothesis was tested by examining the influence of ND on vowel-space articulation by 22 women and 22 men. As expected, women produced overall more-dispersed vowel spaces than men, and vowel spaces associated with high-ND words were more-dispersed than low-ND words. Contrary to expectations, the influence of ND on vowel-space expansion was strongest in men. This appeared to be due a tendency for women not to produce contracted vowel spaces for low-ND words.

  19. The Effect of Background Language and Speaker Differences on Serial Recall of Aurally Presented Single-Talker Stimuli

    E-print Network

    Steidley, Breanna I.

    2011-04-06

    lowers performance as a result of auditory distraction. This has been shown to be true for both speech (Drullman et al., 1999; Rhebergen et al., 2005; Tremblay et al., 2001; Van Engen & Bradlow, 2006) and non-speech sounds (Beaman et al., 2005; Bradlow... the intensity of the background speech is the same or higher than that of the target speech (Van Engen & Bradlow, 2006). It has also been found that the number of talkers in multitalker babble (Van Engen & Bradlow, 2006), native and non-native single...

  20. Gender Identity

    MedlinePLUS

    ... Identity: Gender Identity Sexuality/Sexual Orientation Mental Health Issues Gender Identity Helpful Resources Homophobia/Transphobia Gender identity is how strong a person's feeling is about being male or female, or possibly parts of both. Most people are comfortable with the feeling ...

  1. Object identity

    Microsoft Academic Search

    Setrag N. Khoshafian; George P. Copeland

    1986-01-01

    Identity is that property of an object which distinguishes each object from all others. Identity has been investigated almost independently in general-purpose programming languages and database languages. Its importance is growing as these two environments evolve and merge.We describe a continuum between weak and strong support of identity, and argue for the incorporation of the strong notion of identity at

  2. Identity theft

    Microsoft Academic Search

    Berni Dwan

    2004-01-01

    Almost every week I hear a news report or read a newspaper article about identity theft. It will either be about yet another person who suffers at the hands of the identity thief, some new software or hardware breakthrough that will foil the activities of the identity thieves, or, a new report or study telling us the cost of identity

  3. Evaluation of an Audiovisual-FM System: Investigating the Interaction between Illumination Level and a Talker's Skin Color on Speech-Reading Performance

    ERIC Educational Resources Information Center

    Gagne, Jean-Pierre; Laplante-Levesque, Ariane; Labelle, Maude; Doucet, Katrine; Potvin, Marie-Christine

    2006-01-01

    A program designed to evaluate the benefits of an audiovisual-frequency modulated (FM) system led to some questions concerning the effects of illumination level and a talker's skin color on speech-reading performance. To address those issues, the speech of a Caucasian female was videotaped under 2 conditions: a light skin color condition and a…

  4. Age-related changes to spectral voice characteristics affect judgments of prosodic, segmental, and talker attributes for child and adult speech

    PubMed Central

    Dilley, Laura C.; Wieland, Elizabeth A.; Gamache, Jessica L.; McAuley, J. Devin; Redford, Melissa A.

    2013-01-01

    Purpose As children mature, changes in voice spectral characteristics covary with changes in speech, language, and behavior. Spectral characteristics were manipulated to alter the perceived ages of talkers’ voices while leaving critical acoustic-prosodic correlates intact, to determine whether perceived age differences were associated with differences in judgments of prosodic, segmental, and talker attributes. Method Speech was modified by lowering formants and fundamental frequency, for 5-year-old children’s utterances, or raising them, for adult caregivers’ utterances. Next, participants differing in awareness of the manipulation (Exp. 1a) or amount of speech-language training (Exp. 1b) made judgments of prosodic, segmental, and talker attributes. Exp. 2 investigated the effects of spectral modification on intelligibility. Finally, in Exp. 3 trained analysts used formal prosody coding to assess prosodic characteristics of spectrally-modified and unmodified speech. Results Differences in perceived age were associated with differences in ratings of speech rate, fluency, intelligibility, likeability, anxiety, cognitive impairment, and speech-language disorder/delay; effects of training and awareness of the manipulation on ratings were limited. There were no significant effects of the manipulation on intelligibility or formally coded prosody judgments. Conclusions Age-related voice characteristics can greatly affect judgments of speech and talker characteristics, raising cautionary notes for developmental research and clinical work. PMID:23275414

  5. Moral Identity

    Microsoft Academic Search

    Sam A. Hardy; Gustavo Carlo

    \\u000a Moral identity is a construct at the intersection of moral development and identity formation. It is thought to be a source\\u000a of moral motivation linking moral reasoning (our judgments about whether certain actions are right or wrong) to behavior.\\u000a In other words, people with a stronger sense of moral identity will be more likely to do what they know is

  6. Adoptive Identity

    Microsoft Academic Search

    Harold D. Grotevant; Lynn Von Korff

    \\u000a Adoptive identity addresses these questions: “Who am I as an adopted person?” and “What does being adopted mean to me, and\\u000a how does this fit into my understanding of my self, relationships, family, and culture?” The process of identity construction\\u000a is observed in adoptive identity exploration, as adopted persons reflect on the meaning of adoption in their lives, take active

  7. Identity Theft

    Microsoft Academic Search

    Keith B. Anderson; Erik Durbin; Michael A. Salinger

    2008-01-01

    Identity theft is made possible by the nature of modern payment systems. In the modern economy, sellers are willing to offer goods and services to strangers in exchange for a promise to pay, provided the promise is backed up by data that link the buyer to a specific account or credit history. Identity theft involves acquiring enough data about another

  8. Brand Identity.

    ERIC Educational Resources Information Center

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are outlined;…

  9. Similarity and familiarity: Second language sentence recognition in first- and second-language multi-talker babblea

    PubMed Central

    Van Engen, Kristin J.

    2010-01-01

    The intelligibility of speech in noisy environments depends not only on the functionality of listeners’ peripheral auditory systems, but also on cognitive factors such as their language learning experience. Previous studies have shown, for example, that normal-hearing listeners attending to a non-native language have more difficulty identifying speech targets in noisy conditions than do native listeners. Furthermore, native listeners have more difficulty understanding speech targets in the presence of speech noise in their native language versus a foreign language. The present study addresses the role of listener language experience with both the target and noise languages by examining second-language sentence recognition in first- and second-language noise. Native English speakers and non-native English speakers whose native language is Mandarin were tested on English sentence recognition in English and Mandarin 2-talker babble. Results show that both listener groups experienced greater difficulty in English versus Mandarin babble, but that native Mandarin listeners experienced a smaller release from masking in Mandarin babble relative to English babble. These results indicate that both the similarity between the target and noise and the language experience of the listeners contribute to the amount of interference listeners experience when listening to speech in the presence of speech noise. PMID:21179561

  10. Bidirectional clear speech perception benefit for native and high-proficiency non-native talkers and listeners: Intelligibility and accentednessa

    PubMed Central

    Smiljani?, Rajka; Bradlow, Ann R.

    2011-01-01

    This study investigated how native language background interacts with speaking style adaptations in determining levels of speech intelligibility. The aim was to explore whether native and high proficiency non-native listeners benefit similarly from native and non-native clear speech adjustments. The sentence-in-noise perception results revealed that fluent non-native listeners gained a large clear speech benefit from native clear speech modifications. Furthermore, proficient non-native talkers in this study implemented conversational-to-clear speaking style modifications in their second language (L2) that resulted in significant intelligibility gain for both native and non-native listeners. The results of the accentedness ratings obtained for native and non-native conversational and clear speech sentences showed that while intelligibility was improved, the presence of foreign accent remained constant in both speaking styles. This suggests that objective intelligibility and subjective accentedness are two independent dimensions of non-native speech. Overall, these results provide strong evidence that greater experience in L2 processing leads to improved intelligibility in both production and perception domains. These results also demonstrated that speaking style adaptations along with less signal distortion can contribute significantly towards successful native and non-native interactions. PMID:22225056

  11. Lexical training through modeling and elicitation procedures with late talkers who have specific language impairment and developmental delays.

    PubMed

    Kouri, Theresa A

    2005-02-01

    Late talkers with specific language impairment and developmental delay make up a large portion of our early childhood caseloads; therefore, an understanding of best clinical practices for these populations is essential. Early lexical learning was examined in 2 interactive treatment approaches with 29 late-talking preschoolers with language and developmental disabilities. Children were randomly assigned to either a mand-elicited imitation (MEI) condition in which elicitations and imitative prompts were used or to a modeling with auditory bombardment (Mod-AB) condition in which auditory bombardment and play modeling were incorporated with no response demands on participants. Lexical production of target vocabulary words already comprehended was measured during a 10-session training period and then during two 50-min play interactions with a parent/caretaker in the home after treatment was completed. Results indicated that the MEI procedure was relatively more effective in facilitating frequency and rate of target word learning in the treatment setting, but no significant differences were found between conditions in the number or percentage of target words generalized to the home setting. Mod-AB children produced more target words that were limited to the home setting than did MEI children, whose productivity was more balanced across settings. Treatment by aptitude regression analyses indicated that none of the preintervention language, cognitive, or total development aptitude scores were predictive of child performance in 1 treatment condition or the other, although Battelle Developmental Inventory communication scores and sizes of preintervention lexicons were predictive of child performance across conditions. Empirical and clinical issues pertaining to the efficacy of modeling- and elicitation-based procedures for late-talking preschoolers are discussed. PMID:15934450

  12. Designing acoustics for linguistically diverse classrooms: Effects of background noise, reverberation and talker foreign accent on speech comprehension by native and non-native English-speaking listeners

    NASA Astrophysics Data System (ADS)

    Peng, Zhao Ellen

    The current classroom acoustics standard (ANSI S12.60-2010) recommends core learning spaces not to exceed background noise level (BNL) of 35 dBA and reverberation time (RT) of 0.6 second, based on speech intelligibility performance mainly by the native English-speaking population. Existing literature has not correlated these recommended values well with student learning outcomes. With a growing population of non-native English speakers in American classrooms, the special needs for perceiving degraded speech among non-native listeners, either due to realistic room acoustics or talker foreign accent, have not been addressed in the current standard. This research seeks to investigate the effects of BNL and RT on the comprehension of English speech from native English and native Mandarin Chinese talkers as perceived by native and non-native English listeners, and to provide acoustic design guidelines to supplement the existing standard. This dissertation presents two studies on the effects of RT and BNL on more realistic classroom learning experiences. How do native and non-native English-speaking listeners perform on speech comprehension tasks under adverse acoustic conditions, if the English speech is produced by talkers of native English (Study 1) versus native Mandarin Chinese (Study 2)? Speech comprehension materials were played back in a listening chamber to individual listeners: native and non-native English-speaking in Study 1; native English, native Mandarin Chinese, and other non-native English-speaking in Study 2. Each listener was screened for baseline English proficiency level, and completed dual tasks simultaneously involving speech comprehension and adaptive dot-tracing under 15 acoustic conditions, comprised of three BNL conditions (RC-30, 40, and 50) and five RT scenarios (0.4 to 1.2 seconds). The results show that BNL and RT negatively affect both objective performance and subjective perception of speech comprehension, more severely for non-native listeners than for native listeners. While the presence of foreign accent is generally detrimental, an interlanguage benefit was identified on both speech comprehension and the self-report frustration and perceived performance ratings, specifically for non-native listeners with matched foreign accent as the talker. Suggested design guidelines for BNL and RT are identified for attaining optimal speech comprehension performance to improve classroom acoustics for the non-native English-speaking population.

  13. Scholarly Identity

    ERIC Educational Resources Information Center

    White, Julie

    2012-01-01

    The work of academics has intensified, but the focus for most remains on teaching, research and contribution to service. Institutional imperatives and positioning within universities impact significantly on how individual academics fashion themselves to fit with expectations and demands. There is, of course, no simple version of scholarly identity

  14. Performing Identities

    ERIC Educational Resources Information Center

    Heuman, Amy N.; Simmons, Jake; Kinane, Ryan D.; Stow, Brandon D.

    2008-01-01

    The intercultural communication course offers a unique space for the introduction of pluralistic realities and lived experiences. Intercultural communication instructors are faced with the formidable task of facilitating a course that provides an outlet for exploring complex information related to the negotiation of cultural identities and value…

  15. Identity Style, Parental Authority, and Identity Commitment.

    ERIC Educational Resources Information Center

    Berzonsky, Michael D.

    2004-01-01

    The role that parental authority patterns and social-cognitive identity styles may play in establishing identity commitments was investigated. The results indicated that family authority and identity style variables combined accounted for 50% of the variation in strength of identity commitment. As hypothesized, the relationship between parental…

  16. Identity Adaptiveness: Affect Across Multiple Identities

    Microsoft Academic Search

    Todd L. Pittinsky; Margaret Shih; Nalini Ambady

    1999-01-01

    Most empirical work that examines the effects of stereotypes on targets considers only one of a target's many social identities. This study examined how individuals implicitly affectively orient themselves toward their social identities in situations in which one or another of these identities is relatively adaptive. An adaptive iden- tity is one associated with stereotypes that predict desirable performance in

  17. National Identity Learning Module

    NSDL National Science Digital Library

    M.Keane

    This learning module provides conceptual framework on the topic of national identity as well as three case studies on the topics of: icons of identity, landscapes of national identity, and contested public space.

  18. identity application sectionnine

    E-print Network

    Klein, Ophir

    identity application sectionnine 74 contents introduction .........................................................................................................85 #12;University of California, San Francisco | Public Affairs | Visual Identity Standards The following examples are intended to demonstrate the positive impact a visual identity can have when

  19. MOBILE IDENTITY MANAGEMENT

    Microsoft Academic Search

    George Roussos; Uma Patel

    In this paper we review the state-of-the-art in Mobile Identity Management and discuss its implications for the emerging ubiquitous computing systems. We start by establishing the concept of identity in the digital context and then proceed to discuss the emerging field of digital identity and mobility. We identify the benefits of mobile identity management both for the consumer and for

  20. Avoiding Medical Identity Theft

    MedlinePLUS

    ... be the first to learn about an incident of identity theft involving your health information. Should this happen, ... the Identity Theft Data Clearinghouse, and the Department of Health and Human Services Medical Identity Theft Response Checklist Medical Identity Theft Response Checklist ...

  1. Economics And Identity

    Microsoft Academic Search

    George A. Akerlof; Rachel E. Kranton

    2000-01-01

    This paper considers how identity, a person's sense of self, affects economic outcomes. We incorporate the psychology and sociology of identity into an economic model of behavior. In the utility function we propose, identity is associated with different social categories and how people in these categories should behave. We then construct a simple game-theoretic model showing how identity can affect

  2. Introduction Identity Based Signatures

    E-print Network

    Garcia, Flavio D.

    Introduction Identity Based Signatures The Construction Conclusions A Schnorr-like Lightweight Identity-Based Signature Scheme Flavio D. Garcia Institute for Computing and Information Sciences, Radboud-like Lightweight Identity-Based Signature Scheme #12;Introduction Identity Based Signatures The Construction

  3. Identity Theft Prevention

    Microsoft Academic Search

    Chandragupta Gudena

    2009-01-01

    8.4 million Americans - this is the number of identity theft victims in 2007, as reported on privacyrights.org. Identity theft has become one of the fastest growing crimes in the country, increasing both in numbers and sophistication while becoming part of organized crime, prompting state and federal agencies to take measures to protect Americans’ identity information. So what is Identity

  4. Credit and identity theft

    Microsoft Academic Search

    Charles M. Kahn; William Roberds

    2008-01-01

    The quintessential crime of the information age is identity theft, the malicious use of personal identifying data. In this paper we model “identity” and its use in credit transactions. Various types of identity theft occur in equilibrium, including “new account fraud,” “existing account fraud,” and “friendly fraud.” The equilibrium incidence of identity theft represents a tradeoff between a desire to

  5. Identity Management CyberCIEGE Identity Management

    E-print Network

    finally going through it making what you believe are the correct choices. This scenario explores typically include VPN clients. 1.3 Clean Up The "View Log" button lets you view a log of what occurredIdentity Management CyberCIEGE Identity Management CyberCIEGE is an information assurance (IA

  6. Varying constants quantum cosmology

    E-print Network

    Katarzyna Leszczynska; Adam Balcerzak; Mariusz P. Dabrowski

    2015-01-26

    We discuss minisuperspace models within the framework of varying physical constants theories including $\\Lambda$-term. In particular, we consider the varying speed of light (VSL) theory and varying gravitational constant theory (VG) using the specific ans\\"atze for the variability of constants: $c(a) = c_0 a^n$ and $G(a)=G_0 a^q$. We find that most of the varying $c$ and $G$ minisuperspace potentials are of the tunneling type which allows to use WKB approximation of quantum mechanics. Using this method we show that the probability of tunneling of the universe "from nothing" ($a=0)$ to a Friedmann geometry with the scale factor $a_t$ is large for growing $c$ models and is strongly suppressed for diminishing $c$ models. As for $G$ varying, the probability of tunneling is large for $G$ diminishing, while it is small for $G$ increasing. In general, both varying $c$ and $G$ change the probability of tunneling in comparison to the standard matter content (cosmological term, dust, radiation) universe models.

  7. Perceived consequences of hypothetical identity-inconsistent sexual experiences: effects of perceiver's sex and sexual identity.

    PubMed

    Preciado, Mariana A; Johnson, Kerri L

    2014-04-01

    Most people organize their sexual orientation under a single sexual identity label. However, people may have sexual experiences that are inconsistent with their categorical sexual identity label. A man might identify as heterosexual but still experience some attraction to men; a woman might identify as lesbian yet enter into a romantic relationship with a man. Identity-inconsistent experiences are likely to have consequences. In the present study, we examined lay perceptions of the consequences of identity-inconsistent sexual experiences for self-perceived sexuality and for social relationships among a sexually diverse sample (N = 283). We found that the perceived consequences of identity-inconsistent experiences for self-perception, for social stigmatization, and for social relationships varied as a function of participant sex, participant sexual identity (heterosexual, gay, lesbian), and experience type (fantasy, attraction, behavior, love). We conclude that not all identity-inconsistent sexual experiences are perceived as equally consequential and that the perceived consequences of such experiences vary predictably as a function of perceiver sex and sexual identity. We discuss the role lay perceptions of the consequences of identity-inconsistent sexual experiences may play in guiding attitudes and behavior. PMID:23733152

  8. Identity, causality, and pronoun ambiguity.

    PubMed

    Sagi, Eyal; Rips, Lance J

    2014-10-01

    This article looks at the way people determine the antecedent of a pronoun in sentence pairs, such as: Albert invited Ron to dinner. He spent hours cleaning the house. The experiment reported here is motivated by the idea that such judgments depend on reasoning about identity (e.g., the identity of the he who cleaned the house). Because the identity of an individual over time depends on the causal-historical path connecting the stages of the individual, the correct antecedent will also depend on causal connections. The experiment varied how likely it is that the event of the first sentence (e.g., the invitation) would cause the event of the second (the house cleaning) for each of the two individuals (the likelihood that if Albert invited Ron to dinner, this would cause Albert to clean the house, versus cause Ron to clean the house). Decisions about the antecedent followed causal likelihood. A mathematical model of causal identity accounted for most of the key aspects of the data from the individual sentence pairs. PMID:25131648

  9. Mobility and Identity

    Microsoft Academic Search

    Denis Royer; André Deuker; Kai Rannenberg

    While identity management systems for the Internet are debated intensively, identity management in mobile applications has\\u000a grown silently over the last 17 years. Technologies, such as the still-growing Global System for Mobile Communication (GSM)\\u000a with its Subscriber Identity Module (SIM) identification infrastructure, are foundations for many new mobile identity management\\u000a related applications and services. This includes location-based services (LBS), offering

  10. Identity Uncertainty Stuart Russell

    E-print Network

    Russell, Stuart

    Identity Uncertainty Stuart Russell Computer Science Division University of California, Berkeley, CA 94720, USA russell@cs.berkeley.edu Abstract We are often uncertain about the identity of objects probabilis- tic approach to reasoning about identity under uncer- tainty in the framework of first

  11. Brandeis University Identity Manual

    E-print Network

    Snider, Barry B.

    Brandeis University Identity Manual Brandeis University O ce of Communications #12;Introduction Key Components of the Visual Identity The Brandeis Logotype The Brandeis Seal The O cial Brandeis Stationery Use Numbers Capitalization Abbreviations Terminology and Usage Titles and Names Miscellaneous Visual Identity

  12. Identity security awareness.

    PubMed

    Philipsen, Nayna C

    2004-01-01

    Identity theft is an increasing concern when organizations, businesses, and even childbirth educators ask for a client's Social Security number for identification purposes. In this column, the author suggests ways to protect one's identity and, more importantly, decrease the opportunities for identity theft. PMID:17273374

  13. Social Identity and Preferences*

    PubMed Central

    Benjamin, Daniel J.; Choi, James J.; Strickland, A. Joshua

    2009-01-01

    Social identities prescribe behaviors for people. We identify the marginal behavioral effect of these norms on discount rates and risk aversion by measuring how laboratory subjects’ choices change when an aspect of social identity is made salient. When we make ethnic identity salient to Asian-American subjects, they make more patient choices. When we make racial identity salient to black subjects, non-immigrant blacks (but not immigrant blacks) make more patient choices. Making gender identity salient has no effect on intertemporal or risk choices. PMID:20871741

  14. Fast Varying Loads

    Microsoft Academic Search

    Veronica B. Bohorquez

    2007-01-01

    The operation of Fast Varying Loads (FVLs) in distribution systems is associated with high variation in the active power and bursts of distortion. FVLs affect surrounding loads sensitive to voltage rms variation and distortion. Thus they affect quality of the supply. This paper presents an overview of some electric loads that behave as FVLs. FVLs are characterized in this paper

  15. When less is heard than meets the ear: Change deafness in a telephone conversation

    Microsoft Academic Search

    Kimberly M. Fenn; Hadas Shintel; Alexandra S. Atkins; Jeremy I. Skipper; Veronica C. Bond; Howard C. Nusbaum

    2011-01-01

    During a conversation, we hear the sound of the talker as well as the intended message. Traditional models of speech perception posit that acoustic details of a talker's voice are not encoded with the message whereas more recent models propose that talker identity is automatically encoded. When shadowing speech, listeners often fail to detect a change in talker identity. The

  16. University Identity Standards a manual for building a stronger identity

    E-print Network

    New Mexico, University of

    University Identity Standards a manual for building a stronger identity Produced by University). quick info #12;1 UNM brand redesign table of contents University Identity Standards Table of Contents..................................................................................................... 2 Image & Identity

  17. Exploring medical identity theft.

    PubMed

    Mancilla, Desla; Moczygemba, Jackie

    2009-01-01

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification. PMID:20169017

  18. About Property Identity

    E-print Network

    Cusmariu, Arnold

    ABOUT PROPERTY IDENTITY Arnold Cusmariu W. V. Quine has objected that properties are phil­ osophically suspect on grounds that their identity conditions are obscure.! I consider this and related matters below. I It is a generally accepted... doctrine that Leibniz's Law (LL) (x)(y)(x=y - (F)(Fx = Fy)) provides logically necessary conditions for the concept of identity. But for some reason, philosophers sometimes either overlook the intended breadth of LL or else do not take it seriously...

  19. Social Identity and Cooperation

    E-print Network

    Manago, Bianca N

    2012-07-11

    RESEARCH SCHOLAR A Senior Scholars Thesis by BIANCA NICOLE MANAGO SOCIAL IDENTITY AND COOPERATION Approved by: Research Advisor: Jane Sell Associate Dean for Undergraduate Research: Robert C. Webb Major: Sociology April 2010... Identity and Cooperation. (April 2010) Bianca Nicole Manago Department of Sociology Texas A&M University Research Advisor: Jane Sell Department of Sociology This study seeks to examine the effects of cooperation on social identity in group work...

  20. Culture and identity

    Microsoft Academic Search

    Sergiu Constantin; Günther Rautz

    2003-01-01

    Culture and identity are not just some abstract notions, but 'living' concepts which are closely connected to people's lives, and the decision of the domestic courts reflect, in fact, how different societies respond to the issue of protecting the culture and identity of minorities. The national courts' decisions presented in this article are related to the following groups: linguistic minorities,

  1. Ecological Identity through Dialogue

    ERIC Educational Resources Information Center

    Scott, Charles

    2010-01-01

    Martin Buber's philosophy of dialogue offers an epistemic and ontological orientation upon which an ecological identity can be established as part of an integrated, environmental education. I consider here the significance of a relational self in establishing this ecological identity, as well as the benefits from doing so. This relational,…

  2. SEXUALITY AND GENDER IDENTITY

    E-print Network

    Viglas, Anastasios

    LEARN TO UNDERSTAND SEXUALITY AND GENDER IDENTITY COUNSELLING AND PSYCHOLOGICAL SERVICES CAPS #12;CONTENTS 01 Questioning your sexuality or gender identity 02 Coming out 04 Sexual health 05 Harassment and discrimination 06 Types of support and information available 08 Useful resources Sexual orientation is about who

  3. Marketing local identity

    Microsoft Academic Search

    Bill Erickson; Marion Roberts

    1997-01-01

    This paper reports on a research project into city identity, city marketing and the implications for urban design. Identity can refer to those aspects which make a place identifiable, or unique but can also refer to the way individuals or groups identify with a place. A common view today is that uniform concepts of planning and development together with the

  4. Time Varying Feature Data

    NASA Astrophysics Data System (ADS)

    Echterhoff, J.; Simonis, I.; Atkinson, R.

    2012-04-01

    The infrastructure to gather, store and access information about our environment is improving and growing rapidly. The increasing amount of information allows us to get a better understanding of the current state of our environment, historical processes and to simulate and predict the future state of the environment. Finer grained spatial and temporal data and more reliable communications make it easier to model dynamic states and ephemeral features. The exchange of information within and across geospatial domains is facilitated through the use of harmonized information models. The Observations & Measurements (O&M) developed through OGC and standardised by ISO is an example of such a cross-domain information model. It is used in many domains, including meteorology, hydrology as well as the emergency management. O&M enables harmonized representation of common metadata that belong to the act of determining the state of a feature property, whether by sensors, simulations or humans. In addition to the resulting feature property value, information such as the result quality but especially the time that the result applies to the feature property can be represented. Temporal metadata is critical to modelling past and future states of a feature. The features, and the semantics of each property, are defined in domain specific Application Schema using the General Feature Model (GFM) from ISO 19109 and usually encoded following ISO 19136. However, at the moment these standards provide only limited support for the representation and handling of time varying feature data. Features like rivers, wildfires or gas plumes have a defined state - for example geographic extent - at any given point in time. To keep track of changes, a more complex model for example using time-series coverages is required. Furthermore, the representation and management of feature property value changes via the service interfaces defined by OGC and ISO - namely: WFS and WCS - would be rather complex. Keeping track of feature property value corrections or even feature (state change) cancellations for auditing purposes is also not easy to achieve. The aviation domain has strong requirements to represent and manage the state of aeronautical features through time. Being able to efficiently encode and manage feature state changes, keeping track of all changes for auditing purposes and being able to determine the future state of an aeronautical feature as currently known to the system are vital for aeronautical applications. In order to support these requirements, the Aeronautical Information Exchange Model (AIXM) which has been developed by the aviation domain is based on the so called AIXM Temporality Model (AIXM-TM). The AIXM-TM defines various rules for modeling, representing and handling the state of aeronautical features through time. This is a promising approach that can be incorporated into the GFM so that ultimately the modeling and management of time varying feature data is supported in an interoperable and harmonized way in all geospatial domains. This presentation gives an introduction to the main concepts of the AIXM-TM. It also shows how the GFM can be extended to support time varying feature data. Finally, the relationship of O&M and time varying features is discussed.

  5. Blade pitch varying mechanism

    SciTech Connect

    Butler, L.

    1988-04-19

    A gas turbine engine is described comprising: (a) a stationary member; (b) first and second rotating structures coaxially disposed about the stationary member; (c) an annular gas flowpath coaxial with the first and second rotating structures; (d) first and second rotor blades attached to the first and second rotating structures; (e) forward and aft rows of variable pitch propulsor blades coupled to and disposed radially outwardly of the first and second rotating structures respectively; (f) a first gear coaxially coupled to one of the propulsor blades whereby angular displacement of the first gear about a radius of the rotating structure varies the pitch of the propulsor blade with respect to the rotating structure; (g) a second gear rotatably coupled to the first gear; (h) a third gear rigidly coupled to the second gear; (i) a fourth gear rigidly coupled to the rotating structure and rotatably coupled to the thrid gear, (j) means for eccentrically revolving the second gear and the third gear with respect to the first gear and the fourth gear, respectively, whereby the first gear is angularly displaced with respect to the fourth gear.

  6. Who stole my identity?

    PubMed

    Ferrara, Raymond C

    2003-01-01

    What you personally and as a manager should know about identity theft, its ramifications, and how to help your institution prevent potential thieves from stealing confidential information. PMID:12629794

  7. web identity application sectioneleven

    E-print Network

    Derisi, Joseph

    web identity application sectioneleven 99 contents elements of webpage design......................................................................... 100-101 web development and design considerations web banners is required for all official UCSF webpages. This banner includes a required link

  8. Story telling: crafting identities

    PubMed Central

    McMahon, Mary; Watson, Mark

    2013-01-01

    Career guidance clients are seeking to craft new identities that better position them in their careers. The focus of the present article is on narrative career counselling's potential contribution in providing a meaningful and useful experience for career guidance clients. To illustrate the potential of narrative career counselling, the story telling approach is offered as an example to illustrate how identity can be crafted in contextually and culturally sensitive ways. PMID:24009405

  9. Material and Consumer Identities

    Microsoft Academic Search

    Helga Dittmar

    \\u000a One increasingly powerful context in which individuals construct and express their identities is the material and consumer\\u000a culture we live in. Having the ‘right’ material goods has become vital to many, not so much because of these goods themselves,\\u000a but because of hoped-for psychological benefits, such as moving closer to an ideal identity, creating a desired social image,\\u000a and achieving

  10. Identity and Illness

    Microsoft Academic Search

    Kathryn J. Lively; Carrie L. Smith

    \\u000a Over the last several decades, sociological interest in and research on the relationship between illness and identity has\\u000a flourished. Unlike disease, which refers primarily to physical pathology, illness generally refers to lived experience (Kleinman\\u000a et al. 1978). The foci of this research have been two-fold: an examination of the public self (an individual’s identity as\\u000a perceived by others) and the

  11. Gender Identity Development

    Microsoft Academic Search

    Kay Bussey

    \\u000a Gender features strongly in most societies and is a significant aspect of self-definition for most people. Following a brief\\u000a description of views on gender identity from the perspectives of humanistic social science, sociology, and psychology, this\\u000a chapter provides an analysis of gender identity development from the perspective of social cognitive theory. Social cognitive\\u000a theory describes how gender conceptions are developed

  12. Exploring Medical Identity Theft

    Microsoft Academic Search

    Desla Mancilla; Jackie Moczygemba

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of

  13. PERSONAL IDENTITY VERIFICATION (PIV) OF

    E-print Network

    March 2005 PERSONAL IDENTITY VERIFICATION (PIV) OF FEDERAL EMPLOYEES AND CONTRACTORS: FEDERAL A new Federal Information Processing Standard (FIPS) for a government- wide personal identity enhance security, increase government efficiency, reduce identity fraud, and protect personal privacy

  14. IDENTITY THEFT PREVENTION Policy Statement

    E-print Network

    Shahriar, Selim

    1 IDENTITY THEFT PREVENTION Policy Statement This policy requires affected Northwestern University schools and departments to develop and implement Identity Theft Prevention Programs that include opportunities for identity theft; 2. Identify patterns, practices, and specific forms of activity that indicate

  15. IDENTITY THEFT PREVENTION Policy Statement

    E-print Network

    Shahriar, Selim

    IDENTITY THEFT PREVENTION Policy Statement This policy requires affected Northwestern University schools and departments to develop and implement Identity Theft Prevention Programs that include opportunities for identity theft; 2. Identify patterns, practices, and specific forms of activity that indicate

  16. The Non-Identity Problem

    E-print Network

    Urbanek, Valentina Maria

    2010-01-01

    Some actions are identity affecting, they affect who will exist in the future. Explaining how identity affecting actions can be wrong has been thought to pose a problem, the Non-Identity Problem. The problem is that an ...

  17. Dogs Discriminate Identical Twins

    PubMed Central

    Pinc, Ludvík; Bartoš, Lud?k; Reslová, Alice; Kotrba, Radim

    2011-01-01

    Earlier studies have shown variation among experimental attempts to establish whether human monozygotic twins that are genetically identical also have identical individual scents. In none of the cases were the dogs able to distinguish all the individual scents of monozygotic twins living in the same environment if the scents were presented to them separately. Ten specially trained police German Shepherd dogs of three Czech Republic Police Regional Headquarters were used for scent identification in our study. The dogs were supposed to match scents of two monozygotic pairs (5 and 7 years old) and two dizygotic twin pairs (8 and 13 years old). Scents were collected on cotton squares stored in glass jars. Dog handlers were blind to the experiment details. In each trial (line-up), one scent was used as a starting scent and the dog was then sent to determine if any of the 7 presented glass jars contained a matching scent. Scents of children of similar ages were used as distractors. In the matching procedure, the dogs matched correctly the scent of one twin with the other, as well as two scents collected from every single identical and non-identical twin to prove their efficacy and likewise, the presence of the matching twin scent in any given glass jar. All dogs in all trials distinguished correctly the scents of identical as well as non-identical twins. All dogs similarly matched positively two scents collected from the same individuals. Our findings indicated that specially trained German Shepherd dogs are able to distinguish individual scents of identical twins despite the fact that they live in the same environment, eat the same food and even if the scents are not presented to them simultaneously. PMID:21698282

  18. Identity Database 1. CyberCIEGE Identity Database

    E-print Network

    Identity Database 1. CyberCIEGE Identity Database CyberCIEGE is an information assurance (IA-motivated professionals. The Identity Database scenario requires players to protect an identity database that is used issues related to protecting a centralized database that is accessed by a variety of users. Security

  19. Diasporas, Migration & Identities

    NSDL National Science Digital Library

    Funded with substantial monies provided by the Arts and Humanities Research Council in the United Kingdom, the Diasporas, Migrations & Identities research programme is designed "to research, discuss and present issues related to diasporas and migration, and their past and present impact on subjectivity and identity, culture and the imagination, place and space, emotion, politics and sociality." While the programme is no longer actively funded, visitors can view the fruits of their academic labors on this site in the "Publications" area. Visitors to this section can view their annual reports and their working papers. Scholars and others can make their way through ten working papers, which include the titles "Here we go-but where? The possibilities of diaspora in the field of sport" and "London's Chinatown: Diaspora, Identity and Belonging". The site also contains a "Links" area, which contains a healthy selection of external links to other like-minded research institutes and centers.

  20. Identity Theft Resource Center

    NSDL National Science Digital Library

    These days, persons who find themselves the victim of an identity theft have a number of resources they can draw on to deal with their predicament. In 1997, things were quite different, and at that time Linda Foley found herself victimized by this crime. Several years later, Linda founded the Identity Theft Resource Center, and since then the Center has been commended for its work by the Department of Justice and Senator Dianne Feinstein. From the Center’s homepage, visitors can access victim information guides, learn about recent (and some “classic”) consumer scams. A great deal of this information is tailored specifically for different audiences, such as law enforcement and children. One area that may be particularly helpful is the “In the Workplace” section. Here, visitors can learn how to avoid identity theft in the workplace, and also browse through a list of prevention tips.

  1. Carleton University Visual Identity Toolkit

    E-print Network

    Carleton University

    IS A CONSISTENT VISUAL IDENTITY IMPORTANT? WHAT IS THE AIM OF OUR IDENTITY STANDARDS? SECTION 2 GUIDELINES and advertisements. This toolkit is designed to help familiarize you with our visual identity standards Identity Toolkit 1 2 3 #12;HOME QUIT SECTION 2 GUIDELINES SECTION 3 EXAMPLES SECTION 1 INTRODUCTION WHAT

  2. School Refuser Child Identities

    ERIC Educational Resources Information Center

    Stroobant, Emma; Jones, Alison

    2006-01-01

    "School refuser" is an always-already negative child identity. The term is used to categorize children or adolescents who appear to dislike and fear school (or aspects of school) and persistently refuse to attend or attend very unwillingly. Given that school attendance is generally considered a necessary social good, regular and anxious refusal to…

  3. Language, Identity, and Exile

    ERIC Educational Resources Information Center

    Erdinast-Vulcan, Daphna

    2010-01-01

    The exilic mode of being, a living on boundary-lines, produces a constant relativization of one's home, one's culture, one's language, and one's self, through the acknowledgement of otherness. It is a homesickness without nostalgia, without the desire to return to the same, to be identical to oneself. The encounter with the other which produces a…

  4. Dissociative Identity Disorder

    ERIC Educational Resources Information Center

    Schmidt, Tom

    2007-01-01

    Few psychological disorders in the Diagnostic Statistical Manual have generated as much controversy as Dissociative Identity Disorder (DID). For the past 35 years diagnoses of DID, previously referred to as Multiple Personality Disorder (MPD), have increased exponentially, causing various psychological researchers and clinicians to question the…

  5. Disincentives, Identities, and Smoking.

    ERIC Educational Resources Information Center

    Norman, Nancy M.

    When smoking decisions are understood in terms of the beliefs and attitudes which determine them, prevention programs can focus on changing these beliefs and attitudes. A study was conducted to measure students' attitudes and beliefs on the short-term health effects of smoking, on the social consequences of smoking, and on specific identities

  6. An Interesting Identity

    E-print Network

    Brett Pansano

    2015-03-13

    This purpose of this paper is to note an interesting identity derived from an integral in Gradshteyn and Ryzhik using techniques from George Boros'(deceased) Ph.D thesis. The idenity equates a sum to a product by evaluating an integral in two different ways. A more general form of the idenity is left for further investigation.

  7. The Symbolic Identity Technique.

    ERIC Educational Resources Information Center

    Goud, Nelson H.

    2001-01-01

    Explains the role of symbols in attaining total psychic growth by applying concepts of C. Jung, R. Assagiolo, and L. Kubie. Describes a new strategy, the symbolic identity technique, which involves environmental exploration in a relaxed, receptive manner in order to discover something in the outer environment that reflects one's inner nature.…

  8. Beyond Gender Identity?

    ERIC Educational Resources Information Center

    Rasmussen, Mary Lou

    2009-01-01

    This paper focuses on the continuing significance of gender identity as a category of analysis within the field of gender theory and research in education. I begin by considering contemporary discussions of the limitations of research relating to gender theory and research in education. Following on from this, I explore some contemporary…

  9. Gendered Avatar Identity

    ERIC Educational Resources Information Center

    Woolums, Viola

    2011-01-01

    Gendered appearance in "World of Warcraft" is of particular interest because it seems to infiltrate interactions between individuals without serving a functional purpose within the game itself. It provides an opportunity to look at avatar choice in environments that have a primary purpose aside from existing as an arena for creating identity, and…

  10. Defining Identity Theft

    Microsoft Academic Search

    Susan Sproule; Norm Archer

    2007-01-01

    The authors are involved in a program of research on identity theft in Canada. This paper describes an innovative process that was used to reach agreement on terminology to be used in the research program. Initially, there was little agreement on the use of the terms \\

  11. Women and Identity.

    ERIC Educational Resources Information Center

    Coleman, Ann; And Others

    An interdisciplinary course on women and identity for college-level women's studies instructors is presented. Materials for the course are taken from myth, psychology, sociology, feminism, art, and other disciplines. It is divided into seven units: sexuality, fertility, work and family, fear and envy, women's networks, individuality, and social…

  12. Yangians and Capelli identities

    Microsoft Academic Search

    Maxim Nazarov

    1996-01-01

    We study the image of the universal $R$-matrix for the Yangian $Y(gl_N)$ with respect to the evaluation homomorphism of $Y(gl_N)$ to the enveloping algebra $U(gl_N)$. We use the fusion procedure as defined by I. Cherednik. As a corollary we get a generalization of the classical Capelli identity.

  13. The Visual Identity Project

    ERIC Educational Resources Information Center

    Tennant-Gadd, Laurie; Sansone, Kristina Lamour

    2008-01-01

    Identity is the focus of the middle-school visual arts program at Cambridge Friends School (CFS) in Cambridge, Massachusetts. Sixth graders enter the middle school and design a personal logo as their first major project in the art studio. The logo becomes a way for students to introduce themselves to their teachers and to represent who they are…

  14. Story Telling: Crafting Identities

    ERIC Educational Resources Information Center

    McMahon, Mary; Watson, Mark

    2013-01-01

    Career guidance clients are seeking to craft new identities that better position them in their careers. The focus of the present article is on narrative career counselling's potential contribution in providing a meaningful and useful experience for career guidance clients. To illustrate the potential of narrative career counselling, the story…

  15. Varying \\

    Microsoft Academic Search

    Thomas Dent

    We review astrophysical, cosmological and terrestrial evidence for and against the con- stancy of fundamental parameters of particle physics, and discuss theoretical issues of unification and scalar-mediated forces, finding that the current rate of variation is bounded by limits on viola- tions of the weak equivalence principle. Introduction. The constancy of the parameters of particle physics (1), such as the

  16. Gender identity and adjustment in black, Hispanic, and white preadolescents.

    PubMed

    Corby, Brooke C; Hodges, Ernest V E; Perry, David G

    2007-01-01

    The generality of S. K. Egan and D. G. Perry's (2001) model of gender identity and adjustment was evaluated by examining associations between gender identity (felt gender typicality, felt gender contentedness, and felt pressure for gender conformity) and social adjustment in 863 White, Black, and Hispanic 5th graders (mean age = 11.1 years). Relations between gender identity and adjustment varied across ethnic/racial groups, indicating that S. K. Egan and D. G. Perry's model requires amendment. It is suggested that the implications of gender identity for adjustment depend on the particular meanings that a child attaches to gender (e.g., the specific attributes the child regards as desirable for each sex); these meanings may vary across and within ethnic/racial groups. Cross-ethnic/racial investigation can aid theory building by pointing to constructs that are neglected in research with a single ethnic/racial group but that are crucial components of basic developmental processes. PMID:17201524

  17. FROM IDENTITY THEORY TO COMMUNICATIONAL SEMIOPRAGMATICS.

    E-print Network

    Paris-Sud XI, Université de

    FROM IDENTITY THEORY TO COMMUNICATIONAL SEMIOPRAGMATICS. Multiple Identities in Interpersonal Communication Alex Frame University of Burgundy EA 4177 #12;From Identity Theory to Communicational Semiopragmatics: Multiple Identities in Interpersonal Communication Identities under Construction - Liège ­ 16th

  18. A Grasp of Identity

    E-print Network

    Pere Seglar; Enric Pérez

    2014-11-06

    We revisit the treatment of identical particles in quantum mechanics. Two kinds of solutions of Schr\\"{o}dinger equation are found and analyzed. First, the known symmetrized and antisymmetrized eigenfunctions. We examine how the very concept of particle is blurred whithin this approach. Second, we propose another kind of solution with no symmetries that we identify with Maxwell-Boltzmann statistics. In it, particles do preserve their individuality, as they are provided with individual energy and momenta. However, these properties cannot be univocally ascribed; moreover, particles do not possess distinctive positions. Finally, we explore how these results affect the calculation of canonical partition function, and we show that extensivity arises as a consequence of identity.

  19. Disclosing a dyslexic identity.

    PubMed

    Evans, William

    2015-04-01

    Potential difficulties experienced by nursing students diagnosed with dyslexia can be minimised with the introduction of appropriate policies and guidance around reasonable adjustment and support. In order to access all relevant services, however, a student must actively decide to disclose their dyslexic identity to relevant faculty personnel. Disclosure of such personal information is a complex matter and, critically, requires a receptive environment where diversity and disability are embraced in a positive and meaningful way. The act of disclosure for the most part has previously been described in simplistic terms, with the focus being solely on the behaviour itself and not on the individual's own positioning of their dyslexia or the social context associated with the act. There is an onus on all students with dyslexia to self-monitor how this aspect of their identity interacts with their professional duty of care. PMID:25849235

  20. Engineering Ethics and Identity: Emerging Initiatives in Comparative Perspective

    Microsoft Academic Search

    Gary Lee Downey; Juan C. Lucena; Carl Mitcham

    2007-01-01

    This article describes and accounts for variable interests in engineering ethics in France, Germany, and Japan by locating\\u000a recent initiatives in relation to the evolving identities of engineers. A key issue in ethics education for engineers concerns\\u000a the relationship between the identity of the engineer and the responsibilities of engineering work. This relationship has\\u000a varied significantly over time and from

  1. Employing identities in organizational ecology

    Microsoft Academic Search

    James N. Baron

    2004-01-01

    This paper argues for greater attention to employment-based organizational identities in ecological theory and research. I define and explore three dimensions of particular relevance to labor market identities: sharpness\\/resonance, focus and authenticity. The paper offers some speculations regarding: (i) when labor market identities are most decisive for organizations; (ii) how product market and labor market identities interact; (iii) how employment-based

  2. School COMSC Forensics, Trust & Identity

    E-print Network

    Martin, Ralph R.

    the student to make informed decisions related to the issues of trust and identity within information systems on the issues faced by multi-national organisations and their approach to Trust and Identity. UnderstandingSchool COMSC Forensics, Trust & Identity Every organization will eventually deal with cyber

  3. Citizenship, Diversity and National Identity

    ERIC Educational Resources Information Center

    Crick, Bernard

    2008-01-01

    This article explores the issues of citizenship, diversity and national identity in the context of the introduction of citizenship education in the UK. It considers the historical context of national identity in the UK and notes that the "British national identity has historically implied diversity". It also analyses the views of British national…

  4. Edinburgh Research Explorer Cultural Identity

    E-print Network

    Millar, Andrew J.

    Edinburgh Research Explorer Cultural Identity Citation for published version: Joseph, JE 2013, 'Cultural Identity'. in CA Chapelle (ed.), The Encyclopedia of Applied Linguistics. Blackwell Publishing Linguistics Publisher Rights Statement: © Joseph, J. E. (2013). Cultural Identity. In C. A. Chapelle (Ed

  5. Identity Development in Deaf Adolescents

    ERIC Educational Resources Information Center

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in seven deaf adolescents who attended a school for deaf children in the highest level of regular secondary education (age between 14 and 18 years), administering identity interviews every year. Identity development is conceptualized as the processes of exploration and commitment formation (Bosma,…

  6. ON THE QUINTUPLE PRODUCT IDENTITY

    Microsoft Academic Search

    HERSHEL M. FARKAS; IRWIN KRA

    In this note we present a new proof of the quintuple product iden- tity which is based on our study of kth order theta functions with character- istics and the identities they satisfy. In this context the quintuple product identity is another example of an identity which when phrased in terms of theta functions, rather than innite products and sums,

  7. Ego identity and maternal identification

    Microsoft Academic Search

    M. Howard Dignan

    1965-01-01

    The relationship between ego identity and maternal identification was studied within the framework of Erikson's psychosocial theory of ego development. Because maternal identification is an important childhood identification contributing to ego identity, it was hypothesized that it would be positively related to ego identity. This hypothesis was tested on 245 college women in late adolescence, and results showed that the

  8. Identity theft and your practice.

    PubMed

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft. PMID:21090197

  9. Social identity change: shifts in social identity during adolescence.

    PubMed

    Tanti, Chris; Stukas, Arthur A; Halloran, Michael J; Foddy, Margaret

    2011-06-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then measured the effect of the prime on self-stereotyping and ingroup favouritism. The findings showed significant differences in social identity across adolescent groups, in that social identity effects were relatively strong in early- and late-adolescents, particularly when peer group identity rather than gender identity was salient. While these effects were consistent with the experience of change in educational social context, differences in cognitive style were only weakly related to ingroup favouritism. The implications of the findings for theory and future research on social identity during adolescence are discussed. PMID:20547418

  10. Identical particles and entanglement

    E-print Network

    GianCarlo Ghirardi; Luca Marinatto

    2005-09-28

    We review two general criteria for deciding whether a pure bipartite quantum state describing a system of two identical particles is entangled or not. The first one considers the possibility of attributing a complete set of objective properties to each particle belonging to the composed system, while the second is based both on the consideration of the Slater-Schmidt number of the fermionic and bosonic analog of the Schmidt decomposition and on the evaluation of the von Neumann entropy of the one-particle reduced statistical operators.

  11. Identical particles and entanglement

    NASA Astrophysics Data System (ADS)

    Ghirardi, G. C.; Marinatto, L.

    2005-09-01

    We review two general criteria for deciding whether a pure bipartite quantum state describing a system of two identical particles is entangled or not. The first one considers the possibility of attributing a complete set of objective properties to each particle belonging to the composed system, while the second is based both on the consideration of the Slater-Schmidt number of the fermionic and bosonic analog of the Schmidt decomposition and on the evaluation of the von Neumann entropy of the one-particle reduced statistical operators.

  12. Online Identities and Social Networking

    NASA Astrophysics Data System (ADS)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  13. Guidelines for Use of CURA's Visual Identity

    E-print Network

    Levinson, David M.

    Guidelines for Use of CURA's Visual Identity Revised Junw 2011 #12;Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Elements of the Identity . . . . . . . . . . . . . . . . . . . . . 3 Use of the Identity . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Misuse

  14. Eudaimonic Identity Theory: Identity as Self-Discovery

    Microsoft Academic Search

    Alan S. Waterman

    \\u000a Work on eudaimonistic identity theory began in an effort to answer the question: How is an individual trying to answer identity-related\\u000a questions to know which of the many identity alternatives available is the “better” choice to make? Central to eudaimonistic\\u000a philosophy is the construct of the daimon or “true self,” those potentials of each individual that represent the best that

  15. Host Identity Protocol Proxy

    NASA Astrophysics Data System (ADS)

    Salmela, Patrik; Melén, Jan

    The Host Identity Protocol (HIP) is one of the more recent designs that challenge the current Internet architecture. The main features of HIP are security and the identifier-locator split, which solves the problem of overloading the IP address with two separate tasks. This paper studies the possibility of providing HIP services to legacy hosts via a HIP proxy. Making a host HIP enabled requires that the IP-stack of the host is updated to support HIP. From a network administrator's perspective this can be a large obstacle. However, by providing HIP from a centralized point, a HIP proxy, the transition to begin using HIP can be made smoother. This and other arguments for a HIP proxy will be presented in this paper along with an analysis of a prototype HIP proxy and its performance.

  16. Identity development in deaf adolescents.

    PubMed

    Kunnen, E Saskia

    2014-10-01

    We studied identity development during 5 years in seven deaf adolescents who attended a school for deaf children in the highest level of regular secondary education (age between 14 and 18 years), administering identity interviews every year. Identity development is conceptualized as the processes of exploration and commitment formation (Bosma, 1985). We started from the assumption that because deaf adolescents meet more challenges and also-in our sample-were stimulated in their identity development by school programs, they meet identity conflicts at a relatively early age. The findings were highly consistent with our hypotheses that-compared to a general sample-identity development proceeds faster than in a hearing group and that commitment formation in the domain "Being Deaf" starts earlier than in other domains. We did not find evidence for the hypothesis that commitment formation in this domain in the last year was more mature than in other domains due to a ceiling effect. PMID:24872376

  17. An Identity and Certificate Manager

    E-print Network

    Wu, Brian C

    2007-01-01

    We have designed and implemented a software library, called Identity and Certificate Manager (ICM), for managing, using, and exchanging application-level usernames, users' digital certificates, and cryptographic ...

  18. web identity standards introduction .............................................................................................................87

    E-print Network

    Mullins, Dyche

    web identity standards sectionten 86 contents introduction............................................................................................................... 89-90 tagline and the web .................................................................................................91 tagline and the web: improper use

  19. Notarized Federated Identity Management for Web Services

    E-print Network

    Ryder, Barbara G.

    for mitigating aspects of the identity theft problem and discuss its use in our notarized federated identity and notarization, SAML, identity theft, identity-based encryption 1 Introduction Digital identity management the door to identity theft, which poses a serious threat to personal finances This work was principally

  20. Narrating and Performing Identity: Literacy Specialists' Writing Identities

    ERIC Educational Resources Information Center

    McKinney, Marilyn; Giorgis, Cyndi

    2009-01-01

    In this study, we explored ways that four literacy specialists who worked in three schools that were part of one state's Reading Excellence Act (REA) grant constructed their identities as writers and as teachers of writing. We also explored how they negotiated the performance of those identities in different contexts over a two-year period.…

  1. High School Identity Climate and Student Identity Development

    ERIC Educational Resources Information Center

    Rich, Yisrael; Schachter, Elli P.

    2012-01-01

    This research investigated whether schools characterized by high school students as being rich in identity promoting features contribute to student identity development. A theoretical model posited that student perceptions of teachers as caring role models and their school as cultivating the whole student will foster student exploration and…

  2. Men as Victims: "Victim" Identities, Gay Identities, and Masculinities

    ERIC Educational Resources Information Center

    Dunn, Peter

    2012-01-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they…

  3. Teacher Educator Identity Emerging from Identity as a Person

    ERIC Educational Resources Information Center

    Murphy, M. Shaun; Pinnegar, Stefinee

    2011-01-01

    Experience is fundamental in identity development. In research, concepts and issues around identity are shaped and confronted in moments of reflection. The act of reflection requires a backward attention to engender a present understanding and create future possibilities. Kim and Greene, and Young and Erickson capture this temporal aspect of…

  4. Threading "Stitches" to Approach Gender Identity, Sexual Identity, and Difference

    ERIC Educational Resources Information Center

    North, Connie E.

    2010-01-01

    As LGBTQI (lesbian, gay, bisexual, transgender, queer/questioning, and intersex) issues become increasingly integrated into multicultural education discourses, we as educators need to examine the implications of our pedagogies for teaching about gender and sexual identities. This article explores my teaching of non-conforming gender identities in…

  5. Negotiating white Icelandic identity: multiculturalism and colonial identity formations

    Microsoft Academic Search

    Kristín Loftsdóttir

    2011-01-01

    Post-colonial scholars have emphasized the need to explore the ways in which colonial contact shaped both the colonized and colonizers; that is, how European identities were formulated in relation to imperial projects. Colonial Europe itself has to be deconstructed, looking at similarities and variability within different countries.This article explores the construction of ‘white’ Icelandic identity in historical and contemporary discourses.

  6. Sexual identity in the American Deep South: the concordance and discordance of sexual activity, relationships, and identities.

    PubMed

    Baunach, Dawn Michelle; Burgess, Elisabeth O

    2013-01-01

    This research explores the association between sexual identity and sexual behavior and how that association varies across gender and race in the American Deep South. Multinomial logistic regression analysis is used to determine the likelihood of each sexual identity given past sexual behavior, sexual relationships, and other social characteristics. The more traditional cultural climate of the South appears to suppress identification as a sexual minority. Sexual identification in the Deep South is primarily a product of sexual activity and sexual relationships, although attitudes toward and contact with the lesbian, gay, bisexual, and transgender (LGBT) community play a minor role. Although most participants' sexual behaviors and identities were in concordance, sexual discordance was highest for White women and lowest for White men. Discordance was also associated with traditional men's roles attitudes, negative homosexuality attitudes, and contact with the LGBT community. It is hoped that these results encourage scholarship that deconstructs the sexual behavior and identity of all groups, not just oppressed groups. PMID:23952925

  7. When Is Identity Congruent with the Self? A Self-Determination Theory Perspective

    Microsoft Academic Search

    Bart Soenens; Maarten Vansteenkiste

    \\u000a Within the identity literature, self and identity are often used as interchangeable terms. In contrast, in self-determination\\u000a theory (SDT; Ryan & Deci, 2003) both terms have a differentiated meaning and it is maintained that identities may vary in\\u000a the extent to which they are congruent with the basic growth tendencies of the self that are fueled by the basic psychological

  8. Including Identity in Clinical Practices

    ERIC Educational Resources Information Center

    Hagstrom, Fran

    2004-01-01

    This article adds qualitative analyses to established practices in speech-language pathology to demonstrate how clinicians can work with identity. Interview material is used to illustrate established analytical practices. This same material is again analyzed from the perspective of identity using the Functional Individual Systems (FIS) framework,…

  9. Palestinian Children Crafting National Identity

    ERIC Educational Resources Information Center

    Habashi, Janette

    2008-01-01

    This study examines the formulation of national identity in Palestinian children by exploring their understanding of its paradoxes. Twelve Palestinian children were interviewed from cities, villages and refugee camps in the West Bank. The children express the multiple dimensions of national identity in terms of "self" and "other"; however these…

  10. Language and Identity in Belarus

    Microsoft Academic Search

    N. Anthony Brown

    2005-01-01

    This research analyzes self-reported native language and mother tongue data from Belarusian university-age students and discusses the role of language in shaping individual and collective identity. Participants’ gender, language of questionnaire, and region of residence also serve as important variables in understanding identity formation in contemporary Belarus. Mother tongue and native language data analyzed in this article differ significantly, thus

  11. How geography shapes National Identities

    Microsoft Academic Search

    David H. Kaplan; Guntram H. Herb

    2011-01-01

    Geography is an intrinsic part of national identities, and the contributions to this journal have reflected this throughout its existence. In this essay, we discuss how geography has shaped National Identities in particular ways. Several of the journal's articles have examined how would-be nationalists form a geographical image of the prospective nation in order to make it real or how

  12. Social Identity in Puerto Rico

    Microsoft Academic Search

    H. Giles; N. Llado; D. J. McKirnan; D. M. Taylor

    1979-01-01

    This study examines the social identity of 384 high school students from four age levels (10, 12, 15 and 17 years-old) in Puerto Rico. This complex society represents an interesting context because of the potential relevance of a number of dimensions for identity including language, cultural heritage, economic status, religion and political beliefs. An important methodological refinement is introduced in

  13. Teacher Investment in Learner Identity

    ERIC Educational Resources Information Center

    Reeves, Jenelle

    2009-01-01

    From a sociocultural perspective, teacher identity is constructed in relation to others, including other teachers and students. Drawing on positioning theory and the concept of investment, this study analyzed the case of a secondary English teacher who negotiated his teacher identity in relation to English language learners (ELLs). Findings…

  14. Fibonacci Identities, Matrices, and Graphs

    ERIC Educational Resources Information Center

    Huang, Danrun

    2005-01-01

    General strategies used to help discover, prove, and generalize identities for Fibonacci numbers are described along with some properties about the determinants of square matrices. A matrix proof for identity (2) that has received immense attention from many branches of mathematics, like linear algebra, dynamical systems, graph theory and others…

  15. Fibonacci numbers and trigonometric identities

    Microsoft Academic Search

    N. Garnier; O. Ramare

    2006-01-01

    Webb & Parberry proved in 1969 a startling trigonometric iden- tity involving Fibonacci numbers. This identity has remained isolated up to now, despite the amount of work on related polynomials. We provide a wide generalization of this identity together with what we believe (and hope!) to be its proper understanding.

  16. Explanatory Identities and Conceptual Change

    ERIC Educational Resources Information Center

    Thagard, Paul

    2014-01-01

    Although mind-brain identity remains controversial, many other identities of ordinary things with scientific ones are well established. For example, air is a mixture of gases, water is H[subscript 2]O, and fire is rapid oxidation. This paper examines the history of 15 important identifications: air, blood, cloud, earth, electricity, fire, gold,…

  17. Collective Identity and Social Movements

    Microsoft Academic Search

    Francesca Polletta; James M. Jasper

    2001-01-01

    ? Abstract Sociologists have turned to collective identity to fill gaps in resource mobilization and political process accounts of the emergence, trajectories, and impacts of social movements.,Collective identity has been treated as an alternative to struc- turally given interests in accounting for the claims on behalf of which people mobilize, an alternative to selective incentives in understanding why people participate,

  18. The Power Politics of Identity

    Microsoft Academic Search

    JANICE BIALLY MATTERN

    2001-01-01

    International Relations scholars often treat international order as a byproduct of threats of military violence. Recent scholarship, however, has focused attention on security communities — nonviolent international orders that develop as a by-product of interstate collective identity. Yet it is unclear how these regimes could work during crises when collective identity is disrupted. This article argues that during such periods

  19. An Exploration of the Development of Academic Identity in a School of Education

    ERIC Educational Resources Information Center

    White, Elizabeth; Roberts, Amanda; Rees, Mary; Read, Mary

    2014-01-01

    This paper explores the complex processes involved in the self-construction of academic identity in a UK School of Education. Building on seminal literature in this field and drawing on the research of four academics, it begins by discussing teacher educators' varying perceptions of the need to re-configure their identity to meet the…

  20. Constructing identities of “difference” and “resistance”: the politics of being Muslim and British

    Microsoft Academic Search

    Mohammad Siddique Seddon

    2010-01-01

    A number of existing academic researches exploring experiences and attitudes amongst the UK's Muslim population have highlighted the varied forms of discrimination encountered as a ‘‘fact of life’’ of minorities in contemporary Britain. The combination of prejudice, discrimination and exclusion appears to have heightened emphatic self-definitions of religious identity, often ruling out any proximity to being British. An ‘‘identity of

  1. Relationship Duration Moderation of Identity Status Differences in Emerging Adults' Same-Sex Friendship Intimacy

    ERIC Educational Resources Information Center

    Johnson, H. Durell

    2012-01-01

    Previous research has not yielded consistent identity and intimacy associations for female and male emerging adults. Intimacy varies with time spent in a relationship, and relationship duration may explain variations in the identity process association with intimacy. Data from 278 female and 156 male emerging adults revealed relationship duration…

  2. Young African American children constructing identities in an urban integrated science-literacy classroom

    NASA Astrophysics Data System (ADS)

    Kane, Justine M.

    This is a qualitative study of identities constructed and enacted by four 3rd-grade African American children (two girls and two boys) in an urban classroom that engaged in a year-long, integrated science-literacy project. Juxtaposing narrative and discursive identity lenses, coupled with race and gender perspectives, I examined the ways in which the four children saw and performed themselves as students and as science students in their classroom. Interview data were used for the narrative analysis and classroom Discourse and artifacts were used for the discursive analysis. A constructivist grounded theory framework was adopted for both analyses. The findings highlight the diversity and richness of perspectives and forms of engagement these young children shared and enacted, and help us see African American children as knowers, doers, and talkers of science individually and collectively. In their stories about themselves, all the children identified themselves as smart but they associated with smartness different characteristics and practices depending on their strengths and preferences. Drawing on the children's social, cultural, and ethnolinguistic resources, the dialogic and multimodal learning spaces facilitated by their teacher allowed the children to explore, negotiate, question, and learn science ideas. The children in this study brought their understandings and ways of being into the "lived-in" spaces co-created with classmates and teacher and influenced how these spaces were created. At the same time, each child's ways of being and understandings were shaped by the words, actions, behaviors, and feelings of peers and teacher. Moreover, as these four children engaged with science-literacy activities, they came to see themselves as competent, creative, active participants in science learning. Although their stories of "studenting" seemed dominated by following rules and being well-behaved, their stories of "sciencing" were filled with exploration, ingenuity, risk taking, and thinking. The study calls for (a) research that is positioned within children's perspectives and give voice to the experiences of African American children in urban schools, (b) teacher education that supports teachers' efforts to help urban school students become academically successful, and (c) policy that foregrounds identity development along with subject-matter learning.

  3. Coming to an Asexual Identity: Negotiating Identity, Negotiating Desire

    PubMed Central

    Scherrer, Kristin S.

    2010-01-01

    Sexuality is generally considered an important aspect of self-hood. Therefore, individuals who do not experience sexual attraction, and embrace an asexual identity are in a unique position to inform the social construction of sexuality. This study explores the experiences of asexual individuals utilizing open ended Internet survey data from 102 self-identified asexual people. In this paper I describe several distinct aspects of asexual identities: the meanings of sexual, and therefore, asexual behaviors, essentialist characterizations of asexuality, and lastly, interest in romance as a distinct dimension of sexuality. These findings have implications not only for asexual identities, but also for the connections of asexuality with other marginalized sexualities. PMID:20593009

  4. Identity and Intimacy during Adolescence: Connections among Identity Styles, Romantic Attachment and Identity Commitment

    ERIC Educational Resources Information Center

    Kerpelman, Jennifer L.; Pittman, Joe F.; Cadely, Hans Saint-Eloi; Tuggle, Felicia J.; Harrell-Levy, Marinda K.; Adler-Baeder, Francesca M.

    2012-01-01

    Integration of adult attachment and psychosocial development theories suggests that adolescence is a time when capacities for romantic intimacy and identity formation are co-evolving. The current study addressed direct, indirect and moderated associations among identity and romantic attachment constructs with a diverse sample of 2178 middle…

  5. Identity verification by keystroke timing

    E-print Network

    Usnick, Mark C.

    1988-01-01

    an imposter [Brand and Makey 1985; Cole 1978; National Bureau of Standards 1977; Warfel 1984]. The identification of a valid user can be based on any of three things: 1) Something the user knows (eg. passwords) 2) Something the user has (eg. keys) 3... of a password is that it is a static identity verifier. The password is only used to verify an individual's identity at log-in time; from that point on the identity of the individual is never questioned. lf the user leaves the terminal, an imposter...

  6. Ward identities for Hall transport

    NASA Astrophysics Data System (ADS)

    Hoyos, Carlos; Kim, Bom Soo; Oz, Yaron

    2014-10-01

    We derive quantum field theory Ward identities based on linear area preserving and conformal transformations in 2+1 dimensions. The identities relate Hall viscosities, Hall conductivities and the angular momentum. They apply both for relativistic and non relativistic systems, at zero and at finite temperature. We consider systems with or without translation invariance, and introduce an external magnetic field and viscous drag terms. A special case of the identities yields the well known relation between the Hall conductivity and half the angular momentum density.

  7. Looking for Daisy: Constructing Teacher Identities

    ERIC Educational Resources Information Center

    Ritchie, Stephen M.

    2009-01-01

    Research on teacher identities is both important and increasing. In this forum contribution I re-interpret assertions about an African American science teacher's identities in terms of Jonathon Turner's ("2002") constructs of role identity and sub-identity. I contest the notion of renegotiation of identities, suggesting that particular role…

  8. Oregon University System Identity Theft Prevention Program

    E-print Network

    Caughman, John

    Oregon University System Identity Theft Prevention Program Effective May 1, 2009 #12;OUS Identity this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's ("FTC") Red Flags an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection

  9. The Logical Problem of Identity

    E-print Network

    Coleman, Keith

    2008-07-31

    Abstract Keith A. Coleman Department of Philosophy, February 2008 University of Kansas A traditional problem concerning the meaning or logical content of statements of identity received its modern formulation in Gottlob Frege's "On Sense...

  10. Aspartate identity of transfer RNAs

    Microsoft Academic Search

    R Giegé; C Florentz; D Kern; J Gangloff; G Eriani; D Moras

    1996-01-01

    Structure\\/function relationships accounting for specific tRNA charging by class II aspartyl-tRNA synthetases from Saccharomyces cerevisiae, Escherichia coli and Thermus thermophilus are reviewed. Effects directly linked to tRNA features are emphasized and aspects about synthetase contribution in expression of tRNAAsp identity are also covered. Major identity nucleotides conferring aspartate specificity to yeast, E coli and T thermophilus tRNAs comprise G34, U35,

  11. Explanatory Identities and Conceptual Change

    NASA Astrophysics Data System (ADS)

    Thagard, Paul

    2014-07-01

    Although mind-brain identity remains controversial, many other identities of ordinary things with scientific ones are well established. For example, air is a mixture of gases, water is H2O, and fire is rapid oxidation. This paper examines the history of 15 important identifications: air, blood, cloud, earth, electricity, fire, gold, heat, light, lightning, magnetism, salt, star, thunder, and water. This examination yields surprising conclusions about the nature of justification, explanation, and conceptual change.

  12. Fibonacci Identities and Graph Colorings

    E-print Network

    Christopher J. Hillar; Troels Windfeldt

    2008-07-08

    We generalize both the Fibonacci and Lucas numbers to the context of graph colorings, and prove some identities involving these numbers. As a corollary we obtain new proofs of some known identities involving Fibonacci numbers such as \\[F_{r+s+t} = F_{r+1}F_{s+1}F_{t+1} + F_r F_s F_t - F_{r-1}F_{s-1}F_{t-1}.\\

  13. RECOMMENDATIONS FOR ESTABLISHING AN IDENTITY ECOSYSTEM GOVERNANCE

    E-print Network

    Perkins, Richard A.

    RECOMMENDATIONS FOR ESTABLISHING AN IDENTITY ECOSYSTEM GOVERNANCE STRUCTURE THE DEPARTMENT an Identity Ecosystem Governance Structure This page is intentionally left blank. #12;Recommendations for Establishing an Identity Ecosystem Governance Structure Foreword The Internet is one of the most

  14. Looking for Daisy: constructing teacher identities

    NASA Astrophysics Data System (ADS)

    Ritchie, Stephen M.

    2009-09-01

    Research on teacher identities is both important and increasing. In this forum contribution I re-interpret assertions about an African American science teacher's identities in terms of Jonathon Turner's (2002) constructs of role identity and sub-identity. I contest the notion of renegotiation of identities, suggesting that particular role identities can be brought to the foreground and then backgrounded depending on the situation and the need to confirm a sub-identity. Finally, I recommend the inclusion of teachers' voices in identity research through greater use of co-authoring roles for teachers.

  15. Gait phase varies over velocities.

    PubMed

    Liu, Yancheng; Lu, Kun; Yan, Songhua; Sun, Ming; Lester, D Kevin; Zhang, Kuan

    2014-02-01

    We sought to characterize the percent (PT) of the phases of a gait cycle (GC) as velocity changes to establish norms for pathological gait characteristics with higher resolution technology. Ninety five healthy subjects (49 males and 46 females with age 34.9 ± 11.8 yrs, body weight 64.0 ± 11.7 kg and BMI 23.5 ± 3.6) were enrolled and walked comfortably on a 10-m walkway at self-selected slower, normal, and faster velocities. Walking was recorded with a high speed camera (250 frames per second) and the eight phases of a GC were determined by examination of individual frames for each subject. The correlation coefficients between the mean PT of the phases of the three velocities gaits and PT defined by previous publications were all greater than 0.99. The correlation coefficient between velocity and PT of gait phases is -0.83 for loading response (LR), -0.75 for mid stance (MSt), and -0.84 for pre-swing (PSw). While the PT of the phases of three velocities from this study are highly correlated with PT described by Dr. Jacquenlin Perry decades ago, actual PT of each phase varied amongst these individuals with the largest coefficient variation of 24.31% for IC with slower velocity. From slower to faster walk, the mean PT of MSt diminished from 35.30% to 25.33%. High resolution recording revealed ambiguity of some gait phase definitions, and these data may benefit GC characterization of normal and pathological gait in clinical practice. The study results indicate that one should consider individual variations and walking velocity when evaluating gaits of subjects using standard gait phase classification. PMID:24192276

  16. Can Salience of Gender Identity Impair Math Performance among 7-8 Years Old Girls? The Moderating Role of Task Difficulty

    ERIC Educational Resources Information Center

    Neuville, Emmanuelle; Croizet, Jean-Claude

    2007-01-01

    Can the salience of gender identity affect the math performance of 7-8 year old girls? Third-grade girls and boys were required to solve arithmetical problems of varied difficulty. Prior to the test, one half of the participants had their gender identity activated. Results showed that activation of gender identity affected girls' performance but…

  17. Social Trust of Virtual Identities

    NASA Astrophysics Data System (ADS)

    Seigneur, Jean-Marc

    Most other chapters of this book discuss computational models of trust in broader terms, giving definitions of trust, explaining how trust should evolve over time, surveying the different facets of trust .On the other hand, this chapter has a clear focus on the important element of identity in computational trust mechanisms. Trust and reputation are easier to form in face-to-face situations than in situations involving the use of computers and networks because the identity of the trustee is more difficult to verify. In this chapter, the different means to recognise virtual identities are surveyed. Next, their integration into computational trust engines is discussed, especially according to four main requirements: Adaptability, Security, Usability and Privacy (ASUP).

  18. Voice identity discrimination in schizophrenia.

    PubMed

    Chhabra, Saruchi; Badcock, Johanna C; Maybery, Murray T; Leung, Doris

    2012-10-01

    Voices provide a wealth of socially-relevant information, including cues to a speaker's identity and emotion. Deficits recognising emotion from voice have been extensively described in schizophrenia, and linked specifically to auditory hallucinations (AH), but relatively little attention has been given to examining the ability to analyse speaker identity. Hence, the current study assessed the ability to discriminate between different speakers in people with schizophrenia (including 33 with and 32 without AH) compared to 32 healthy controls. Participants rated the degree of perceived identity similarity of pairs of unfamiliar voices pronouncing three-syllable words. Multidimensional scaling of the dissimilarity matrices was performed and the resulting dimensions were interpreted, a posteriori, via correlations with acoustic measures relevant to voice identity. A two-dimensional perceptual space was found to be appropriate for both schizophrenia patients and controls, with axes corresponding to the average fundamental frequency (F0) and formant dispersion (D(f)). Patients with schizophrenia did not differ from healthy controls in their reliance on F0 in differentiating voices, suggesting that the ability to use pitch-based cues for discriminating voice identity may be relatively preserved in schizophrenia. On the other hand, patients (both with and without AH) made less use of D(f) in discriminating voices compared to healthy controls. This distorted pattern of responses suggests some potentially important differences in voice identity processing in schizophrenia. Formant dispersion has been linked to perceptions of dominance, masculinity, size and age in healthy individuals. These findings open some interesting new directions for future research. PMID:22910275

  19. Integrating Identities: Ethnic and Academic Identities among Diverse College Students

    ERIC Educational Resources Information Center

    Walker, Lovey H. M.; Syed, Moin

    2013-01-01

    Background/Context: Students of Color continue to be underrepresented at the undergraduate level. Recent research has demonstrated the importance of non-academic psychosocial factors for understanding college experiences. One factor, identity, is a broad, multidimensional construct that comprises numerous distinct domains, including political,…

  20. Consumer identity theft prevention and identity fraud detection behaviours

    Microsoft Academic Search

    Norm Archer

    2012-01-01

    Purpose – The purpose of this paper is to investigate consumer behaviour as it relates to identity theft and fraud. Design\\/methodology\\/approach – Using survey data, this paper models the relationship between past experience of consumers and their levels of concern, and derives the principal components that make up consumer behaviours. Findings – The components are physical prevention measures, account monitoring,

  1. "Doing Identity" in the Botswana Classroom: Negotiating Gendered Institutional Identities

    ERIC Educational Resources Information Center

    Humphreys, Sara

    2013-01-01

    Drawing on post-structural and post-colonial conceptions of gender, this paper explores multiple student masculinities and femininities in the classrooms of four junior secondary schools in Botswana. These gendered identities, it is argued, are negotiated within broader institutional constraints that have been socio-historically produced. Such…

  2. Resonance in an exemplar-based lexicon: The emergence of social identity and phonology

    Microsoft Academic Search

    Keith Johnson

    2006-01-01

    Two sets of data are discussed in terms of an exemplar-resonance model of the lexicon. First, a cross-linguistic review of vowel formant measurements indicate that phonetic differences between male and female talkers are a function of language, dissociated to a certain extent from vocal tract length. Second, an auditory word recognition study [Strand (2000). Gender Stereotype Effects in Speech Processing.

  3. Absorption properties of identical atoms

    SciTech Connect

    Sancho, Pedro, E-mail: psanchos@aemet.es

    2013-09-15

    Emission rates and other optical properties of multi-particle systems in collective and entangled states differ from those in product ones. We show the existence of similar effects in the absorption probabilities for (anti)symmetrized states of two identical atoms. The effects strongly depend on the overlapping between the atoms and differ for bosons and fermions. We propose a viable experimental verification of these ideas. -- Highlights: •The absorption rates of a pair of identical atoms in product and (anti)symmetrized states are different. •The modifications of the optical properties are essentially determined by the overlapping between the atoms. •The absorption properties differ, in some cases, for bosons and fermions.

  4. RFID identity theft and countermeasures

    NASA Astrophysics Data System (ADS)

    Herrigel, Alexander; Zhao, Jian

    2006-02-01

    This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.

  5. Changes in Identity after Aphasic Stroke: Implications for Primary Care

    PubMed Central

    Gilbert, Thomas; Bokhour, Barbara G.

    2015-01-01

    Background. Stroke survivors with aphasia experience difficulty associated with their communication disorder. While much has been written about aphasia's impacts on partners/family, we lack data regarding the psychosocial adjustment of aphasic stroke survivors, with a paucity of data from the patients themselves. Methods. Qualitative study of lived experiences of individuals with poststroke aphasia. Each of the stroke survivors with aphasia completed 3-4 semistructured interviews. In most cases, patients' partners jointly participated in interviews, which were transcribed and analyzed using techniques derived from grounded theory. Results. 12 patients were interviewed, with the total of 45 interviews over 18 months. Themes included poststroke changes in patients' relationships and identities, which were altered across several domains including occupational identity, relationship and family roles, and social identity. While all these domains were impacted by aphasia, the impact varied over time. Conclusion. Despite the challenges of interviewing individuals with aphasia, we explored aphasia's impacts on how individuals experience their identity and develop new identities months and years after stroke. This data has important implications for primary care of patients with aphasia, including the importance of the long-term primary care relationship in supporting psychosocial adjustment to life after aphasic stroke. PMID:25685553

  6. American Identity in the USA: Youth Perspectives

    Microsoft Academic Search

    Parissa Jahromi

    2011-01-01

    National identity, how one sees oneself as a member of a given nation, is an important form of social identity. Feelings toward one's country are a matter of both individual and collective concern. In an increasingly diverse world, the issue of identifying with a nation is complex and consequential for individual identity formation as well as collective political identity. How

  7. A Dialogical Approach to Conceptualizing Teacher Identity

    ERIC Educational Resources Information Center

    Akkerman, Sanne F.; Meijer, Paulien C.

    2011-01-01

    In recent attempts to address the notion of teacher identity, scholars have stressed how identity is dynamically evolving, intrinsically related to others, and consists of multiple identities. Though these postmodern characterizations represent radically new perceptions of identity, they are not extensively discussed in relation to previous…

  8. Teacher Identity Work in Mathematics Teacher Education

    ERIC Educational Resources Information Center

    Neumayer-Depiper, Jill

    2013-01-01

    Becoming a teacher is not developing an identity, but is developing identity as a continuous process of constructing and deconstructing understandings within the complexities of social practice, beliefs, experiences, and social norms. I take up this stance on identity as articulated in Judith Butler's (1999) work with gender identity and…

  9. Federated Identity Management David W Chadwick

    E-print Network

    Kent, University of

    Federated Identity Management David W Chadwick Computing Laboratory, University of Kent, Canterbury, CT2 7NF, UK d.w.chadwick@kent.ac.uk Abstract. This paper addresses the topic of federated identity management. It discusses in detail the following topics: what is digital identity, what is identity

  10. Effect of varying light intensity on blood physiological reactions of broiler chickens grown to heavy weights

    Technology Transfer Automated Retrieval System (TEKTRAN)

    This study investigated effects of varying levels of light intensities (25, 10, 5, 2.5, and 0.2 lx) from 22 to 56 d of age at 50% RH on blood acid-base balance, metabolites, and electrolytes of heavy broilers reared under environmentally controlled conditions. Four identical trials were conducted wi...

  11. Effect of varying light intensity on welfare indices of broiler chickens grown to heavy weights

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The effects of varying light-intensity on ocular, immue, fear, and leg health of broiler chickens grown to heavy weights under environmentally controlled conditions were evaluated. Four identical trials were conducted with two replications per trial. In each trial, 600 Ross 308 chicks were randomly ...

  12. System Identification: Time Varying and Nonlinear Methods

    E-print Network

    Majji, Manoranjan

    2010-07-14

    to develop first few time step models is detailed, providing a unified solution to the time varying identification problem. The practical problem of identifying the time varying generalized Markov parameters required for TVERA is presented as the next result...

  13. Identities for the Fibonacci Powers

    ERIC Educational Resources Information Center

    Chen, Alex; Chen, Hongwei

    2008-01-01

    Based on the generating functions, for any positive integers "n" and "k", identities are established and the explicit formula for a[subscript i](k) in terms of Fibonomial coefficients are presented. The corresponding results are extended to some other famous sequences including Lucas and Pell sequences.

  14. [Identity and narration: autobiographical quests].

    PubMed

    Arfuch, Leonor

    2013-01-01

    This paper aims to tackle the subtle relation between autobiographical narratives and identity construction, from a non essentialist conception of identity. In a perspective that articulates philosophy of language, psychoanalysis, semiotics and literary critique, we posit the concept of biographical space as an analytical instrument to make a critical update of the reconfiguration of identities and subjectivities in contemporary culture, marked by the predominance of the biographical, the private and a kind of "public intimacy". This look is more symptomatic than descriptive: it intends to account for the rise of auto/biographical narratives and life-stories, from canonic genres to their multiple derivations in the media, social networks and the most diverse artistic practices, a phenomenon that seems to reaffirm the notion of narrative identities by Ricoeur. Our analysis here, from an ethic, aesthetic and political point of view, will focus on two visual arts experiences that have recently taken place for the first time in Buenos Aires: Christian Boltanski's and Tracey Emin's, solo exhibitions, each of them with a different biographical approach. PMID:24251298

  15. ICAR: Identity Card Automatic Reader

    Microsoft Academic Search

    Josep Lladós; Felipe Lumbreras; Vicente Chapaprieta; Joan Queralt

    2001-01-01

    This paper describes the ICAR system, an application for automatic reading of identity cards and passports. The system acquires the image of the document by a flatbed scanner and recognizes the type of the document among a set of predefined models using color information. Textual fields are located in the image by a connected component analysis and identified in terms

  16. Feminist Identity among Latina Adolescents

    ERIC Educational Resources Information Center

    Manago, Adriana M.; Brown, Christia Spears; Leaper, Campbell

    2009-01-01

    This study explores developing conceptions of feminism among Latina adolescents, their prevalence of feminist endorsement, and whether home environment and well-being are related to feminist identity. One hundred and forty Latina girls (Grades 9 to 12, M age = 15) wrote personal narratives of their understanding of feminism and whether they…

  17. Cultural Identity in Tibetan Diasporas

    Microsoft Academic Search

    Howard Giles; Tenzin Dorjee

    2005-01-01

    Tibetan civilisation is over two millenniums old and, today, its struggles in diaspora open up a new chapter in Tibetan history. Diasporic Tibetans (e.g. in India and the USA) have made tremendous efforts over the last few decades to maintain their way of life. We focus on cultural identity in the Tibetan diasporas, with special attention focused on its historical

  18. Tracing the Identity of Objects

    Microsoft Academic Search

    Lance J. Rips; Sergey Blok; George Newman

    2006-01-01

    This article considers how people judge the identity of objects (e.g., how people decide that a description of an object at one time, t0, belongs to the same object as a description of it at another time, t1). The authors propose a causal continuer model for these judgments, based on an earlier theory by Nozick (1981). According to this model,

  19. Brand: Identity, Image, and Relationships

    ERIC Educational Resources Information Center

    Danker, Stephanie Harvey

    2014-01-01

    Adolescents face complex dilemmas such as challenging issues of identity and self-concept, and struggles with building and maintaining relationships. These issues must be embraced in the art classroom. This Instructional Resource will focus on the concept of brand--connecting visual art, marketing, and psychology--and center on ideas found in the…

  20. 6 Keys to Identity Management

    ERIC Educational Resources Information Center

    Shoham, Idan

    2011-01-01

    An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…

  1. Cultural Identity in Tibetan Diasporas

    ERIC Educational Resources Information Center

    Giles, Howard; Dorjee, Tenzin

    2005-01-01

    Tibetan civilisation is over two millenniums old and, today, its struggles in diaspora open up a new chapter in Tibetan history. Diasporic Tibetans (e.g. in India and the USA) have made tremendous efforts over the last few decades to maintain their way of life. We focus on cultural identity in the Tibetan diasporas, with special attention focused…

  2. Zero knowledge proofs of identity

    Microsoft Academic Search

    U. Fiege; Amos Fiat; Adi Shamir

    1987-01-01

    In this paper we extend the notion of zero knowledge proofs of membership (which reveal one bit of information) to zero knowledge proofs of knowledge (which reveal no information whatsoever). After formally defining this notion, we show its relevance to identification schemes, in which parties prove their identity by demonstrating their knowledge rather than by proving the validity of assertions.

  3. Extracting entanglement from identical particles

    E-print Network

    N. Killoran; M. Cramer; M. B. Plenio

    2014-04-22

    Identical particles and entanglement are both fundamental components of quantum mechanics. However, when identical particles are condensed in a single spatial mode, the standard notions of entanglement, based on clearly identifiable subsystems, break down. This has led many to conclude that such systems have limited value for quantum information tasks, compared to distinguishable particle systems. To the contrary, we show that any entanglement formally appearing amongst the identical particles, including entanglement due purely to symmetrization, can be extracted into an entangled state of independent modes, which can then be applied to any task. In fact, the entanglement of the mode system is in one-to-one correspondence with the entanglement between the inaccessible identical particles. This settles the long-standing debate about the resource capabilities of such states, in particular spin-squeezed states of Bose-Einstein condensates, while also revealing a new perspective on how and when entanglement is generated in passive optical networks. Our results thus reveal new fundamental connections between entanglement, squeezing, and indistinguishability.

  4. Politics, Policy and Professional Identity

    ERIC Educational Resources Information Center

    Bodman, Sue; Taylor, Susan; Morris, Helen

    2012-01-01

    Standards-based reform of education is a dominant political discourse in many nations. In this paper we argue that the type of standards-based reform that is enacted has important implications for teacher agency and teacher professional development. Teacher professional development and identity is explored through theories of the teacher's role in…

  5. PHISHING, PHARMING AND IDENTITY THEFT

    Microsoft Academic Search

    Richard G. Brody

    2007-01-01

    Identity theft is the fastest growing crime in America, occurring when the criminal obtains confidential information from an individual or business and uses it to access private financial accounts. In today's world of information technology, many thieves prey on their victims via the Internet. The level of disclosure of personal information in many of today's information age transactions is what

  6. Data breaches and identity theft

    Microsoft Academic Search

    William Roberds; Stacey L. Schreft

    2009-01-01

    An environment is analyzed in which agents join clubs (payment networks) in order to facilitate trade. The networks compile personal identifying data (PID) so as to match transactors to transactions histories. Technological limitations cause the networks’ data management practices to impact each other's incidence and costs of identity theft. Too much data collection and too little security arise in equilibrium

  7. Developing Designer Identity through Reflection

    ERIC Educational Resources Information Center

    Tracey, Monica W.; Hutchinson, Alisa

    2013-01-01

    As designers utilize design thinking while moving through a design space between problem and solution, they must rely on design intelligence, precedents, and intuition in order to arrive at meaningful and inventive outcomes. Thus, instructional designers must constantly re-conceptualize their own identities and what it means to be a designer.…

  8. Trig Integrals without Trig Identities

    ERIC Educational Resources Information Center

    Sprows, David J.

    2008-01-01

    The standard approach to finding antiderivatives of trigonometric expressions such as sin(ax) cos(bx) is to make use of certain trigonometric identities. The disadvantage of this technique is that it gives no insight into the problem, but relies on students using a memorized formula. This note considers a technique for finding antiderivatives of…

  9. The Ontogeny of Face Identity

    ERIC Educational Resources Information Center

    Blass, Elliott M.; Camp, Carole Ann

    2004-01-01

    A paradigm was designed to study how infants identify live faces. Eight- to 21-week-old infants were seated comfortably and were presented an adult female, dressed in a white laboratory coat and a white turtle neck sweater, until habituation ensued. The adult then left the room. One minute later either she or an identically garbed confederate…

  10. Changing Identities in Information Societies

    Microsoft Academic Search

    Leif Bloch Rasmussen; Rocío Rueda Ortiz

    This paper is a search for identities in the past, the pr esent and the future. Using a systems thinking approach of ontological, pra gmatic and phenomenological\\/experimental approaches the possible identit y of cyborgs, its potentials and consequences of adopting are discussed. Le ssons learned from Kindergarten are contrasted with lessons learned from a systems thinker in order to find

  11. Building a Common Identity Common identity is an important tool in ensuring appropriate access to corporate

    E-print Network

    Chaudhuri, Surajit

    Building a Common Identity Common identity is an important tool in ensuring appropriate access to corporate information. Without an efficient method of establishing and maintaining a common identity across. Forefront Identity Manager (FIM) 2010 R2 helps you resolve these issues by providing self-service identity

  12. Identity

    ERIC Educational Resources Information Center

    Ransom, Liz

    2012-01-01

    The National Association of Hispanic Journalists tracks the presence of Latinos in the news. It reports that news stories in which Latinos are the subject most often concern immigration, poverty and crime. And Hollywood does no better in reflecting the broad reality of Latino life. Latino characters are often portrayed as poor and uneducated. In…

  13. Two monozygotic (identical) twin pairs discordant for gender identity

    Microsoft Academic Search

    Richard Green; Robert J. Stoller

    1971-01-01

    Two pairs of monozygotic twins discordant for gender identity are described. The first set are 8-year-old males, one of whom enjoys doll play, cross-dressing, and taking the role of a female in fantasy games. His brother shows no feminine behavior, enjoys sports, and is more masculine in gestures and speech. The second set are 24-year-old females, one of whom wants

  14. The Relations among Feminist Identity Development, Gender-Role Orientation, and Psychological Well-Being in Women

    ERIC Educational Resources Information Center

    Saunders, Kendra J.; Kashubeck-West, Susan

    2006-01-01

    This study examined relations between feminist identity development, gender-role orientation, and psychological well-being in 244 women of varying ages and backgrounds. As hypothesized, both feminist identity development and gender-role orientation contributed independently to the explanation of variance in psychological well-being.…

  15. Hungarian Youth in Transylvania Discuss Hybrid Notions of Civic Identity: Making the Case for Cultural Preservation and Multilingualism

    ERIC Educational Resources Information Center

    Obenchain, Kathryn M.; Alarcón, Jeannette; Ives, Bob; Bellows, Elizabeth; Alama, Madalina

    2014-01-01

    This study aims to understand ways in which Hungarian high school students describe and articulate their civic identity, as members of varied civic communities. We conducted our study in Romania, an emerging democracy with an Hungarian national minority, as it provides a unique opportunity to examine the development of a democratic civic identity

  16. Crossing New Uncharted Territory: Shifts in Academic Identity as a Result of Modifying Teaching Practice in Undergraduate Mathematics

    ERIC Educational Resources Information Center

    Kensington-Miller, Barbara; Sneddon, Jamie; Stewart, Sepideh

    2014-01-01

    The changes in academic identity a teacher may undergo, as they modify their teaching practice, will vary depending on their experiences and the support they receive. In this paper, we describe the shifts in academic identity of two lecturers, a mathematician and a mathematics educator, as they both made changes to their teaching practice by…

  17. Efficient Encoding and Rendering of Time-Varying Volume Data

    NASA Technical Reports Server (NTRS)

    Ma, Kwan-Liu; Smith, Diann; Shih, Ming-Yun; Shen, Han-Wei

    1998-01-01

    Visualization of time-varying volumetric data sets, which may be obtained from numerical simulations or sensing instruments, provides scientists insights into the detailed dynamics of the phenomenon under study. This paper describes a coherent solution based on quantization, coupled with octree and difference encoding for visualizing time-varying volumetric data. Quantization is used to attain voxel-level compression and may have a significant influence on the performance of the subsequent encoding and visualization steps. Octree encoding is used for spatial domain compression, and difference encoding for temporal domain compression. In essence, neighboring voxels may be fused into macro voxels if they have similar values, and subtrees at consecutive time steps may be merged if they are identical. The software rendering process is tailored according to the tree structures and the volume visualization process. With the tree representation, selective rendering may be performed very efficiently. Additionally, the I/O costs are reduced. With these combined savings, a higher level of user interactivity is achieved. We have studied a variety of time-varying volume datasets, performed encoding based on data statistics, and optimized the rendering calculations wherever possible. Preliminary tests on workstations have shown in many cases tremendous reduction by as high as 90% in both storage space and inter-frame delay.

  18. The induction of shared identity: the positive role of individual distinctiveness for groups.

    PubMed

    Jans, Lise; Postmes, Tom; Van der Zee, Karen I

    2011-08-01

    This article examines inductive processes of social identity formation, the bottom-up processes by which individual group members influence a social identity, integrating it with work on entitativity. Three studies tested the prediction that feelings of individual distinctiveness mediate the relation between inductive social identity formation and entitativity and that entitativity in turn predicts identification. The studies provided consistent support for this theoretical model over alternative models, using a range of different social groups and methods. Study 1 found support for the model in self-selected small groups. Study 2 supported it with a much broader set of groups that were not self-selected. Finally, Study 3 varied levels of inductive social identity formation systematically by varying group size and provided direct support for the hypothesized causal relations. PMID:21525328

  19. The Venn of Identity: Options and Issues in Federated Identity Management

    Microsoft Academic Search

    Eve Maler; Drummond Reed

    2008-01-01

    Federated identity management lets users dynamically distribute identity information across security domains, increasing the portability of their digital identities. It also raises new architectural challenges and significant security and privacy issues.

  20. Preventing Identity Theft with Electronic Identity Cards and the Trusted Platform Module

    E-print Network

    Carle, Georg

    Preventing Identity Theft with Electronic Identity Cards and the Trusted Platform Module Andreas Eunicke Steria Mummert Consulting Healthcare / Public Services Hamburg, Germany christoph, Electronic ID, Identity System 1. INTRODUCTION In our modern world, web-based services got omnipresent

  1. The concept of identity: research and theory.

    PubMed

    Newman, B M; Newman, P R

    1978-01-01

    The concept of identity is one of the few themes of psychosocial theory that has been researched directly. The dichotomy between identity achievement and role diffusion can be more accurately understood as two potential statuses among a number of resolutions to the identity crisis. Identity status appears to be related to significant childrearing experiences, particularly to dimensions of warmth, limit setting, values of autonomy, and achievement orientation. The pattern of identity achievement is different for males and females. Successful achievement of identity reflects different parental child-rearing practices for males and females. PMID:352102

  2. Schmidt balls around the identity

    E-print Network

    Lieven Clarisse

    2005-12-01

    Robustness measures as introduced by Vidal and Tarrach [PRA, 59, 141-155] quantify the extent to which entangled states remain entangled under mixing. Analogously, we introduce here the Schmidt robustness and the random Schmidt robustness. The latter notion is closely related to the construction of Schmidt balls around the identity. We analyse the situation for pure states and provide non-trivial upper and lower bounds. Upper bounds to the random Schmidt-2 robustness allow us to construct a particularly simple distillability criterion. We present two conjectures, the first one is related to the radius of inner balls around the identity in the convex set of Schmidt number n-states. We also conjecture a class of optimal Schmidt witnesses for pure states.

  3. Absorption properties of identical atoms

    E-print Network

    Pedro Sancho

    2013-07-31

    Emission rates and other optical properties of multiparticle systems in collective and entangled states differ from those in product ones. We show the existence of similar effects in the absorption probabilities for (anti)symmetrized states of two identical atoms. The effects strongly depend on the overlapping between the atoms and differ for bosons and fermions. We propose a viable experimental verification of these ideas.

  4. Bringing Identity Theory into Leisure

    E-print Network

    Jun, Jinhee

    2010-01-14

    , 1988; Shamir, 1988, 1993). People?s commitment to a leisure identity drives engagement in specific leisure behaviors. According to Haggard and Williams (1992), knowledge of the self and desire for expressing the true (or ideal) self can predict... people?s leisure behavior. In the investigation of the relationship between self-image and leisure activities, Haggard and Williams (1992) found that respondents expressed themselves by participating in recreational activities which reflect specific...

  5. Identity, Genocide, and Group Violence

    Microsoft Academic Search

    David Moshman

    \\u000a Social identity is typically multidimensional, involving connections and commitments to multiple overlapping groups. Because\\u000a abstract groups such as nations, cultures, or religions have the potential to outlast the individuals who compose them at\\u000a any given point in time, affiliation with such groups provides a sense of continuity, permanence, and meaning. Thus, we are\\u000a highly motivated to act on behalf of

  6. Silos and Social Identity: The Social Identity Approach as a Framework for Understanding and Overcoming Divisions in Health Care

    PubMed Central

    Kreindler, Sara A; Dowd, Damien A; Dana Star, Noah; Gottschalk, Tania

    2012-01-01

    Context One of health care's foremost challenges is the achievement of integration and collaboration among the groups providing care. Yet this fundamentally group-related issue is typically discussed in terms of interpersonal relations or operational issues, not group processes. Methods We conducted a systematic search for literature offering a group-based analysis and examined it through the lens of the social identity approach (SIA). Founded in the insight that group memberships form an important part of the self-concept, the SIA encompasses five dimensions: social identity, social structure, identity content, strength of identification, and context. Findings Our search yielded 348 reports, 114 of which cited social identity. However, SIA-citing reports varied in both compatibility with the SIA's metatheoretical paradigm and applied relevance to health care; conversely, some non-SIA-citers offered SIA-congruent analyses. We analyzed the various combinations and interpretations of the five SIA dimensions, identifying ten major conceptual currents. Examining these in the light of the SIA yielded a cohesive, multifaceted picture of (inter)group relations in health care. Conclusions The SIA offers a coherent framework for integrating a diverse, far-flung literature on health care groups. Further research should take advantage of the full depth and complexity of the approach, remain sensitive to the unique features of the health care context, and devote particular attention to identity mobilization and context change as key drivers of system transformation. Our article concludes with a set of “guiding questions” to help health care leaders recognize the group dimension of organizational problems, identify mechanisms for change, and move forward by working with and through social identities, not against them. PMID:22709391

  7. Fast Digital Identity Revocation (Extended Abstract)

    E-print Network

    Ostrovsky, Rafail

    ) before its expiration date (similar to the cancelation of a credit­cards in the case that they are stolen a method for revoking someone's digital identity in the case that this identity is stolen (or canceled

  8. Fast Digital Identity Revocation Extended Abstract

    E-print Network

    Ostrovsky, Rafail

    before its expiration date similar to the cancelation of a credit-cards in the case that they are stolen a method for revoking someone's digital identity in the case that this identity is stolen or canceled

  9. A Contextual Framework for Combating Identity Theft

    Microsoft Academic Search

    Wenjie Wang; Yufei Yuan; Norman P. Archer

    2006-01-01

    Identity theft is on the rise - as is the resulting damage to consumers and countries. In this article, the authors propose a framework to identify stakeholders and the interactive relationships that play multiple roles in combating identity theft

  10. Threats to Feminist Identity and Reactions to Gender Discrimination.

    PubMed

    Cichocka, Aleksandra; Golec de Zavala, Agnieszka; Kofta, Mirek; Rozum, Joanna

    2013-05-01

    The aim of this research was to examine conditions that modify feminists' support for women as targets of gender discrimination. In an experimental study we tested a hypothesis that threatened feminist identity will lead to greater differentiation between feminists and conservative women as victims of discrimination and, in turn, a decrease in support for non-feminist victims. The study was conducted among 96 young Polish female professionals and graduate students from Gender Studies programs in Warsaw who self-identified as feminists (M age ?=?22.23). Participants were presented with a case of workplace gender discrimination. Threat to feminist identity and worldview of the discrimination victim (feminist vs. conservative) were varied between research conditions. Results indicate that identity threat caused feminists to show conditional reactions to discrimination. Under identity threat, feminists perceived the situation as less discriminatory when the target held conservative views on gender relations than when the target was presented as feminist. This effect was not observed under conditions of no threat. Moreover, feminists showed an increase in compassion for the victim when she was portrayed as a feminist compared to when she was portrayed as conservative. Implications for the feminist movement are discussed. PMID:23606785

  11. Reconsidering Research on Teachers' Professional Identity

    ERIC Educational Resources Information Center

    Beijaard, Douwe; Meijer, Paulien C.; Verloop, Nico

    2004-01-01

    The studies considered in this review of recent research on teachers' professional identity can be divided into three categories: (1) studies in which the focus was on teachers' professional identity formation, (2) studies in which the focus was on the identification of characteristics of teachers' professional identity, and (3) studies in which…

  12. Dehistoricized Cultural Identity and Cultural Othering

    ERIC Educational Resources Information Center

    Weiguo, Qu

    2013-01-01

    The assumption that each culture has its own distinctive identity has been generally accepted in the discussion of cultural identities. Quite often identity formation is not perceived as a dynamic and interactive ongoing process that engages other cultures and involves change in its responses to different challenges at different times. I will…

  13. NISTIR 7284 Personal Identity Verification Card

    E-print Network

    NISTIR 7284 Personal Identity Verification Card Management Report Jim Dray David Corcoran #12;Personal Identity Verification Card Management Report NISTIR 7284 Jim Dray David Corcoran C O M P U T E R William A. Jeffrey, Director #12;Personal Identity Verification Card Management Report REPORTS ON COMPUTER

  14. ‘Eternal Other’ Japan: South Koreans' Postcolonial Identity

    Microsoft Academic Search

    Miyoung Oh

    2009-01-01

    This paper explores South Korean women's postcolonial and ethnic identities. In particular, it investigates their postcolonial consciousness by examining their perspectives of, and relations to, Japan. The discussion expands to include the women's ethnic identity with respect to North Korea in order to interrogate the intersection of their postcolonial and ethnic identities. The research data have been collected from two

  15. Gender Identity and Adjustment in Middle Childhood

    Microsoft Academic Search

    Priscilla R. Carver; Jennifer L. Yunger; David G. Perry

    2003-01-01

    This article has two purposes. The first is to present a brief (and speculative) account of the developmental origins of the several components of gender identity featured in the multidimensional model of gender identity proposed by Egan and Perry (2001). The second is to offer additional empirical support for the construct and discriminant validity of the various gender identity dimensions.

  16. Distinguishing identical twins by face recognition

    Microsoft Academic Search

    P. Jonathon Phillips; Patrick J. Flynn; Kevin W. Bowyer; Richard W. Vorder Bruegge; Patrick J. Grother; George W. Quinn; Matthew Pruitt

    2011-01-01

    The paper measures the ability of face recognition algorithms to distinguish between identical twin siblings. The experimental dataset consists of images taken of 126 pairs of identical twins (252 people) collected on the same day and 24 pairs of identical twins (48 people) with images collected one year apart. In terms of both the number of paris of twins and

  17. Gender differences in adolescent interpersonal identity formation

    Microsoft Academic Search

    William Thorbecke I; Harold D. Grotevant

    1982-01-01

    Gender differences in adolescent interpersonal identity formation were investigated in 41 male and 42 female high school juniors and seniors. Subjects were interviewed and assessed on progress toward interpersonal identity achievement in friendship and dating relationships. Differential patterns of correlation for each sex were examined for measures of vocational identity, psychological masculinity and femininity, and achievement motivation. Results indicated that

  18. American Identity in the USA: Youth Perspectives

    ERIC Educational Resources Information Center

    Jahromi, Parissa

    2011-01-01

    National identity, how one sees oneself as a member of a given nation, is an important form of social identity. Feelings toward one's country are a matter of both individual and collective concern. In an increasingly diverse world, the issue of identifying with a nation is complex and consequential for individual identity formation as well as…

  19. Digital forensics and the issues of identity

    Microsoft Academic Search

    Andrew Jones; Thomas Martin

    2010-01-01

    The issue of what we consider to be the identity of a person has become increasingly complex as we have made ever greater use of the facilities and services that have been made available by developing technologies and the Internet. In the past people normally had one identity, while in the current environment it is acceptable to maintain separate ‘identities

  20. Executive Education The objective of the Identity

    E-print Network

    the gamut of IdM issues; from low- level authentication protocol mechanics, to high-level identityExecutive Education Seminars About CISR The objective of the Identity Management (IdM) Executive Seminars is to provide DOD managers and high-level decision makers with an appreciation of identity

  1. Fibonacci Identities via the Determinant Sum Property

    ERIC Educational Resources Information Center

    Spivey, Michael

    2006-01-01

    We use the sum property for determinants of matrices to give a three-stage proof of an identity involving Fibonacci numbers. Cassini's and d'Ocagne's Fibonacci identities are obtained at the ends of stages one and two, respectively. Catalan's Fibonacci identity is also a special case.

  2. The axial gauge BRS identities in supergravity

    NASA Astrophysics Data System (ADS)

    Capper, D. M.; MacLean, A.

    1983-07-01

    The BRS identities for supergravity in the axial gauge are derived and an identity involving the graviton self energy is verified to one-loop. It is demonstrated that even in a gauge where the anti-symmetric part of the vierbein field does not propagate, it does not decouple from the BRS identities.

  3. 21 CFR 610.14 - Identity.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...2010-04-01 2010-04-01 false Identity. 610.14 Section 610.14 Food...STANDARDS General Provisions § 610.14 Identity. The contents of a final container...filling of each lot shall be tested for identity after all labeling operations shall...

  4. 7 CFR 782.14 - Identity preservation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...2012-01-01 2012-01-01 false Identity preservation. 782.14 Section 782...End-Use Certificate Program § 782.14 Identity preservation. (a) The importer...the imported wheat shall preserve the identity of the Canadian-produced...

  5. NISTIR 7870 NIST Test Personal Identity

    E-print Network

    Magee, Joseph W.

    NISTIR 7870 NIST Test Personal Identity Verification (PIV) Cards David A. Cooper http://dx.doi.org/10.6028/NIST.IR.7870 #12;NISTIR 7870 NIST Text Personal Identity Verification (PIV) Cards David A and middleware that support the Personal Identity Verification (PIV) Card, NIST has developed a set of test PIV

  6. 7 CFR 782.14 - Identity preservation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...2010-01-01 2010-01-01 false Identity preservation. 782.14 Section 782...End-Use Certificate Program § 782.14 Identity preservation. (a) The importer...the imported wheat shall preserve the identity of the Canadian-produced...

  7. 21 CFR 610.14 - Identity.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...2012-04-01 2012-04-01 false Identity. 610.14 Section 610.14 Food...STANDARDS General Provisions § 610.14 Identity. The contents of a final container...filling of each lot shall be tested for identity after all labeling operations shall...

  8. 7 CFR 782.14 - Identity preservation.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...2013-01-01 2013-01-01 false Identity preservation. 782.14 Section 782...End-Use Certificate Program § 782.14 Identity preservation. (a) The importer...the imported wheat shall preserve the identity of the Canadian-produced...

  9. Identity and deception in the virtual community

    Microsoft Academic Search

    Judith S. Donath

    1997-01-01

    Identity plays a key role in virtual communities. In communication, which is the primary activity, knowing the identity of those with whom you communicate is essential for understanding and evaluating an interaction. Yet in the disembodied world of the virtual community, identity is also ambiguous. Many of the basic cues about personality and social role we are accustomed to in

  10. 21 CFR 610.14 - Identity.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...2014-04-01 2014-04-01 false Identity. 610.14 Section 610.14 Food...STANDARDS General Provisions § 610.14 Identity. The contents of a final container...filling of each lot shall be tested for identity after all labeling operations shall...

  11. Career Identity among Community College Students

    ERIC Educational Resources Information Center

    Stringer, Kate J.; Kerpelman, Jennifer L.

    2014-01-01

    Career identity development is salient in adolescence and young adulthood, but little research has assessed career identity in populations other than four-year college students. Context should be considered when examining career identity, and to address this gap in the literature, the current study examined the extent to which parental support for…

  12. 7 CFR 782.14 - Identity preservation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...2011-01-01 2011-01-01 false Identity preservation. 782.14 Section 782...End-Use Certificate Program § 782.14 Identity preservation. (a) The importer...the imported wheat shall preserve the identity of the Canadian-produced...

  13. Institutional Identity Guide forMillersvilleUniversity

    E-print Network

    Hardy, Christopher R.

    Institutional Identity Guide forMillersvilleUniversity Published by University Communications & Marketing Last updated March 2014 #12;2Institutional Identity Guide for Millersville University CONTENTS Introduction 3 About the Identity 3 University Logo 4 Logo Color Usage 5 Logo Treatment 6-7 University Seal 8

  14. The Identity Management Problem --A Short Survey

    E-print Network

    Guibas, Leonidas J.

    The Identity Management Problem -- A Short Survey Leonidas J. Guibas Computer Science Department Stanford University Stanford, CA 94305, U.S.A. Email: guibas@cs.stanford.edu Abstract--The identity and target identities, based on observations made by sen- sors. Updates of the belief state can happen

  15. 21 CFR 610.14 - Identity.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...2013-04-01 2013-04-01 false Identity. 610.14 Section 610.14 Food...STANDARDS General Provisions § 610.14 Identity. The contents of a final container...filling of each lot shall be tested for identity after all labeling operations shall...

  16. 7 CFR 782.14 - Identity preservation.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...2014-01-01 2014-01-01 false Identity preservation. 782.14 Section 782...End-Use Certificate Program § 782.14 Identity preservation. (a) The importer...the imported wheat shall preserve the identity of the Canadian-produced...

  17. 21 CFR 610.14 - Identity.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...2011-04-01 2010-04-01 true Identity. 610.14 Section 610.14 Food...STANDARDS General Provisions § 610.14 Identity. The contents of a final container...filling of each lot shall be tested for identity after all labeling operations shall...

  18. Theorizing identity in language and sexuality research

    Microsoft Academic Search

    MARY B UCHOLTZ

    2004-01-01

    The field of language and sexuality has gained importance within socio- culturally oriented linguistic scholarship. Much current work in this area emphasizes identity as one key aspect of sexuality. However, recent cri- tiques of identity-based research advocate instead a desire-centered view of sexuality. Such an approach artificially restricts the scope of the field by overlooking the close relationship between identity

  19. Foreign Language Teaching and Cultural Identity.

    ERIC Educational Resources Information Center

    Nasr, Raja T., Ed.; And Others

    A collection of works on the role of cultural identity in second language learning and teaching includes: "Linguas estrangeiras e ideologia" (Roberto Ballalai); "Cultural Identity and Bilinguality" (Josiane F. Hamers, Michel Blanc); "Foreign Language Teaching and Cultural Identity" (Lakshmie K. Cumaranatunge); "Ensino de linguas estrangeiras e…

  20. Developing a Leadership Identity: A Grounded Theory

    Microsoft Academic Search

    Susan R. Komives; Julie E. Owen; Susan D. Longerbeam; Felicia C. Mainella; Laura Osteen

    2005-01-01

    This grounded theory study on developing a leadership identity revealed a 6-stage develop- mental process. The thirteen diverse students in this study described their leadership identity as moving from a leader-centric view to one that embraced leadership as a collaborative, relational process. Developing a leadership identity was connected to the categories of developmental influences, developing self, group influences, students' changing

  1. The Development of Ethnic Identity During Adolescence

    Microsoft Academic Search

    Sabine Elizabeth French; Edward Seidman; LaRue Allen; J. Lawrence Aber

    2006-01-01

    The development of ethnic identity is a critical facet of adolescence, particularly for adolescents of color. In order to examine the developmental trajectory of ethnic identity, African American, Latino American, and European American early and middle adolescents (N = 420) were assessed over 3 years. Two components of ethnic identity were assessed—group-esteem was found to rise for both early and

  2. Identities, Social Representations and Critical Thinking

    ERIC Educational Resources Information Center

    Lopez-Facal, Ramon; Jimenez-Aleixandre, Maria Pilar

    2009-01-01

    This comment on L. Simonneaux and J. Simonneaux paper focuses on the role of "identities" in dealing with socio-scientific issues. We argue that there are two types of identities (social representations) influencing the students' positions: On the one hand their social representations of the bears' and wolves' identities as belonging to particular…

  3. Identity theft in an online world

    Microsoft Academic Search

    Angus M. Marshall; Brian C. Tompsett

    2005-01-01

    With the aid of an example case of identity theft used to perpetrate an apparent benefits fraud and consideration of other undesirable online activities, the authors examine the motives and methods of Internet-based identity theft. Consideration is given to how such cases may be detected, investigated and prevented in the future. The problem of trust relationships and validation of identity

  4. Notarized Federated Identity Management for Web Services

    E-print Network

    (STMS). We also give a practical solution for mitigating aspects of the identity theft problem information in online transactions opens the door to identity theft, which poses a serious threat to personal dangers of identity theft are negatively affecting people's collective confidence on the digital world

  5. East Carolina University IDENTITY THEFT PROTECTION COMMITTEE

    E-print Network

    12/12/2013 East Carolina University IDENTITY THEFT PROTECTION COMMITTEE Membership: 16 members established the Identity Theft Protection Committee (ITPC) to oversee the compliance of ECU with respect with the requirements of the NC Identity Theft Protection Act · To review current campus collection and uses of social

  6. Identity theft: An overview of the problem

    Microsoft Academic Search

    Katherine Slosarik

    2002-01-01

    Identity theft is becoming a prevalent and increasing problem within the United States. An identity thief only needs one thing - a Social Security Number; with it, he can decimate a victim's life and credit. Historically, federal laws in place to combat identity theft are weak and ineffective. Law enforcement, faced with jurisdictional and technological issues, is ill-equipped to deal

  7. Identity theft, computers and behavioral biometrics

    Microsoft Academic Search

    Robert Moskovitch; Clint Feher; Arik Messerman; Niklas Kirschnick; Tarik Mustafic; Ahmet Ahmet Çamtepe; Bernhard Löhlein; Ulrich Heister; Sebastian Möller; Lior Rokach; Yuval Elovici

    2009-01-01

    The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is

  8. University of Connecticut IDENTITY THEFT PREVENTION PROGRAM

    E-print Network

    Oliver, Douglas L.

    University of Connecticut IDENTITY THEFT PREVENTION PROGRAM I. BACKGROUND II. PURPOSE AND SCOPE BACKGROUND In response to the growing threats of identity theft in the United States, Congress passed) and several other federal agencies with promulgating rules regarding identity theft. On November 7, 2007

  9. Catholic Identity Today: A Position Paper

    ERIC Educational Resources Information Center

    Cook, Timothy J.

    2008-01-01

    Maintaining a distinctive Catholic identity is a challenge for Catholic schools today. Religious identity must be nurtured and it must be contextualized for the 21st century. This paper suggests marks of contemporary Catholic character. Also, it proposes looking at religious identity through the lens of student experience and graduate outcomes.…

  10. The Impact of Stuttering on Identity Construction

    ERIC Educational Resources Information Center

    Daniels, Derek E.; Gabel, Rodney M.

    2004-01-01

    Identity is an important concept to consider when describing human development. To date, relatively few articles have addressed file application of identity theory, especially that concerned with the social construction, to stuttering. This article examines why the construction of a positive identity may be difficult due to the negative effect of…

  11. Nostalgia and Identity in Song Lyrics

    Microsoft Academic Search

    Krystine Irene Batcho; Meghan L. DaRin; Andrea M. Nave; R. Renée Yaworsky

    2008-01-01

    The content of original song lyrics was manipulated to explore the relationship of nostalgia to identity and social connectedness. A sample of 96 undergraduates rated six attributes of four sets of lyrics and completed measures of identity exploration, styles of maintaining identity, nostalgia for their past, and nostalgia for a general historical past. Lyrical nostalgia was not a function of

  12. Literacy Learning as Gendered Identity Work

    ERIC Educational Resources Information Center

    Godley, Amanda J.

    2003-01-01

    Drawing from a six-month ethnographic study, this article explores the negotiation of gendered identities through classroom literacy practices in an urban high school, paying particular attention to how gendered identities are interwoven with those of race, class, and other social identities during literary discussions. I draw upon the notion that…

  13. Phenotypic Bias and Ethnic Identity in Filipino Americans*

    PubMed Central

    Kiang, Lisa; Takeuchi, David T.

    2009-01-01

    Objective Links between phenotypes (skin tone, physical features) and a range of outcomes (income, physical health, psychological distress) were examined. Ethnic identity was examined as a protective moderator of phenotypic bias. Method Data were from a community sample of 2,092 Filipino adults in San Francisco and Honolulu. Results After controlling for age, nativity, marital status, and education, darker skin was associated with lower income and lower physical health for females and males. For females, more ethnic features were associated with lower income. For males, darker skin was related to lower psychological distress. One interaction was found such that females with more ethnic features exhibited lower distress; however, ethnic identity moderated distress levels of those with less ethnic features. Conclusions Phenotypic bias appears prevalent in Filipino Americans though specific effects vary by gender and skin color versus physical features. Discussion centers on the social importance of appearance and potential strengths gained from ethnic identification. PMID:20107617

  14. Ricci identities in higher dimensions

    NASA Astrophysics Data System (ADS)

    Ortaggio, M.; Pravda, V.; Pravdová, A.

    2007-03-01

    We explore connections between geometrical properties of null congruences and the algebraic structure of the Weyl tensor in n > 4 spacetime dimensions. First, we present the full set of Ricci identities on a suitable 'null' frame, thus completing the extension of the Newman Penrose formalism to higher dimensions. Then we specialize to geodetic null congruences and study specific consequences of the Sachs equations. These imply, for example, that Kundt spacetimes are of type II or more special (like for n = 4) and that for odd n a twisting geodetic WAND must also be shearing (in contrast to the case n = 4).

  15. [Dissociative identity disorder or schizophrenia?].

    PubMed

    Tschöke, S; Steinert, T

    2010-01-01

    We present a case of dissociative identity disorder in which Schneiderian first rank symptoms were present besides of various states of consciousness. Thus the diagnosis of schizophrenia had to be considered. Formally, the symptoms met ICD-10 criteria for schizophrenia. However, taking into account the lack of formal thought disorder and of negative symptoms as well as a typical history of severe and prolonged traumatisation, we did not diagnose a co-morbid schizophrenic disorder. There is good evidence for the existence of psychotic symptoms among patients with dissociative disorders. However, in clinical practice this differential diagnosis is rarely considered. PMID:19847739

  16. Codimensions of generalized polynomial identities

    SciTech Connect

    Gordienko, Aleksei S [M. V. Lomonosov Moscow State University, Faculty of Mechanics and Mathematics, Moscow (Russian Federation)

    2010-02-28

    It is proved that for every finite-dimensional associative algebra A over a field of characteristic zero there are numbers C element of Q{sub +} and t element of Z{sub +} such that gc{sub n}(A){approx}Cn{sup t}d{sup n} as n{yields}{infinity}, where d=PI exp(A) element of Z{sub +}. Thus, Amitsur's and Regev's conjectures hold for the codimensions gc{sub n}(A) of the generalized polynomial identities. Bibliography: 6 titles.

  17. Identical twins with lumbosacral lipomyelomeningocele.

    PubMed

    Hanaei, Sara; Nejat, Farideh; Mortazavi, Abolghasem; Habibi, Zohreh; Esmaeili, Arash; El Khashab, Mostafa

    2015-01-01

    Lipomyelomeningocele, a congenital spine defect, is presented as skin-covered lipomatous tissue that attaches to the cord in different ways according to its subtypes. Unlike other types of neural tube defects, the exact cause of this birth defect has not been confirmed yet, but it is proposed to be a multifactorial disease with involvement of both genetic and environmental factors. The authors describe identical twins with lipomyelomeningocele of the same subtype and location without any familial history of similar abnormality. Therefore, the same genetic and/or environmental risk factors could have played a part in their condition. PMID:25396701

  18. Ectodermal dysplasia in identical twins

    PubMed Central

    Puttaraju, Gurkar Haraswarupa; Visveswariah, Paranjyothi Magadi

    2013-01-01

    Hereditary hypohidrotic ectodermal dysplasia (HED) is typically inherited as an X-linked recessive trait, characterized by deformity of at least two or more of the ectodermal structures - hair, teeth, nails and sweat glands. Two cases of hereditary HED involving identical male twins, is being documented for the rarity of its occurrence with special attention given to genetics, pathophysiology, clinical, intraoral manifestations and to the methods to improve the masticatory function, the facial esthetics and psychology of patients affected by this disease. PMID:23956595

  19. Novel shock absorber features varying yield strengths

    NASA Technical Reports Server (NTRS)

    Geier, D. J.

    1964-01-01

    A shock absorbent webbing of partially drawn synthetic strands is arranged in sections of varying density related to the varying mass of the human body. This is contoured to protect the body at points of contact, when subjected to large acceleration or deceleration forces.

  20. Fractal analysis of time varying data

    DOEpatents

    Vo-Dinh, Tuan (Knoxville, TN); Sadana, Ajit (Oxford, MS)

    2002-01-01

    Characteristics of time varying data, such as an electrical signal, are analyzed by converting the data from a temporal domain into a spatial domain pattern. Fractal analysis is performed on the spatial domain pattern, thereby producing a fractal dimension D.sub.F. The fractal dimension indicates the regularity of the time varying data.

  1. Identity Gaps and Level of Depression Among Korean Immigrants

    Microsoft Academic Search

    Eura Jung; Michael L. Hecht

    2008-01-01

    Identity gaps are a new theoretical construct that provide a framework for integrating communication into the study of identity and understanding the relationship between identity and health outcomes, such as depression. Derived from the communication theory of identity, identity gaps emerge when elements of identity are inconsistent with each other. This article focuses on 2 types of identity gaps, personal–enacted

  2. Identity and Leadership 1 running head: Psychoanalytic Dialogues of Identity and Leadership

    E-print Network

    Paris-Sud XI, Université de

    Identity and Leadership 1 running head: Psychoanalytic Dialogues of Identity and Leadership Identities and Ideals: Psychoanalytic Dialogues of Self and Leadership Gazi Islam Associate Professor,version1-21Mar2014 #12;Identity and Leadership 2 Abstract The author contextualizes recent developments

  3. Identity Status and Identity Style among African American Juvenile Delinquents: Implications for Rehabilitation.

    ERIC Educational Resources Information Center

    Grier, Leslie K.

    1997-01-01

    Examines identity status and identity style among 45 African-American male juvenile delinquents. Results indicate that 75% of the subjects were of a diffused identity status. Approximately half of the delinquents were categorized as interpersonally diffused. The ideological diffused-identity status was predictive of diffuse-orientation and less…

  4. Racial Identity Attitudes and Ego Identity Statuses in Dominican and Puerto Rican College Students

    ERIC Educational Resources Information Center

    Sanchez, Delida

    2013-01-01

    This study explored the relation between racial identity attitudes and ego identity statuses in 94 Dominican and Puerto Rican Latino college students in an urban public college setting. Simultaneous regression analyses were conducted to test the relation between racial identity attitudes and ego identity statuses, and findings indicated that…

  5. Abstract--Identity concealment is viewed as a standard identity privacy feature. UMTS provides partial concealment.

    E-print Network

    Barbeau, Michel

    Abstract-- Identity concealment is viewed as a standard identity privacy feature. UMTS provides partial concealment. This work extends the UMTS mutual authentication protocol such that the true identity. Three different solutions using aliases are proposed. Each of them provides perfect identity concealment

  6. On an identity of Gessel and Stanton and the new little Gollnitz identities

    E-print Network

    Savage, Carla D.

    On an identity of Gessel and Stanton and the new little G¨ollnitz identities Carla D. Savage Dept that an identity of Gessel and Stanton (Trans. Amerc. Math Soc. 277 (1983), p. 197, Eq. (7.24)) can be viewed as a a symmetric version of a recent analytic variation of the little G¨ollnitz identities. This is significant

  7. Dual Identity as a Two-Edged Sword: Identity Threat and Minority School Performance

    ERIC Educational Resources Information Center

    Baysu, Gulseli; Phalet, Karen; Brown, Rupert

    2011-01-01

    Some members of ethnic minority groups respond to identity threat in ways that are detrimental to their school career, while others persist despite an unwelcoming school environment. It was hypothesized that ethnic and national identities, as combined in "separated," "assimilated," or "dual identity" strategies, moderate consequences of identity

  8. Identity-Based Cryptosystems I Identity-based public key cryptography is a paradigm

    E-print Network

    Verdult, Roel

    Identity-Based Cryptosystems I I Background Identity-based public key cryptography is a paradigm) that have to deliver private keys to users after hav- ing derived them from their identity information solutions for identity- based signatures (IBS) have been devised since [, , ], but finding a practical

  9. WHAT PRICE PRIVACY? (and why identity theft is about neither identity nor theft)

    E-print Network

    Chapter 1 WHAT PRICE PRIVACY? (and why identity theft is about neither identity nor theft) Adam- erful. Untraceability is when you can not be traced from one identity to another. For example, "John. In this chapter we will debunk these myths. Another myth we will debunk is that identity theft is a privacy

  10. Identities in Harmony: Gender-Work Identity Integration Moderates Frame Switching in Cognitive Processing

    ERIC Educational Resources Information Center

    Sacharin, Vera; Lee, Fiona; Gonzalez, Richard

    2009-01-01

    Professional women's identity integration--the perceived compatibility between work and gender identities--plays a role in how task or relationship information is processed. Seventy female business school students were primed with either their professional or their gender identity. Business women with higher identity integration showed an…

  11. Quantum teleportation with identical particles

    NASA Astrophysics Data System (ADS)

    Marzolino, Ugo; Buchleitner, Andreas

    2015-03-01

    We study teleportation with identical massive particles. Indistinguishability imposes that the relevant degrees of freedom to be teleported are not particles, but rather addressable orthogonal modes. We discuss the performances of teleportation under the constraint of conservation of the total number of particles. The latter inevitably decreases the teleportation fidelity. Moreover, even though a phase reference, given by the coupling to a reservoir, circumvents the constraint, it does not restore perfect deterministic teleportation. The latter is only achievable with some special resource entangled states and when the number of particles tends to infinity. Interestingly, some of such states are the many-particle atomic coherent states and the ground state of cold atoms loaded into a double well potential, which are routinely prepared in experiments.

  12. Identity transformation in medical students.

    PubMed

    Cohen, Mitchell J M; Kay, Abigail; Youakim, James M; Balaicuis, John M; Balacius, John M

    2009-03-01

    This paper reviews the literature on the impact of medical school on personal development and consolidation of core identity. The limited literature relies on reports from medical students' journaling exercises, discussion groups, post-graduation surveys, and repeated personality testing. We review forces acting on medical students, with potential transforming effects. These forces include high external expectations and internal fear of superficial knowledge and skills, entry into the culture of medicine with its insider jargon and hierarchy, high academic workload, and the emotional burdens of confronting cadavers and death as well as bearing witness to patients' suffering. Potential developmental delay, emergence of substance abuse and hedonic acting out, cynicism, and loss of individual core values are possible consequences. Protections against these adverse outcomes include identification of strong mentors and role models, developing post-conventional morality and relativistic thinking, finding healthy coping strategies such as peer support, and remaining intellectually creative and personally reflective. PMID:19295620

  13. Social identity framing: Leader communication for social change

    NASA Astrophysics Data System (ADS)

    Seyranian, Viviane

    Social identity framing (SIF) delineates a process of intergroup communication that leaders may engage in to promote a vision of social change. As a step towards social change, social identity may need to be altered to accommodate a new view of the group, its collective goals, and its place alongside other groups. Thus, social identity content may be deconstructed and reconstructed by the leader en route to change. SIF suggests that this may be achieved through a series of 16 communication tactics, which are largely derived from previous research (Seyranian & Bligh, 2008). This research used an experimental design to test the effectiveness of three SIF communication tactics - inclusion, similarity to followers, and positive social identity - on a number of follower outcomes. Students ( N=246) were randomly assigned to read one of eight possible speeches promoting renewable energy on campus that was ostensibly from a student leader. The speeches were varied to include or exclude the three communication tactics. Following the speech, participants completed a dependent measures questionnaire. Results indicated that similarity to followers and positive social identity did not affect follower outcomes. However, students exposed to inclusion were more likely to indicate that renewable energy was ingroup normative; intend to engage in collective action to bring renewable energy to campus; experience positive emotional reactions towards change; feel more confident about the possibility of change; and to view the leader more positively. The combination of inclusion and positive social identity increased perceptions of charismatic leadership. Perceived leader prototypicality and cognitive elaboration of the leader's message resulted in more favorable attitudes towards renewable energy. Perceived leader prototypicality was also directly related to social identification, environmental values, ingroup injunctive norms, and self-stereotypes. Overall, these results support SIF theory by providing evidence that communication that implicates social identity (i.e., inclusion) is an important aspect of the leader-follower influence process and that it can be used to bring about changes such as promoting environmental conservation policies. Avenues of future research on SIF are discussed.

  14. “Am I my genes?”: Questions of identity among individuals confronting genetic disease

    PubMed Central

    Klitzman, Robert

    2013-01-01

    Purpose To explore many questions raised by genetics concerning personal identities that have not been fully investigated. Methods We interviewed in depth, for 2 hours each, 64 individuals who had or were at risk for Huntington disease, breast cancer, or alpha-1 antitrypsin deficiency. Results These individuals struggled with several difficult issues of identity. They drew on a range of genotypes and phenotypes (e.g., family history alone; mutations, but no symptoms; or symptoms). They often felt that their predicament did not fit preexisting categories well (e.g., “sick,” “healthy,” “disabled,” “predisposed”), due in part to uncertainties involved (e.g., unclear prognoses, since mutations may not produce symptoms). Hence, individuals varied in how much genetics affected their identity, in what ways, and how negatively. Factors emerged related to disease, family history, and other sources of identity. These identities may, in turn, shape disclosure, coping, and other health decisions. Conclusions Individuals struggle to construct a genetic identity. They view genetic information in highly subjective ways, varying widely in what aspects of genetic information they focus on and how. These data have important implications for education of providers (to assist patients with these issues), patients, and family members; and for research, to understand these issues more fully. PMID:20010365

  15. Ethnic identity, identity coherence, and psychological functioning: testing basic assumptions of the developmental model.

    PubMed

    Syed, Moin; Juang, Linda P

    2014-04-01

    The purpose of the present study was to test three fundamental theoretical propositions from Phinney's (1990) developmental model about the relations among ethnic identity, identity coherence, and psychological functioning: (a) ethnic identity is more strongly related to identity coherence for ethnic minorities than for Whites; (b) ethnic identity is more strongly related to psychological functioning for ethnic minorities than for Whites; and (c) identity coherence mediates the association between ethnic identity and psychological functioning for ethnic minorities, but not for Whites. These hypotheses were tested in three independent samples of ethnically diverse youth. In general, we found weak to moderate support for these three hypotheses, suggesting that the theoretically proposed differences in ethnic identity between ethnic minorities and Whites may not be supported by data. Implications for theory and measurement of ethnic identity are discussed. PMID:24773003

  16. Different Places, Different Specialisms: Similar Questions of Doctoral Identities under Construction

    ERIC Educational Resources Information Center

    McAlpine, Lynn; Lucas, Lisa

    2011-01-01

    We share a common interest in researching the experiences of doctoral students. Over time, as we conducted our independent studies, we became increasingly interested in the varied ways in which doctoral students constructed their identities in relation to their past experiences, present and shifting intentions and affect, personal and social…

  17. On Being Indigenous: An Essay on the Hermeneutics of "Cultural Identity"

    ERIC Educational Resources Information Center

    Chandler, M. J.

    2013-01-01

    The range of cultural resources distributed along developmental pathways open to young persons as they frame the outlines of their own identities is not fixed, but inevitably varies across historical moments. The young lives most touched by such transitional circumstances arguably belong to those that find themselves growing up in times of…

  18. How Dresses Can Make You Mentally Ill: Examining Gender Identity Disorder in Children

    Microsoft Academic Search

    Susan J. Langer; James I. Martin

    2004-01-01

    This paper examines the diagnostic category of Gender Identity Disorder in Children (GIDC) and its evolution. It also critiques the continued use of GIDC on conceptual, psychometric, and ethical grounds. Gender atypicality is a social construction that varies over time according to culture and social class and therefore should not be pathologized.

  19. Monoracial and Biracial Children: Effects of Racial Identity Saliency on Social Learning and Social Preferences

    ERIC Educational Resources Information Center

    Gaither, Sarah E.; Chen, Eva E.; Corriveau, Kathleen H.; Harris, Paul L.; Ambady, Nalini; Sommers, Samuel R.

    2014-01-01

    Children prefer learning from, and affiliating with, their racial in-group but those preferences may vary for biracial children. Monoracial (White, Black, Asian) and biracial (Black/White, Asian/White) children (N = 246, 3-8 years) had their racial identity primed. In a learning preferences task, participants determined the function of a novel…

  20. Longitudinal Trajectories of Ethnic Identity among Urban Black and Latino Adolescents

    ERIC Educational Resources Information Center

    Pahl, Kerstin; Way, Niobe

    2006-01-01

    The current study modeled developmental trajectories of ethnic identity exploration and affirmation and belonging from middle to late adolescence (ages 15-18) and examined how these trajectories varied according to ethnicity, gender, immigrant status, and perceived level of discrimination. The sample consisted of 135 urban low-income Black and…

  1. Family Interaction Patterns as Predictors of Vocational Identity and Career Decision-Making Self-Efficacy.

    ERIC Educational Resources Information Center

    Hargrove, Byron K.; Creagh, Maureen G.; Burgess, Brian L.

    2002-01-01

    Vocational identity scores of 210 college students varied by family achievement orientation. Career decision-making self-efficacy was influenced by family differences in achievement, intellectual-cultural, and moral-religious 'orientation; conflict; and expressiveness. Family interaction patterns thus may play a small but significant role in…

  2. Mind–brain identity and evidential insulation

    Microsoft Academic Search

    Jakob Hohwy

    2011-01-01

    Is it rational to believe that the mind is identical to the brain? Identity theorists say it is (or looks like it will be,\\u000a once all the neuroscientific evidence is in), and they base this claim on a general epistemic route to belief in identity.\\u000a I re-develop this general route and defend it against some objections. Then I discuss how

  3. Two types of cross-gender identity

    Microsoft Academic Search

    Kurt Freund; Betty W. Steiner; Samuel Chan

    1982-01-01

    A revision of the typology of male cross-gender identity was carried out by means of formalized, easily replicable methods. The results suggest (1) that there are two discrete types of cross-gender identity, one heterosexual, the other homosexual; (2) that transvestism, and closely related conditions of cross-gender identity, occur exclusively or almost exclusively in heterosexuals; (3) that of the two types

  4. Ethnic Identity in Everyday Life: The Influence of Identity Development Status

    PubMed Central

    Yip, Tiffany

    2013-01-01

    The current study explores the intersection of ethnic identity development and significance in a sample of 354 diverse adolescents (mean age 14). Adolescents completed surveys 5 times a day for 1 week. Cluster analyses revealed 4 identity clusters: diffused, foreclosed, moratorium, achieved. Achieved adolescents reported the highest levels of identity salience across situations, followed by moratorium adolescents. Achieved and moratorium adolescents also reported a positive association between identity salience and private regard. For foreclosed and achieved adolescents reporting low levels of centrality, identity salience was associated with lower private regard. For foreclosed and achieved adolescents reporting high levels of centrality, identity salience was associated with higher private regard. PMID:23581701

  5. Facial allograft transplantation, personal identity and subjectivity

    PubMed Central

    Swindell, J S

    2007-01-01

    An analysis of the identity issues involved in facial allograft transplantation is provided in this paper. The identity issues involved in organ transplantation in general, under both theoretical accounts of personal identity and subjective accounts provided by organ recipients, are examined. It is argued that the identity issues involved in facial allograft transplantation are similar to those involved in organ transplantation in general, but much stronger because the face is so closely linked with personal identity. Recipients of facial allograft transplantation have the potential to feel that their identity is a mix between their own and the donor's, and the donor's family is potentially likely to feel that their loved one “lives on”. It is also argued that facial allograft transplantation allows the recipients to regain an identity, because they can now be seen in the social world. Moreover, they may regain expressivity, allowing for them to be seen even more by others, and to regain an identity to an even greater extent. Informing both recipients and donors about the role that identity plays in facial allograft transplantation could enhance the consent process for facial allograft transplantation and donation. PMID:17664301

  6. Exploring the interplay between organizational and professional identity

    E-print Network

    Paris-Sud XI, Université de

    Page 1 Exploring the interplay between organizational and professional identity Communication.1. Professional identity 4 2.2. Organizational identity 5 2.3. Professional and organizational identity: contextualizing professional identity? 6 2.4. Institutional framework, education policy and identities 7 2

  7. Multiple pathways to identification: exploring the multidimensionality of academic identity formation in ethnic minority males.

    PubMed

    Matthews, Jamaal S

    2014-04-01

    Empirical trends denote the academic underachievement of ethnic minority males across various academic domains. Identity-based explanations for this persistent phenomenon describe ethnic minority males as disidentified with academics, alienated, and oppositional. The present work interrogates these theoretical explanations and empirically substantiates a multidimensional lens for discussing academic identity formation within 330 African American and Latino early-adolescent males. Both hierarchical and iterative person-centered methods were utilized and reveal 5 distinct profiles derived from 6 dimensions of academic identity. These profiles predict self-reported classroom grades, mastery orientation, and self-handicapping in meaningful and varied ways. The results demonstrate multiple pathways to motivation and achievement, challenging previous oversimplified stereotypes of marginalized males. This exploratory study triangulates unique interpersonal and intrapersonal attributes for promoting healthy identity development and academic achievement among ethnic minority adolescent males. PMID:24447039

  8. Effect of varying light intensity on growth performance and carcass characteristics of broiler chickens grown to heavy weights

    Technology Transfer Automated Retrieval System (TEKTRAN)

    This study investigated effects of varying levels of light intensities (25, 10, 5, 2.5, and 0.2 lx) on growth performance and carcass characteristics of broiler chickens grown to heavy weights. Four identical trials were conducted with two replications per trial. In each trial, 600 1-d-old Ross 308 ...

  9. 21 CFR 130.17 - Temporary permits for interstate shipment of experimental packs of food varying from the...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    21 Food and Drugs 2 2013-04-01 2013-04-01...interstate shipment of experimental packs of food varying from the requirements of definitions...identity. 130.17 Section 130.17 Food and Drugs FOOD AND DRUG...

  10. 21 CFR 130.17 - Temporary permits for interstate shipment of experimental packs of food varying from the...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    21 Food and Drugs 2 2014-04-01 2014-04-01...interstate shipment of experimental packs of food varying from the requirements of definitions...identity. 130.17 Section 130.17 Food and Drugs FOOD AND DRUG...

  11. 21 CFR 130.17 - Temporary permits for interstate shipment of experimental packs of food varying from the...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    21 Food and Drugs 2 2011-04-01 2011-04-01...interstate shipment of experimental packs of food varying from the requirements of definitions...identity. 130.17 Section 130.17 Food and Drugs FOOD AND DRUG...

  12. 21 CFR 130.17 - Temporary permits for interstate shipment of experimental packs of food varying from the...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    21 Food and Drugs 2 2012-04-01 2012-04-01...interstate shipment of experimental packs of food varying from the requirements of definitions...identity. 130.17 Section 130.17 Food and Drugs FOOD AND DRUG...

  13. 21 CFR 130.17 - Temporary permits for interstate shipment of experimental packs of food varying from the...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    21 Food and Drugs 2 2010-04-01 2010-04-01...interstate shipment of experimental packs of food varying from the requirements of definitions...identity. 130.17 Section 130.17 Food and Drugs FOOD AND DRUG...

  14. When can identical particles collide

    SciTech Connect

    Bourdeau, M. (Department of Physics, Brandeis University, Waltham, Massachusetts 02254 (United States)); Sorkin, R.D. (Enrico Fermi Institute, University of Chicago, Chicago, Illinois 60637 (United States))

    1992-01-15

    It is customary, when discussing configuration spaces of identical particles in two or more dimensions, to discard the configurations where two or more particles overlap, the justification being that the configuration space ceases to be a manifold at those points, and also to allow for nonbosonic statistics. We show that there is in general a loss of physical information in discarding these points by studying the simple system of two free particles moving in the plane and requiring that the Hamiltonian be self-adjoint. We find that the Hamiltonian for fermions is unique, but that in all other cases (i.e., for particles obeying properly fractional or Bose statistics) there is a one-parameter family of possible self-adjoint extensions. We show how a plausible limiting procedure selects a unique extension from each family, the favored extension being the one for which the wave function remains finite at the points of overlap. We also test our procedure by applying it to the known case of the hydrogen atom.

  15. Dissociative identity disorder: Medicolegal challenges.

    PubMed

    Farrell, Helen M

    2011-01-01

    Persons with dissociative identity disorder (DID) often present in the criminal justice system rather than the mental health system and perplex experts in both professions. DID is a controversial diagnosis with important medicolegal implications. Defendants have claimed that they committed serious crimes, including rape or murder, while they were in a dissociated state. Asserting that their alter personality committed the bad act, defendants have pleaded not guilty by reason of insanity (NGRI). In such instances, forensic experts are asked to assess the defendant for DID and provide testimony in court. Debate continues over whether DID truly exists, whether expert testimony should be allowed into evidence, and whether it should exculpate defendants for their criminal acts. This article reviews historical and theoretical perspectives on DID, presents cases that illustrate the legal implications and controversies of raising an insanity defense based on multiple personalities, and examines the role of forensic experts asked to comment on DID with the goal of assisting clinicians in the medicolegal assessment of DID in relation to crimes. PMID:21908758

  16. Anorexia nervosa in identical triplets.

    PubMed

    Sokol, M S; Carroll, Anna K; Heebink, Denise M; Hoffman-Rieken, Kristina M; Goudge, Christine S; Ebers, Douglas D

    2009-03-01

    The cause of anorexia nervosa (AN) is unclear, but is likely multifactorial, including psychological, familial, environmental, societal, genetic, and other biological factors. This case report of identical 12-year-old female triplets simultaneously concordant for AN illustrates the importance of addressing all these components in evaluation and treatment, and the difficulty of determining the relative importance of each factor in the cause of an individual's eating disorder. An overly close relationship and competitiveness between the girls, treated at times as a triplet group rather than as individuals, as well as stressful family dynamics, were probably important antecedents to the girls' AN. The girls encouraged each other and competed to lose weight. Brief individual and family psychotherapy, parent counseling, nutritional counseling, and psychoeducation led to successful treatment. The triplets were encouraged in treatment to compete with and encourage each other to obtain treatment goals, including eating more healthily and achieving healthy weights. A literature review of AN twins studies is also presented, as these studies add to our understanding of the relative importance of shared genes and shared environment in the development of AN. These studies also add insight into treating individuals from families with multiple affected relatives. PMID:19407712

  17. Athletic Identity, Vocational Identity, and Occupational Engagement in College Student-Athletes and Non-Athletes

    E-print Network

    Hook, Lacole Lea

    2012-05-31

    counselors, some studies have found that student-athletes are behind non-athletes in career development. This study examined the relationship between athletic identity and career identity in student-athletes attending one Football Bowl Subdivision institution...

  18. Why aren't identical twins linguistically identical? Genetic, prenatal and postnatal factors

    E-print Network

    Stromswold, Karin

    Why aren't identical twins linguistically identical? Genetic, prenatal and postnatal factors Karin reserved. Keywords: Language development; Twins; Genetics; Epigenetics; Perinatal environment 1 used to investigate the impact of genetic factors on language. Roughly speaking, the logic of twin

  19. The Wildcat Corpus of Native- and Foreign-Accented English: Communicative Efficiency across Conversational Dyads with Varying Language Alignment Profiles

    PubMed Central

    Van Engen, Kristin J.; Baese-Berk, Melissa; Baker, Rachel E.; Choi, Arim; Kim, Midam; Bradlow, Ann R.

    2012-01-01

    This paper describes the development of the Wildcat Corpus of native- and foreign-accented English, a corpus containing scripted and spontaneous speech recordings from 24 native speakers of American English and 52 non-native speakers of English. The core element of this corpus is a set of spontaneous speech recordings, for which a new method of eliciting dialogue-based, laboratory-quality speech recordings was developed (the Diapix task). Dialogues between two native speakers of English, between two non-native speakers of English (with either shared or different L1s), and between one native and one non-native speaker of English are included and analyzed in terms of general measures of communicative efficiency. The overall finding was that pairs of native talkers were most efficient, followed by mixed native/non-native pairs and non-native pairs with shared L1. Non-native pairs with different L1s were least efficient. These results support the hypothesis that successful speech communication depends both on the alignment of talkers to the target language and on the alignment of talkers to one another in terms of native language background. PMID:21313992

  20. Emotions and White Racial Identity Status Attitudes

    ERIC Educational Resources Information Center

    Siegel, Matthew P.; Carter, Robert T.

    2014-01-01

    Relationships between emotional states and White racial identity status attitudes (Helms, 1984, 1990) were tested on a sample of 286 White students. The stimulus was a vignette in which one condition involved explicit racial information and one did not. Participants rated baseline and posttest emotions and completed the White Racial Identity

  1. Improving Measurement of Workplace Sexual Identity Management

    ERIC Educational Resources Information Center

    Lance, Teresa S.; Anderson, Mary Z.; Croteau, James M.

    2010-01-01

    The purpose of this study was to advance measurement of sexual identity management for lesbian, gay, and bisexual workers. Psychometric properties of a revised version of the Workplace Sexual Identity Management Measure (WSIMM; Anderson, Croteau, Chung, & DiStefano, 2001) were examined on a sample of 64 predominantly White K-12 teachers.…

  2. Homi Bhabha's Third Space and African identity

    Microsoft Academic Search

    Fetson Kalua

    2009-01-01

    This paper suggests a way of looking at postcolonial African identity as fluid, relational and always in flux. I explain this fluidity of identity by making a connection between Victor Turner's concept of liminality and Homi Bhabha's innovative formulation and application of the same idea in his text, The Location of Culture. The connection is important because, in espousing the

  3. Personal Federation Control with the Identity Dashboard

    E-print Network

    Boyer, Edmond

    Personal Federation Control with the Identity Dashboard Jonathan Scudder1 and Audun Jøsang2 1 of Oslo, Norway. josang@unik.no Abstract. Current federated identity management solutions for open networks do not solve the scalability problems for users. In some cases, federation might even increase

  4. Interculturalities: Reframing Identities in Intercultural Communication

    ERIC Educational Resources Information Center

    Nair-Venugopal, Shanta

    2009-01-01

    This paper attempts to reframe identities as "interculturalities" in the multimodal ways in which language is used for identity construction, specifically as responses to questionnaires, articulations within limited narratives, on-line interactions and in community ways of speaking a localised variety of English. Relying on a framework of analysis…

  5. Iranian Validation of the Identity Style Inventory

    ERIC Educational Resources Information Center

    Crocetti, Elisabetta; Shokri, Omid

    2010-01-01

    The purpose of this study was to validate the Iranian version of the Identity Style Inventory (ISI). Participants were 376 (42% males) university students. Confirmatory factor analyses revealed a clear three-factor structure of identity style and a mono-factor structure of commitment in the overall sample as well as in gender subgroups. Convergent…

  6. Ethnicity, Identity and Educational Achievement in Mexico

    ERIC Educational Resources Information Center

    Flores-Crespo, Pedro

    2007-01-01

    Identity is central for research on education since, under certain conditions, it may influence school choice, career preferences and classroom behaviour. Identity also determines disposition toward schooling because it may have the capacity to shape and modify the values, beliefs and characteristics that distinguish one person from another, by…

  7. Identity, Language Learning, and Social Change

    ERIC Educational Resources Information Center

    Norton, Bonny; Toohey, Kelleen

    2011-01-01

    In this review article on identity, language learning, and social change, we argue that contemporary poststructuralist theories of language, identity, and power offer new perspectives on language learning and teaching, and have been of considerable interest in our field. We first review poststructuralist theories of language, subjectivity, and…

  8. Speaking of Gender Identity: Theoretical Approaches.

    ERIC Educational Resources Information Center

    Freedman, Susan A.

    Various definitions of gender identity have ranged from recognition of one's biological sex to an individual's sense of masculinity or femininity. For the purpose of this paper, which examines some of the theoretical approaches to the subject, gender identity will be defined as "the degree to which individuals are 'aware' of and accept their…

  9. New Amazonian geographies: emerging identities and landscapes

    Microsoft Academic Search

    Jacqueline M. Vadjunec; Marianne Schmink; Alyson L. Greiner

    2011-01-01

    Common stereotypes of a homogeneous Amazonia belie the complexity and diversity of peoples and landscapes across the region. Although often invisible to the outside world, diverse peoples—indigenous, traditional, migrant, urban dwellers and others—actively construct their identities and shape cultural and political landscapes in diverse ways throughout the region. This volume combines political ecology, with its emphasis on identity, politics, and

  10. Psychosocial Identity Development and Cultural Others.

    ERIC Educational Resources Information Center

    Hoare, Carol H.

    1991-01-01

    Contends that identity is constituted differently depending on the culture of origin. Against backdrop of U.S. individualism, explores cultural relativity of identity and pseudospeciation (false sense of cultural specialness). Notes that this literature grounds prejudice in evolution itself and provides reasons for movement beyond individualism to…

  11. Experiments with three identical ultraprecision machine tools

    SciTech Connect

    Evans, C.; Hannah, P.; Rhorer, R.

    1988-01-01

    This paper outlines the underlying philosophy of, and reports preliminary results from experiments with three nominally identical diamond turning machines. Identical tools, specially fabricated from the same diamond, were used to machine mirrors from blanks cut from the same base material using previously specified process parameters; parts produced are compared. 8 refs., 14 figs.

  12. Achievement Goal Orientations and Identity Formation Styles

    ERIC Educational Resources Information Center

    Kaplan, Avi; Flum, Hanoch

    2010-01-01

    The present article points to shared underlying theoretical assumptions and central processes of a prominent academic motivation perspective--achievement goal theory--and recent process perspectives in the identity formation literature, and more specifically, identity formation styles. The review highlights the shared definition of achievement…

  13. 40 CFR 720.85 - Chemical identity.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...the chemical identity of the substance to the maximum...submitter either that one of the proposed generic names...submitter claims chemical identity to be confidential under...paragraph (a)(2) of this section, EPA will issue for publication in...

  14. 40 CFR 720.85 - Chemical identity.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...the chemical identity of the substance to the maximum...submitter either that one of the proposed generic names...submitter claims chemical identity to be confidential under...paragraph (a)(2) of this section, EPA will issue for publication in...

  15. 40 CFR 720.85 - Chemical identity.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...the chemical identity of the substance to the maximum...submitter either that one of the proposed generic names...submitter claims chemical identity to be confidential under...paragraph (a)(2) of this section, EPA will issue for publication in...

  16. 40 CFR 720.85 - Chemical identity.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...the chemical identity of the substance to the maximum...submitter either that one of the proposed generic names...submitter claims chemical identity to be confidential under...paragraph (a)(2) of this section, EPA will issue for publication in...

  17. 40 CFR 720.85 - Chemical identity.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...the chemical identity of the substance to the maximum...submitter either that one of the proposed generic names...submitter claims chemical identity to be confidential under...paragraph (a)(2) of this section, EPA will issue for publication in...

  18. Architectural mismatch issues in identity management deployment

    Microsoft Academic Search

    Mads Schaarup Andersen

    2010-01-01

    Integrating Commercial Off-The-Shelf products in a company's software product portfolio offers business value, but introduces challenges from a software architecture perspective. In this paper, the research challenges in relation to identity management in the Danish municipality administration system called Opus, are outlined. Opus BRS is the identity management part of Opus. Opus integrates SAP, legacy mainframe systems, and other third

  19. Gender and Identity in Mandarin Chinese Blogosphere 

    E-print Network

    Siqun, Xu

    2007-11-28

    The research on gender and identity in Mandarin Chinese CMC sphere has been less explored from a sociolinguistic point of view, which motivates me to do some relevant studies to shed light on the issues of gender difference and online identity...

  20. Youth identity formation and contemporary alcohol marketing

    Microsoft Academic Search

    Timothy McCreanor; Alison Greenaway; Helen Moewaka Barnes; Suaree Borell; Amanda Gregory

    2005-01-01

    This paper considers linkages between contemporary marketing theory and practice, and emerging conceptualizations of identity, to discuss implications for public health concerns over alcohol use among young people. Particular attention is paid to the theorizing of consumption as a component of youth identities and the ways in which developments of marketing praxis orients to such schemata. The authors’ analyses of

  1. Intercultural Allusion in Transcultural Identity Narratives

    ERIC Educational Resources Information Center

    Sell, Jonathan P. A.

    2004-01-01

    This paper attempts to provide a theoretical framework for the use of intercultural allusion in narratives of transcultural identity. Identity is taken to be narrative in performance, one element of which, intercultural allusion, serves pragmatically to broker the transcultured subject's insertion into the host culture. The paper then shows how…

  2. Young Women Online: Collaboratively Constructing Identities

    ERIC Educational Resources Information Center

    Paechter, Carrie

    2013-01-01

    In this paper I examine how young women construct their identities with others in online communities. I argue that the proliferation of social networking and its popularity among young people means that performed identities are increasingly collaboratively constructed, with the individual having less control over their public image than was…

  3. SUSY Ward identities, Superamplitudes, and Counterterms

    E-print Network

    Elvang, Henriette

    Ward identities of SUSY and R-symmetry relate n-point amplitudes in supersymmetric theories. We review recent work in which theseWard identities are solved in N = 4 SYM and N = 8 supergravity. The solution, valid at both ...

  4. Constructing a Lemko Identity: Tactics of Belonging

    ERIC Educational Resources Information Center

    Hornsby, Michael

    2015-01-01

    Lemko identity in Poland is contested in a number of contexts, including social, linguistic and political domains, among others. The members of this minority have to learn to negotiate multiple identities, not only from an in-group perspective but also in interactions with the majority community in Poland. This paper examines how the Lemkos…

  5. Implicit and Explicit Exercise and Sedentary Identity

    ERIC Educational Resources Information Center

    Berry, Tanya R.; Strachan, Shaelyn M.

    2012-01-01

    We examined the relationship between implicit and explicit "exerciser" and "sedentary" self-identity when activated by stereotypes. Undergraduate participants (N = 141) wrote essays about university students who either liked to exercise or engage in sedentary activities. This was followed by an implicit identity task and an explicit measure of…

  6. An Identity on SU(2) Invariants

    E-print Network

    Herry J. Kwee; Richard F. Lebed

    2007-11-27

    We prove an identity [Eq. (1) below] among SU(2) 6j and 9j symbols that generalizes the Biedenharn-Elliott sum rule. We prove the result using diagrammatic techniques (briefly reviewed here), and then provide an algebraic proof. This identity is useful for studying meson-baryon scattering in which an extra isoscalar meson is produced.

  7. An identity-authentication system using fingerprints

    Microsoft Academic Search

    R. Bolle; Lin Hong; AK Jain; S. Pankanti

    1997-01-01

    Fingerprint verification is an important biometric technique for personal identification. In this paper, we describe the design and implementation of a prototype automatic identity authentication system which uses fingerprints to authenticate the identity of an individual. We have developed an improved minutiae extraction algorithm which is faster and more accurate than our earlier algo- rithm (58). An alignment-based minutiae matching

  8. The Discursive Negotiation of International Student Identities

    ERIC Educational Resources Information Center

    Haugh, Michael

    2008-01-01

    Research about identity has undergone a discursive turn in recent years, with a shift from conceptualising identity as an essentialistic, pre-existing construct that drives social interaction, to a more fluid and hybrid construct that is constituted through discourse. As a result, a number of recent studies investigating the construction of…

  9. Principles of composition and criteria of identity

    Microsoft Academic Search

    Katherine Hawley

    2006-01-01

    I argue that, despite van Inwagen's pessimism about the task, it is worth looking for answers to his General Composition Question. Such answers or ‘principles of composition’ tell us about the relationship between an object and its parts. I compare principles of composition with criteria of identity, arguing that, just as different sorts of thing satisfy different criteria of identity,

  10. Racial identity development: A construct validity study

    Microsoft Academic Search

    Kellie Victoria Walker

    1993-01-01

    In recent years, Black identity and ego development have become focal constructs in psychological theory and research. They both attempt to define the self and the process by which an individual's personality takes shape and meaning. Black identity deals specifically with an individual's awareness, values, attitudes, and beliefs about being Black, whereas ego development deals more universally with how an

  11. I Alumnus: Understanding Early Alumni Identity

    ERIC Educational Resources Information Center

    Pung, Barnaby

    2013-01-01

    This dissertation sought to provide a better understanding of early alumnus identity at a public Midwestern university. Unlike a majority of alumni studies, this study used a qualitative case study methodology to examine alumni identity among participants through the use of personal interviews. Participants were 10-11 years post graduation from…

  12. Semiotics of Identity: Politics and Education

    ERIC Educational Resources Information Center

    Szkudlarek, Tomasz

    2011-01-01

    In this text I concentrate on semiotic aspects of the theory of political identity in the work of Ernesto Laclau, and especially on the connection between metaphors, metonymies, catachreses and synecdoches. Those tropes are of ontological status, and therefore they are of key importance in understanding the discursive "production" of identity in…

  13. Autobiographic Notes on the Identity Crisis

    ERIC Educational Resources Information Center

    Erikson, Erik H.

    1970-01-01

    The author describes his training conducted by Anna Freud and the emergence of his concepts of identity and identity crisis. He recapitulates his conceptual ancestry, insofar as it originates in psychoanalysis, in order to indicate that psychoanalysis represents a very special admixture of laboratory conditions, methodological climate, and…

  14. The Ontogeny of Career Identities in Adolescence

    ERIC Educational Resources Information Center

    Malanchuk, Oksana; Messersmith, Emily E.; Eccles, Jacquelynne S.

    2010-01-01

    Exploration and identity formation are primary developmental tasks during adolescence and the transition to adulthood. Yet little is known about occupational identity formation and growth during this period of life. In this chapter, the authors describe their ongoing research on this topic. First, they present their findings on the ontogeny of the…

  15. Aphasia as identity theft: Theory and practice

    Microsoft Academic Search

    Barbara Shadden

    2005-01-01

    Background: The impact of aphasia on identity is frequently acknowledged, but there have been few theoretical or research publications focusing on identity as an explanatory construct in understanding quality of life issues for persons with aphasia and their significant others. This article is abbreviated from a keynote address at the 2004 Clinical Aphasiology Conference.Aims: The purpose of this article is

  16. Identity theft prevention in the healthcare setting.

    PubMed

    Warren, Bryan

    2005-01-01

    How a healthcare security department has undertaken a program to prevent employees, patients, and visitors from becoming victims of Identity Theft as well as providing help for victims of this crime in mitigating their losses. An Identity Theft affidavit for ID theft victims is illustrated. PMID:16535940

  17. Identity theft, spyware and the law

    Microsoft Academic Search

    Timothy R. Loibl

    2005-01-01

    Identity theft has become a huge problem in today's society. With the advent of the computer age, came the need for information on demand. This information on demand not only made it easier for authorized users to get information, but also for unauthorized users. One-way identity thieves gain access to personal information is through the use of spyware programs. According

  18. Measuring Identity Processes in Family Relational Empowerment

    ERIC Educational Resources Information Center

    Buckley-Walker, Kellie; Crowe, Trevor Patrick; Caputi, Peter

    2013-01-01

    This paper outlines a procedure for measuring personal identity that uses self-characterisations to elicit and integrate ideographic data for fixed construct repertory grid nomothetic applications. There is a focus on how family members view their personal identities when they are recovering from the impacts of having a "loved one" with a mental…

  19. Sex-specific norms code face identity.

    PubMed

    Rhodes, Gillian; Jaquet, Emma; Jeffery, Linda; Evangelista, Emma; Keane, Jill; Calder, Andrew J

    2011-01-01

    Face identity aftereffects suggest that an average face, which is continuously updated by experience, functions as a norm for coding identity. Sex-contingent figural face aftereffects indicate that different norms are maintained for male and female faces but do not directly implicate them in coding identity. Here, we investigated whether sex-specific norms are used to code the identities of male and female faces or whether a generic, androgynous norm is used for all faces. We measured identity aftereffects for adapt-test pairs that were opposite relative to a sex-specific average and pairs that were opposite relative to an androgynous average. Identity aftereffects are generally larger for adapt-test pairs that lie opposite an average face, which functions as a norm for coding identity, than those that do not. Therefore, we reasoned that whichever average gives the larger aftereffect would be closer to the true psychological norm. Aftereffects were substantially and significantly larger for pairs that lie opposite a sex-specific than an androgynous average. This difference remained significant after correcting for differences in test trajectory length. These results indicate that, despite the common structure shared by all faces, identity is coded using sex-specific norms. We suggest that the use of category-specific norms may increase coding efficiency and help us discriminate thousands of faces despite their similarity as patterns. PMID:21199895

  20. Exploring Relationships between Teacher Identities and Disciplinarity

    ERIC Educational Resources Information Center

    Ballantyne, Julie; Grootenboer, Peter

    2012-01-01

    The relationships between discipline specialization, teacher identity, and pedagogy can be seen as the crux of practice in the music classroom--impacting on all the actions of the teacher, both within and outside the classroom. Crucially, the impact of music teacher identity on the nature of music teaching and learning is one that has the…

  1. Interculturalism and the Pendulum of Identity

    ERIC Educational Resources Information Center

    Svirsky, Marcelo; Mor-Sommerfeld, Aura

    2012-01-01

    This article offers a critical appraisal of the role played by cultural identity in intercultural bilingual Arabic-Hebrew schools in Israel. While engineered as oases of interculturalism amidst a life of ethnic segregation, such schools ultimately confront serious difficulties in escaping the constraints of identity politics and representation.…

  2. Music and Identity Formation in Older Adults

    ERIC Educational Resources Information Center

    Dabback, William M.

    2010-01-01

    For many individuals, engagement with the arts and music in later life plays a significant role in identity formation. Research indicates that music engagement facilitates successful aging. While participants may or may not establish identities as musicians, musical activities provide interactions and opportunities that facilitate their…

  3. Development of Deaf Identity: An Ethnographic Study

    ERIC Educational Resources Information Center

    McIlroy, Guy; Storbeck, Claudine

    2011-01-01

    This ethnographic study explores the identity development of 9 deaf participants through the narratives of their educational experiences in either mainstream or special schools for the Deaf. This exploration goes beyond a binary conceptualization of deaf identity that allows for only the medical and social models and proposes a bicultural…

  4. "Crazyghettosmart": A Case Study in Latina Identities

    ERIC Educational Resources Information Center

    Vetter, Amy M.; Fairbanks, Colleen; Ariail, Mary

    2011-01-01

    Drawing from recent scholarship that examines schooling and the shifting terrain of youth identities, this study examines the identity constructions of Jessica, a Latina high school student. Our portrait of Jessica is part of a larger longitudinal study in which the middle and high school experiences of three Latinas, including Jessica, were…

  5. Sacred communities: religion and national identities

    Microsoft Academic Search

    James Dingley

    2011-01-01

    This article aims to review the relationships between religion and national identity as revealed through some 23 articles in National Identities published over the last 10 years. In addition I will also try to lay out a broad perspective on religion and nation from which to develop this review. Specifically the message is that religion has not gone away and

  6. The Varied Uses of Readability Measurement.

    ERIC Educational Resources Information Center

    Fry, Edward

    Readability formulas have varied uses. In education they are used to match children's reading ability to the difficulty level of material, select stories and books for classroom use and for individual students' particular needs, select textbooks and other reading materials, aid educational research, and check reading materials of newly literate…

  7. Time-varying joint distribution through copulas

    Microsoft Academic Search

    M. Concepcion Ausin; Hedibert F. Lopes

    2010-01-01

    This paper deals with the analysis of temporal dependence in multivariate time series. The dependence structure between the marginal series is modelled through the use of copulas which, unlike the correlation matrix, give a complete description of the joint distribution. The param- eters of the copula function vary through time following certain evolution equations depending on their previous values and

  8. Relaxation Assessment with Varied Structured Milieu (RELAX).

    ERIC Educational Resources Information Center

    Cassel, Russell N.; Cassel, Susie L.

    1983-01-01

    Describes Relaxation Assessment with Varied Structured Milieu (RELAX), a clinical program designed to assess the degree to which an individual is able to demonstrate self-control for overall general relaxation. The program is designed for use with the Cassel Biosensors biofeedback equipment. (JAC)

  9. Venturi Tube with Varying Mass Flow

    NASA Technical Reports Server (NTRS)

    Regenscheit, B.

    1948-01-01

    Measurements on three tubes with flow regulated by suction at the trainling edge of the tube are described. It was possible to vary the mass of air flowing through the tube over a large range. Such tubes could be used for shrouded propellers.

  10. Adaptive Template Moderated Spatially Varying Statistical Classification

    Microsoft Academic Search

    Simon K. Warfield; Michael Kaus; Ferenc A. Jolesz; Ron Kikinis

    1998-01-01

    A novel image segmentation algorithm was developed to allow the automatic segmentation of both normal and abnormal anatomy. The new algo- rithm is a form of spatially varying classification (SVC), in which an explicit anatomical template is used to moderate the segmentation obtained by k Nearest Neighbour ( -NN) statistical classification. The new algorithm consist s of an iter- ated

  11. Time-Varying World Market Integration

    Microsoft Academic Search

    Geert Bekaert; Campbell R Harvey

    1995-01-01

    We propose a measure of capital market integration arising from a conditional regime-switching model. Our measure allows us to describe expected returns in countries that are segmented from world capital markets in one part of the sample and become integrated later in the sample. We find that a number of emerging markets exhibit time-varying integration. Some markets appear more integrated

  12. INVESTIGATION The Genetic Consequences of Spatially Varying

    E-print Network

    Bernatchez, Louis

    a stable polymorphic equilibrium at these loci. Our results suggest that some geneticINVESTIGATION The Genetic Consequences of Spatially Varying Selection in the Panmictic American Eel-8000 Aarhus C, Denmark ABSTRACT Our understanding of the genetic basis of local adaptation has recently

  13. Boiling Radial Flow in Fractures of Varying

    E-print Network

    Stanford University

    SGP-TR-166 Boiling Radial Flow in Fractures of Varying Wall Porosity Robb Allan Barnitt June 2000 and boiling convective heat transfer, with boiling flow in a rock fracture. A series of experiments observed differences in boiling regimes and behavior, and attempted to quantify a boiling convection coefficient

  14. Identity Based Broadcast Encryption Based on One to Many Identity Based Proxy Re-encryption

    E-print Network

    Identity Based Broadcast Encryption Based on One to Many Identity Based Proxy Re-encryption Xu Armed Police Force, 710086, P. R. China E-mail:wangxahq@yahoo.com.cn Abstract-- Broadcast encryption non-revoked receivers can decrypt them. Identity based broadcast encryption schemes are public key

  15. Social representations of the Holocaust and Jewish Israeli identity construction: insights from identity process theory

    Microsoft Academic Search

    Rusi Jaspal; Maya A. Yampolsky

    2011-01-01

    This study explores how a group of young Israeli Jews understood and defined their ethno-national identities, focusing upon the role of social representations of the Holocaust in the construction of Jewish Israeli identity. Eleven individuals were interviewed using a semi-structured interview schedule. Transcripts were subjected to interpretative phenomenological analysis. The analysis was informed by identity process theory and social representations

  16. Identity Theft --Appendix 2 Page Page 1 of 3 IDENTITY FRAUD VICTIM WORKSHEET

    E-print Network

    Oklahoma, University of

    Identity Theft -- Appendix 2 Page Page 1 of 3 IDENTITY FRAUD VICTIM WORKSHEET Credit Bureaus: _____________________________________________________________________________________ _____________________________________________________________________________________ #12;Identity Theft -- Appendix 2 Page Page 2 of 3 Banks, Credit Card Issuers and Other Creditors -- Report Fraud Bureau: Equifax Phone Number: 1-800-525-6285 Date Contacted

  17. Can Psychophysical Identity Save Mental Causation? The popularity of psychophysical property identity has waxed and waned

    E-print Network

    Habib, Ayman

    1 Can Psychophysical Identity Save Mental Causation? The popularity of psychophysical property identity has waxed and waned since its presentation by the Australian materialists of the 1950s. It went it has been thought that psychophysical identity is useful for solving difficult problems as to how

  18. The public face of teacher identity—narrative construction of teacher identity in public policy documents

    Microsoft Academic Search

    Gunn Elisabeth Søreide

    2007-01-01

    This article will illuminate how public narratives about teachers within the Norwegian national curriculum documents regulating teacher education (1999 and 2003) and elementary school (1997) construct teacher identities. The aim is not to define what identity Norwegian teachers as a group or individuals possess, but to describe how teacher identity is narratively constructed in some selected public policy texts. The

  19. Sense of identity in Alzheimer's Disease Sense of identity in advanced Alzheimer's dementia: a cognitive

    E-print Network

    Boyer, Edmond

    Sense of identity in Alzheimer's Disease 1 Sense of identity in advanced Alzheimer's dementia was administered to 16 AD patients in the mild to severe stages of dementia and to 16 matched healthy controls. Keywords Self, Dementia, Sense of Identity, Alzheimers disease, Sameness, Selfhood Highlights Sense

  20. Looking through "Northern Exposure" at Jewish American Identity and the Communication Theory of Identity.

    ERIC Educational Resources Information Center

    Hecht, Michael L.; Faulkner, Sandra L.; Meyer, C. R.; Niles, TA; Golden, Doug; Cutler, Melanie

    2002-01-01

    Explores Jewish American identity from a communication theory of identity perspective. Analyzes six episodes of the television program "Northern Exposure" for their representation of Jewish American identity, and explains how the episodes were then shown to 26 Jewish Americans. Notes that the study focused on a communal representation of this…

  1. The Identity Game: Constructing and Enabling Multicultural Identities in a Finland-Swedish School Setting

    ERIC Educational Resources Information Center

    Forsman, Liselott; Hummelstedt-Djedou, Ida

    2014-01-01

    This study, building on previous studies stressing the bond between positive sense of ethnic identity and school belonging, puts at its center the very process of ethnic identity construction. Thus, identity is viewed as co-constructed, within a social-constructionist perspective on learning. The study is two-folded. It starts out by describing…

  2. Barriers to ego identity status formation: a contextual qualification of Marcia's identity status paradigm

    Microsoft Academic Search

    AMY E. YODER

    2000-01-01

    While many psychological, sociological and educational researchers acknowledge that ego identity formation is a socially embedded process, others have found that identity research often focuses, almost exclusively, on internal psychological development. The concept of “barriers” provides a means by which to describe external influences associated with adolescent and young adult ego identity exploration and commitment processes which affect and possibly

  3. Vocal caricatures reveal signatures of speaker identity

    PubMed Central

    López, Sabrina; Riera, Pablo; Assaneo, María Florencia; Eguía, Manuel; Sigman, Mariano; Trevisan, Marcos A.

    2013-01-01

    What are the features that impersonators select to elicit a speaker's identity? We built a voice database of public figures (targets) and imitations produced by professional impersonators. They produced one imitation based on their memory of the target (caricature) and another one after listening to the target audio (replica). A set of naive participants then judged identity and similarity of pairs of voices. Identity was better evoked by the caricatures and replicas were perceived to be closer to the targets in terms of voice similarity. We used this data to map relevant acoustic dimensions for each task. Our results indicate that speaker identity is mainly associated with vocal tract features, while perception of voice similarity is related to vocal folds parameters. We therefore show the way in which acoustic caricatures emphasize identity features at the cost of loosing similarity, which allows drawing an analogy with caricatures in the visual space. PMID:24297083

  4. Effect of Whole-Body Vibration on Speech. Part 2; Effect on Intelligibility

    NASA Technical Reports Server (NTRS)

    Begault, Durand R.

    2011-01-01

    The effect on speech intelligibility was measured for speech where talkers reading Diagnostic Rhyme Test material were exposed to 0.7 g whole body vibration to simulate space vehicle launch. Across all talkers, the effect of vibration was to degrade the percentage of correctly transcribed words from 83% to 74%. The magnitude of the effect of vibration on speech communication varies between individuals, for both talkers and listeners. A worst case scenario for intelligibility would be the most sensitive listener hearing the most sensitive talker; one participant s intelligibility was reduced by 26% (97% to 71%) for one of the talkers.

  5. Medical identity theft: an emerging problem for informatics.

    PubMed

    Gillette, William; Patrick, Timothy B

    2007-01-01

    This poster reports a preliminary review of medical identity theft. Financial identity theft has received a great deal of media attention. Medical identity theft is a particular kind of identity theft that has received little attention. There are two main subtypes of medical identity theft. In the first type the stolen medical identity is used to receive medical services, and in the second type the stolen medical identity is used to commit healthcare fraud. PMID:18694064

  6. Columbia University Varying Electron Cyclotron ResonanceVarying Electron Cyclotron Resonance

    E-print Network

    Columbia University Varying Electron Cyclotron ResonanceVarying Electron Cyclotron Resonance currently via two electron cyclotron resonance heating (ECRH) sources: 2.5 kW at 2.45 GHz and 2.5 kW at 6 discharge can be used to turn plasma instabilities on and off. #12;OutlineOutline Electron cyclotron

  7. Developmental priority of identity conservation: acceleration of identity and equivalence in normal and moderately retarded children.

    PubMed

    Litrownik, A J; Franzini, L R; Livingston, M K; Harvey, S

    1978-03-01

    In an attempt to clarify the chronological relationship between identity and equivalence conservation, normal preschool-aged children (experiment 1) were exposed to brief videotape demonstrations of a model conserving identity and equivalence, identity only, equivalence only, or neither. Subsequent performances indicate that identity was easier to accelerate than equivalence, and training in both identity and equivalence appeared to be most effective in accelerating conservation. Trainable mentally retarded (TMR) children were then exposed to either the identity-equivalence-conserving or control model (experiment 2). This population, which some have argued remains at a preoperational level of functioning, was more likely to conserve identity than equivalence. In addition, conservation in the training group increased following training, though these gains were not maintained over a 3-week retention interval. PMID:657891

  8. Career identity in the veterinary profession.

    PubMed

    Page-Jones, S; Abbey, G

    2015-04-25

    This research investigates vet and vet nurse career identity through the qualitative methodology of narrative enquiry. It derives learning and understanding from these empirical data to assist the veterinary profession to adjust to the changing industry landscape. Through a case series of 20 vets and vet nurses' career stories, this paper seeks understanding about career identity and its impact on individuals and organisations in the light of industry consolidation. Findings suggest that career is central to identity for many veterinary professionals who tend to have a strong sense of self; this is particularly evident around self as learner and technically competent, teacher and educator, ethical and moral and dedicated and resilient. Consequently, mismatches between 'who I am' and 'what I do' tend not to lead to identity customisation (to fit self into role or organisation) but to the search for alternative, more identity-compatible employment. This study offers a valuable insight for employers, veterinary professionals and universities. It suggests that businesses can gain competitive advantage and employees achieve validation and enrichment by working towards organisational and individual identity congruence and that teaching veterinary professionals with contemporary business in mind may develop graduates with a more sustainable identity. PMID:25564471

  9. Identity-based motivation: Implications for intervention

    PubMed Central

    Oyserman, Daphna; Destin, Mesmin

    2010-01-01

    Children want to succeed academically and attend college, but their actual attainment often lags behind; some groups (e.g., boys, low-income children) are particularly likely to experience this gap. Social structural factors matter, influencing this gap in part by affecting children's perceptions of what is possible for them and people like them in the future. Interventions that focus on this macro-micro interface can boost children's attainment. We articulate the processes underlying these effects using an integrative culturally sensitive framework entitled identity-based motivation (IBM, Oyserman, 2007, 2009a, 2009b). The IBM model assumes that identities are dynamically constructed in context. People interpret situations and difficulties in ways that are congruent with currently active identities and prefer identity-congruent to identity-incongruent actions. When action feels identity-congruent, experienced difficulty highlights that the behavior is important and meaningful. When action feels identity-incongruent, the same difficulty suggests that the behavior is pointless and “not for people like me.” PMID:21516204

  10. The Thermal Collector With Varied Glass Covers

    SciTech Connect

    Luminosu, I.; Pop, N. [Department of Physical Foundation of Engineering, 'Politehnica' University of Timisoara, B-dul V. Parvan, No. 2, Timisoara, 300223 (Romania)

    2010-08-04

    The thermal collector with varied glass covers represents an innovation realized in order to build a collector able to reach the desired temperature by collecting the solar radiation from the smallest surface, with the highest efficiency. In the case of the thermal collector with variable cover glasses, the number of the glass plates covering the absorber increases together with the length of the circulation pipe for the working fluid. The thermal collector with varied glass covers compared to the conventional collector better meet user requirements because: for the same temperature increase, has the collecting area smaller; for the same collection area, realizes the highest temperature increase and has the highest efficiency. This works is addressed to researchers in the solar energy and to engineers responsible with air-conditioning systems design or industrial and agricultural products drying.

  11. The Thermal Collector With Varied Glass Covers

    NASA Astrophysics Data System (ADS)

    Luminosu, I.; Pop, N.

    2010-08-01

    The thermal collector with varied glass covers represents an innovation realized in order to build a collector able to reach the desired temperature by collecting the solar radiation from the smallest surface, with the highest efficiency. In the case of the thermal collector with variable cover glasses, the number of the glass plates covering the absorber increases together with the length of the circulation pipe for the working fluid. The thermal collector with varied glass covers compared to the conventional collector better meet user requirements because: for the same temperature increase, has the collecting area smaller; for the same collection area, realizes the highest temperature increase and has the highest efficiency. This works is addressed to researchers in the solar energy and to engineers responsible with air-conditioning systems design or industrial and agricultural products drying.

  12. Varying potential silicon carbide gas sensor

    NASA Technical Reports Server (NTRS)

    Shields, Virgil B. (Inventor); Ryan, Margaret A. (Inventor); Williams, Roger M. (Inventor)

    1997-01-01

    A hydrocarbon gas detection device operates by dissociating or electro-chemically oxidizing hydrocarbons adsorbed to a silicon carbide detection layer. Dissociation or oxidation are driven by a varying potential applied to the detection layer. Different hydrocarbon species undergo reaction at different applied potentials so that the device is able to discriminate among various hydrocarbon species. The device can operate at temperatures between 100.degree. C. and at least 650.degree. C., allowing hydrocarbon detection in hot exhaust gases. The dissociation reaction is detected either as a change in a capacitor or, preferably, as a change of current flow through an FET which incorporates the silicon carbide detection layers. The silicon carbide detection layer can be augmented with a pad of catalytic material which provides a signal without an applied potential. Comparisons between the catalytically produced signal and the varying potential produced signal may further help identify the hydrocarbon present.

  13. Black Hole Censorship of Varying Fundamental Constants

    E-print Network

    Jane H MacGibbon

    2006-04-04

    Here it is shown that the variation in the fine structure constant measured by Webb et al. matches the theoretically derived value for the maximum variation in the electronic charge permitted by the Generalized Second Law of Thermodynamics for black holes accreting and emitting in the present cosmic microwave background. It is postulated that the constants of nature, independently or dependently, vary at the maximal rate allowed by the Generalized Second Law of Thermodynamics.

  14. Human response to varying concentrations of toluene

    Microsoft Academic Search

    Jesper Bælum; Gunnar R. Lundgvist; Lars Mølhave; Niels Trolle Andersen

    1990-01-01

    Summary  Thirty two males and 39 females aged 31–50 were exposed for 7 h to one of the three following conditions: (1) Clean air, (2)\\u000a constant exposure to 100 ppm toluene, or (3) a varying exposure with the same time-weighted average, but with peaks of 300\\u000a ppm every 30 min. During exposure the subjects exercised in three 15-min periods with a

  15. Reminders of a positively stereotyped identity when facing stereotype threat: Identity consistency and identity accessibility as mediating mechanisms

    E-print Network

    Danaher, Kelly

    2011-12-31

    these methodological issues, Study 2 revealed decrements in math performance for women reminded of gender and college stereotypes, though this effect was moderated by pre-test math identification as well as administration order of the math test and identity...

  16. Spatially varying registration using Gaussian processes.

    PubMed

    Gerig, Thomas; Shahim, Kamal; Reyes, Mauricio; Vetter, Thomas; Lüthi, Marcel

    2014-01-01

    In this paper we propose a new approach for spatially-varying registration using Gaussian process priors. The method is based on the idea of spectral tempering, i.e. the spectrum of the Gaussian process is modified depending on a user defined tempering function. The result is a non-stationary Gaussian process, which induces different amount of smoothness in different areas. In contrast to most other schemes for spatially-varying registration, our approach does not require any change in the registration algorithm itself, but only affects the prior model. Thus we can obtain spatially-varying versions of any registration method whose deformation prior can be formulated in terms of a Gaussian process. This includes for example most spline-based models, but also statistical shape or deformation models. We present results for the problem of atlas based skull-registration of cone beam CT images. These datasets are difficult to register as they contain a large amount of noise around the teeth. We show that with our method we can become robust against noise, but still obtain accurate correspondence where the data is clean. PMID:25485406

  17. Dissociative identity disorder: a controversial diagnosis.

    PubMed

    Gillig, Paulette Marie

    2009-03-01

    A brief description of the controversies surrounding the diagnosis of dissociative identity disorder is presented, followed by a discussion of the proposed similarities and differences between dissociative identity disorder and borderline personality disorder. The phenomenon of autohypnosis in the context of early childhood sexual trauma and disordered attachment is discussed, as is the meaning of alters or alternate personalities. The author describes recent neurosciences research that may relate the symptoms of dissociative identity disorder to demonstrable disordered attention and memory processes. A clinical description of a typical patient presentation is included, plus some recommendations for approaches to treatment. PMID:19724751

  18. A Christian identity for the liberal state?

    PubMed

    Joppke, Christian

    2013-12-01

    It seems to be impossible for the liberal state to embrace a Christian identity, because 'liberalism' is exactly a device for separating state and religion. Discussing the implications of a recent decision of the European Court of Human Rights, Lautsi v. Italy (2011), I argue that this is not necessarily so. If paired with a liberal commitment to pluralism, a Christian identity might even be more inclusive of minority religions than a narrowly 'liberal' state identity, which has been the dominant response in Western Europe to the challenge of immigrant diversity, especially that of Muslim origins. PMID:24320068

  19. The Relationship Between Ego Identity, Personal Responsibility, and Facilitative Communication

    ERIC Educational Resources Information Center

    Neuber, Keith; Genthner, Robert

    1977-01-01

    Provides empirical evidence supporting Erikson's postulation of two ego identity status groups (identity achievement and identity diffusion). Shows that persons high in ego identity development demonstrate higher levels of intrapersonal and interpersonal psychological adjustment than persons low in ego identity. (RL)

  20. Fuzzy Identity-Based Encryption Amit Sahai1,

    E-print Network

    Sahai, Amit

    Fuzzy Identity-Based Encryption Amit Sahai1, and Brent Waters2 1 University of California, Los of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A Fuzzy IBE scheme allows for a private key for an identity

  1. An Analytical Model for University Identity and Reputation Strategy Work

    ERIC Educational Resources Information Center

    Steiner, Lars; Sundstrom, Agneta C.; Sammalisto, Kaisu

    2013-01-01

    Universities face increasing global competition, pressuring them to restructure and find new identities. A multidimensional model: identity, image and reputation of strategic university identity and reputation work is developed. The model includes: organizational identity; employee and student attitudes; symbolic identity; influence from…

  2. Racial and Ego Identity Development in Black Caribbean College Students

    ERIC Educational Resources Information Center

    Sanchez, Delida

    2013-01-01

    This study explored the relationships between racial identity attitudes and ego identity statuses among 255 Black Caribbean college students in the Northeast United States. Findings indicated that racial identity attitudes were predictive of ego identity statuses. Specifically, preencounter racial identity attitudes were predictive of lower scores…

  3. The Role of Gender in Adolescent Identity and Intimacy Decisions

    Microsoft Academic Search

    Arlene Confalone Lacombe; Judith Gay

    1998-01-01

    This study explored the relative importance of identity and intimacy in male and female adolescent decisions. One hundred twenty adolescents responded to 16 identity\\/intimacy dilemmas. Females had higher identity (and lower intimacy) scores than males. Identity scores were higher in scenarios with female protagonists. A content analysis of decision explanations showed females gave more explanations than males with identity and

  4. Anxiety Correlates of Sex-Role Identity

    ERIC Educational Resources Information Center

    Biaggio, Mary Kay; Nielsen, Elwin C.

    1976-01-01

    Examines some possible relationships between sex-role identity and other factors, specifically, openness vs. closedness, liberalism vs. conservatism, and other cross-sex vs. same-sex parent identification. (Author/RK)

  5. Identities in nonlinear realizations of supersymmetry

    NASA Astrophysics Data System (ADS)

    Liu, Haishan; Luo, Hui; Luo, Mingxing; Wang, Liucheng

    2012-11-01

    In this paper, we emphasize that a UV SUSY-breaking theory can be realized either linearly or nonlinearly. Both realizations form the dual descriptions of the UV SUSY-breaking theory. Guided by this observation, we find subtle identities involving the Goldstino field and matter fields in the standard nonlinear realization from trivial ones in the linear realization. Rather complicated integrands in the standard nonlinear realization are identified as total-divergences. Especially, identities only involving the Goldstino field reveal the self-consistency of the Grassmann algebra. As an application of these identities, we prove that the nonlinear Kahler potential without or with gauge interactions is unique, if the corresponding linear one is fixed. Our identities pick out the total-divergence terms and guarantee this uniqueness.

  6. Muslim identity and Islamic faith in Sarajevo.

    E-print Network

    Sorabji, Cornelia

    their distinct political identities within the fragile power balance system of Yugoslavia. The republic of Bosnia-Hercegovina is dominated by three such nationalities - the Serb, the Croat and the Muslim. These three correspond to three religious faiths...

  7. 21 CFR 701.11 - Identity labeling.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) COSMETICS COSMETIC LABELING Package Form § 701.11 Identity labeling. (a) The principal display panel of a cosmetic in package form shall bear as one of its...

  8. 21 CFR 701.11 - Identity labeling.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) COSMETICS COSMETIC LABELING Package Form § 701.11 Identity labeling. (a) The principal display panel of a cosmetic in package form shall bear as one of its...

  9. 21 CFR 701.11 - Identity labeling.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) COSMETICS COSMETIC LABELING Package Form § 701.11 Identity labeling. (a) The principal display panel of a cosmetic in package form shall bear as one of its...

  10. 21 CFR 701.11 - Identity labeling.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) COSMETICS COSMETIC LABELING Package Form § 701.11 Identity labeling. (a) The principal display panel of a cosmetic in package form shall bear as one of its...

  11. 21 CFR 701.11 - Identity labeling.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) COSMETICS COSMETIC LABELING Package Form § 701.11 Identity labeling. (a) The principal display panel of a cosmetic in package form shall bear as one of its...

  12. Identity Theft in Community Mental Health Patients

    PubMed Central

    Klopp, Jonathon; Konrad, Shane; Yanofski, Jason

    2007-01-01

    Identity theft is a serious problem in the United States, and persons with enduring mental illnesses may be particularly vulnerable to becoming victims of this crime. Victims of identity theft experience a variety of consequences that include financial loss and serious emotional distress. Little is known about the impact of identity theft on individuals with mental illnesses. The two cases from a community mental health center presented in this article demonstrate many of the facets that may be associated with an increased risk for becoming the victim of identity theft. A summary of preventive steps as well as steps involved in resolving the crime once one has become a victim are presented. PMID:20806029

  13. Measuring Professional Identity Development among Counselor Trainees

    ERIC Educational Resources Information Center

    Prosek, Elizabeth A.; Hurt, Kara M.

    2014-01-01

    This study examined the differences in professional identity development between novice and advanced counselor trainees (N = 161). Multivariate analyses of variance indicated significant differences between groups. Specifically, advanced counselor trainees demonstrated greater professional development compared with novice counselor trainees. No…

  14. Identity work and control in occupational communities

    E-print Network

    Van Maanen, John

    This chapter is about three highly intertwined concepts. The first concerns occupational communities and the work cultures they nourish. The second concerns the work identities that are valued (and devalued) in such ...

  15. Identical Individuals? Population Structure: How Individuals Differ

    E-print Network

    Caraco, Thomas

    aged individuals Individual life history: Age and net reproductive rate, R0 Population projection: Age structure and population projection #12;US Males #12;Survivorship (Ricklefs & Miller, 1999) FecundityIdentical Individuals? Population Structure: How Individuals Differ Significance for Population

  16. Gender Identity and Autism Spectrum Disorders

    PubMed Central

    van Schalkwyk, Gerrit I.; Klingensmith, Katherine; Volkmar, Fred R.

    2015-01-01

    In this review, we briefly summarize much of the existing literature on gender-related concerns and autism spectrum disorders (ASD), drawing attention to critical shortcomings in our current understanding and potential clinical implications. Some authors have concluded that gender identity disorder (GID), or gender dysphoria (GD), is more common in individuals with ASD, providing a range of potential explanations. However, existing literature is quantitatively limited, and our capacity to draw conclusions is further complicated by conceptual challenges regarding how gender identity is best understood. Discourses that emphasize gender as a component of identity formation are gaining prominence and seem particularly salient when applied to ASD. Individuals with ASD should enjoy equal rights with regard to treatment for gender dysphoria. Clinicians may be able to assist individuals in understanding this aspect of their identity by broadening the social frame and facilitating an exploration of gender roles.

  17. The identity of Salix conifera (Salicaceae)

    Microsoft Academic Search

    George W. Argus

    1984-01-01

    The nameSalix conifera Wangenh. is considered and its identity is shown to be the same as the hybridS. discolor × humilis. It is lectotypified by Wangenheim's figure supplemented by his description and diagnosis.

  18. AI Technologies to Defeat Identity Theft Vulnerabilities

    Microsoft Academic Search

    Latanya Sweeney

    When a large number of citizens are at risk to identity theft, national security and economic prosperity are threatened. This work shows that thousands of Americans are at such risk, and introduces technology, named \\

  19. Parfit, personal identity, and what matters

    E-print Network

    Splawn, Clay Davis

    1996-01-01

    description of Parfit's arguments that lead to his radical conclusion. This includes an explication of his Spectra and Fission Arguments, each of which are then assessed. The second task is a description and evaluation of Parfit's replacement for identity...

  20. Identity Development Among Sexual-Minority Youth

    Microsoft Academic Search

    Ritch C. Savin-Williams

    \\u000a \\u000a Sexual identity is the name and meaning individuals assign to themselves based on the most salient sexual aspects of their life – such as\\u000a sexual attractions, fantasies, desires, and behaviors. Sexual identities usually fall within existing social categories, such\\u000a as straight, bisexual, or lesbian\\/gay, and are historically and culturally specific. Youth in today’s cohort have expanded\\u000a the list of sexual

  1. Islamabad: The Struggle for Pakistan's Identity

    E-print Network

    Siddiqui, Eman

    2012-04-01

    Islamabad: The Struggle for Pakistan's Identity Eman Siddiqui ABSTRACT "The capital of a country is the focus and the center of the people's ambitions and desires, and it is wrong to put them in an existing city," Pakistan's President General... Ayub Khan declared the need for a new capital for a young Pakistan in 1958. General Ayub's desire required bringing about greater national unity by rejecting a cultural baggage of the past for a new national identity. This premise disqualified...

  2. Amalgamated Codazzi Raychaudhuri identity for foliation

    E-print Network

    Brandon Carter

    1997-05-13

    It is shown how a pure background tensor formalism provides a concise but explicit and highly flexible machinery for the generalised curvature analysis of individual embedded surfaces and foliations such as arise in the theory of topological defects in cosmological and other physical contexts. The unified treatment provided here shows how the relevant extension of the Raychaudhuri identity is related to the correspondingly extended Codazzi identity.

  3. Cybersecurity through an Identity Management System

    Microsoft Academic Search

    Elli Androulaki; Maritza Johnson; Binh Vo; Steven Bellovin

    Abstract— Cybersecurity is a concern,of growing,importance,as internet usage continues to spread,into new,areas. Strong authentication combined,with accountability is a powerful,measure,towards,indi- viduals’ protection against any type of identity theft. On the other hand, such strong identification raises privacy concerns. In this paper, we argue that authentication, accountability and privacy can be combined into a single, deployable identity management system,which,can,be adopted,to current,citizenship database

  4. Craft Idiocy, Erikson, and Footballing Identities

    Microsoft Academic Search

    John Gray; Remco Polman

    In our opinion the current talent development strategies and schemes of the England Football Association and clubs resulted in the development of unhealthy personalities and an un-mature sense of self-identity through the high exposure to a single area of competence. In particular, academy players are in danger of developing self-identities that are characterized as foreclosed. In some way this mirrors

  5. Identity and Peace Conflict Resolution in Africa

    Microsoft Academic Search

    Gerard Hagg; Peter Kagwanja

    The emergence of intra-state wars based on identity requires a reconfig- uring of existing conflict resolution mechanisms. The article recognises the limitations of liberal peace models originally configured to deal with inter-state conflicts, but increasingly applied to inter-ethnic conflicts with limited success and often disastrous effects. The article argues for the reconceptualisation of identities as building blocks of sustainable peace,

  6. Inversion identities for inhomogeneous face models

    E-print Network

    Holger Frahm; Nikos Karaiskos

    2014-07-25

    We derive exact inversion identities satisfied by the transfer matrix of inhomogeneous interaction-round-a-face (IRF) models with arbitrary boundary conditions using the underlying integrable structure and crossing properties of the local Boltzmann weights. For the critical restricted solid-on-solid (RSOS) models these identities together with some information on the analytical properties of the transfer matrix determine the spectrum completely and allow to derive the Bethe equations for both periodic and general open boundary conditions.

  7. 3D-printing spatially varying BRDFs.

    PubMed

    Rouiller, Olivier; Bickel, Bernd; Kautz, Jan; Matusik, Wojciech; Alexa, Marc

    2013-01-01

    A new method fabricates custom surface reflectance and spatially varying bidirectional reflectance distribution functions (svBRDFs). Researchers optimize a microgeometry for a range of normal distribution functions and simulate the resulting surface's effective reflectance. Using the simulation's results, they reproduce an input svBRDF's appearance by distributing the microgeometry on the printed material's surface. This method lets people print svBRDFs on planar samples with current 3D printing technology, even with a limited set of printing materials. It extends naturally to printing svBRDFs on arbitrary shapes. PMID:24808130

  8. Diffusion in spatially varying porous media

    E-print Network

    Bruna, Maria

    2015-01-01

    The problem of diffusion in a porous medium with a spatially varying porosity is considered. The particular microstructure analyzed comprises a collection of impenetrable spheres, though the methods developed are general. Two different approaches for calculating the effective diffusion coefficient as a function of the microstructure are presented. The first is a deterministic approach based on the method of multiple scales; the second is a stochastic approach for small volume fraction of spheres based on matched asymptotic expansions. We compare the two approaches, and we show good agreement between them in a number of example configurations.

  9. Linear Parameter Varying Control for Actuator Failure

    NASA Technical Reports Server (NTRS)

    Shin, Jong-Yeob; Wu, N. Eva; Belcastro, Christine; Bushnell, Dennis M. (Technical Monitor)

    2002-01-01

    A robust linear parameter varying (LPV) control synthesis is carried out for an HiMAT vehicle subject to loss of control effectiveness. The scheduling parameter is selected to be a function of the estimates of the control effectiveness factors. The estimates are provided on-line by a two-stage Kalman estimator. The inherent conservatism of the LPV design is reducing through the use of a scaling factor on the uncertainty block that represents the estimation errors of the effectiveness factors. Simulations of the controlled system with the on-line estimator show that a superior fault-tolerance can be achieved.

  10. Voice aftereffects of adaptation to speaker identity.

    PubMed

    Zäske, Romi; Schweinberger, Stefan R; Kawahara, Hideki

    2010-09-01

    While adaptation to complex auditory stimuli has traditionally been reported for linguistic properties of speech, the present study demonstrates non-linguistic high-level aftereffects in the perception of voice identity, following adaptation to voices or faces of personally familiar speakers. In Exp. 1, prolonged exposure to speaker A's voice biased the perception of identity-ambiguous voice morphs between speakers A and B towards speaker B (and vice versa). Significantly biased voice identity perception was also observed in Exp. 2 when adaptors were videos of speakers' silently articulating faces, although effects were reduced in magnitude relative to those seen in Exp. 1. By contrast, adaptation to an unrelated speaker C elicited an intermediate proportion of speaker A identifications in both experiments. While crossmodal aftereffects on auditory identification (Exp. 2) dissipated rapidly, unimodal aftereffects (Exp. 1) were still measurable a few minutes after adaptation. These novel findings suggest contrastive coding of voice identity in long-term memory, with at least two perceptual mechanisms of voice identity adaptation: one related to auditory coding of voice characteristics, and another related to multimodal coding of familiar speaker identity. PMID:20430084

  11. 21A.226 Ethnic and National Identity, Spring 2005

    E-print Network

    Jackson, Jean

    This course is an introduction to the cross-cultural study of ethnic and national identity. We examine the concept of social identity, consider how gender, religious and racial identity components interact with ethnic and ...

  12. 21A.226 Ethnic and National Identity, Fall 2009

    E-print Network

    Jackson, Jean

    An introduction to the cross-cultural study of ethnic and national identity. We examine the concept of social identity, and consider the ways in which gendered, linguistic, religious, and ethno-racial identity components ...

  13. 48 CFR 552.204-9 - Personal Identity Verification requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...2014-10-01 2014-10-01 false Personal Identity Verification requirements. 552.204-9...and Clauses 552.204-9 Personal Identity Verification requirements. As prescribed...insert the following clause: Personal Identity Verification Requirements (OCT...

  14. 12 CFR 614.4960 - Notice of servicer's identity.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...2012-01-01 false Notice of servicer's identity. 614.4960 Section 614.4960...614.4960 Notice of servicer's identity. (a) Notice requirement...Director's designee) in writing of the identity of the servicer of the loan. The...

  15. 48 CFR 552.204-9 - Personal Identity Verification requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...2012-10-01 2012-10-01 false Personal Identity Verification requirements. 552.204-9...and Clauses 552.204-9 Personal Identity Verification requirements. As prescribed...insert the following clause: Personal Identity Verification Requirements (OCT...

  16. 12 CFR 1022.123 - Appropriate proof of identity.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...2013-01-01 false Appropriate proof of identity. 1022.123 Section 1022.123 Banks...of Consumer Reporting Agencies Regarding Identity Theft § 1022.123 Appropriate proof of identity. (a) Consumer reporting...

  17. 12 CFR 614.4960 - Notice of servicer's identity.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...2013-01-01 false Notice of servicer's identity. 614.4960 Section 614.4960...614.4960 Notice of servicer's identity. (a) Notice requirement...Director's designee) in writing of the identity of the servicer of the loan. The...

  18. 21 CFR 21.44 - Verification of identity.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...2014-04-01 false Verification of identity. 21.44 Section 21.44 Food...Systems § 21.44 Verification of identity. (a) An individual seeking access...and Drug Administration to determine his identity. The identification required...

  19. 21 CFR 21.44 - Verification of identity.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...2011-04-01 false Verification of identity. 21.44 Section 21.44 Food...Systems § 21.44 Verification of identity. (a) An individual seeking access...and Drug Administration to determine his identity. The identification required...

  20. 12 CFR 614.4960 - Notice of servicer's identity.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...2014-01-01 false Notice of servicer's identity. 614.4960 Section 614.4960...614.4960 Notice of servicer's identity. (a) Notice requirement...Director's designee) in writing of the identity of the servicer of the loan. The...

  1. 12 CFR 1022.123 - Appropriate proof of identity.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...2014-01-01 false Appropriate proof of identity. 1022.123 Section 1022.123 Banks...of Consumer Reporting Agencies Regarding Identity Theft § 1022.123 Appropriate proof of identity. (a) Consumer reporting...

  2. 17 CFR 201.65 - Identity and signature.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...2010-04-01 2010-04-01 false Identity and signature. 201.65 Section...Exchange Act of 1934 § 201.65 Identity and signature. Applications pursuant to this subpart may omit the identity, mailing address, and...

  3. 21 CFR 21.44 - Verification of identity.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...2010-04-01 false Verification of identity. 21.44 Section 21.44 Food...Systems § 21.44 Verification of identity. (a) An individual seeking access...and Drug Administration to determine his identity. The identification required...

  4. 12 CFR 614.4960 - Notice of servicer's identity.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...2010-01-01 false Notice of servicer's identity. 614.4960 Section 614.4960...614.4960 Notice of servicer's identity. (a) Notice requirement...Director's designee) in writing of the identity of the servicer of the loan. The...

  5. 12 CFR 1022.123 - Appropriate proof of identity.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...2012-01-01 false Appropriate proof of identity. 1022.123 Section 1022.123 Banks...of Consumer Reporting Agencies Regarding Identity Theft § 1022.123 Appropriate proof of identity. (a) Consumer reporting...

  6. 12 CFR 614.4960 - Notice of servicer's identity.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...2011-01-01 false Notice of servicer's identity. 614.4960 Section 614.4960...614.4960 Notice of servicer's identity. (a) Notice requirement...Director's designee) in writing of the identity of the servicer of the loan. The...

  7. 48 CFR 552.204-9 - Personal Identity Verification requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...2013-10-01 2013-10-01 false Personal Identity Verification requirements. 552.204-9...and Clauses 552.204-9 Personal Identity Verification requirements. As prescribed...insert the following clause: Personal Identity Verification Requirements (OCT...

  8. 21 CFR 21.44 - Verification of identity.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...2013-04-01 false Verification of identity. 21.44 Section 21.44 Food...Systems § 21.44 Verification of identity. (a) An individual seeking access...and Drug Administration to determine his identity. The identification required...

  9. 46 CFR 12.809 - Citizenship and identity.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...2014-10-01 false Citizenship and identity. 12.809 Section 12.809 Shipping...Vessels § 12.809 Citizenship and identity. (a) Instead of the requirements... (b) To meet the citizenship and identity requirements of this subpart,...

  10. 21 CFR 21.44 - Verification of identity.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...2012-04-01 false Verification of identity. 21.44 Section 21.44 Food...Systems § 21.44 Verification of identity. (a) An individual seeking access...and Drug Administration to determine his identity. The identification required...

  11. Policy #3011 Identity Theft Protection Program 1 OLD DOMINION UNIVERSITY

    E-print Network

    Policy #3011 ­ Identity Theft Protection Program 1 OLD DOMINION UNIVERSITY University Policy Policy #3011 IDENTITY THEFT PROTECTION PROGRAM Responsible Oversight Executive: Vice President of this policy is to develop an Identity Theft Prevention Program (hereinafter referred to as "Program

  12. Administrative Policy: Identity Theft Prevention Program Page 1 of 7

    E-print Network

    Hardy, Christopher R.

    Administrative Policy: Identity Theft Prevention Program Page 1 of 7 Governance & Policies Effective: March 31, 2009 Administrative Policy IDENTITY THEFT PREVENTION PROGRAM Approved: March 31, 2009 President's Cabinet Program Adoption Millersville University ("University") developed this Identity Theft

  13. Student Engineers and Engineer Identity: Campus Engineer Identities as Figured World

    NASA Astrophysics Data System (ADS)

    Tonso, Karen L.

    2006-09-01

    The research reported here contributes to understanding how student engineers on an engineering campus in the US mid-continent not only talked about the kinds of people recognized as engineers on campus, but also juxtaposes their talk about "campus engineer identities" with two students' ways of presenting themselves as engineers through engineering project teamwork to argue that campus engineer identities framed on-campus interpretations of actions, and ultimately that identity production was a complicated process through which campus engineer identities (cultural knowledge learned on campus) provided a lens of meaning through which to "recognize" (or not) performances of engineer selves as engineers. This research adds to conversations about identity in practice, especially identity production in science education, by suggesting the importance of cultural forms for belonging, especially at an obdurate site of science practice like the campus studied.

  14. Identity configurations: a new perspective on identity formation in contemporary society.

    PubMed

    Schachter, Elli P

    2004-02-01

    This paper deals with the theoretical construct of "identity configuration." It portrays the different possible ways in which individuals configure the relationship among potentially conflicting identifications in the process of identity formation. In order to explicate these configurations, I analyzed narratives of identity development retold by individuals describing personal identity conflicts that arise within a larger context of sociocultural conflict. Thirty Jewish modern orthodox young adults were interviewed regarding a potentially conflictual identity issue (i.e. their religious and sexual development). Their deliberations, as described in the interviews, were examined, and four different configurations were identified: a configuration based on choice and suppression; an assimilative and synthesizing configuration; a confederacy of identifications; and a configuration based on the thrill of dissonance. The different configurations are illustrated through exemplars, and the possible implications of the concept of "configuration" for identity theory are discussed. PMID:14686888

  15. Toroidal Varied-Line Space (TVLS) Gratings

    NASA Technical Reports Server (NTRS)

    Thomas, Roger J.; Oegerle, William (Technical Monitor)

    2002-01-01

    It is a particular challenge to develop a stigmatic spectrograph for XUV wavelengths since the very low normal-incidence reflectance of standard materials most often requires that the design be restricted to a single optical element which must simultaneously provide both re-imaging and spectral dispersion. This problem has been solved in the past by the use of toroidal gratings with uniform line-spaced rulings (TULS). A number of solar EUV (Extreme Ultraviolet) spectrometers have been based on such designs, including SOHO/CDS, Solar-B/EIS, and the sounding rockets SERTS and EUNIS. More recently, Kita, Harada, and collaborators have developed the theory of spherical gratings with varied line-space rulings (SVLS) operated at unity magnification, which have been flown on several astronomical satellite missions. We now combine these ideas into a spectrometer concept that puts varied-line space rulings onto toroidal gratings. Such TVLS designs are found to provide excellent imaging even at very large spectrograph magnifications and beam-speeds, permitting extremely high-quality performance in remarkably compact instrument packages. Optical characteristics of two solar spectrometers based on this concept are described: SUMI, proposed as a sounding rocket experiment, and NEXUS, proposed for the Solar Dynamics Observatory mission.

  16. Varying prior information in Bayesian inversion

    NASA Astrophysics Data System (ADS)

    Walker, Matthew; Curtis, Andrew

    2014-06-01

    Bayes' rule is used to combine likelihood and prior probability distributions. The former represents knowledge derived from new data, the latter represents pre-existing knowledge; the Bayesian combination is the so-called posterior distribution, representing the resultant new state of knowledge. While varying the likelihood due to differing data observations is common, there are also situations where the prior distribution must be changed or replaced repeatedly. For example, in mixture density neural network (MDN) inversion, using current methods the neural network employed for inversion needs to be retrained every time prior information changes. We develop a method of prior replacement to vary the prior without re-training the network. Thus the efficiency of MDN inversions can be increased, typically by orders of magnitude when applied to geophysical problems. We demonstrate this for the inversion of seismic attributes in a synthetic subsurface geological reservoir model. We also present results which suggest that prior replacement can be used to control the statistical properties (such as variance) of the final estimate of the posterior in more general (e.g., Monte Carlo based) inverse problem solutions.

  17. Detecting skin colors under varying illumination

    NASA Astrophysics Data System (ADS)

    Liu, Leyuan; Huang, Rui; Yang, Saiyong; Sang, Nong

    2011-11-01

    Skin color has been used as an important cue for various human related computer vision applications. However, detecting skin colors under varying illumination is a challenging task, as the appearance of skin in an image highly depends on the illumination under which the image was taken. To this end, a method for detecting skin colors under varying illumination is proposed in this paper. First, spatial illumination variation is identified and the images are segmented into different regions with different illumination. Each illumination region of color images are corrected base on the illuminant estimated by a local edge-based color constancy algorithm. Then, the corrected images are transformed into a color-space, where statistical results on a skin dataset show that the skin color cluster and non-skin color clusters are separated. Finally, the skin colors are modeled under Bayesian decision framework and classified from non-skin colors. The experimental results show that the proposed method is robust to illumination variations.

  18. Varying execution discipline to increase performance

    SciTech Connect

    Campbell, P.L.; Maccabe, A.B.

    1993-12-22

    This research investigates the relationship between execution discipline and performance. The hypothesis has two parts: 1. Different execution disciplines exhibit different performance for different computations, and 2. These differences can be effectively predicted by heuristics. A machine model is developed that can vary its execution discipline. That is, the model can execute a given program using either the control-driven, data-driven or demand-driven execution discipline. This model is referred to as a ``variable-execution-discipline`` machine. The instruction set for the model is the Program Dependence Web (PDW). The first part of the hypothesis will be tested by simulating the execution of the machine model on a suite of computations, based on the Livermore Fortran Kernel (LFK) Test (a.k.a. the Livermore Loops), using all three execution disciplines. Heuristics are developed to predict relative performance. These heuristics predict (a) the execution time under each discipline for one iteration of each loop and (b) the number of iterations taken by that loop; then the heuristics use those predictions to develop a prediction for the execution of the entire loop. Similar calculations are performed for branch statements. The second part of the hypothesis will be tested by comparing the results of the simulated execution with the predictions produced by the heuristics. If the hypothesis is supported, then the door is open for the development of machines that can vary execution discipline to increase performance.

  19. Transient, spatially varied groundwater recharge modeling

    NASA Astrophysics Data System (ADS)

    Assefa, Kibreab Amare; Woodbury, Allan D.

    2013-08-01

    The objective of this work is to integrate field data and modeling tools in producing temporally and spatially varying groundwater recharge in a pilot watershed in North Okanagan, Canada. The recharge modeling is undertaken by using the Richards equation based finite element code (HYDRUS-1D), ArcGIS™, ROSETTA, in situ observations of soil temperature and soil moisture, and a long-term gridded climate data. The public version of HYDUS-1D and another version with detailed freezing and thawing module are first used to simulate soil temperature, snow pack, and soil moisture over a one year experimental period. Statistical analysis of the results show both versions of HYDRUS-1D reproduce observed variables to the same degree. After evaluating model performance using field data and ROSETTA derived soil hydraulic parameters, the HYDRUS-1D code is coupled with ArcGIS™ to produce spatially and temporally varying recharge maps throughout the Deep Creek watershed. Temporal and spatial analysis of 25 years daily recharge results at various representative points across the study watershed reveal significant temporal and spatial variations; average recharge estimated at 77.8 ± 50.8 mm/year. Previous studies in the Okanagan Basin used Hydrologic Evaluation of Landfill Performance without any attempt of model performance evaluation, notwithstanding its inherent limitations. Thus, climate change impact results from this previous study and similar others, such as Jyrkama and Sykes (2007), need to be interpreted with caution.

  20. Brown Dwarf Variability: What's Varying and Why?

    NASA Technical Reports Server (NTRS)

    Marley, Mark Scott

    2014-01-01

    Surveys by ground based telescopes, HST, and Spitzer have revealed that brown dwarfs of most spectral classes exhibit variability. The spectral and temporal signatures of the variability are complex and apparently defy simplistic classification which complicates efforts to model the changes. Important questions include understanding if clearings are forming in an otherwise uniform cloud deck or if thermal perturbations, perhaps associated with breaking gravity waves, are responsible. If clouds are responsible how long does it take for the atmospheric thermal profile to relax from a hot cloudy to a cooler cloudless state? If thermal perturbations are responsible then what atmospheric layers are varying? How do the observed variability timescales compare to atmospheric radiative, chemical, and dynamical timescales? I will address such questions by presenting modeling results for time-varying partly cloudy atmospheres and explore the importance of various atmospheric processes over the relevant timescales for brown dwarfs of a range of effective temperatures. Regardless of the origin of the observed variability, the complexity seen in the atmospheres of the field dwarfs hints at the variability that we may encounter in the next few years in directly imaged young Jupiters. Thus understanding the nature of variability in the field dwarfs, including sensitivity to gravity and metallicity, is of particular importance for exoplanet characterization.

  1. The Sexual Domain of Identity: Sexual Statuses of Identity in Relation to Psychosocial Sexual Health

    Microsoft Academic Search

    Sally L. Archer; Jeremy A. Grey

    2009-01-01

    Sexual identity has been substantially underinvestigated relative to other aspects of identity. The purpose of this study was to document the relationship between sexual psychosocial maturity, positive sexual self-concepts, and effective sexual decision-making\\/coping styles with the identity processes that college students choose to use in defining their sexual self. Participants in the study were 275 undergraduate male and female students

  2. How ESL Teachers’ Sociocultural Identities Mediate Their Teacher Role Identities in a Diverse Urban School Setting

    Microsoft Academic Search

    Lasisi Ajayi

    English-as-a-second language (ESL) teachers’ sociocultural identities and teacher role identities are posited to be deeply\\u000a rooted in their personal histories. Yet, this being the case, how ESL teachers interpret, negotiate and construct their identities\\u000a in the pedagogical process remains underexplored. This study is an exploration of the influences of teachers’ social, linguistic,\\u000a cultural, and educational backgrounds on the conception of

  3. Dissociative identity disorder: adaptive deception of self and others.

    PubMed

    Beahrs, J O

    1994-01-01

    Dissociative identity disorder (multiple personality) is increasingly diagnosed, often follows childhood trauma, and is characterized by rigidification of phenomena that resemble hypnosis. To interpret dissociated aspects of selfhood as autonomous entities is a useful heuristic; but when taken too literally, it leads to three kinds of anomaly: (1) legal: dissociators remain culpable for misdeeds carried out beyond apparent awareness or control; (2) clinical: legitimization sometimes leads not to relief, but to escalating cycles of regressive dependency; and (3) scientific: the form of dissociated entities varies with how they are defined, in ways that are intrinsically motivated and clinically manipulable. These anomalies yield to an evolutionary perspective that views dissociative identity disorder as an evolved strategy of adaptive deception of self and others; e.g., a beaten subordinate avoids further retribution by "pleading illness." Such a deceit best avoids detection when fully experienced; through its intensity and persistence, it becomes real at a new level. One's basic competencies remain intact, however, and are the source of the anomalies described. They can be clinically accessed and empowered, providing the key to therapeutic change when dissociative processes are problematic. Overall, despite clear impairment in subjective awareness and volition, dissociative-disordered individuals are best held fully accountable for the consequences of their actions. PMID:7949411

  4. Ellipsometry with randomly varying polarization states.

    PubMed

    Liu, Feng; Lee, Chris J; Chen, Juequan; Louis, Eric; van der Slot, Peter J M; Boller, Klaus J; Bijkerk, Fred

    2012-01-16

    We show that, under the right conditions, one can make highly accurate polarization-based measurements without knowing the absolute polarization state of the probing light field. It is shown that light, passed through a randomly varying birefringent material has a well-defined orbit on the Poincar sphere, which we term a generalized polarization state, that is preserved. Changes to the generalized polarization state can then be used in place of the absolute polarization states that make up the generalized state, to measure the change in polarization due to a sample under investigation. We illustrate the usefulness of this analysis approach by demonstrating fiber-based ellipsometry, where the polarization state of the probe light is unknown, and, yet, the ellipsometric angles of the investigated sample (? and ?) are obtained with an accuracy comparable to that of conventional ellipsometry instruments by measuring changes to the generalized polarization state. PMID:22274433

  5. String theory, cosmology and varying constants

    E-print Network

    Thibault Damour

    2002-10-18

    In string theory the coupling ``constants'' appearing in the low-energy effective Lagrangian are determined by the vacuum expectation values of some (a priori) massless scalar fields (dilaton, moduli). This naturally leads one to expect a correlated variation of all the coupling constants, and an associated violation of the equivalence principle. We review some string-inspired theoretical models which incorporate such a spacetime variation of coupling constants while remaining naturally compatible both with phenomenological constraints coming from geochemical data (Oklo; Rhenium decay) and with present equivalence principle tests. Barring a very unnatural fine-tuning of parameters, a variation of the fine-structure constant as large as that recently ``observed'' by Webb et al. in quasar absorption spectra appears to be incompatible with these phenomenological constraints. Independently of any model, it is emphasized that the best experimental probe of varying constants are high-precision tests of the universality of free fall, such as MICROSCOPE and STEP.

  6. Application of Hamilton's law of varying action

    NASA Technical Reports Server (NTRS)

    Bailey, C. D.

    1975-01-01

    The law of varying action enunciated by Hamilton in 1834-1835 permits the direct analytical solution of the problems of mechanics, both stationary and nonstationary, without consideration of force equilibrium and the theory of differential equations associated therewith. It has not been possible to obtain direct analytical solutions to nonstationary systems through the use of energy theory, which has been limited for 140 years to the principle of least action and to Hamilton's principle. It is shown here that Hamilton's law permits the direct analytical solution to nonstationary, initial value systems in the mechanics of solids without any knowledge or use of the theory of differential equations. Solutions are demonstrated for nonconservative, nonstationary particle motion, both linear and nonlinear.

  7. Time varying arctic climate change amplification

    SciTech Connect

    Chylek, Petr [Los Alamos National Laboratory; Dubey, Manvendra K [Los Alamos National Laboratory; Lesins, Glen [DALLHOUSIE U; Wang, Muyin [NOAA/JISAO

    2009-01-01

    During the past 130 years the global mean surface air temperature has risen by about 0.75 K. Due to feedbacks -- including the snow/ice albedo feedback -- the warming in the Arctic is expected to proceed at a faster rate than the global average. Climate model simulations suggest that this Arctic amplification produces warming that is two to three times larger than the global mean. Understanding the Arctic amplification is essential for projections of future Arctic climate including sea ice extent and melting of the Greenland ice sheet. We use the temperature records from the Arctic stations to show that (a) the Arctic amplification is larger at latitudes above 700 N compared to those within 64-70oN belt, and that, surprisingly; (b) the ratio of the Arctic to global rate of temperature change is not constant but varies on the decadal timescale. This time dependence will affect future projections of climate changes in the Arctic.

  8. Time varying, multivariate volume data reduction

    SciTech Connect

    Ahrens, James P [Los Alamos National Laboratory; Fout, Nathaniel [UC DAVIS; Ma, Kwan - Liu [UC DAVIS

    2010-01-01

    Large-scale supercomputing is revolutionizing the way science is conducted. A growing challenge, however, is understanding the massive quantities of data produced by large-scale simulations. The data, typically time-varying, multivariate, and volumetric, can occupy from hundreds of gigabytes to several terabytes of storage space. Transferring and processing volume data of such sizes is prohibitively expensive and resource intensive. Although it may not be possible to entirely alleviate these problems, data compression should be considered as part of a viable solution, especially when the primary means of data analysis is volume rendering. In this paper we present our study of multivariate compression, which exploits correlations among related variables, for volume rendering. Two configurations for multidimensional compression based on vector quantization are examined. We emphasize quality reconstruction and interactive rendering, which leads us to a solution using graphics hardware to perform on-the-fly decompression during rendering. In this paper we present a solution which addresses the need for data reduction in large supercomputing environments where data resulting from simulations occupies tremendous amounts of storage. Our solution employs a lossy encoding scheme to acrueve data reduction with several options in terms of rate-distortion behavior. We focus on encoding of multiple variables together, with optional compression in space and time. The compressed volumes can be rendered directly with commodity graphics cards at interactive frame rates and rendering quality similar to that of static volume renderers. Compression results using a multivariate time-varying data set indicate that encoding multiple variables results in acceptable performance in the case of spatial and temporal encoding as compared to independent compression of variables. The relative performance of spatial vs. temporal compression is data dependent, although temporal compression has the advantage of offering smooth animations, while spatial compression can handle volumes of larger dimensions.

  9. Effective dynamics for chaos synchronization in networks with time-varying topology

    E-print Network

    Rodrigo Frehse Pereira; Romeu Miqueias Szmoski; Sandro Ely de Souza Pinto

    2010-11-30

    A coupled map lattice whose topology changes at each time step is studied. We show that the transversal dynamics of the synchronization manifold can be analyzed by the introduction of effective dynamical quantities. These quantities are defined as weighted averages over all possible topologies. We demonstrate that an ensemble of short time observations can be used to predict the long-term behavior of the lattice. Finally, we point out that it is possible to obtain a lattice with constant topology in which the dynamical behavior is asymptotically identical to one of the time-varying topology.

  10. On Varying-coefficient Independence Screening for High-dimensional Varying-coefficient Models

    PubMed Central

    Song, Rui; Yi, Feng; Zou, Hui

    2014-01-01

    Varying coefficient models have been widely used in longitudinal data analysis, nonlinear time series, survival analysis, and so on. They are natural non-parametric extensions of the classical linear models in many contexts, keeping good interpretability and allowing us to explore the dynamic nature of the model. Recently, penalized estimators have been used for fitting varying-coefficient models for high-dimensional data. In this paper, we propose a new computationally attractive algorithm called IVIS for fitting varying-coefficient models in ultra-high dimensions. The algorithm first fits a gSCAD penalized varying-coefficient model using a subset of covariates selected by a new varying-coefficient independence screening (VIS) technique. The sure screening property is established for VIS. The proposed algorithm then iterates between a greedy conditional VIS step and a gSCAD penalized fitting step. Simulation and a real data analysis demonstrate that IVIS has very competitive performance for moderate sample size and high dimension. PMID:25484548

  11. The Effects of Varying Cosmological Parameters on Halo Substructure

    NASA Astrophysics Data System (ADS)

    Dooley, Gregory A.; Griffen, Brendan F.; Zukin, Phillip; Ji, Alexander P.; Vogelsberger, Mark; Hernquist, Lars E.; Frebel, Anna

    2014-05-01

    We investigate how different cosmological parameters, such as those delivered by the WMAP and Planck missions, affect the nature and evolution of the dark matter halo substructure. We use a series of flat ? cold dark matter cosmological N-body simulations of structure formation, each with a different power spectrum but with the same initial white noise field. Our fiducial simulation is based on parameters from the WMAP seventh year cosmology. We then systematically vary the spectral index, ns ; matter density, ? M ; and normalization of the power spectrum, ?8, for seven unique simulations. Across these, we study variations in the subhalo mass function, mass fraction, maximum circular velocity function, spatial distribution, concentration, formation times, accretion times, and peak mass. We eliminate dependence of subhalo properties on host halo mass and average the values over many hosts to reduce variance. While the "same" subhalos from identical initial overdensity peaks in higher ?8, ns , and ? m simulations accrete earlier and end up less massive and closer to the halo center at z = 0, the process of continuous subhalo accretion and destruction leads to a steady state distribution of these properties across all subhalos in a given host. This steady state mechanism eliminates cosmological dependence on all of the properties listed above except for subhalo concentration and V max, which remain greater for higher ?8, ns , and ? m simulations, and subhalo formation time, which remains earlier. We also find that the numerical technique for computing the scale radius and the halo finder that were used can significantly affect the concentration-mass relationship as computed for a simulation.

  12. The Relationships among Caregiver and Adolescent Identity Status, Identity Distress and Psychological Adjustment

    ERIC Educational Resources Information Center

    Wiley, Rachel E.; Berman, Steven L.

    2012-01-01

    The present study addresses the relationships of caregiver identity status on their adolescent children's identity distress and psychological symptom severity among a sample of adolescents (age 12-19) in treatment at a community mental health center (N = 60 caregiver-child dyads). A significant proportion of caregivers (10%) and their adolescent…

  13. Uncovering Visitor Identity: A Citywide Utilization of the Falk Visitor-Identity Model

    ERIC Educational Resources Information Center

    Trainer, Laureen; Steele-Inama, Marley; Christopher, Amber

    2012-01-01

    In his book, "Identity and the Museum Visitor Experience," John Falk makes the case that by understanding the underlying motivations that drive a visitor, a museum can create an experience that reflects a person's identity and therefore satisfy their motivation for visiting. According to Falk, this level of personal connection increases…

  14. Religious Identity and Cultural Diversity: Exploring the Relationships between Religious Identity, Sexism, Homophobia, and Multicultural Competence

    ERIC Educational Resources Information Center

    Balkin, Richard S.; Schlosser, Lewis Z.; Levitt, Dana Heller

    2009-01-01

    In this article, the authors present the results from a national study investigating the relationships between religious identity, sexism, homophobia, and multicultural competence. Participants were 111 randomly sampled counseling professionals and graduate students. The results indicated a relationship between religious identity and various…

  15. Professional identity – product of structure, product of choice : Linking changing professional identity and changing professions

    Microsoft Academic Search

    Sabine Hotho

    2008-01-01

    Purpose – The purpose of this paper is to extend the discussion of the recursive relationship between the identity of a profession and the professional identity of individuals in the context of change. Design\\/methodology\\/approach – The paper draws on qualitative data collected as part of a pilot study into change in the NHS. It draws on structuration theory and insights

  16. Ethnic Identity in Everyday Life: The Influence of Identity Development Status

    ERIC Educational Resources Information Center

    Yip, Tiffany

    2014-01-01

    The current study explores the intersection of ethnic identity development and significance in a sample of 354 diverse adolescents (mean age 14). Adolescents completed surveys five times a day for 1 week. Cluster analyses revealed four identity clusters: diffused, foreclosed, moratorium, and achieved. Achieved adolescents reported the highest…

  17. Virtual space, real identity: Exploring cultural identity of Chinese Diaspora in virtual community

    Microsoft Academic Search

    Xie Wenjing

    2005-01-01

    With the advent of globalization, the movement of immigrants has crossed the borders and the question of identity has been more and more salient in the modern society. Struggling in different cultural frames, Diasporas’ cultural identities are constructed through the interaction between what Hall called similarity and difference in the process of displacement and relocation.The deterritorialization in the era of

  18. Implications of Ethnic Identity Exploration and Ethnic Identity Affirmation and Belonging for Intergroup Attitudes among Adolescents

    ERIC Educational Resources Information Center

    Whitehead, Kevin A.; Ainsworth, Andrew T.; Wittig, Michele A.; Gadino, Brandy

    2009-01-01

    The present paper develops and tests two temporal models of the relationships among adolescents' ethnic identity exploration, ethnic identity affirmation and belonging, and attitudes toward their racial/ethnic ingroup and outgroups. Structural equation models for Euro-Americans, Asian Americans, and Latinos revealed that all hypothesized…

  19. Tracking Identity: Academic Performance and Ethnic Identity among Ecuadorian Immigrant Teenagers in Madrid

    ERIC Educational Resources Information Center

    Lucko, Jennifer

    2011-01-01

    This article examines Ecuadorian students' attempts to contest immigrant stereotypes and redefine their social identities in Madrid, Spain. I argue that academic tracking plays a pivotal role in the trajectory of students' emergent ethnic identity. To illustrate this process, I focus on students who abandon their academic and professional…

  20. Coset Character Identities in Superstring Compactifications

    NASA Astrophysics Data System (ADS)

    Yamaguchi, Satoshi

    2002-01-01

    We apply the coset character identities (generalization of Jacobi's abstruse identity) to compact and noncompact Gepner models. In the both cases, we prove that the partition function actually vanishes due to the spacetime supersymmetry. In the case of the compact models and discrete parts of the noncompact models, the partition function includes the expected vanishing factor. But the character identities used to the continuous part of the noncompact models suggest that these models have twice as many supersymmetry as expected. This fact is an evidence for the conjecture that the holographically dual of the string theory on an actually singular Calabi-Yau manifold is a super conformal field theory. The extra SUSY charges are interpreted as the superconformal S generators.