Chain of Custody Item Monitor Message Viewer v.1.0 Beta
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schwartz, Steven Robert; Fielder, Laura; Hymel, Ross W.
The CoCIM Message Viewer software allows users to connect to and download messages from a Chain of Custody Item Monitor (CoCIM) connected to a serial port on the user’s computer. The downloaded messages are authenticated and displayed in a Graphical User Interface that allows the user a limited degree of sorting and filtering of the downloaded messages as well as the ability to save downloaded files or to open previously downloaded message history files.
Simultaneous Authentication and Certification of Arms-Control Measurement Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacArthur, Duncan W.; Hauck, Danielle K.; Thron, Jonathan L.
2012-07-09
Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must bemore » possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5) increase the monitoring party's confidence in the authentication of the measurement system.« less
Gjersoe, Nathalia L.; Newman, George E.; Chituc, Vladimir; Hood, Bruce
2014-01-01
The current studies examine how valuation of authentic items varies as a function of culture. We find that U.S. respondents value authentic items associated with individual persons (a sweater or an artwork) more than Indian respondents, but that both cultures value authentic objects not associated with persons (a dinosaur bone or a moon rock) equally. These differences cannot be attributed to more general cultural differences in the value assigned to authenticity. Rather, the results support the hypothesis that individualistic cultures place a greater value on objects associated with unique persons and in so doing, offer the first evidence for how valuation of certain authentic items may vary cross-culturally. PMID:24658437
Gjersoe, Nathalia L; Newman, George E; Chituc, Vladimir; Hood, Bruce
2014-01-01
The current studies examine how valuation of authentic items varies as a function of culture. We find that U.S. respondents value authentic items associated with individual persons (a sweater or an artwork) more than Indian respondents, but that both cultures value authentic objects not associated with persons (a dinosaur bone or a moon rock) equally. These differences cannot be attributed to more general cultural differences in the value assigned to authenticity. Rather, the results support the hypothesis that individualistic cultures place a greater value on objects associated with unique persons and in so doing, offer the first evidence for how valuation of certain authentic items may vary cross-culturally.
Evaluation of the automatic optical authentication technologies for control systems of objects
NASA Astrophysics Data System (ADS)
Averkin, Vladimir V.; Volegov, Peter L.; Podgornov, Vladimir A.
2000-03-01
The report considers the evaluation of the automatic optical authentication technologies for the automated integrated system of physical protection, control and accounting of nuclear materials at RFNC-VNIITF, and for providing of the nuclear materials nonproliferation regime. The report presents the nuclear object authentication objectives and strategies, the methodology of the automatic optical authentication and results of the development of pattern recognition techniques carried out under the ISTC project #772 with the purpose of identification of unique features of surface structure of a controlled object and effects of its random treatment. The current decision of following functional control tasks is described in the report: confirmation of the item authenticity (proof of the absence of its substitution by an item of similar shape), control over unforeseen change of item state, control over unauthorized access to the item. The most important distinctive feature of all techniques is not comprehensive description of some properties of controlled item, but unique identification of item using minimum necessary set of parameters, properly comprising identification attribute of the item. The main emphasis in the technical approach is made on the development of rather simple technological methods for the first time intended for use in the systems of physical protection, control and accounting of nuclear materials. The developed authentication devices and system are described.
A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.
Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao
2016-05-01
Recent advances in medical treatment and emergency applications, the need of integrating wireless body area network (WBAN) with cloud computing can be motivated by providing useful and real time information about patients' health state to the doctors and emergency staffs. WBAN is a set of body sensors carried by the patient to collect and transmit numerous health items to medical clouds via wireless and public communication channels. Therefore, a cloud-assisted WBAN facilitates response in case of emergency which can save patients' lives. Since the patient's data is sensitive and private, it is important to provide strong security and protection on the patient's medical data over public and insecure communication channels. In this paper, we address the challenge of participant authentication in mobile emergency medical care systems for patients supervision and propose a secure cloud-assisted architecture for accessing and monitoring health items collected by WBAN. For ensuring a high level of security and providing a mutual authentication property, chaotic maps based authentication and key agreement mechanisms are designed according to the concept of Diffie-Hellman key exchange, which depends on the CMBDLP and CMBDHP problems. Security and performance analyses show how the proposed system guaranteed the patient privacy and the system confidentiality of sensitive medical data while preserving the low computation property in medical treatment and remote medical monitoring.
Learners' Perspectives on Authenticity.
ERIC Educational Resources Information Center
Chavez, Monika M. Th.
A survey investigated the attitudes of second language learners about authentic texts, written and oral, used for language instruction. Respondents were 186 randomly-selected university students of German. The students were administered a 212-item questionnaire (the items are appended) that requested information concerning student demographic…
Fostering a student's skill for analyzing test items through an authentic task
NASA Astrophysics Data System (ADS)
Setiawan, Beni; Sabtiawan, Wahyu Budi
2017-08-01
Analyzing test items is a skill that must be mastered by prospective teachers, in order to determine the quality of test questions which have been written. The main aim of this research was to describe the effectiveness of authentic task to foster the student's skill for analyzing test items involving validity, reliability, item discrimination index, level of difficulty, and distractor functioning through the authentic task. The participant of the research is students of science education study program, science and mathematics faculty, Universitas Negeri Surabaya, enrolled for assessment course. The research design was a one-group posttest design. The treatment in this study is that the students were provided an authentic task facilitating the students to develop test items, then they analyze the items like a professional assessor using Microsoft Excel and Anates Software. The data of research obtained were analyzed descriptively, such as the analysis was presented by displaying the data of students' skill, then they were associated with theories or previous empirical studies. The research showed the task facilitated the students to have the skills. Thirty-one students got a perfect score for the analyzing, five students achieved 97% mastery, two students had 92% mastery, and another two students got 89% and 79% of mastery. The implication of the finding was the students who get authentic tasks forcing them to perform like a professional, the possibility of the students for achieving the professional skills will be higher at the end of learning.
How much are Harry Potter’s glasses worth? Children’s monetary evaluation of authentic objects
Gelman, Susan A.; Frazier, Brandy N.; Noles, Nicholaus S.; Manczak, Erika M.; Stilwell, Sarah M.
2014-01-01
Adults attach special value to objects that link to notable people or events – authentic objects. We examined children’s monetary evaluation of authentic objects, focusing on four kinds: celebrity possessions (e.g., Harry Potter’s glasses), original creations (e.g., the very first teddy bear), personal possessions (e.g., your grandfather’s baseball glove), and merely old items (e.g., an old chair). Children ages 4–12 years and adults (N= 151) were asked how much people would pay for authentic and control objects. Young children consistently placed greater monetary value on celebrity possessions than original creations, even when adults judged the two kinds of items to be equivalent. These results suggest that contact with a special individual may be the foundation for the value placed on authentic objects. PMID:25663829
Frazier, Brandy N; Gelman, Susan A; Wilson, Alice; Hood, Bruce
2009-01-01
Authentic objects are those that have an historical link to a person, event, time, or place of some significance (e.g., original Picasso painting; gown worn by Princess Diana; your favorite baby blanket). The current study examines everyday beliefs about authentic objects, with three primary goals: to determine the scope of adults' evaluation of authentic objects, to examine such evaluation in two distinct cultural settings, and to determine whether a person's attachment history (i.e., whether or not they owned an attachment object as a child) predicts evaluation of authentic objects. We found that college students in the U.K. (N = 125) and U.S. (N = 119) consistently evaluate a broad range of authentic items as more valuable than matched control (inauthentic) objects, more desirable to keep, and more desirable to touch, though only non-personal authentic items were judged to be more appropriate for display in a museum. These patterns were remarkably similar across the two cultural contexts. Additionally, those who had an attachment object as a child evaluated objects more favorably, and in particular judged authentic objects to be more valuable. Altogether, these results demonstrate broad endorsement of "positive contagion" among college-educated adults.
Frazier, Brandy N.; Gelman, Susan A.; Wilson, Alice; Hood, Bruce
2010-01-01
Authentic objects are those that have an historical link to a person, event, time, or place of some significance (e.g., original Picasso painting; gown worn by Princess Diana; your favorite baby blanket). The current study examines everyday beliefs about authentic objects, with three primary goals: to determine the scope of adults’ evaluation of authentic objects, to examine such evaluation in two distinct cultural settings, and to determine whether a person’s attachment history (i.e., whether or not they owned an attachment object as a child) predicts evaluation of authentic objects. We found that college students in the U.K. (N = 125) and U.S. (N = 119) consistently evaluate a broad range of authentic items as more valuable than matched control (inauthentic) objects, more desirable to keep, and more desirable to touch, though only non-personal authentic items were judged to be more appropriate for display in a museum. These patterns were remarkably similar across the two cultural contexts. Additionally, those who had an attachment object as a child evaluated objects more favorably, and in particular judged authentic objects to be more valuable. Altogether, these results demonstrate broad endorsement of "positive contagion" among college-educated adults. PMID:20631919
Preliminary Development and Validation of a Measure of Relationship Authenticity
ERIC Educational Resources Information Center
Lopez, Frederick G.; Rice, Kenneth G.
2006-01-01
The authors describe the preliminary development and validation of the Authenticity in Relationships Scale. An initial pool of 37 items addressing various elements of the proposed definition of "relationship authenticity" was administered to 2 independent samples of undergraduates (N = 487) who acknowledged being in a current romantic…
Novel Authentication of Monitoring Data Through the use of Secret and Public Cryptographic Keys
DOE Office of Scientific and Technical Information (OSTI.GOV)
Benz, Jacob M.; Tolk, Keith; Tanner, Jennifer E.
The Office of Nuclear Verification (ONV) is supporting the development of a piece of equipment to provide data authentication and protection for a suite of monitoring sensors as part of a larger effort to create an arms control technology toolkit. This device, currently called the Red Box, leverages the strengths of both secret and public cryptographic keys to authenticate, digitally sign, and pass along monitoring data to allow for host review, and redaction if necessary, without the loss of confidence in the authenticity of the data by the monitoring party. The design of the Red Box will allow for themore » addition and removal of monitoring equipment and can also verify that the data was collected by authentic monitoring equipment prior to signing the data and sending it to the host and for review. The host will then forward the data to the monitor for review and inspection. This paper will highlight the progress to date of the Red Box development, and will explain the novel method of leveraging both symmetric and asymmetric (secret and public key) cryptography to authenticate data within a warhead monitoring regime.« less
Authenticating concealed private data while maintaining concealment
Thomas, Edward V [Albuquerque, NM; Draelos, Timothy J [Albuquerque, NM
2007-06-26
A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.
A multi-factor Rasch scale for artistic judgment.
Bezruczko, Nikolaus
2002-01-01
Measurement properties are reported for a combined scale of abstract and figurative artistic judgment aptitude items. Abstract items are synthetic, rule-based images from Visual Designs Test which implements a statistical algorithm to control design complexity and redundancy, and figurative items are canvas paintings in five styles, Fauvism, Post-Impressionism, Surrealism, Renaissance, and Baroque especially created for this research. The paintings integrate syntactic structure from VDT Abstract designs with thematic content for each style at four levels of complexity while controlling redundancy. Trained test administrators collected preference for synthetic abstract designs and authentic figurative art from 462 examinees in Johnson O'Connor Research Foundation testing offices in Boston, New York, Chicago, and Dallas. The Rasch model replicated measurement properties for VDT Abstract items and identified an item hierarchy that was statistically invariant between genders and generally stable across age for new, authentic figurative items. Further examination of the figurative item hierarchy revealed that complexity interacts with style and meaning. Sound measurement properties for a combined VDT Abstract and Figurative scale shows promise for a comprehensive artistic judgment construct.
Defining the questions: a research agenda for nontraditional authentication in arms control
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hauck, Danielle K; Mac Arthur, Duncan W; Smith, Morag K
Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidencesmore » in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.« less
Carver, Charles S.; Johnson, Sheri L.
2010-01-01
This study examines the relationships of trait-like tendencies towards authentic and hubristic pride (Tracy & Robins, 2004) with goal-regulation tendencies, affective tendencies, and impulsive traits. Undergraduates (n = 936) completed the 14-item measure of authentic and hubristic pride (Tracy & Robins, 2007b) and a battery of other self-report measures. The two types of pride correlated with distinct profiles of goal regulation tendencies, affective tendencies, and self-control. Authentic pride correlated with measures of self-control, whereas hubristic pride was related to measures of impulsivity and aggression. Overall, the differential pattern of correlations fits with a model in which authentic pride is tied to adaptive achievement and goal engagement, whereas hubristic pride is tied to extrinsic values of public recognition and social dominance. PMID:21769159
Authentication via wavefront-shaped optical responses
NASA Astrophysics Data System (ADS)
Eilers, Hergen; Anderson, Benjamin R.; Gunawidjaja, Ray
2018-02-01
Authentication/tamper-indication is required in a wide range of applications, including nuclear materials management and product counterfeit detection. State-of-the-art techniques include reflective particle tags, laser speckle authentication, and birefringent seals. Each of these passive techniques has its own advantages and disadvantages, including the need for complex image comparisons, limited flexibility, sensitivity to environmental conditions, limited functionality, etc. We have developed a new active approach to address some of these short-comings. The use of an active characterization technique adds more flexibility and additional layers of security over current techniques. Our approach uses randomly-distributed nanoparticles embedded in a polymer matrix (tag/seal) which is attached to the item to be secured. A spatial light modulator is used to adjust the wavefront of a laser which interacts with the tag/seal, and a detector is used to monitor this interaction. The interaction can occur in various ways, including transmittance, reflectance, fluorescence, random lasing, etc. For example, at the time of origination, the wavefront-shaped reflectance from a tag/seal can be adjusted to result in a specific pattern (symbol, words, etc.) Any tampering with the tag/seal would results in a disturbance of the random orientation of the nanoparticles and thus distort the reflectance pattern. A holographic waveplate could be inserted into the laser beam for verification. The absence/distortion of the original pattern would then indicate that tampering has occurred. We have tested the tag/seal's and authentication method's tamper-indicating ability using various attack methods, including mechanical, thermal, and chemical attacks, and have verified our material/method's robust tamper-indicating ability.
Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept
NASA Astrophysics Data System (ADS)
Damousis, Ioannis G.; Tzovaras, Dimitrios; Bekiaris, Evangelos
2008-12-01
Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO) (2007) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks †
Hayajneh, Thaier; Mohd, Bassam J; Imran, Muhammad; Almashaqbeh, Ghada; Vasilakos, Athanasios V.
2016-01-01
There is broad consensus that remote health monitoring will benefit all stakeholders in the healthcare system and that it has the potential to save billions of dollars. Among the major concerns that are preventing the patients from widely adopting this technology are data privacy and security. Wireless Medical Sensor Networks (MSNs) are the building blocks for remote health monitoring systems. This paper helps to identify the most challenging security issues in the existing authentication protocols for remote patient monitoring and presents a lightweight public-key-based authentication protocol for MSNs. In MSNs, the nodes are classified into sensors that report measurements about the human body and actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue, as any alteration may lead to serious consequences. The proposed protocol is based on the Rabin authentication algorithm, which is modified in this paper to improve its signature signing process, making it suitable for delay-sensitive MSN applications. To prove the efficiency of the Rabin algorithm, we implemented the algorithm with different hardware settings using Tmote Sky motes and also programmed the algorithm on an FPGA to evaluate its design and performance. Furthermore, the proposed protocol is implemented and tested using the MIRACL (Multiprecision Integer and Rational Arithmetic C/C++) library. The results show that secure, direct, instant and authenticated commands can be delivered from the medical staff to the MSN nodes. PMID:27023540
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks.
Hayajneh, Thaier; Mohd, Bassam J; Imran, Muhammad; Almashaqbeh, Ghada; Vasilakos, Athanasios V
2016-03-24
There is broad consensus that remote health monitoring will benefit all stakeholders in the healthcare system and that it has the potential to save billions of dollars. Among the major concerns that are preventing the patients from widely adopting this technology are data privacy and security. Wireless Medical Sensor Networks (MSNs) are the building blocks for remote health monitoring systems. This paper helps to identify the most challenging security issues in the existing authentication protocols for remote patient monitoring and presents a lightweight public-key-based authentication protocol for MSNs. In MSNs, the nodes are classified into sensors that report measurements about the human body and actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue, as any alteration may lead to serious consequences. The proposed protocol is based on the Rabin authentication algorithm, which is modified in this paper to improve its signature signing process, making it suitable for delay-sensitive MSN applications. To prove the efficiency of the Rabin algorithm, we implemented the algorithm with different hardware settings using Tmote Sky motes and also programmed the algorithm on an FPGA to evaluate its design and performance. Furthermore, the proposed protocol is implemented and tested using the MIRACL (Multiprecision Integer and Rational Arithmetic C/C++) library. The results show that secure, direct, instant and authenticated commands can be delivered from the medical staff to the MSN nodes.
The influence of authentic leadership on safety climate in nursing.
Dirik, Hasan Fehmi; Seren Intepeler, Seyda
2017-07-01
This study analysed nurses' perceptions of authentic leadership and safety climate and examined the contribution of authentic leadership to the safety climate. It has been suggested and emphasised that authentic leadership should be used as a guidance to ensure quality care and the safety of patients and health-care personnel. This predictive study was conducted with 350 nurses in three Turkish hospitals. The data were collected using the Authentic Leadership Questionnaire and the Safety Climate Survey and analysed using hierarchical regression analysis. The mean authentic leadership perception and the safety climate scores of the nurses were 2.92 and 3.50, respectively. The percentage of problematic responses was found to be less than 10% for only four safety climate items. Hierarchical regression analysis revealed that authentic leadership significantly predicted the safety climate. Procedural and political improvements are required in terms of the safety climate in institutions, where the study was conducted, and authentic leadership increases positive perceptions of safety climate. Exhibiting the characteristics of authentic leadership, or improving them and reflecting them on to personnel can enhance the safety climate. Planning information sharing meetings to raise the personnel's awareness of safety climate and systemic improvements can contribute to creating safe care climates. © 2017 John Wiley & Sons Ltd.
Development and validation of the Body and Appearance Self-Conscious Emotions Scale (BASES).
Castonguay, Andrée L; Sabiston, Catherine M; Crocker, Peter R E; Mack, Diane E
2014-03-01
The purpose of these studies was to develop a psychometrically sound measure of shame, guilt, authentic pride, and hubristic pride for use in body and appearance contexts. In Study 1, 41 potential items were developed and assessed for item quality and comprehension. In Study 2, a panel of experts (N=8; M=11, SD=6.5 years of experience) reviewed the scale and items for evidence of content validity. Participants in Study 3 (n=135 males, n=300 females) completed the BASES and various body image, personality, and emotion scales. A separate sample (n=155; 35.5% male) in Study 3 completed the BASES twice using a two-week time interval. The BASES subscale scores demonstrated evidence for internal consistency, item-total correlations, concurrent, convergent, incremental, and discriminant validity, and 2-week test-retest reliability. The 4-factor solution was a good fit in confirmatory factor analysis, reflecting body-related shame, guilt, authentic and hubristic pride subscales of the BASES. The development and validation of the BASES may help advance body image and self-conscious emotion research by providing a foundation to examine the unique antecedents and outcomes of these specific emotional experiences. Copyright © 2014 Elsevier Ltd. All rights reserved.
Baird, Kathleen; Gamble, Jenny; Sidebotham, Mary
2016-09-01
Education programs leading to professional licencing need to ensure assessments throughout the program are constructively aligned and mapped to the specific professional expectations. Within the final year of an undergraduate degree, a student is required to transform and prepare for professional practice. Establishing assessment items that are authentic and able to reflect this transformation is a challenge for universities. This paper both describes the considerations around the design of a capstone assessment and evaluates, from an academics perspective, the quality and applicability of an e-portfolio as a capstone assessment item for undergraduate courses leading to a professional qualification. The e-portfolio was seen to meet nine quality indicators for assessment. Academics evaluated the e-portfolio as an authentic assessment item that would engage the students and provide them with a platform for ongoing professional development and lifelong learning. The processes of reflection on strengths, weaknesses, opportunities and threats, comparison of clinical experiences with national statistics, preparation of professional philosophy and development of a curriculum vitae, whilst recognised as comprehensive and challenging were seen as highly valuable to the student transforming into the profession. Copyright © 2016 Elsevier Ltd. All rights reserved.
Security Considerations and Recommendations in Computer-Based Testing
Al-Saleem, Saleh M.
2014-01-01
Many organizations and institutions around the globe are moving or planning to move their paper-and-pencil based testing to computer-based testing (CBT). However, this conversion will not be the best option for all kinds of exams and it will require significant resources. These resources may include the preparation of item banks, methods for test delivery, procedures for test administration, and last but not least test security. Security aspects may include but are not limited to the identification and authentication of examinee, the risks that are associated with cheating on the exam, and the procedures related to test delivery to the examinee. This paper will mainly investigate the security considerations associated with CBT and will provide some recommendations for the security of these kinds of tests. We will also propose a palm-based biometric authentication system incorporated with basic authentication system (username/password) in order to check the identity and authenticity of the examinee. PMID:25254250
Security considerations and recommendations in computer-based testing.
Al-Saleem, Saleh M; Ullah, Hanif
2014-01-01
Many organizations and institutions around the globe are moving or planning to move their paper-and-pencil based testing to computer-based testing (CBT). However, this conversion will not be the best option for all kinds of exams and it will require significant resources. These resources may include the preparation of item banks, methods for test delivery, procedures for test administration, and last but not least test security. Security aspects may include but are not limited to the identification and authentication of examinee, the risks that are associated with cheating on the exam, and the procedures related to test delivery to the examinee. This paper will mainly investigate the security considerations associated with CBT and will provide some recommendations for the security of these kinds of tests. We will also propose a palm-based biometric authentication system incorporated with basic authentication system (username/password) in order to check the identity and authenticity of the examinee.
Fiber Optic Tamper Indicating Enclosure (TIE); A Case Study in Authentication
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anheier, Norman C.; Benz, Jacob M.; Tanner, Jennifer E.
2015-07-15
A robust fiber optic-based tamper-indicating enclosure (TIE) has been developed by PNNL through funding by the National Nuclear Security Administration Office of Nuclear Verification over the past few years. The objective of this work is to allow monitors to have confidence in both the authenticity and integrity of the TIE and the monitoring equipment inside, throughout the time it may be located at a host facility. Incorporating authentication features into the design were the focus of fiscal year 2014 development efforts. Throughout the development process, modifications have been made to the physical TIE design based on lessons learned via exercisesmore » and expert elicitation. The end result is a robust and passive TIE which can be utilized to protect monitoring party equipment left in a host facility.« less
Rezende, Kariolanda C A; Moreira, Roger Cardoso; Logrado, Lucio Paulo Lima; Talhavini, Márcio; Coltro, Wendell K T
2016-10-01
This report describes for the first time the use of microchip electrophoresis (ME) devices integrated with capacitively coupled contactless conductivity detection (C 4 D) to investigate the authenticity of seized whiskey samples, which were probably adulterated by simple dilution with tap water. The proposed microfluidic platform was explored for the monitoring of anionic species (Cl - and F - ) in both original and tampered samples. The best separations were achieved within 70 s using a running buffer composed of lactic acid and histidine (pH = 5.9). ME-C 4 D devices were used to analyze samples from three different brands (five samples each). Based on the presence of inorganic anions like Cl - , F - , SO 4 2- and NO 2 - in different amounts, the authenticity of seized whiskeys was compared to original samples. According to the reported data, the proposed microfluidic platform can be useful to help regulatory authorities in the investigation and monitoring of authenticity of commercialized whiskey beverages. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Students' Involvement in Authentic Modelling Practices as Contexts in Chemistry Education
NASA Astrophysics Data System (ADS)
Prins, Gjalt T.; Bulte, Astrid M. W.; van Driel, Jan H.; Pilot, Albert
2009-11-01
In science education students should come to understand the nature and significance of models. A promising strategy to achieve this goal is using authentic modelling practices as contexts for meaningful learning of models and modelling. An authentic practice is defined as professionals working with common motives and purposes, pertaining to a similar type of procedure and applying relevant knowledge on the modelling issue they work on. In this study we evaluate whether the use of authentic practices initiates adequate students’ involvement. This was done by investigating students’ interests, ownership, familiarity and complexity. In addition, we evaluated students’ expressed modelling procedures in response to the modelling issues. We designed learning tasks which were enacted by a focus group of students. Three primary data sources were used to collect data. Firstly, a group discussion was organised in which students’ reflected on both authentic practices. Secondly, students filled in written questionnaires containing items on affective and cognitive aspects. Thirdly, the realised modelling procedures by students were analysed. The results show that students’ involvement was successfully initiated, evidenced by motivated students, willingness to continue and the completeness and quality of the realised modelling procedures. The design of the learning tasks proved to be successful in realising this involvement. The results obtained in this study support the strategy of using authentic modelling practices as contexts for meaningful learning of models and modelling.
The Mindful School: How To Assess Thoughtful Outcomes. K-College.
ERIC Educational Resources Information Center
Burke, Kay
Authentic assessment, as referred to in this book, encompasses meaningful tasks, positive interaction between teachers and students, methods that emphasize higher-order thinking skills, and strategies that allow students to plan, monitor, and evaluate their own learning. Most important, authentic assessment means helping students to apply and…
Steps to Designing Authentic Assessments for Students with Disabilities in Music Classes
ERIC Educational Resources Information Center
VanWeelden, Kimberly; Heath-Reynolds, Julia
2017-01-01
Classroom assessments are an opportunity to monitor student learning and in turn inform instructional decisions. Assessments also provide opportunities for students to participate in authentic music-making experiences. Using classroom music-making experiences as assessments may be particularly suitable for students with disabilities. Due to the…
2010-01-01
from the sensor) as a second-tier authentication is problematic because the monitored data are often pathological (i.e. revealing disease symptoms...Standards and Technology, March 2006. 17. Tan B and Schuckers S. Liveness detection for fingerprint scanners based on the statistics of wavelet signal
Authentic Practices as Contexts for Learning to Draw Inferences beyond Correlated Data
ERIC Educational Resources Information Center
Dierdorp, Adri; Bakker, Arthur; Eijkelhof, Harrie; van Maanen, Jan
2011-01-01
To support 11th-grade students' informal inferential reasoning, a teaching and learning strategy was designed based on authentic practices in which professionals use correlation or linear regression. These practices included identifying suitable physical training programmes, dyke monitoring, and the calibration of measurement instruments. The…
Storms and Water Usage; Swine Flu
ERIC Educational Resources Information Center
Edwards, C. C.; Muttiah, Daniel
2009-01-01
This article offers a contemporary, authentic application of quantitative reasoning based on media clips. Students analyze items from the media to answer mathematical questions related to the article. Volumes, economics, and growth rates of a pandemic are featured in the two clips presented. (Contains 4 figures and 1 table.)
Art Activities about Mesopotamia, Egypt and Islam. Hands-On Ancient People.
ERIC Educational Resources Information Center
Merrill, Yvonne Y.
This book features objects of the Mesopotamian, the Egyptian, and Islamic cultures. In exploring important contributions in ancient art, the book presents visuals that are interpretations of authentic artifacts, usually in museum collections, or illustrations from archaeological publications and articles. Historical items (n=55+) have been adapted…
Transaction-Level Learning Analytics in Online Authentic Assessments
ERIC Educational Resources Information Center
Nyland, Rob; Davies, Randall S.; Chapman, John; Allen, Gove
2017-01-01
This paper presents a case for the use of transaction-level data when analyzing automated online assessment results to identify knowledge gaps and misconceptions for individual students. Transaction-level data, which records all of the steps a student uses to complete an assessment item, are preferred over traditional assessment formats that…
Spiral Learning: An Introductory Course on Reading LOTE Online
ERIC Educational Resources Information Center
Schuetze, Ulf
2010-01-01
In teaching reading, authentic texts with abundant lexical items and complex grammatical structures are typically used (Roche, 1992). Unfortunately, this has been a challenge for students enrolled in reading courses developed for English as a Second Language (ESL) as well as Languages Other Than English (LOTE) students. Students often translate…
Wang, Chenyu; Xu, Guoai; Sun, Jing
2017-12-19
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows-Abadi-Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.
Xu, Guoai; Sun, Jing
2017-01-01
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme. PMID:29257066
Greenslade, Kathryn J; Coggins, Truman E
2014-01-01
Identifying what a communication partner is looking at (referential intention) and why (social intention) is essential to successful social communication, and may be challenging for children with social communication deficits. This study explores a clinical task that assesses these intention-reading abilities within an authentic context. To gather evidence of the task's reliability and validity, and to discuss its clinical utility. The intention-reading task was administered to twenty 4-7-year-olds with typical development (TD) and ten with autism spectrum disorder (ASD). Task items were embedded in an authentic activity, and they targeted the child's ability to identify the examiner's referential and social intentions, which were communicated through joint attention behaviours. Reliability and construct validity evidence were addressed using established psychometric methods. Reliability and validity evidence supported the use of task scores for identifying children whose intention-reading warranted concern. Evidence supported the reliability of task administration and coding, and item-level codes were highly consistent with overall task performance. Supporting task validity, group differences aligned with predictions, with children with ASD exhibiting poorer and more variable task scores than children with TD. Also, as predicted, task scores correlated significantly with verbal mental age and ratings of parental concerns regarding social communication abilities. The evidence provides preliminary support for the reliability and validity of the clinical task's scores in assessing young children's real-time intention-reading abilities, which are essential for successful interactions in school and beyond. © 2014 Royal College of Speech and Language Therapists.
Unscrambling Jumbled Sentences: An Authentic Task for English Language Assessment?
ERIC Educational Resources Information Center
Lanteigne, Betty
2017-01-01
Jumbled sentence items in language assessment have been criticized by some authors as inauthentic. However, unscrambling jumbled sentences is a common occurrence in real-world communication in English as a lingua franca. Naturalistic inquiry identified 54 instances of jumbled sentence use in daily life in Dubai/Sharjah, where English is widely…
Some Architecture for Embedded-Assessment Systems
ERIC Educational Resources Information Center
Kane, Michael T.; Tannenbaum, Richard J.
2016-01-01
It is one thing to produce an innovative, construct-based assessment task; it's another to produce 10 a year that are comparable in difficulty, measure the same competencies, are free of differential item functioning, and can be scaled and equated. These challenges contributed to the failure of the performance (or authentic) assessment movement of…
A Collectibles Project: Engaging Students in Authentic Multimodal Research and Writing
ERIC Educational Resources Information Center
Moynihan, Karen E.
2007-01-01
High school teacher Karen E. Moynihan creates a multimodal project inspired by the creative nonfiction style of "The Orchid Thief" by Susan Orlean. Students choose a collectible item and immerse themselves in the subculture of the collectors. The project includes participation in library and field research, interviews, photography and graphic…
Questioning the Validity of Inquiry Assessment in a High Stakes Physical Sciences Examination
ERIC Educational Resources Information Center
Ramnarain, Umesh
2014-01-01
The South African science curriculum advocates an inquiry-based approach to practical work. Inquiry is a complex and multifaceted activity involving both cognitive and physical activity; thus, paper-and-pencil items do not provide the authentic context for this assessment. This study investigates the construct validity of inquiry-related questions…
NASA Astrophysics Data System (ADS)
Dussault, Mary E.; Wright, Erika A.; Sadler, Philip; Sonnert, Gerhard; ITEAMS II Team
2018-01-01
Encouraging students to pursue careers in science, technology, engineering, and mathematics (STEM) is a high priority for national K-12 education improvement initiatives in the United States. Many educators have claimed that a promising strategy for nurturing early student interest in STEM is to engage them in authentic inquiry experiences. “Authentic” refers to investigations in which the questions are of genuine interest and importance to students, and the inquiry more closely resembles the way real science is done. Science education researchers and practitioners at the Harvard-Smithsonian Center for Astrophysics have put this theory into action with the development of YouthAstroNet, a nationwide online learning community of middle-school aged students, educators, and STEM professionals that features the MicroObservatory Robotic Telescope Network, professional image analysis software, and complementary curricula for use in a variety of learning settings. This preliminary study examines factors that influence YouthAstroNet participants' Science Affinity, STEM Identity, and STEM Career Interest, using the matched pre/post survey results of 261 participants as the data source. The pre/post surveys included some 40 items measuring affinity, identity, knowledge, and career interest. In addition, the post intervention instrument included a number of items in which students reported the instructional strategies they experienced as part of the program. A simple analysis of pre-post changes in affinity and interest revealed very little significant change, and for those items where a small pre-post effect was observed, the average change was most often negative. However, after accounting for students' different program treatment experiences and for their prior attitudes and interests, a predictor of significant student gains in Affinity, STEM Identity, Computer/Math Identity, and STEM Career Interest could be identified. This was the degree to which students reported using and experiencing the primary "authentic" learning activities of the YouthAstroNet program.
Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo
2012-12-01
The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.
Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho
2014-01-01
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. PMID:24919012
Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho
2014-06-10
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.
Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid
Câmara, Sérgio; Anand, Dhananjay; Pillitteri, Victoria; Carmo, Luiz
2017-01-01
Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82% and 47.29% in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead. PMID:28736582
Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid.
Câmara, Sérgio; Anand, Dhananjay; Pillitteri, Victoria; Carmo, Luiz
2016-01-01
Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82% and 47.29% in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead.
Orr, Christopher Henry; Luff, Craig Janson; Dockray, Thomas; Macarthur, Duncan Whittemore
2003-11-18
The apparatus and method provide a technique for significantly reducing capacitance effects in detector electrodes arising due to movement of the instrument relative to the item/location being monitored in ion detection based techniques. The capacitance variations are rendered less significant by placing an electrically conducting element between the detector electrodes and the monitored location/item. Improved sensitivity and reduced noise signals arise as a result. The technique also provides apparatus and method suitable for monitoring elongate items which are unsuited to complete enclosure in one go within a chamber. The items are monitored part by part as the pass through the instrument, so increasing the range of items or locations which can be successfully monitored.
ERIC Educational Resources Information Center
Chen, Yu-Hua; Bruncak, Radovan
2015-01-01
With the advances in technology, wordlists retrieved from computer corpora have become increasingly popular in recent years. The lexical items in those wordlists are usually selected, according to a set of robust frequency and dispersion criteria, from large corpora of authentic and naturally occurring language. Corpus wordlists are of great value…
ERIC Educational Resources Information Center
Cameron, Craig; Dickfos, Jennifer
2014-01-01
This paper examines the influence of an authentic assessment item on three dimensions of oral communication in accounting education: skills, self-efficacy, and relevance. An explanatory mixed methods design is used to explore students' perceptions of their development. The results indicate that an elevator pitch assessment has a positive impact on…
Drosou, A.; Ioannidis, D.; Moustakas, K.; Tzovaras, D.
2011-01-01
Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities. PMID:21380485
Tan, Zuowen
2014-03-01
The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical.
Drosou, A; Ioannidis, D; Moustakas, K; Tzovaras, D
2011-03-01
Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities.
Holograms and authentication: meeting future demands
NASA Astrophysics Data System (ADS)
Lancaster, Ian M.
2004-06-01
The use of holograms as authentication or security devices is the most valuable application of holograms yet devised. In 20 years, this has developed from the first use of a hologram on credit cards, to the situation today where governments turn to holograms as a key security feature on the protected documents they issue, including banknotes, identity documents and tax banderols. At the same time, holograms (and related devices) are the most recognised visible feature used to authenticate and protect branded and OEM products; this sector covers the gamut from CD jewel-box seals to the protection of safety-related items such as medicines and vehicle replacement parts. There has been creative synergy between the commercial suppliers of such holograms and the practical holography community. But new technologies are coming forward to challenge the role of holograms, a challenge that is aided by the counterfeiting of security holograms. What are the characteristics of those technologies and can holograms provide similar resources to users? Examples of collaboration between hologram producers and producers of other technologies to create combination devices suggest a possible route forward for holography to maintain its role in authentication and security. By scrutinising and adapting to needs, often by combination with other techniques, holographers may be able to retain their role in this important application.
The Use of Web-Based Portfolios in College Physical Education Activity Courses
ERIC Educational Resources Information Center
Hastie, Peter A.; Sinelnikov, Oleg A.
2007-01-01
This paper describes the introduction of web-based portfolios as a means of authentic assessment in collegiate physical education classes. Students in three volleyball classes were required to contribute to web-based team portfolios, and at the end of the semester, were able to make comment upon this process. A six-item on-line survey used to…
A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.
Chang, Ya-Fen; Yu, Shih-Hui; Shiao, Ding-Rui
2013-04-01
Connected health care provides new opportunities for improving financial and clinical performance. Many connected health care applications such as telecare medicine information system, personally controlled health records system, and patient monitoring have been proposed. Correct and quality care is the goal of connected heath care, and user authentication can ensure the legality of patients. After reviewing authentication schemes for connected health care applications, we find that many of them cannot protect patient privacy such that others can trace users/patients by the transmitted data. And the verification tokens used by these authentication schemes to authenticate users or servers are only password, smart card and RFID tag. Actually, these verification tokens are not unique and easy to copy. On the other hand, biometric characteristics, such as iris, face, voiceprint, fingerprint and so on, are unique, easy to be verified, and hard to be copied. In this paper, a biometrics-based user authentication scheme will be proposed to ensure uniqueness and anonymity at the same time. With the proposed scheme, only the legal user/patient himself/herself can access the remote server, and no one can trace him/her according to transmitted data.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi
2015-08-01
Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.
Progress and challenges associated with halal authentication of consumer packaged goods.
Premanandh, Jagadeesan; Bin Salem, Samara
2017-11-01
Abusive business practices are increasingly evident in consumer packaged goods. Although consumers have the right to protect themselves against such practices, rapid urbanization and industrialization result in greater distances between producers and consumers, raising serious concerns on the supply chain. The operational complexities surrounding halal authentication pose serious challenges on the integrity of consumer packaged goods. This article attempts to address the progress and challenges associated with halal authentication. Advancement and concerns on the application of new, rapid analytical methods for halal authentication are discussed. The significance of zero tolerance policy in consumer packaged foods and its impact on analytical testing are presented. The role of halal assurance systems and their challenges are also considered. In conclusion, consensus on the establishment of one standard approach coupled with a sound traceability system and constant monitoring would certainly improve and ensure halalness of consumer packaged goods. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.
A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.
Jiang, Qi; Lian, Xinxin; Yang, Chao; Ma, Jianfeng; Tian, Youliang; Yang, Yuanyuan
2016-11-01
Wireless body area networks (WBANs) have become one of the key components of mobile health (mHealth) which provides 24/7 health monitoring service and greatly improves the quality and efficiency of healthcare. However, users' concern about the security and privacy of their health information has become one of the major obstacles that impede the wide adoption of WBANs. Anonymous and unlinkable authentication is critical to protect the security and privacy of sensitive physiological information in transit from the client to the application provider. We first show that the anonymous authentication scheme of Wang and Zhang based on bilinear pairing is prone to client impersonation attack. Then, we propose an enhanced anonymous authentication scheme to remedy the flaw in Wang and Zhang's scheme. We give the security analysis to demonstrate that the enhanced scheme achieves the desired security features and withstands various known attacks.
GNSS Spoofing Network Monitoring Based on Differential Pseudorange.
Zhang, Zhenjun; Zhan, Xingqun
2016-10-23
Spoofing is becoming a serious threat to various Global Navigation Satellite System (GNSS) applications, especially for those that require high reliability and security such as power grid synchronization and applications related to first responders and aviation safety. Most current works on anti-spoofing focus on spoofing detection from the individual receiver side, which identifies spoofing when it is under an attack. This paper proposes a novel spoofing network monitoring (SNM) mechanism aiming to reveal the presence of spoofing within an area. Consisting of several receivers and one central processing component, it keeps detecting spoofing even when the network is not attacked. The mechanism is based on the different time difference of arrival (TDOA) properties between spoofing and authentic signals. Normally, TDOAs of spoofing signals from a common spoofer are identical while those of authentic signals from diverse directions are dispersed. The TDOA is measured as the differential pseudorange to carrier frequency ratio (DPF). In a spoofing case, the DPFs include those of both authentic and spoofing signals, among which the DPFs of authentic are dispersed while those of spoofing are almost overlapped. An algorithm is proposed to search for the DPFs that are within a pre-defined small range, and an alarm will be raised if several DPFs are found within such range. The proposed SNM methodology is validated by simulations and a partial field trial. Results show 99.99% detection and 0.01% false alarm probabilities are achieved. The SNM has the potential to be adopted in various applications such as (1) alerting dedicated users when spoofing is occurring, which could significantly shorten the receiver side spoofing cost; (2) in combination with GNSS performance monitoring systems, such as the Continuous Operating Reference System (CORS) and GNSS Availability, Accuracy, Reliability anD Integrity Assessment for Timing and Navigation (GAARDIAN) System, to provide more reliable monitoring services.
RUASN: a robust user authentication framework for wireless sensor networks.
Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae
2011-01-01
In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.
NASA Astrophysics Data System (ADS)
Lee, Jasper C.; Ma, Kevin C.; Liu, Brent J.
2008-03-01
A Data Grid for medical images has been developed at the Image Processing and Informatics Laboratory, USC to provide distribution and fault-tolerant storage of medical imaging studies across Internet2 and public domain. Although back-up policies and grid certificates guarantee privacy and authenticity of grid-access-points, there still lacks a method to guarantee the sensitive DICOM images have not been altered or corrupted during transmission across a public domain. This paper takes steps toward achieving full image transfer security within the Data Grid by utilizing DICOM image authentication and a HIPAA-compliant auditing system. The 3-D lossless digital signature embedding procedure involves a private 64 byte signature that is embedded into each original DICOM image volume, whereby on the receiving end the signature can to be extracted and verified following the DICOM transmission. This digital signature method has also been developed at the IPILab. The HIPAA-Compliant Auditing System (H-CAS) is required to monitor embedding and verification events, and allows monitoring of other grid activity as well. The H-CAS system federates the logs of transmission and authentication events at each grid-access-point and stores it into a HIPAA-compliant database. The auditing toolkit is installed at the local grid-access-point and utilizes Syslog [1], a client-server standard for log messaging over an IP network, to send messages to the H-CAS centralized database. By integrating digital image signatures and centralized logging capabilities, DICOM image integrity within the Medical Imaging and Informatics Data Grid can be monitored and guaranteed without loss to any image quality.
Wilmot, Michael P; Kostal, Jack W; Stillwell, David; Kosinski, Michal
2017-07-01
For the past 40 years, the conventional univariate model of self-monitoring has reigned as the dominant interpretative paradigm in the literature. However, recent findings associated with an alternative bivariate model challenge the conventional paradigm. In this study, item response theory is used to develop measures of the bivariate model of acquisitive and protective self-monitoring using original Self-Monitoring Scale (SMS) items, and data from two large, nonstudent samples ( Ns = 13,563 and 709). Results indicate that the new acquisitive (six-item) and protective (seven-item) self-monitoring scales are reliable, unbiased in terms of gender and age, and demonstrate theoretically consistent relations to measures of personality traits and cognitive ability. Additionally, by virtue of using original SMS items, previously collected responses can be reanalyzed in accordance with the alternative bivariate model. Recommendations for the reanalysis of archival SMS data, as well as directions for future research, are provided.
AliEn—ALICE environment on the GRID
NASA Astrophysics Data System (ADS)
Saiz, P.; Aphecetche, L.; Bunčić, P.; Piskač, R.; Revsbech, J.-E.; Šego, V.; Alice Collaboration
2003-04-01
AliEn ( http://alien.cern.ch) (ALICE Environment) is a Grid framework built on top of the latest Internet standards for information exchange and authentication (SOAP, PKI) and common Open Source components. AliEn provides a virtual file catalogue that allows transparent access to distributed datasets and a number of collaborating Web services which implement the authentication, job execution, file transport, performance monitor and event logging. In the paper we will present the architecture and components of the system.
Orr, Christopher Henry; Luff, Craig Janson; Dockray, Thomas; Macarthur, Duncan Whittemore
2002-01-01
The apparatus and method provide techniques for effectively implementing alpha and/or beta and/or gamma monitoring of items or locations as desired. Indirect alpha monitoring by detecting ions generated by alpha emissions, in conjunction with beta and/or gamma monitoring is provided. The invention additionally provides for screening of items prior to alpha monitoring using beta and/or gamma monitoring, so as to ensure that the alpha monitoring apparatus is not contaminated by proceeding direct to alpha monitoring of a heavily contaminated item or location. The invention provides additional versatility in the emission forms which can be monitored, whilst maintaining accuracy and avoiding inadvertent contamination.
NASA Astrophysics Data System (ADS)
Darma, I. K.
2018-01-01
This research is aimed at determining: 1) the differences of mathematical problem solving ability between the students facilitated with problem-based learning model and conventional learning model, 2) the differences of mathematical problem solving ability between the students facilitated with authentic and conventional assessment model, and 3) interaction effect between learning and assessment model on mathematical problem solving. The research was conducted in Bali State Polytechnic, using the 2x2 experiment factorial design. The samples of this research were 110 students. The data were collected using a theoretically and empirically-validated test. Instruments were validated by using Aiken’s approach of technique content validity and item analysis, and then analyzed using anova stylistic. The result of the analysis shows that the students facilitated with problem-based learning and authentic assessment models get the highest score average compared to the other students, both in the concept understanding and mathematical problem solving. The result of hypothesis test shows that, significantly: 1) there is difference of mathematical problem solving ability between the students facilitated with problem-based learning model and conventional learning model, 2) there is difference of mathematical problem solving ability between the students facilitated with authentic assessment model and conventional assessment model, and 3) there is interaction effect between learning model and assessment model on mathematical problem solving. In order to improve the effectiveness of mathematics learning, collaboration between problem-based learning model and authentic assessment model can be considered as one of learning models in class.
10 CFR 74.55 - Item monitoring.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Item monitoring. 74.55 Section 74.55 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) MATERIAL CONTROL AND ACCOUNTING OF SPECIAL NUCLEAR MATERIAL Formula Quantities of Strategic Special Nuclear Material § 74.55 Item monitoring. (a) Licensees subject to § 74.51...
10 CFR 74.55 - Item monitoring.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Item monitoring. 74.55 Section 74.55 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) MATERIAL CONTROL AND ACCOUNTING OF SPECIAL NUCLEAR MATERIAL Formula Quantities of Strategic Special Nuclear Material § 74.55 Item monitoring. (a) Licensees subject to § 74.51...
10 CFR 74.55 - Item monitoring.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Item monitoring. 74.55 Section 74.55 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) MATERIAL CONTROL AND ACCOUNTING OF SPECIAL NUCLEAR MATERIAL Formula Quantities of Strategic Special Nuclear Material § 74.55 Item monitoring. (a) Licensees subject to § 74.51...
10 CFR 74.55 - Item monitoring.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Item monitoring. 74.55 Section 74.55 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) MATERIAL CONTROL AND ACCOUNTING OF SPECIAL NUCLEAR MATERIAL Formula Quantities of Strategic Special Nuclear Material § 74.55 Item monitoring. (a) Licensees subject to § 74.51...
BOKP: A DNA Barcode Reference Library for Monitoring Herbal Drugs in the Korean Pharmacopeia
Liu, Jinxin; Shi, Linchun; Song, Jingyuan; Sun, Wei; Han, Jianping; Liu, Xia; Hou, Dianyun; Yao, Hui; Li, Mingyue; Chen, Shilin
2017-01-01
Herbal drug authentication is an important task in traditional medicine; however, it is challenged by the limitations of traditional authentication methods and the lack of trained experts. DNA barcoding is conspicuous in almost all areas of the biological sciences and has already been added to the British pharmacopeia and Chinese pharmacopeia for routine herbal drug authentication. However, DNA barcoding for the Korean pharmacopeia still requires significant improvements. Here, we present a DNA barcode reference library for herbal drugs in the Korean pharmacopeia and developed a species identification engine named KP-IDE to facilitate the adoption of this DNA reference library for the herbal drug authentication. Using taxonomy records, specimen records, sequence records, and reference records, KP-IDE can identify an unknown specimen. Currently, there are 6,777 taxonomy records, 1,054 specimen records, 30,744 sequence records (ITS2 and psbA-trnH) and 285 reference records. Moreover, 27 herbal drug materials were collected from the Seoul Yangnyeongsi herbal medicine market to give an example for real herbal drugs authentications. Our study demonstrates the prospects of the DNA barcode reference library for the Korean pharmacopeia and provides future directions for the use of DNA barcoding for authenticating herbal drugs listed in other modern pharmacopeias. PMID:29326593
Authentication System for Electrical Charging of Electrical Vehicles in the Housing Development
NASA Astrophysics Data System (ADS)
Song, Wang-Cheol
Recently the smart grid has been a hot issue in the research area. The Electric Vehicle (EV) is the most important component in the Smart Grid, having a role of the battery component with high capacity. We have thought how to introduce the EV in the housing development, and for proper operation of the smart grid systems in the housing area the authentication system is essential for the individual houses. We propose an authentication system to discriminate an individual houses, so that the account management component can appropriately operate the electrical charging and billing in the housing estate. The proposed system has an architecture to integrate the charging system outside a house and the monitoring system inside a house.
García Bengoechea, Enrique; Sabiston, Catherine M; Wilson, Philip M
2017-01-01
The aim of this study was to provide initial evidence of validity and reliability of scores derived from the Activity Context in Youth Sport Questionnaire (ACYSQ), an instrument designed to offer a comprehensive assessment of the activities adolescents take part in during sport practices. Two studies were designed for the purposes of item development and selection, and to provide evidence of structural and criterion validity of ACYSQ scores, respectively (N = 334; M age = 14.93, SD = 1.76 years). Confirmatory factor analysis (CFA) supported the adequacy of a 20-item ACYSQ measurement model, which was invariant across gender, and comprised the following dimensions: (1) stimulation; (2) usefulness-value; (3) authenticity; (4) repetition-boredom; and (5) ineffectiveness. Internal consistency reliability estimates and composite reliability estimates for ACYSQ subscale scores ranged from 0.72 to 0.91. In regression analyses, stimulation predicted enjoyment and perceived competence, ineffectiveness was significantly associated with perceived competence and authenticity emerged as a predictor of commitment in sport. These findings indicate that the ACYSQ displays adequate psychometric properties and the use of the instrument may be useful for studying selected activity-based features of the practice environment and their motivational consequences in youth sport.
Li, Chun-Ta; Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming
2017-06-23
In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.
Energy Monitoring: Powerful Connections between Math, Science, and Community
ERIC Educational Resources Information Center
Farrin, Lynn; Mokros, Jan
2012-01-01
Middle school students need to know about energy concepts and how they can reduce their energy use. New energy-monitoring tools provide powerful opportunities for students to engage in authentic investigations rich in the science practices described in "A Framework for K-12 Science Education" (NRC 2012), while at the same time advancing their…
New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing.
Wang, Chunzhi; Zhang, Yanmei
2015-11-01
Due to the development of information technologies and network technologies, healthcare systems have been employed in many countries. As an important part of healthcare systems, the wireless body area network (WBAN) could bring convenience to both patients and physicians because it could help physicians to monitor patients' physiological values remotely. It is essential to ensure secure communication in WBANs because patients' physiological values are very sensitive. Recently, Liu et al. proposed an efficient authentication scheme for WBANs. Unfortunately, Zhao pointed out that their scheme suffered from the stolen verifier-table attack. To improve security and efficiency, Zhao proposed an anonymous authentication scheme for WBANs. However, Zhao's scheme cannot provide real anonymity because the users' pseudo identities are constant value and the attack could tract the users. In this paper, we propose a new anonymous authentication scheme for WBANs. Security analysis shows that the proposed scheme could overcome weaknesses in previous scheme. We also use the BAN logic to demonstrate the security of the proposed scheme.
Bajoub, Aadil; Bendini, Alessandra; Fernández-Gutiérrez, Alberto; Carrasco-Pancorbo, Alegría
2018-03-24
Over the last decades, olive oil quality and authenticity control has become an issue of great importance to consumers, suppliers, retailers, and regulators in both traditional and emerging olive oil producing countries, mainly due to the increasing worldwide popularity and the trade globalization of this product. Thus, in order to ensure olive oil authentication, various national and international laws and regulations have been adopted, although some of them are actually causing an enormous debate about the risk that they can represent for the harmonization of international olive oil trade standards. Within this context, this review was designed to provide a critical overview and comparative analysis of selected regulatory frameworks for olive oil authentication, with special emphasis on the quality and purity criteria considered by these regulation systems, their thresholds and the analytical methods employed for monitoring them. To complete the general overview, recent analytical advances to overcome drawbacks and limitations of the official methods to evaluate olive oil quality and to determine possible adulterations were reviewed. Furthermore, the latest trends on analytical approaches to assess the olive oil geographical and varietal origin traceability were also examined.
Advances in high-resolution mass spectrometry based on metabolomics studies for food--a review.
Rubert, Josep; Zachariasova, Milena; Hajslova, Jana
2015-01-01
Food authenticity becomes a necessity for global food policies, since food placed in the market without fail has to be authentic. It has always been a challenge, since in the past minor components, called also markers, have been mainly monitored by chromatographic methods in order to authenticate the food. Nevertheless, nowadays, advanced analytical methods have allowed food fingerprints to be achieved. At the same time they have been also combined with chemometrics, which uses statistical methods in order to verify food and to provide maximum information by analysing chemical data. These sophisticated methods based on different separation techniques or stand alone have been recently coupled to high-resolution mass spectrometry (HRMS) in order to verify the authenticity of food. The new generation of HRMS detectors have experienced significant advances in resolving power, sensitivity, robustness, extended dynamic range, easier mass calibration and tandem mass capabilities, making HRMS more attractive and useful to the food metabolomics community, therefore becoming a reliable tool for food authenticity. The purpose of this review is to summarise and describe the most recent metabolomics approaches in the area of food metabolomics, and to discuss the strengths and drawbacks of the HRMS analytical platforms combined with chemometrics.
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks
Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae
2011-01-01
In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost. PMID:22163888
Zhang, Ruisheng; Liu, Qidong
2017-01-01
Wireless sensor networks (WSNs), which consist of a large number of sensor nodes, have become among the most important technologies in numerous fields, such as environmental monitoring, military surveillance, control systems in nuclear reactors, vehicle safety systems, and medical monitoring. The most serious drawback for the widespread application of WSNs is the lack of security. Given the resource limitation of WSNs, traditional security schemes are unsuitable. Approaches toward withstanding related attacks with small overhead have thus recently been studied by many researchers. Numerous studies have focused on the authentication scheme for WSNs, but most of these works cannot achieve the security performance and overhead perfectly. Nam et al. proposed a two-factor authentication scheme with lightweight sensor computation for WSNs. In this paper, we review this scheme, emphasize its drawbacks, and propose a temporal credential-based mutual authentication with a multiple-password scheme for WSNs. Our scheme uses multiple passwords to achieve three-factor security performance and generate a session key between user and sensor nodes. The security analysis phase shows that our scheme can withstand related attacks, including a lost password threat, and the comparison phase shows that our scheme involves a relatively small overhead. In the comparison of the overhead phase, the result indicates that more than 95% of the overhead is composed of communication and not computation overhead. Therefore, the result motivates us to pay further attention to communication overhead than computation overhead in future research. PMID:28135288
Liu, Xin; Zhang, Ruisheng; Liu, Qidong
2017-01-01
Wireless sensor networks (WSNs), which consist of a large number of sensor nodes, have become among the most important technologies in numerous fields, such as environmental monitoring, military surveillance, control systems in nuclear reactors, vehicle safety systems, and medical monitoring. The most serious drawback for the widespread application of WSNs is the lack of security. Given the resource limitation of WSNs, traditional security schemes are unsuitable. Approaches toward withstanding related attacks with small overhead have thus recently been studied by many researchers. Numerous studies have focused on the authentication scheme for WSNs, but most of these works cannot achieve the security performance and overhead perfectly. Nam et al. proposed a two-factor authentication scheme with lightweight sensor computation for WSNs. In this paper, we review this scheme, emphasize its drawbacks, and propose a temporal credential-based mutual authentication with a multiple-password scheme for WSNs. Our scheme uses multiple passwords to achieve three-factor security performance and generate a session key between user and sensor nodes. The security analysis phase shows that our scheme can withstand related attacks, including a lost password threat, and the comparison phase shows that our scheme involves a relatively small overhead. In the comparison of the overhead phase, the result indicates that more than 95% of the overhead is composed of communication and not computation overhead. Therefore, the result motivates us to pay further attention to communication overhead than computation overhead in future research.
Tanimoto, Tsuyoshi; Nakanishi, Yoko; Yoshida, Naoko; Tsuboi, Hirohito; Kimura, Kazuko
2012-01-01
Objective To explore the circulation of anti-obesity medicines via the internet and their quality. Design Cross-sectional study. Setting Internet pharmacies and pharmaceutical suppliers accessible from Japan. Participants Anti-obesity medicines were purchased using relevant keywords on Japanese Google search engine. Blogs and advertisement-only sites were excluded. Primary and secondary outcome measures The authenticity of the samples was investigated in collaboration with the manufacturers of the samples and medicine regulatory authorities. Quality of the samples was assessed by pharmacopoeial analyses using high-performance liquid chromatography. Results 82 samples were purchased from 36 internet sites. Approximately half of the sites did not mention a physical address, and 45% of the samples did not contain a package insert. A variety of custom declarations were made for the shipments of the samples: personal health items, supplement, medicines, general merchandise, tea and others. Among 82 samples, 52 samples were analysed to check their pharmacopoeial quality. Authenticity responses were received from only five of 20 manufacturing companies. According to the pharmacopoeial analyses and authenticity investigation, three of the samples were identified as counterfeits and did not contain any active ingredients. Two of these samples were confirmed as counterfeits by the manufacturer of the authentic products. The manufacturer of the other sample did not respond to our request for an authenticity check even after several communication attempts. These counterfeit cases have been reported at the rapid alert system of Western Pacific Region of the WHO. Conclusions Many counterfeit and unapproved anti-obesity medicines may be easily bypassing regulatory checks during shipping and are widely circulated through the internet. Regulatory authorities should take measures to prevent these medicines from entering countries to safeguard their citizens. PMID:22581794
Using iKidTools™ Software Support Systems to Develop and Implement Self-Monitoring Interventions
ERIC Educational Resources Information Center
Patti, Angela L.; Miller, Kevin J.
2011-01-01
Educational teams often are faced with the task of developing and implementing Behavioral Intervention Plans (BIPs) for students who present challenging and/or disruptive behaviors. This article describes the steps used to develop and implement a self-monitoring BIP that incorporated an innovative software system, iKidTools™. An authentic case…
Use of indicator items to monitor marine debris on a New Jersey beach from 1991 to 1996
Ribic, C.A.
1998-01-01
The US National Marine Debris Monitoring Program is using indicator items from beach surveys to identify whether amounts of marine debris are changing over time. Indicator items were selected through expert opinion and assumed to reflect the trend of all debris. We used monthly data from a 1991-1996 study of debris on a New Jersey beach to determine if indicator and non-indicator items showed similar trends. Total indicator debris levels did not change; this was true regardless of probable source. Non-indicator debris increased about 40% annually. Plastic non-indicator items increased regardless of whether items were whole items, cigarette filters, or pieces. Of the whole items, almost 50% were plastic lids, cups, and utensils, and about 25% were drug-related paraphernalia, tobacco-related products, plastic stirrers, pull rings, and fireworks. When indicator items are used in a monitoring programme to reflect total debris patterns, concordance of trends in indicator and non-indicator debris should be checked.
Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming
2017-01-01
In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients’ physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu–Chung’s scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP. PMID:28644381
Commutability of food microbiology proficiency testing samples.
Abdelmassih, M; Polet, M; Goffaux, M-J; Planchon, V; Dierick, K; Mahillon, J
2014-03-01
Food microbiology proficiency testing (PT) is a useful tool to assess the analytical performances among laboratories. PT items should be close to routine samples to accurately evaluate the acceptability of the methods. However, most PT providers distribute exclusively artificial samples such as reference materials or irradiated foods. This raises the issue of the suitability of these samples because the equivalence-or 'commutability'-between results obtained on artificial vs. authentic food samples has not been demonstrated. In the clinical field, the use of noncommutable PT samples has led to erroneous evaluation of the performances when different analytical methods were used. This study aimed to provide a first assessment of the commutability of samples distributed in food microbiology PT. REQUASUD and IPH organized 13 food microbiology PTs including 10-28 participants. Three types of PT items were used: genuine food samples, sterile food samples and reference materials. The commutability of the artificial samples (reference material or sterile samples) was assessed by plotting the distribution of the results on natural and artificial PT samples. This comparison highlighted matrix-correlated issues when nonfood matrices, such as reference materials, were used. Artificially inoculated food samples, on the other hand, raised only isolated commutability issues. In the organization of a PT-scheme, authentic or artificially inoculated food samples are necessary to accurately evaluate the analytical performances. Reference materials, used as PT items because of their convenience, may present commutability issues leading to inaccurate penalizing conclusions for methods that would have provided accurate results on food samples. For the first time, the commutability of food microbiology PT samples was investigated. The nature of the samples provided by the organizer turned out to be an important factor because matrix effects can impact on the analytical results. © 2013 The Society for Applied Microbiology.
Valentini, Paola; Galimberti, Andrea; Mezzasalma, Valerio; De Mattia, Fabrizio; Casiraghi, Maurizio; Labra, Massimo; Pompa, Pier Paolo
2017-07-03
Food trade globalization and the growing demand for selected food varieties have led to the intensification of adulteration cases, especially in the form of species substitution and mixing with cheaper taxa. This phenomenon has huge economic impact and sometimes even public health implications. DNA barcoding represents a well-proven molecular approach to assess the authenticity of food items, although its use is hampered by analytical constraints and timeframes that are often prohibitive for the food market. To address such issues, we have introduced a new technology, named NanoTracer, that allows for rapid and naked-eye molecular traceability of any food and requires limited instrumentation and cost-effective reagents. Moreover, unlike sequencing, this method can be used to identify not only the substitution of a fine ingredient, but also its dilution with cheaper ones. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-20
... DoD published a proposed rule in the Federal Register at 76 FR 21847 on April 19, 2011, to add DFARS..., the contract line item may be for a desktop computer, but the actual items delivered, invoiced, and..., Desktop with 20 EA CPU, Monitor, Keyboard and Mouse. Alternative line-item structure offer where monitors...
Assessment in Science Education
NASA Astrophysics Data System (ADS)
Rustaman, N. Y.
2017-09-01
An analyses study focusing on scientific reasoning literacy was conducted to strengthen the stressing on assessment in science by combining the important of the nature of science and assessment as references, higher order thinking and scientific skills in assessing science learning as well. Having background in developing science process skills test items, inquiry in its many form, scientific and STEM literacy, it is believed that inquiry based learning should first be implemented among science educators and science learners before STEM education can successfully be developed among science teachers, prospective teachers, and students at all levels. After studying thoroughly a number of science researchers through their works, a model of scientific reasoning was proposed, and also simple rubrics and some examples of the test items were introduced in this article. As it is only the beginning, further studies will still be needed in the future with the involvement of prospective science teachers who have interests in assessment, either on authentic assessment or in test items development. In balance usage of alternative assessment rubrics, as well as valid and reliable test items (standard) will be needed in accelerating STEM education in Indonesia.
Wang, Bo; Sun, Bukuan
2017-03-01
The current study examined whether the effect of post-encoding emotional arousal on item memory extends to reality-monitoring source memory and, if so, whether the effect depends on emotionality of learning stimuli and testing format. In Experiment 1, participants encoded neutral words and imagined or viewed their corresponding object pictures. Then they watched a neutral, positive, or negative video. The 24-hour delayed test showed that emotional arousal had little effect on both item memory and reality-monitoring source memory. Experiment 2 was similar except that participants encoded neutral, positive, and negative words and imagined or viewed their corresponding object pictures. The results showed that positive and negative emotional arousal induced after encoding enhanced consolidation of item memory, but not reality-monitoring source memory, regardless of emotionality of learning stimuli. Experiment 3, identical to Experiment 2 except that participants were tested only on source memory for all the encoded items, still showed that post-encoding emotional arousal had little effect on consolidation of reality-monitoring source memory. Taken together, regardless of emotionality of learning stimuli and regardless of testing format of source memory (conjunction test vs. independent test), the facilitatory effect of post-encoding emotional arousal on item memory does not generalize to reality-monitoring source memory.
1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks
Liu, Jingwei; Zhang, Lihuan; Sun, Rong
2016-01-01
Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead. PMID:27213384
1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.
Liu, Jingwei; Zhang, Lihuan; Sun, Rong
2016-05-19
Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.
Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae
2014-01-01
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications. PMID:24521942
Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae
2014-02-11
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications.
Monitoring Items in Real Time to Enhance CAT Security
ERIC Educational Resources Information Center
Zhang, Jinming; Li, Jie
2016-01-01
An IRT-based sequential procedure is developed to monitor items for enhancing test security. The procedure uses a series of statistical hypothesis tests to examine whether the statistical characteristics of each item under inspection have changed significantly during CAT administration. This procedure is compared with a previously developed…
Asing; Ali, Md. Eaqub; Abd Hamid, Sharifah Bee; Hossain, M. A. Motalib; Mustafa, Shuhaimi; Kader, Md. Abdul; Zaidul, I. S. M.
2016-01-01
The Malayan box turtle (Cuora amboinensis) (MBT) is a vulnerable and protected turtle species, but it is a lucrative item in the illegal wildlife trade because of its great appeal as an exotic food item and in traditional medicine. Although several polymerase chain reaction (PCR) assays to identify MBT by various routes have been documented, their applicability for forensic authentication remains inconclusive due to the long length of the amplicon targets, which are easily broken down by natural decomposition, environmental stresses or physiochemical treatments during food processing. To address this research gap, we developed, for the first time, a species-specific PCR-restriction fragment length polymorphism (RFLP) assay with a very short target length (120 bp) to detect MBT in the food chain; this authentication ensured better security and reliability through molecular fingerprints. The PCR-amplified product was digested with Bfa1 endonuclease, and distinctive restriction fingerprints (72, 43 and 5 bp) for MBT were found upon separation in a microfluidic chip-based automated electrophoresis system, which enhances the resolution of short oligos. The chances of any false negative identifications were eliminated through the use of a universal endogenous control for eukaryotes, and the limit of detection was 0.0001 ng DNA or 0.01% of the meat under admixed states. Finally, the optimized PCR-RFLP assay was validated for the screening of raw and processed commercial meatballs, burgers and frankfurters, which are very popular in most countries. The optimized PCR-RFLP assay was further used to screen MBT materials in 153 traditional Chinese medicines of 17 different brands and 62 of them were found MBT positive; wherein the ingredients were not declared in product labels. Overall, the novel assay demonstrated sufficient merit for use in any forensic and/or archaeological authentication of MBT, even under a state of decomposition. PMID:27716792
Asing; Ali, Md Eaqub; Abd Hamid, Sharifah Bee; Hossain, M A Motalib; Mustafa, Shuhaimi; Kader, Md Abdul; Zaidul, I S M
2016-01-01
The Malayan box turtle (Cuora amboinensis) (MBT) is a vulnerable and protected turtle species, but it is a lucrative item in the illegal wildlife trade because of its great appeal as an exotic food item and in traditional medicine. Although several polymerase chain reaction (PCR) assays to identify MBT by various routes have been documented, their applicability for forensic authentication remains inconclusive due to the long length of the amplicon targets, which are easily broken down by natural decomposition, environmental stresses or physiochemical treatments during food processing. To address this research gap, we developed, for the first time, a species-specific PCR-restriction fragment length polymorphism (RFLP) assay with a very short target length (120 bp) to detect MBT in the food chain; this authentication ensured better security and reliability through molecular fingerprints. The PCR-amplified product was digested with Bfa1 endonuclease, and distinctive restriction fingerprints (72, 43 and 5 bp) for MBT were found upon separation in a microfluidic chip-based automated electrophoresis system, which enhances the resolution of short oligos. The chances of any false negative identifications were eliminated through the use of a universal endogenous control for eukaryotes, and the limit of detection was 0.0001 ng DNA or 0.01% of the meat under admixed states. Finally, the optimized PCR-RFLP assay was validated for the screening of raw and processed commercial meatballs, burgers and frankfurters, which are very popular in most countries. The optimized PCR-RFLP assay was further used to screen MBT materials in 153 traditional Chinese medicines of 17 different brands and 62 of them were found MBT positive; wherein the ingredients were not declared in product labels. Overall, the novel assay demonstrated sufficient merit for use in any forensic and/or archaeological authentication of MBT, even under a state of decomposition.
Brief report: improving the validity of assessments of adolescents' feelings of privacy invasion.
Laird, Robert D; Marrero, Matthew D; Melching, Jessica; Kuhn, Emily S
2013-02-01
Studies of privacy invasion have relied on measures that combine items assessing adolescents' feelings of privacy invasion with items assessing parents' monitoring behaviors. Removing items assessing parents' monitoring behaviors may improve the validity of assessments of privacy invasion. Data were collected from 163 adolescents (M age 13 years, 5 months; 47% female; 50% European American, non-Hispanic, 46% African American) and their mothers. A model specifying separate factors for privacy invasion and monitoring behavior fit adolescent-reported and parent-reported data significantly better than a single factor model. Although privacy invasion and monitoring behavior were positively associated, privacy invasion and monitoring behavior correlations were significantly different from one another across all ten variables reported by adolescents and across eight of the nine variables reported by mothers. The pattern of results strongly supports a recommendation for researchers to exclude items assessing monitoring behaviors to provide a more valid assessment of privacy invasion. Copyright © 2012 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
Brief Report: Improving the Validity of Assessments of Adolescents' Feelings of Privacy Invasion
ERIC Educational Resources Information Center
Laird, Robert D.; Marrero, Matthew D.; Melching, Jessica; Kuhn, Emily S.
2013-01-01
Studies of privacy invasion have relied on measures that combine items assessing adolescents' feelings of privacy invasion with items assessing parents' monitoring behaviors. Removing items assessing parents' monitoring behaviors may improve the validity of assessments of privacy invasion. Data were collected from 163 adolescents (M age 13 years,…
Social influences on reality-monitoring decisions.
Hoffman, H G; Granhag, P A; Kwong See, S T; Loftus, E F
2001-04-01
A modified Asch (1951) conformity paradigm was used to study the impact of social influence on reality-monitoring decisions about new items. Subjects studied pictures of some objects and imagined others. In a later test phase, they judged whether items had been perceived in the study phase, had been imagined, or were new. Critically, for some items, the subjects were informed of a confederate's response before rendering a judgment. Although the confederate was always correct when they responded to old items, for new items, the confederate responded perceived, imagined, or new, or did not respond (baseline). In two experiments, we show that memory for new items was influenced by an erroneous response of the confederate. Social conformity was reduced by undermining the credibility of the confederate (Experiments 1A and 1B), and the confederate's influence was evident even after there was only a 20-min delay between study and test (Experiment 2), when the subjects were 87% accurate on new baseline items. These experiments reveal the power of social influence on reality-monitoring accuracy and confidence.
Nithaniyal, Stalin; Newmaster, Steven G; Ragupathy, Subramanyam; Krishnamoorthy, Devanathan; Vassou, Sophie Lorraine; Parani, Madasamy
2014-01-01
India is rich with biodiversity, which includes a large number of endemic, rare and threatened plant species. Previous studies have used DNA barcoding to inventory species for applications in biodiversity monitoring, conservation impact assessment, monitoring of illegal trading, authentication of traded medicinal plants etc. This is the first tropical dry evergreen forest (TDEF) barcode study in the World and the first attempt to assemble a reference barcode library for the trees of India as part of a larger project initiated by this research group. We sampled 429 trees representing 143 tropical dry evergreen forest (TDEF) species, which included 16 threatened species. DNA barcoding was completed using rbcL and matK markers. The tiered approach (1st tier rbcL; 2nd tier matK) correctly identified 136 out of 143 species (95%). This high level of species resolution was largely due to the fact that the tree species were taxonomically diverse in the TDEF. Ability to resolve taxonomically diverse tree species of TDEF was comparable among the best match method, the phylogenetic method, and the characteristic attribute organization system method. We demonstrated the utility of the TDEF reference barcode library to authenticate wood samples from timber operations in the TDEF. This pilot research study will enable more comprehensive surveys of the illegal timber trade of threatened species in the TDEF. This TDEF reference barcode library also contains trees that have medicinal properties, which could be used to monitor unsustainable and indiscriminate collection of plants from the wild for their medicinal value.
Nithaniyal, Stalin; Newmaster, Steven G.; Ragupathy, Subramanyam; Krishnamoorthy, Devanathan; Vassou, Sophie Lorraine; Parani, Madasamy
2014-01-01
Background India is rich with biodiversity, which includes a large number of endemic, rare and threatened plant species. Previous studies have used DNA barcoding to inventory species for applications in biodiversity monitoring, conservation impact assessment, monitoring of illegal trading, authentication of traded medicinal plants etc. This is the first tropical dry evergreen forest (TDEF) barcode study in the World and the first attempt to assemble a reference barcode library for the trees of India as part of a larger project initiated by this research group. Methodology/Principal Findings We sampled 429 trees representing 143 tropical dry evergreen forest (TDEF) species, which included 16 threatened species. DNA barcoding was completed using rbcL and matK markers. The tiered approach (1st tier rbcL; 2nd tier matK) correctly identified 136 out of 143 species (95%). This high level of species resolution was largely due to the fact that the tree species were taxonomically diverse in the TDEF. Ability to resolve taxonomically diverse tree species of TDEF was comparable among the best match method, the phylogenetic method, and the characteristic attribute organization system method. Conclusions We demonstrated the utility of the TDEF reference barcode library to authenticate wood samples from timber operations in the TDEF. This pilot research study will enable more comprehensive surveys of the illegal timber trade of threatened species in the TDEF. This TDEF reference barcode library also contains trees that have medicinal properties, which could be used to monitor unsustainable and indiscriminate collection of plants from the wild for their medicinal value. PMID:25259794
Kim, Kyong-Jee; Hwang, Jee-Young
2016-03-01
Ubiquitous testing has the potential to affect medical education by enhancing the authenticity of the assessment using multimedia items. This study explored medical students' experience with ubiquitous testing and its impact on student learning. A cohort (n=48) of third-year students at a medical school in South Korea participated in this study. The students were divided into two groups and were given different versions of 10 content-matched items: one in text version (the text group) and the other in multimedia version (the multimedia group). Multimedia items were delivered using tablets. Item response analyses were performed to compare item characteristics between the two versions. Additionally, focus group interviews were held to investigate the students' experiences of ubiquitous testing. The mean test score was significantly higher in the text group. Item difficulty and discrimination did not differ between text and multimedia items. The participants generally showed positive responses on ubiquitous testing. Still, they felt that the lectures that they had taken in preclinical years did not prepare them enough for this type of assessment and clinical encounters during clerkships were more helpful. To be better prepared, the participants felt that they needed to engage more actively in learning in clinical clerkships and have more access to multimedia learning resources. Ubiquitous testing can positively affect student learning by reinforcing the importance of being able to understand and apply knowledge in clinical contexts, which drives students to engage more actively in learning in clinical settings.
HIPAA-compliant automatic monitoring system for RIS-integrated PACS operation
NASA Astrophysics Data System (ADS)
Jin, Jin; Zhang, Jianguo; Chen, Xiaomeng; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen; Feng, Jie; Sheng, Liwei; Huang, H. K.
2006-03-01
As a governmental regulation, Health Insurance Portability and Accountability Act (HIPAA) was issued to protect the privacy of health information that identifies individuals who are living or deceased. HIPAA requires security services supporting implementation features: Access control; Audit controls; Authorization control; Data authentication; and Entity authentication. These controls, which proposed in HIPAA Security Standards, are Audit trails here. Audit trails can be used for surveillance purposes, to detect when interesting events might be happening that warrant further investigation. Or they can be used forensically, after the detection of a security breach, to determine what went wrong and who or what was at fault. In order to provide security control services and to achieve the high and continuous availability, we design the HIPAA-Compliant Automatic Monitoring System for RIS-Integrated PACS operation. The system consists of two parts: monitoring agents running in each PACS component computer and a Monitor Server running in a remote computer. Monitoring agents are deployed on all computer nodes in RIS-Integrated PACS system to collect the Audit trail messages defined by the Supplement 95 of the DICOM standard: Audit Trail Messages. Then the Monitor Server gathers all audit messages and processes them to provide security information in three levels: system resources, PACS/RIS applications, and users/patients data accessing. Now the RIS-Integrated PACS managers can monitor and control the entire RIS-Integrated PACS operation through web service provided by the Monitor Server. This paper presents the design of a HIPAA-compliant automatic monitoring system for RIS-Integrated PACS Operation, and gives the preliminary results performed by this monitoring system on a clinical RIS-integrated PACS.
Lightweight and confidential data discovery and dissemination for wireless body area networks.
He, Daojing; Chan, Sammy; Zhang, Yan; Yang, Haomiao
2014-03-01
As a special sensor network, a wireless body area network (WBAN) provides an economical solution to real-time monitoring and reporting of patients' physiological data. After a WBAN is deployed, it is sometimes necessary to disseminate data into the network through wireless links to adjust configuration parameters of body sensors or distribute management commands and queries to sensors. A number of such protocols have been proposed recently, but they all focus on how to ensure reliability and overlook security vulnerabilities. Taking into account the unique features and application requirements of a WBAN, this paper presents the design, implementation, and evaluation of a secure, lightweight, confidential, and denial-of-service-resistant data discovery and dissemination protocol for WBANs to ensure the data items disseminated are not altered or tampered. Based on multiple one-way key hash chains, our protocol provides instantaneous authentication and can tolerate node compromise. Besides the theoretical analysis that demonstrates the security and performance of the proposed protocol, this paper also reports the experimental evaluation of our protocol in a network of resource-limited sensor nodes, which shows its efficiency in practice. In particular, extensive security analysis shows that our protocol is provably secure.
Insider Threat Attributes and Mitigation Strategies
2013-07-01
Monitor and Control External Access and Data Downloads Organizations commonly use Virtual Private Networks (VPNs) for teleworking , allowing...gateways—An added benefit of two-factor authentication is that the access token can be collected if the employee leaves the organization. Without the
Line-scan system for continuous hand authentication
NASA Astrophysics Data System (ADS)
Liu, Xiaofeng; Kong, Lingsheng; Diao, Zhihui; Jia, Ping
2017-03-01
An increasing number of heavy machinery and vehicles have come into service, giving rise to a significant concern over protecting these high-security systems from misuse. Conventionally, authentication performed merely at the initial login may not be sufficient for detecting intruders throughout the operating session. To address this critical security flaw, a line-scan continuous hand authentication system with the appearance of an operating rod is proposed. Given that the operating rod is occupied throughout the operating period, it can be a possible solution for unobtrusively recording the personal characteristics for continuous monitoring. The ergonomics in the physiological and psychological aspects are fully considered. Under the shape constraints, a highly integrated line-scan sensor, a controller unit, and a gear motor with encoder are utilized. This system is suitable for both the desktop and embedded platforms with a universal serial bus interface. The volume of the proposed system is smaller than 15% of current multispectral area-based camera systems. Based on experiments on a database with 4000 images from 200 volunteers, a competitive equal error rate of 0.1179% is achieved, which is far more accurate than the state-of-the-art continuous authentication systems using other modalities.
Orr, Christopher Henry; Luff, Craig Janson; Dockray, Thomas; Macarthur, Duncan Whittemore
2004-11-23
The invention provides apparatus and methods which facilitate movement of an instrument relative to an item or location being monitored and/or the item or location relative to the instrument, whilst successfully excluding extraneous ions from the detection location. Thus, ions generated by emissions from the item or location can successfully be monitored during movement. The technique employs sealing to exclude such ions, for instance, through an electro-field which attracts and discharges the ions prior to their entering the detecting location and/or using a magnetic field configured to repel the ions away from the detecting location.
Gerbig, Stefanie; Stern, Gerold; Brunn, Hubertus E; Düring, Rolf-Alexander; Spengler, Bernhard; Schulz, Sabine
2017-03-01
Direct analysis of fruit and vegetable surfaces is an important tool for in situ detection of food contaminants such as pesticides. We tested three different ways to prepare samples for the qualitative desorption electrospray ionization mass spectrometry (DESI-MS) analysis of 32 pesticides found on nine authentic fruits collected from food control. Best recovery rates for topically applied pesticides (88%) were found by analyzing the surface of a glass slide which had been rubbed against the surface of the food. Pesticide concentration in all samples was at or below the maximum residue level allowed. In addition to the high sensitivity of the method for qualitative analysis, quantitative or, at least, semi-quantitative information is needed in food control. We developed a DESI-MS method for the simultaneous determination of linear calibration curves of multiple pesticides of the same chemical class using normalization to one internal standard (ISTD). The method was first optimized for food extracts and subsequently evaluated for the quantification of pesticides in three authentic food extracts. Next, pesticides and the ISTD were applied directly onto food surfaces, and the corresponding calibration curves were obtained. The determination of linear calibration curves was still feasible, as demonstrated for three different food surfaces. This proof-of-principle method was used to simultaneously quantify two pesticides on an authentic sample, showing that the method developed could serve as a fast and simple preselective tool for disclosure of pesticide regulation violations. Graphical Abstract Multiple pesticide residues were detected and quantified in-situ from an authentic set of food items and extracts in a proof of principle study.
Das, Ashok Kumar; Goswami, Adrijit
2013-06-01
Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.
Yoon, Bo Young; Choi, Ikseon; Choi, Seokjin; Kim, Tae-Hee; Roh, Hyerin; Rhee, Byoung Doo; Lee, Jong-Tae
2016-06-01
The quality of problem representation is critical for developing students' problem-solving abilities in problem-based learning (PBL). This study investigates preclinical students' experience with standardized patients (SPs) as a problem representation method compared to using video cases in PBL. A cohort of 99 second-year preclinical students from Inje University College of Medicine (IUCM) responded to a Likert scale questionnaire on their learning experiences after they had experienced both video cases and SPs in PBL. The questionnaire consisted of 14 items with eight subcategories: problem identification, hypothesis generation, motivation, collaborative learning, reflective thinking, authenticity, patient-doctor communication, and attitude toward patients. The results reveal that using SPs led to the preclinical students having significantly positive experiences in boosting patient-doctor communication skills; the perceived authenticity of their clinical situations; development of proper attitudes toward patients; and motivation, reflective thinking, and collaborative learning when compared to using video cases. The SPs also provided more challenges than the video cases during problem identification and hypotheses generation. SPs are more effective than video cases in delivering higher levels of authenticity in clinical problems for PBL. The interaction with SPs engages preclinical students in deeper thinking and discussion; growth of communication skills; development of proper attitudes toward patients; and motivation. Considering the higher cost of SPs compared with video cases, SPs could be used most advantageously during the preclinical period in the IUCM curriculum.
Kim, Kyong-Jee; Hwang, Jee-Young
2016-01-01
Purpose: Ubiquitous testing has the potential to affect medical education by enhancing the authenticity of the assessment using multimedia items. This study explored medical students’ experience with ubiquitous testing and its impact on student learning. Methods: A cohort (n=48) of third-year students at a medical school in South Korea participated in this study. The students were divided into two groups and were given different versions of 10 content-matched items: one in text version (the text group) and the other in multimedia version (the multimedia group). Multimedia items were delivered using tablets. Item response analyses were performed to compare item characteristics between the two versions. Additionally, focus group interviews were held to investigate the students’ experiences of ubiquitous testing. Results: The mean test score was significantly higher in the text group. Item difficulty and discrimination did not differ between text and multimedia items. The participants generally showed positive responses on ubiquitous testing. Still, they felt that the lectures that they had taken in preclinical years did not prepare them enough for this type of assessment and clinical encounters during clerkships were more helpful. To be better prepared, the participants felt that they needed to engage more actively in learning in clinical clerkships and have more access to multimedia learning resources. Conclusion: Ubiquitous testing can positively affect student learning by reinforcing the importance of being able to understand and apply knowledge in clinical contexts, which drives students to engage more actively in learning in clinical settings. PMID:26838569
Time-Domain Reflectometry for Tamper Indication in Unattended Monitoring Systems for Safeguards
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tedeschi, Jonathan R.; Smith, Leon E.; Moore, David E.
2014-12-01
The International Atomic Energy Agency (IAEA) continues to expand its use of unattended, remotely monitored measurement systems. An increasing number of systems and an expanding family of instruments create challenges in terms of deployment efficiency and the implementation of data authentication measures. Pacific Northwest National Laboratory (PNNL) leads a collaboration that is exploring various tamper-indicating (TI) measures that could help to address some of the long-standing detector and data-transmission authentication challenges with IAEA’s unattended systems. PNNL is investigating the viability of active time-domain reflectometry (TDR) along two parallel but interconnected paths: (1) swept-frequency TDR as the highly flexible, laboratory goldmore » standard to which field-deployable options can be compared, and (2) a low-cost commercially available spread-spectrum TDR technology as one option for field implementation. This report describes PNNL’s progress and preliminary findings from the first year of the study, and describes the path forward.« less
Glucoweb: a case study of secure, remote biomonitoring and communication.
Nigrin, D J; Kohane, I S
2000-01-01
As the Internet begins to play a greater role in many healthcare processes, it is inevitable that remote monitoring of patients' physiological parameters over the Internet will become increasingly commonplace. Internet-based communication between patients and their healthcare providers has already become prevalent, and has gained significant attention in terms of confidentiality issues. However, transmission of data directly from patients' physiological biomonitoring devices over the Web has garnered significantly less focus, especially in the area of authentication and security. In this paper, we describe a prototype system called Glucoweb, which allows patients with diabetes mellitus to transmit their self-monitored blood glucose data directly from their personal glucometer device to their diabetes care provider over the Internet. No customized software is necessary on the patient's computer, only a Web browser and active Internet connection. We use this example to highlight key authentication and security measures that should be considered for devices that transmit healthcare data to remote locations.
Secure anonymous mutual authentication for star two-tier wireless body area networks.
Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga
2016-10-01
Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is also low. Our proposed protocol is a lightweight anonymous mutually authentication protocol to mutually authenticate the sensor nodes with the controller node (hub) in a star two-tier WBAN topology. Results show that our protocol proves efficiency over previously proposed protocols and at the same time, achieves the necessary security requirements for a secure anonymous mutual authentication scheme. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Misdescription of packaged foods: a case study from the United Arab Emirates.
Premanandh, J; Sabbagh, Aman; Maruthamuthu, M
2013-01-01
Food misdescription has become of paramount importance as consumers come into contact daily with a great variety of foods. The controversies surrounding genetically modified organism (GMO) labelling and malpractices in the food chain have forced regulatory authorities to authenticate food from production to consumption. This paper reports the results of a surveillance programme conducted in the United Arab Emirates (UAE) market to assess the status of food misdescription and authenticity. A DNA test was used to screen random samples of processed meat products bought from supermarkets in the UAE. A total of 246 samples were analysed from different geographical locations. The majority of samples showed a high standard of legal compliance, with over 95% confirmed for authenticity. However, 5% of samples were found to contain undeclared species. In conclusion, this study confirms the presence of undeclared food in the UAE market. Regular surveillance and monitoring programmes along with strict implementation of the Food and Adulteration Act may alleviate misdescription issues to a greater extent.
Stakeholder opinion of functional communication activities following traumatic brain injury.
Larkins, B M; Worrall, L E; Hickson, L M
2004-07-01
To establish a process whereby assessment of functional communication reflects the authentic communication of the target population. The major functional communication assessments available from the USA may not be as relevant to those who reside elsewhere, nor assessments developed primarily for persons who have had a stroke as relevant for traumatic brain injury rehabilitation. The investigation used the Nominal Group Technique to elicit free opinion and support individuals who have compromised communication ability. A survey mailed out sampled a larger number of stakeholders to test out differences among groups. Five stakeholder groups generated items and the survey determined relative 'importance'. The stakeholder groups in both studies comprised individuals with traumatic brain injury and their families, health professionals, third-party payers, employers, and Maori, the indigenous population of New Zealand. There was no statistically significant difference found between groups for 19 of the 31 items. Only half of the items explicitly appear on a well-known USA functional communication assessment. The present study has implications for whether functional communication assessments are valid across cultures and the type of impairment.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rowe, Nathan C; Younkin, James R; Pickett, Chris A
Radio-Frequency (RF) devices have revolutionized many aspects of modern industrial processes. RF technology can enable wireless communication for tag identification, sensor communication, and asset tracking. Radio-frequency identification (RFID) is a technology that utilizes wireless communication to interrogate and identify an electronic tag attached to an item in order to identify the item. The technology can come in many forms: passive or active tags, low to ultra-wideband frequencies, small paper-thin tags to brick-sized units, and simple tags or highly integrated sensor packages. RF technology, and specifically RFID, has been applied widely in commercial markets for inventory, supply chain management, and assetmore » tracking. Several recent studies have demonstrated the safeguards benefits of utilizing RFID versus conventional inventory tagging methods for tracking nuclear material. These studies have indicated that the RF requirements for safeguards functions are more stringent than the RF requirements for other inventory tracking and accounting applications. Additionally, other requirements must be addressed, including environmental and operating conditions, authentication, and tag location and attachment. Facility restrictions on radio spectrum, method of tag attachment, and sensitivity of the data collected impact the tag selection and system design. More important, the intended use of the system must be considered. The requirements for using RF to simply replace or supplement container identifiers such as bar codes that facilitate the inventory function will differ greatly from the requirements for deploying RF for unattended monitoring applications. Several studies have investigated these considerations to advance commercial RF devices for safeguards use, and a number of system concepts have been developed. This paper will provide an overview of past studies and current technologies, and will investigate the requirements, existing gaps, and several potential next steps for advancing RF techniques for safeguards use.« less
10 CFR 74.55 - Item monitoring.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Item monitoring. 74.55 Section 74.55 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) MATERIAL CONTROL AND ACCOUNTING OF SPECIAL NUCLEAR MATERIAL Formula... quantitatively measured, the validity of that measurement independently confirmed, and that additionally have...
NASA Astrophysics Data System (ADS)
Nikitin, P. V.; Savinov, A. N.; Bazhenov, R. I.; Sivandaev, S. V.
2018-05-01
The article describes the method of identifying a person in distance learning systems based on a keyboard rhythm. An algorithm for the organization of access control is proposed, which implements authentication, identification and verification of a person using the keyboard rhythm. Authentication methods based on biometric personal parameters, including those based on the keyboard rhythm, due to the inexistence of biometric characteristics without a particular person, are able to provide an advanced accuracy and inability to refuse authorship and convenience for operators of automated systems, in comparison with other methods of conformity checking. Methods of permanent hidden keyboard monitoring allow detecting the substitution of a student and blocking the key system.
Salama, Nahla N; Wang, Shudong
2008-05-28
The present study employs time of flight mass and bupivacaine in authentic, pharmaceutical and spiked human plasma as well as in the presence of their impurities 2,6-dimethylaniline and alkaline degradation product. The method is based on time of flight electron spray ionization mass spectrometry technique without preliminary chromatographic separation and makes use of bupivacaine as internal standard for ropivacaine, which is used as internal standard for bupivacaine. A linear relationship between drug concentrations and the peak intensity ratio of ions of the analyzed substances is established. The method is linear from 23.8 to 2380.0 ng mL(-1) for both drugs. The correlation coefficient was >or=0.996 in authentic and spiked human plasma. The average percentage recoveries in the ranges of 95.39%-102.75% was obtained. The method is accurate (% RE < 5%) and reproducible with intra- and inter-assay precision (RSD% < 8.0%). The quantification limit is 23.8 ng mL(-1) for both drugs. The method is not only highly sensitive and selective, but also simple and effective for determination or identification of both drugs in authentic and biological fluids. The method can be applied in purity testing, quality control and stability monitoring for the studied drugs.
Salama, Nahla N.; Wang, Shudong
2009-01-01
The present study employs time of flight mass and bupivacaine in authentic, pharmaceutical and spiked human plasma as well as in the presence of their impurities 2,6-dimethylaniline and alkaline degradation product. The method is based on time of flight electron spray ionization mass spectrometry technique without preliminary chromatographic separation and makes use of bupivacaine as internal standard for ropivacaine, which is used as internal standard for bupivacaine. A linear relationship between drug concentrations and the peak intensity ratio of ions of the analyzed substances is established. The method is linear from 23.8 to 2380.0 ng mL−1 for both drugs. The correlation coefficient was ≥0.996 in authentic and spiked human plasma. The average percentage recoveries in the ranges of 95.39%–102.75% was obtained. The method is accurate (% RE < 5%) and reproducible with intra- and inter-assay precision (RSD% < 8.0%). The quantification limit is 23.8 ng mL−1 for both drugs. The method is not only highly sensitive and selective, but also simple and effective for determination or identification of both drugs in authentic and biological fluids. The method can be applied in purity testing, quality control and stability monitoring for the studied drugs. PMID:19652756
Efficient security mechanisms for mHealth applications using wireless body sensor networks.
Sahoo, Prasan Kumar
2012-01-01
Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme.
Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks
Sahoo, Prasan Kumar
2012-01-01
Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme. PMID:23112734
ERIC Educational Resources Information Center
Miller, Faith G.; Crovello, Nicholas J.; Chafouleas, Sandra M.
2017-01-01
Direct Behavior Rating-Single Item Scales (DBR-SIS) have been advanced as a promising, systematic, behavioral, progress-monitoring method that is flexible, efficient, and defensible. This study aimed to extend existing literature on the use of DBR-SIS in elementary and secondary settings, and to examine methods of monitoring student progress in…
Wahlheim, Christopher N
2011-07-01
Four experiments examined the monitoring accuracy of immediate and delayed judgments of learning (JOLs) under conditions of proactive interference (PI). PI was produced using paired-associate learning tasks that conformed to variations of classic A-B, A-D paradigms. Results revealed that the relative monitoring accuracy of interference items was better for delayed than for immediate JOLs. However, delayed JOLs were overconfident for interference items, but not for items devoid of interference. Intrusions retrieved prior to delayed JOLs produced inflated predictions of performance. These results show that delayed JOLs enhance monitoring accuracy in PI situations, except when intrusions are mistaken for target responses.
NASA Astrophysics Data System (ADS)
Dominik, Michael T.
The success of a project is dependent in part on the skills, knowledge, and behavior of its leader, the project manager. Despite advances in project manager certifications and professional development, the aerospace and defense industry has continued to see highly visible and expensive project failures partially attributable to failures in leadership. Servant leadership is an emerging leadership theory whose practitioners embrace empowerment, authenticity, humility, accountability, forgiveness, courage, standing back, and stewardship, but has not yet been fully examined in the context of the project manager as leader. The objective of this study was to examine the relationship between servant leadership behaviors demonstrated by aerospace and defense project managers and the resulting success of their projects. Study participants were drawn from aerospace and defense oriented affinity groups from the LinkedInRTM social media web system. The participants rated their project managers using a 30-item servant leadership scale, and rated the success of their project using a 12-item project success scale. One hundred and fifteen valid responses were analyzed from 231 collected samples from persons who had worked for a project manager on an aerospace and defense project within the past year. The results of the study demonstrated statistically significant levels of positive correlation to project success for all eight servant leadership factors independently evaluated. Using multiple linear regression methods, the servant leadership factors of empowerment and authenticity were determined to be substantial and statistically significant predictors of project success. The study results established the potential application of servant leadership as a valid approach for improving outcomes of projects.
Dashboard Task Monitor for Managing ATLAS User Analysis on the Grid
NASA Astrophysics Data System (ADS)
Sargsyan, L.; Andreeva, J.; Jha, M.; Karavakis, E.; Kokoszkiewicz, L.; Saiz, P.; Schovancova, J.; Tuckett, D.; Atlas Collaboration
2014-06-01
The organization of the distributed user analysis on the Worldwide LHC Computing Grid (WLCG) infrastructure is one of the most challenging tasks among the computing activities at the Large Hadron Collider. The Experiment Dashboard offers a solution that not only monitors but also manages (kill, resubmit) user tasks and jobs via a web interface. The ATLAS Dashboard Task Monitor provides analysis users with a tool that is independent of the operating system and Grid environment. This contribution describes the functionality of the application and its implementation details, in particular authentication, authorization and audit of the management operations.
Promoting the Quality of Health Research-based News: Introduction of a Tool
Ashoorkhani, Mahnaz; Majdzadeh, Reza; Nedjat, Saharnaz; Gholami, Jaleh
2017-01-01
Introduction: While disseminating health research findings to the public, it is very important to present appropriate and accurate information to give the target audience a correct understanding of the subject matter. The objective of this study was to design and psychometrically evaluate a checklist for health journalists to help them prepare news of appropriate accuracy and authenticity. Methods: The study consisted of two phases, checklist design and psychometrics. Literature review and expert opinion were used to extract the items of the checklist in the first phase. In the second phase, to assess content and face validity, the judgment of 38 persons (epidemiologists with a tool production history, editors-in-chief, and health journalists) was used to check the items’ understandability, nonambiguity, relevancy, and clarity. Reliability was assessed by the test–retest method using intra-cluster correlation (ICC) indices in the two phases. Cronbach's alpha was used to assess internal validity of the checklist. Results: Based on the participants’ opinions, the items were reduced from 20 to 14 in number. The items were categorized into the following three domains: (a) items assessing the source of news and its validity, (b) items addressing the presentation of complete and accurate information on research findings, and (c) items which if adhered to lead to the target audiences’ better understanding. The checklist was approved for content and face validity. The reliability of the checklist was assessed in the last stage; the ICC was 1 for 12 items and above 0.8 for the other two. Internal consistency (Cronbach's alpha) was 0.98. Discussion and Conclusions: The resultant indices of the study indicate that the checklist has appropriate validity and reliability. Hence, it can be used by health journalists to develop health research-based news. PMID:29184638
2016-01-01
Purpose: The quality of problem representation is critical for developing students’ problem-solving abilities in problem-based learning (PBL). This study investigates preclinical students’ experience with standardized patients (SPs) as a problem representation method compared to using video cases in PBL. Methods: A cohort of 99 second-year preclinical students from Inje University College of Medicine (IUCM) responded to a Likert scale questionnaire on their learning experiences after they had experienced both video cases and SPs in PBL. The questionnaire consisted of 14 items with eight subcategories: problem identification, hypothesis generation, motivation, collaborative learning, reflective thinking, authenticity, patient-doctor communication, and attitude toward patients. Results: The results reveal that using SPs led to the preclinical students having significantly positive experiences in boosting patient-doctor communication skills; the perceived authenticity of their clinical situations; development of proper attitudes toward patients; and motivation, reflective thinking, and collaborative learning when compared to using video cases. The SPs also provided more challenges than the video cases during problem identification and hypotheses generation. Conclusion: SPs are more effective than video cases in delivering higher levels of authenticity in clinical problems for PBL. The interaction with SPs engages preclinical students in deeper thinking and discussion; growth of communication skills; development of proper attitudes toward patients; and motivation. Considering the higher cost of SPs compared with video cases, SPs could be used most advantageously during the preclinical period in the IUCM curriculum. PMID:26923094
The SMORE Project: A Model for Transforming Authentic Research into Classroom Curricula
NASA Astrophysics Data System (ADS)
Abmayr, V.
2016-12-01
The SMORE (Students Monitoring Ocean Response to Eutrophication) Project is the direct result of a partnership between marine scientist Dr. Patricia Yager (UGA) and Lollie Garay, a middle school classroom teacher from Texas. Partnered by PolarTREC on an expedition to the Southern Ocean in 2007, they have since traveled together building not only a lasting teacher/scientist collaboration, but also a tri-state student collaboration based on authentic fieldwork. Inspired by Dr. Yager's research, this student -driven project has generated biogeochemical data from Alaska, Texas, and Georgia. Moreover, it has enhanced student understanding of ocean science topics traditionally underemphasized in classrooms. Engaging students in scientific practices and application benefits not only the students and teachers, but also the scientists.
Orr, Christopher Henry; Luff, Craig Janson; Dockray, Thomas; Macarthur, Duncan Whittemore
2001-01-01
The apparatus and method provide a technique for more simply measuring alpha and/or beta emissions arising from items or locations. The technique uses indirect monitoring of the emissions by detecting ions generated by the emissions, the ions being attracted electrostatically to electrodes for discharge of collection. The apparatus and method employ a chamber which is sealed around the item or location during monitoring with no air being drawn into or expelled from the chamber during the monitoring process. A simplified structure and operations arises as a result, but without impairing the efficiency and accuracy of the detection technique.
Psychometric Aspects of Pupil Monitoring Systems
ERIC Educational Resources Information Center
Glas, Cees A. W.; Geerlings, Hanneke
2009-01-01
Pupil monitoring systems support the teacher in tailoring teaching to the individual level of a student and in comparing the progress and results of teaching with national standards. The systems are based on the availability of an item bank calibrated using item response theory. The assessment of the students' progress and results can be further…
Eat-by-light: fiber-optic and micro-optic devices for food safety and quality assessment
NASA Astrophysics Data System (ADS)
Mignani, A. G.; Ciaccheri, L.; Cucci, C.; Mencaglia, A. A.; Cimato, A.; Attilio, C.; Thienpont, H.; Ottevaere, H.; Paolesse, R.; Mastroianni, M.; Monti, D.; Buonocore, G.; Del Nobile, A.; Mentana, A.; Dall'Asta, C.; Faccini, A.; Galaverna, G.; Dossena, A.
2007-07-01
A selection of fiber-optic and micro-optic devices is presented designed and tested for monitoring the quality and safety of typical foods, namely the extra virgin olive oil, the beer, and the milk. Scattered colorimetry is used for the authentication of various types of extra virgin olive oil and beer, while a fiber-optic-based device for UV-VIS-NIR absorption spectroscopy is exploited in order to obtain the hyperspectral optical signature of olive oil. This is done not only for authentication purposes, but also so as to correlate the spectral data with the content of fatty acids that are important nutritional factors. A micro-optic sensor for the detection of olive oil aroma is presented. It is capable of distinguishing different ageing levels of extra virgin olive oil. It shows effective potential for acting as a smart cap of bottled olive oil in order to achieve a non-destructive olfactory perception of oil ageing. Lastly, a compact portable fluorometer is experimented for the rapid monitoring of the carcinogenic M1 aflatoxin in milk.
Jiang, Bei; Kronenberg, Fredi; Nuntanakorn, Paiboon; Qiu, Ming-Hua; Kennelly, Edward J.
2011-01-01
Black cohosh (Actaea racemosa L., syn. Cimicifuga racemosa L.) has become increasingly popular as a dietary supplement in the United States for the treatment of symptoms related to menopause, but the botanical authenticity of most products containing black cohosh has not been evaluated, nor is manufacturing highly regulated in the United States. In this study, 11 black cohosh products were analyzed for triterpene glycosides, phenolic constituents, and formononetin by high-performance liquid chromatography–photodiode array detection and a new selected ion monitoring liquid chromatography–mass spectrometry method. Three of the 11 products were found to contain the marker compound cimifugin and not cimiracemoside C, thereby indicating that these plants contain Asian Actaea instead of black cohosh. One product contained both black cohosh and an Asian Actaea species. For the products containing only black cohosh, there was significant product-to-product variability in the amounts of the selected triterpene glycosides and phenolic constituents, and as expected, no formononetin was detected. PMID:16637680
Fraundorf, Scott H; Benjamin, Aaron S
2016-09-01
Information about others' success in remembering is frequently available. For example, students taking an exam may assess its difficulty by monitoring when others turn in their exams. In two experiments, we investigated how rememberers use this information to guide recall. Participants studied paired associates, some semantically related (and thus easier to retrieve) and some unrelated (and thus harder). During a subsequent cued recall test, participants viewed fictive information about an opponent's accuracy on each item. In Experiment 1, participants responded to each cue once before seeing the opponent's performance and once afterwards. Participants reconsidered their responses least often when the opponent's accuracy matched the item difficulty (easy items the opponent recalled, hard items the opponent forgot) and most often when the opponent's accuracy and the item difficulty mismatched. When participants responded only after seeing the opponent's performance (Experiment 2), the same mismatch conditions that led to reconsideration even produced superior recall. These results suggest that rememberers monitor whether others' knowledge states accord or conflict with their own experience, and that this information shifts how they interrogate their memory and what they recall.
Statistical Indexes for Monitoring Item Behavior under Computer Adaptive Testing Environment.
ERIC Educational Resources Information Center
Zhu, Renbang; Yu, Feng; Liu, Su
A computerized adaptive test (CAT) administration usually requires a large supply of items with accurately estimated psychometric properties, such as item response theory (IRT) parameter estimates, to ensure the precision of examinee ability estimation. However, an estimated IRT model of a given item in any given pool does not always correctly…
Sample size allocation for food item radiation monitoring and safety inspection.
Seto, Mayumi; Uriu, Koichiro
2015-03-01
The objective of this study is to identify a procedure for determining sample size allocation for food radiation inspections of more than one food item to minimize the potential risk to consumers of internal radiation exposure. We consider a simplified case of food radiation monitoring and safety inspection in which a risk manager is required to monitor two food items, milk and spinach, in a contaminated area. Three protocols for food radiation monitoring with different sample size allocations were assessed by simulating random sampling and inspections of milk and spinach in a conceptual monitoring site. Distributions of (131)I and radiocesium concentrations were determined in reference to (131)I and radiocesium concentrations detected in Fukushima prefecture, Japan, for March and April 2011. The results of the simulations suggested that a protocol that allocates sample size to milk and spinach based on the estimation of (131)I and radiocesium concentrations using the apparent decay rate constants sequentially calculated from past monitoring data can most effectively minimize the potential risks of internal radiation exposure. © 2014 Society for Risk Analysis.
Developing Authentic Research Experiences in the K-12 Classroom
NASA Astrophysics Data System (ADS)
Hall, M. K.
2004-12-01
The excitement of an authentic science experiment in one's own backyard piques interest, but teachers need resources and professional development experiences to capitalize upon this excitement and create opportunities for their students' learning. Three obstacles must be overcome for success in carrying out authentic research in the classroom. First, scientists and teachers must work together to identify relevant and developmentally appropriate research questions for the target audience. Second, teachers need professional development experiences that engage them in authentic research and that provide support for introducing a similar research experience in their own classroom. Third, the outcome of the research experience must have value to the scientist, teacher and student to motivate sustained participation by all. I have directed two projects that have opened the door for teachers to conduct authentic research with their students: monitoring earthquakes with educational seismometers and investigating local environmental problems with a GIS. Classroom seismometers permit students and the public to see first-hand Earth's dynamic response to both human and natural events in their hometown and around the country. From plotting earthquakes occurring throughout the school year to reveal plate tectonic relationships, or conducting seismic hazard analysis of the local region, to analyzing patterns of foreshocks and aftershocks of major earthquakes, students have been actively engaged and motivated in their learning. GIS opens the opportunity to investigate problems of land, water and other resource uses, but presents special problems in acquiring appropriate and useful data. I will discuss the lessons learned from working with teachers in educational seismology and GIS programs and how those lessons can be applied to developing research experiences for teachers and students.
Shewade, Hemant Deepak; Jeyashree, Kathiresan; Kalaiselvi, Selvaraj; Palanivel, Chinnakali; Panigrahi, Krishna Chandra
2017-01-01
A community-based training (CBT) program, where teaching and training are carried out in the community outside of the teaching hospital, is a vital part of undergraduate medical education. Worldwide, there is a shift to competency-based training, and CBT is no exception. We attempted to develop a tool that uses a competency-based approach for assessment of CBT. Based on a review on competencies, we prepared a preliminary list of major domains with items under each domain. We used the Delphi technique to arrive at a consensus on this assessment tool. The Delphi panel consisted of eight purposively selected experts from the field of community medicine. The panel rated each item for its relevance, sensitivity, specificity, and understandability on a scale of 0-4. Median ratings were calculated at the end of each round and shared with the panel. Consensus was predefined as when 70% of the experts gave a rating of 3 or above for an item under relevance, sensitivity, and specificity. If an item failed to achieve consensus after being rated in 2 consecutive rounds, it was excluded. Anonymity of responses was maintained. The panel arrived at a consensus at the end of 3 rounds. The final version of the self-assessment tool consisted of 7 domains and 74 items. The domains (number of items) were Public health - epidemiology and research methodology (13), Public health - biostatistics (6), Public health administration at primary health center level (17), Family medicine (24), Cultural competencies (3), Community development and advocacy (2), and Generic competence (9). Each item was given a maximum score of 5 and minimum score of 1. This is the first study worldwide to develop a tool for competency-based evaluation of CBT in undergraduate medical education. The competencies identified in the 74-item questionnaire may provide the base for development of authentic curricula for CBT.
Relating to monitoring ion sources
Orr, Christopher Henry; Luff, Craig Janson; Dockray, Thomas; Macarthur, Duncan Whittemore; Bounds, John Alan
2002-01-01
The apparatus and method provide techniques for monitoring the position on alpha contamination in or on items or locations. The technique is particularly applicable to pipes, conduits and other locations to which access is difficult. The technique uses indirect monitoring of alpha emissions by detecting ions generated by the alpha emissions. The medium containing the ions is moved in a controlled manner frog in proximity with the item or location to the detecting unit and the signals achieved over time are used to generate alpha source position information.
Apprendre l'orthographe avec un correcteur orthographique (Learning Spelling with a Spell-Checker?)?
ERIC Educational Resources Information Center
Desmarais, Lise
1998-01-01
Reports a study with 27 adults, both native French-speakers and native English-speakers, on the effectiveness of using a spell-checker as the core element to teach French spelling. The method used authentic materials, individualized monitoring, screen and hard-copy text reading, and content sequencing based on errors. The approach generated…
System and method for authentication
Duerksen, Gary L.; Miller, Seth A.
2015-12-29
Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.
[Importance of clinical trial design and standardized implementation in ophthalmology].
Xu, Xun
2013-06-01
Clinical trial is an important medical research method, as well as the bridge of translational medicine. The results of scientific evidences are useful to make clinical practice guidelines. At present,much experience of carrying out ophthalmology clinical trials has been obtained and achieved, but there are still some scientific, practical and ethical problems to be solved,because of their impact on the authenticity and reliability of the results. Therefore, attaching great importance to design of the clinical research and implement of the standardization would be the goal and the development direction. Clinical trial design rely on objective, follow international design principles on the ethics,randomization, blinding and placebo setting. During the trial implementation, personnel training,project management and monitoring would help to reduce protocol deviation and ensure data authenticity.
Design and implementation of a secure wireless mote-based medical sensor network.
Malasri, Kriangsiri; Wang, Lan
2009-01-01
A medical sensor network can wirelessly monitor vital signs of humans, making it useful for long-term health care without sacrificing patient comfort and mobility. For such a network to be viable, its design must protect data privacy and authenticity given that medical data are highly sensitive. We identify the unique security challenges of such a sensor network and propose a set of resource-efficient mechanisms to address these challenges. Our solution includes (1) a novel two-tier scheme for verifying the authenticity of patient data, (2) a secure key agreement protocol to set up shared keys between sensor nodes and base stations, and (3) symmetric encryption/decryption for protecting data confidentiality and integrity. We have implemented the proposed mechanisms on a wireless mote platform, and our results confirm their feasibility.
Classification management plan of groundwater quality in Taiwan
NASA Astrophysics Data System (ADS)
Chen, Chun Ming; Chen, Yu Ying; Pan, Shih Cheng; Li, Hui Jun; Hsiao, Fang Ke
2017-04-01
Taiwan Environmental Protection Administration has been monitoring regional water quality for 14 years. Since the beginning of 2002 till now, there are 453 regional groundwater monitoring wells in ten groundwater subregions in Taiwan, and the monitoring of groundwater quality has been carried out for a long time. Currently, water quality monitoring project has reached 50 items, while the number of water quality monitoring data has reached more than 20,000. In order to use the monitoring data efficiently, this study constructed the localized groundwater quality indicators of Taiwan. This indicator takes into account the different users' point of view, incorporating the Taiwan groundwater pollution monitoring standards (Category II), irrigation water quality standard and drinking water source water quality standard. 50 items of water quality monitoring projects were simplified and classified. The groundwater quality parameters were divided into five items, such as potability for drinking water, salting, external influence, health influences and toxicity hazard. The weight of the five items of groundwater was calculated comprehensively, and the groundwater quality of each monitoring well was evaluated with three grades of good, ordinary, and poor. According to the monitoring results of the groundwater monitoring wells in October to December of 2016, about 70% of groundwater quality in Taiwan is in good to ordinary grades. The areas with poor groundwater quality were mostly distributed in coastal, agriculture and part of the urban areas. The conductivity or ammonia nitrogen concentration was higher in those regions, showing that groundwater may be salinized or affected by external influences. Groundwater quality indicators can clearly show the current comprehensive situation of the groundwater environment in Taiwan and can be used as a tool for groundwater quality classification management. The indicators can coordinate with the Taiwan land planning policy in the future, and will be able to effectively grasp the changes of the national sub-regional environmental resources, which can serve as one of the important references in national land zoning according to environmental resources. Keywords: Groundwater Quality Indicators, Groundwater Quality Classification management
ERIC Educational Resources Information Center
Mitchell, Karen J.; Raye, Carol L.; McGuire, Joseph T.; Frankel, Hillary; Greene, Erich J.; Johnson, Marcia K.
2008-01-01
A short-term source monitoring procedure with functional magnetic resonance imaging assessed neural activity when participants made judgments about the format of 1 of 4 studied items (picture, word), the encoding task performed (cost, place), or whether an item was old or new. The results support findings from long-term memory studies showing that…
Authentic Teachers: Student Criteria Perceiving Authenticity of Teachers
ERIC Educational Resources Information Center
De Bruyckere, Pedro; Kirschner, Paul A.
2016-01-01
Authenticity is seen by many as a key for good learning and education. There is talk of authentic instruction, authentic learning, authentic problems, authentic assessment, authentic tools and authentic teachers. The problem is that while authenticity is an often-used adjective describing almost all aspects of teaching and learning, the concept…
Buck, Harleah G; Harkness, Karen; Ali, Muhammad Usman; Carroll, Sandra L; Kryworuchko, Jennifer; McGillion, Michael
2017-04-01
Caregivers (CGs) contribute important assistance with heart failure (HF) self-care, including daily maintenance, symptom monitoring, and management. Until CGs' contributions to self-care can be quantified, it is impossible to characterize it, account for its impact on patient outcomes, or perform meaningful cost analyses. The purpose of this study was to conduct psychometric testing and item reduction on the recently developed 34-item Caregiver Contribution to Heart Failure Self-care (CACHS) instrument using classical and item response theory methods. Fifty CGs (mean age 63 years ±12.84; 70% female) recruited from a HF clinic completed the CACHS in 2014 and results evaluated using classical test theory and item response theory. Items would be deleted for low (<.05) or high (>.95) endorsement, low (<.3) or high (>.7) corrected item-total correlations, significant pairwise correlation coefficients, floor or ceiling effects, relatively low latent trait and item information function levels (<1.5 and p > .5), and differential item functioning. After analysis, 14 items were excluded, resulting in a 20-item instrument (self-care maintenance eight items; monitoring seven items; and management five items). Most items demonstrated moderate to high discrimination (median 2.13, minimum .77, maximum 5.05), and appropriate item difficulty (-2.7 to 1.4). Internal consistency reliability was excellent (Cronbach α = .94, average inter-item correlation = .41) with no ceiling effects. The newly developed 20-item version of the CACHS is supported by rigorous instrument development and represents a novel instrument to measure CGs' contribution to HF self-care. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.
Fraundorf, Scott H.; Benjamin, Aaron S.
2015-01-01
Information about others’ success in remembering is frequently available. For example, students taking an exam may assess its difficulty by monitoring when others turn in their exams. In two experiments, we investigated how rememberers use this information to guide recall. Participants studied paired associates, some semantically related (and thus easier to retrieve) and some unrelated (and thus harder). During a subsequent cued recall test, participants viewed fictive information about an opponent’s accuracy on each item. In Experiment 1, participants responded to each cue once before seeing the opponent’s performance and once afterwards. Participants reconsidered their responses least often when the opponent’s accuracy matched the item difficulty (easy items the opponent recalled, hard items the opponent forgot) and most often when the opponent’s accuracy and the item difficulty mismatched. When participants responded only after seeing the opponent’s performance (Experiment 2), the same mismatch conditions that led to reconsideration even produced superior recall. These results suggest that rememberers monitor whether others’ knowledge states accord or conflict with their own experience, and that this information shifts how they interrogate their memory and what they recall. PMID:26247369
Objective and Item Banking Computer Software and Its Use in Comprehensive Achievement Monitoring.
ERIC Educational Resources Information Center
Schriber, Peter E.; Gorth, William P.
The current emphasis on objectives and test item banks for constructing more effective tests is being augmented by increasingly sophisticated computer software. Items can be catalogued in numerous ways for retrieval. The items as well as instructional objectives can be stored and test forms can be selected and printed by the computer. It is also…
Teachers doing science: An authentic geology research experience for teachers
Hemler, D.; Repine, T.
2006-01-01
Fairmont State University (FSU) and the West Virginia Geological and Economic Survey (WVGES) provided a small pilot group of West Virginia science teachers with a professional development session designed to mimic experiences obtained by geology majors during a typical summer field camp. Called GEOTECH, the program served as a research capstone event complimenting the participants' multi-year association with the RockCamp professional development program. GEOTECH was funded through a Improving Teacher Quality Grant administered by West Virginia Higher Education Policy Commission. Over the course of three weeks, eight GEOTEACH participants learned field measurement and field data collection techniques which they then applied to the construction of a surficial geologic map. The program exposed participants to authentic scientific processes by emphasizing the authentic scientific application of content knowledge. As a secondary product, it also enhanced their appreciation of the true nature of science in general and geology particular. After the session, a new appreciation of the effort involved in making a geologic map emerged as tacit knowledge ready to be transferred to their students. The program was assessed using pre/post instruments, cup interviews, journals, artifacts (including geologic maps, field books, and described sections), performance assessments, and constructed response items. Evaluation of the accumulated data revealed an increase in participants demonstrated use of science content knowledge, an enhanced awareness and understanding of the processes and nature of geologic mapping, positive dispositions toward geologic research and a high satisfaction rating for the program. These findings support the efficacy of the experience and document future programmatic enhancements.
Interactive Inventory Monitoring
NASA Technical Reports Server (NTRS)
Garud, Sumedha
2013-01-01
Method and system for monitoring present location and/or present status of a target inventory item, where the inventory items are located on one or more inventory shelves or other inventory receptacles that communicate with an inventory base station through use of responders such as RFIDs. A user operates a hand held interrogation and display (lAD) module that communicates with, or is part of the base station to provide an initial inquiry. lnformation on location(s) of the larget invenlory item is also indicated visibly and/or audibly on the receptacle(s) for the user. Status information includes an assessment of operation readiness and a time, if known, that the specified inventory item or class was last removed or examined or modified. Presentation of a user access level may be required for access to the target inventgory item. Another embodiment provides inventory informatin for a stack as a sight-impaired or hearing-impaired person adjacent to that stack.
Interactive inventory monitoring
NASA Technical Reports Server (NTRS)
Spremo, Stevan M. (Inventor); Udoh, Usen E. (Inventor)
2009-01-01
Method and system for monitoring present location and/or present status of a target inventory item, where the inventory items are located on one or more inventory shelves or other inventory receptacles that communicate with an inventory base station through use of responders such as RFIDs. A user operates a hand held interrogation and display (IAD) module that communicates with, or is part of, the base station, to provide an initial inquiry. Information on location(s) of the target inventory item is also indicated visibly and/or audibly on the receptacle(s) for the user. Status information includes an assessment of operation readiness and a time, if known, that the specified inventory item or class was last removed or examined or modified. Presentation of a user access level may be required for access to the target inventory item. Another embodiment provides inventory information for a stack as a sight-impaired or hearing-impaired person passes adjacent to that stack.
Wu, Fan; Xu, Lili
2013-08-01
Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.
Messai, Habib; Farman, Muhammad; Sarraj-Laabidi, Abir; Hammami-Semmar, Asma; Semmar, Nabil
2016-11-17
Olive oils (OOs) show high chemical variability due to several factors of genetic, environmental and anthropic types. Genetic and environmental factors are responsible for natural compositions and polymorphic diversification resulting in different varietal patterns and phenotypes. Anthropic factors, however, are at the origin of different blends' preparation leading to normative, labelled or adulterated commercial products. Control of complex OO samples requires their (i) characterization by specific markers; (ii) authentication by fingerprint patterns; and (iii) monitoring by traceability analysis. These quality control and management aims require the use of several multivariate statistical tools: specificity highlighting requires ordination methods; authentication checking calls for classification and pattern recognition methods; traceability analysis implies the use of network-based approaches able to separate or extract mixed information and memorized signals from complex matrices. This chapter presents a review of different chemometrics methods applied for the control of OO variability from metabolic and physical-chemical measured characteristics. The different chemometrics methods are illustrated by different study cases on monovarietal and blended OO originated from different countries. Chemometrics tools offer multiple ways for quantitative evaluations and qualitative control of complex chemical variability of OO in relation to several intrinsic and extrinsic factors.
Detecting Item Drift in Large-Scale Testing
ERIC Educational Resources Information Center
Guo, Hongwen; Robin, Frederic; Dorans, Neil
2017-01-01
The early detection of item drift is an important issue for frequently administered testing programs because items are reused over time. Unfortunately, operational data tend to be very sparse and do not lend themselves to frequent monitoring analyses, particularly for on-demand testing. Building on existing residual analyses, the authors propose…
Operational Assessment of Tools for Accelerating Leader Development (ALD): Volume 1, Capstone Report
2009-06-01
in units and user juries provided feedback on the tools. The pressures of the operational environment seriously limited the time available to work...following functions: account set-up, user authentication, learning management , usage monitoring, problem reporting, assessment data collection, data...especially sources of data) represented—demonstration/assessment manager , operations manager , Web site experts, users (target audience), data collectors
Factors that influence the generation of autobiographical memory conjunction errors
Devitt, Aleea L.; Monk-Fromont, Edwin; Schacter, Daniel L.; Addis, Donna Rose
2015-01-01
The constructive nature of memory is generally adaptive, allowing us to efficiently store, process and learn from life events, and simulate future scenarios to prepare ourselves for what may come. However, the cost of a flexibly constructive memory system is the occasional conjunction error, whereby the components of an event are authentic, but the combination of those components is false. Using a novel recombination paradigm, it was demonstrated that details from one autobiographical memory may be incorrectly incorporated into another, forming autobiographical memory conjunction errors that elude typical reality monitoring checks. The factors that contribute to the creation of these conjunction errors were examined across two experiments. Conjunction errors were more likely to occur when the corresponding details were partially rather than fully recombined, likely due to increased plausibility and ease of simulation of partially recombined scenarios. Brief periods of imagination increased conjunction error rates, in line with the imagination inflation effect. Subjective ratings suggest that this inflation is due to similarity of phenomenological experience between conjunction and authentic memories, consistent with a source monitoring perspective. Moreover, objective scoring of memory content indicates that increased perceptual detail may be particularly important for the formation of autobiographical memory conjunction errors. PMID:25611492
Steingass, Christof B; Langen, Johannes; Carle, Reinhold; Schmarr, Hans-Georg
2015-02-01
Headspace solid phase microextraction and chirospecific gas chromatography-mass spectrometry in selected ion monitoring mode (HS-SPME-GC-SIM-MS) allowed quantitative determination of δ-lactones (δ-C8, δ-C10) and γ-lactones (γ-C6, γ-C8, γ-C10). A stable isotope dilution assay (SIDA) with d7-γ-decalactone as internal standard was used for quantitative analysis of pineapple lactones that was performed at three progressing post-harvest stages of fully ripe air-freighted and green-ripe sea-freighted fruits, covering the relevant shelf-life of the fruits. Fresh pineapples harvested at full maturity were characterised by γ-C6 of high enantiomeric purity remaining stable during the whole post-harvest period. In contrast, the enantiomeric purity of γ-C6 significantly decreased during post-harvest storage of sea-freighted pineapples. The biogenetical background and the potential of chirospecific analysis of lactones for authentication and quality evaluation of fresh pineapple fruits are discussed. Copyright © 2014 Elsevier Ltd. All rights reserved.
Factors that influence the generation of autobiographical memory conjunction errors.
Devitt, Aleea L; Monk-Fromont, Edwin; Schacter, Daniel L; Addis, Donna Rose
2016-01-01
The constructive nature of memory is generally adaptive, allowing us to efficiently store, process and learn from life events, and simulate future scenarios to prepare ourselves for what may come. However, the cost of a flexibly constructive memory system is the occasional conjunction error, whereby the components of an event are authentic, but the combination of those components is false. Using a novel recombination paradigm, it was demonstrated that details from one autobiographical memory (AM) may be incorrectly incorporated into another, forming AM conjunction errors that elude typical reality monitoring checks. The factors that contribute to the creation of these conjunction errors were examined across two experiments. Conjunction errors were more likely to occur when the corresponding details were partially rather than fully recombined, likely due to increased plausibility and ease of simulation of partially recombined scenarios. Brief periods of imagination increased conjunction error rates, in line with the imagination inflation effect. Subjective ratings suggest that this inflation is due to similarity of phenomenological experience between conjunction and authentic memories, consistent with a source monitoring perspective. Moreover, objective scoring of memory content indicates that increased perceptual detail may be particularly important for the formation of AM conjunction errors.
A Mutual Authentication Framework for Wireless Medical Sensor Networks.
Srinivas, Jangirala; Mishra, Dheerendra; Mukhopadhyay, Sourav
2017-05-01
Wireless medical sensor networks (WMSN) comprise of distributed sensors, which can sense human physiological signs and monitor the health condition of the patient. It is observed that providing privacy to the patient's data is an important issue and can be challenging. The information passing is done via the public channel in WMSN. Thus, the patient, sensitive information can be obtained by eavesdropping or by unauthorized use of handheld devices which the health professionals use in monitoring the patient. Therefore, there is an essential need of restricting the unauthorized access to the patient's medical information. Hence, the efficient authentication scheme for the healthcare applications is needed to preserve the privacy of the patients' vital signs. To ensure secure and authorized communication in WMSN, we design a symmetric key based authentication protocol for WMSN environment. The proposed protocol uses only computationally efficient operations to achieve lightweight attribute. We analyze the security of the proposed protocol. We use a formal security proof algorithm to show the scheme security against known attacks. We also use the Automated Validation of Internet Security Protocols and Applications (AVISPA) simulator to show protocol secure against man-in-the-middle attack and replay attack. Additionally, we adopt an informal analysis to discuss the key attributes of the proposed scheme. From the formal proof of security, we can see that an attacker has a negligible probability of breaking the protocol security. AVISPA simulator also demonstrates the proposed scheme security against active attacks, namely, man-in-the-middle attack and replay attack. Additionally, through the comparison of computational efficiency and security attributes with several recent results, proposed scheme seems to be battered.
Meat Quality Assessment by Electronic Nose (Machine Olfaction Technology)
Ghasemi-Varnamkhasti, Mahdi; Mohtasebi, Seyed Saeid; Siadat, Maryam; Balasubramanian, Sundar
2009-01-01
Over the last twenty years, newly developed chemical sensor systems (so called “electronic noses”) have made odor analyses possible. These systems involve various types of electronic chemical gas sensors with partial specificity, as well as suitable statistical methods enabling the recognition of complex odors. As commercial instruments have become available, a substantial increase in research into the application of electronic noses in the evaluation of volatile compounds in food, cosmetic and other items of everyday life is observed. At present, the commercial gas sensor technologies comprise metal oxide semiconductors, metal oxide semiconductor field effect transistors, organic conducting polymers, and piezoelectric crystal sensors. Further sensors based on fibreoptic, electrochemical and bi-metal principles are still in the developmental stage. Statistical analysis techniques range from simple graphical evaluation to multivariate analysis such as artificial neural network and radial basis function. The introduction of electronic noses into the area of food is envisaged for quality control, process monitoring, freshness evaluation, shelf-life investigation and authenticity assessment. Considerable work has already been carried out on meat, grains, coffee, mushrooms, cheese, sugar, fish, beer and other beverages, as well as on the odor quality evaluation of food packaging material. This paper describes the applications of these systems for meat quality assessment, where fast detection methods are essential for appropriate product management. The results suggest the possibility of using this new technology in meat handling. PMID:22454572
Lin, Han-Yu
2013-04-01
Telecare medical information systems (TMISs) are increasingly popular technologies for healthcare applications. Using TMISs, physicians and caregivers can monitor the vital signs of patients remotely. Since the database of TMISs stores patients' electronic medical records (EMRs), only authorized users should be granted the access to this information for the privacy concern. To keep the user anonymity, recently, Chen et al. proposed a dynamic ID-based authentication scheme for telecare medical information system. They claimed that their scheme is more secure and robust for use in a TMIS. However, we will demonstrate that their scheme fails to satisfy the user anonymity due to the dictionary attacks. It is also possible to derive a user password in case of smart card loss attacks. Additionally, an improved scheme eliminating these weaknesses is also presented.
Design and Implementation of a Secure Wireless Mote-Based Medical Sensor Network
Malasri, Kriangsiri; Wang, Lan
2009-01-01
A medical sensor network can wirelessly monitor vital signs of humans, making it useful for long-term health care without sacrificing patient comfort and mobility. For such a network to be viable, its design must protect data privacy and authenticity given that medical data are highly sensitive. We identify the unique security challenges of such a sensor network and propose a set of resource-efficient mechanisms to address these challenges. Our solution includes (1) a novel two-tier scheme for verifying the authenticity of patient data, (2) a secure key agreement protocol to set up shared keys between sensor nodes and base stations, and (3) symmetric encryption/decryption for protecting data confidentiality and integrity. We have implemented the proposed mechanisms on a wireless mote platform, and our results confirm their feasibility. PMID:22454585
Climate Research by K-12 Students: Can They Do It? Will Anybody Care?
NASA Astrophysics Data System (ADS)
Brooks, D. R.
2011-12-01
Starting from the premise that engaging students in authentic science research is an activity that benefits science education in general, it is first necessary to consider whether students, in collaboration with teachers and climate scientists, can do climate-related research that actually has scientific value. A workshop held in November 2010, co-sponsored by NSF and NOAA, addressed this question. It took as its starting point this "scientific interest" test: "If students conduct a climate-related research project according to protocols designed in collaboration with climate scientists, when they get done, will any of those scientists care whether they did it or not?" If the answer to this question is "yes," then the project may constitute authentic research, but if the answer is "no," then the project may have educational value, but it is not research. This test is important because only when climate scientists (and other stakeholders interested in climate and climate change) are invested in the outcomes of student research will meaningful student research programs with sustainable support be forthcoming. The absence of climate-related projects in high-level student science fair competitions indicates that, currently, the investment and infrastructure required to support student climate research is lacking. As a result, climate science is losing the battle for the "hearts and minds" of today's best students. The critical task for student climate research is to define projects that are theoretically and practically accessible. This excludes the "big questions" of climate science, such as "Is Earth getting warmer?", but includes many observationally based projects that can help to refine our understanding of climate and climate change. The characteristics of collaborative climate research with students include: 1. carefully drawn distinctions between inquiry-based "learning about" activities and actual research; 2. an identified audience of potential stakeholders who will care about the results of the research; 3. clearly defined expectations, logistics, and outcomes for all participants. Some examples of appropriate data-based research topics include: 1. monitoring black carbon, atmospheric aerosols, and water vapor; 2. pyranometry at sufficiently high temporal resolution to study cloud patterns; 3. urban heat island and other microclimate effects; 4. monitoring benthic habitats and seafloor temperatures; 5. monitoring free-floating ocean buoys to help in the establishment of mobile marine sanctuaries; 6. monitoring surface reflectivity to generate highly localized normalized difference vegetation indices; 7. tracking habitats for vector-borne disease carriers in developing countries. Both education and science communities need to work harder to support student climate research. Educational institutions must build authentic student research into their mission statements. Scientists need to be more aware of the constraints under which teachers and their students must operate on a day-to-day basis. But, students can participate in authentic climate research if educators and scientists expect them to do real research, are honest with them about what is required to do real research, and are willing to provide persistent ongoing support.
Bridges, Susan M; Parthasarathy, Divya S; Au, Terry K F; Wong, Hai Ming; Yiu, Cynthia K Y; McGrath, Colman P
2014-01-01
This paper describes the development of a new literacy assessment instrument, the Hong Kong Oral Health Literacy Assessment Task for Paediatric Dentistry (HKOHLAT-P). Its relationship to literacy theory is analyzed to establish content and face validity. Implications for construct validity are examined by analyzing cognitive demand to determine how "comprehension" is measured. Key influences from literacy assessment were identified to analyze item development. Cognitive demand was analyzed using an established taxonomy. The HKOHLAT-P focuses on the functional domain of health literacy assessment. Items had strong content and face validity reflecting established principles from modern literacy theory. Inclusion of new text types signified relevant developments in the area of new literacies. Analysis of cognitive demand indicated that this instrument assesses the "comprehension" domain, specifically the areas of factual and procedural knowledge, with some assessment of conceptual knowledge. Metacognitive knowledge was not assessed. Comprehension tasks assessing patient health literacy predominantly examine functional health literacy at the lower levels of comprehension. Item development is influenced by the fields of situated and authentic literacy. Inclusion of content regarding multiliteracies is suggested for further research. Development of functional health literacy assessment instruments requires careful consideration of the clinical context in determining construct validity. © 2013 American Association of Public Health Dentistry.
ERIC Educational Resources Information Center
Howard, Melissa M.; Weiler, Robert M.; Haddox, J. David
2009-01-01
Background: The purpose of this study was to develop and test the reliability of self-report survey items designed to monitor the nonmedical use of prescription drugs among adolescents. Methods: Eighteen nonmedical prescription drug items designed to be congruent with the substance abuse items in the US Centers for Disease Control and Prevention's…
Barile, John P.; Reeve, Bryce B.; Smith, Ashley Wilder; Zack, Matthew M.; Mitchell, Sandra A.; Kobau, Rosemarie; Cella, David F.; Luncheon, Cecily; Thompson, William W.
2015-01-01
Purpose Healthy People 2020 identified health-related quality of life and well-being (WB) as indicators of population health for the next decade. This study examined the measurement properties of the NIH PROMIS® Global Health Scale, the CDC Healthy Days items, and associations with the Satisfaction with Life Scale. Methods A total of 4,184 adults completed the Porter Novelli's HealthStyles mailed survey. Physical and mental health (9 items from PROMIS Global Scale and 3 items from CDC Healthy days measure), and 4 WB factor items were tested for measurement equivalence using multiple-group confirmatory factor analysis. Results The CDC items accounted for similar variance as the PROMIS items on physical and mental health factors; both factors were moderately correlated with WB. Measurement invariance was supported across gender and age; the magnitude of some factor loadings differed between those with and without a chronic medical condition. Conclusions The PROMIS, CDC, and WB items all performed well. The PROMIS items captured a broad range of functioning across the entire continuum of physical and mental health, while the CDC items appear appropriate for assessing burden of disease for chronic conditions and are brief and easily interpretable. All three measures under study appear to be appropriate measures for monitoring several aspects of the Healthy People 2020 goals and objectives. PMID:23404737
Barile, John P; Reeve, Bryce B; Smith, Ashley Wilder; Zack, Matthew M; Mitchell, Sandra A; Kobau, Rosemarie; Cella, David F; Luncheon, Cecily; Thompson, William W
2013-08-01
Healthy People 2020 identified health-related quality of life and well-being (WB) as indicators of population health for the next decade. This study examined the measurement properties of the NIH PROMIS(®) Global Health Scale, the CDC Healthy Days items, and associations with the Satisfaction with Life Scale. A total of 4,184 adults completed the Porter Novelli's HealthStyles mailed survey. Physical and mental health (9 items from PROMIS Global Scale and 3 items from CDC Healthy days measure), and 4 WB factor items were tested for measurement equivalence using multiple-group confirmatory factor analysis. The CDC items accounted for similar variance as the PROMIS items on physical and mental health factors; both factors were moderately correlated with WB. Measurement invariance was supported across gender and age; the magnitude of some factor loadings differed between those with and without a chronic medical condition. The PROMIS, CDC, and WB items all performed well. The PROMIS items captured a broad range of functioning across the entire continuum of physical and mental health, while the CDC items appear appropriate for assessing burden of disease for chronic conditions and are brief and easily interpretable. All three measures under study appear to be appropriate measures for monitoring several aspects of the Healthy People 2020 goals and objectives.
Chimpanzees (Pan troglodytes) use markers to monitor the movement of a hidden item.
Beran, Michael J; Beran, Mary M; Menzel, Charles R
2005-10-01
Four chimpanzees (Pan troglodytes) monitored the movement of hidden items in arrays of opaque cups. A chocolate candy was hidden in an array of four cups and temporarily presented paper markers indicated the location of the candy (which otherwise was not visible). These markers were either non-symbolic or symbolic (lexigram) stimuli that in other contexts acted as a label for the hidden candy, and the array was either rotated 180 degrees after the marker was removed or the array remained in the same location. For three of four chimpanzees, performance was better than chance in all conditions and there was no effect of the type of marker. These experiments indicate that chimpanzees can track the movement of a hidden item in an array of identical cups even when they never see the item itself, but only see a temporarily presented marker for the location of that item. However, there was no benefit to the use of symbolic as opposed to non-symbolic stimuli in this performance.
Research in Computer Forensics
2002-06-01
systems and how they can aid in the recovery of digital evidence in a forensic analysis. Exposures to hacking techniques and tools in CS3675—Internet...cryptography, access control, authentication, biometrics, actions to be taken during an attack and case studies of hacking and information warfare. 11...chat, surfing, instant messaging and hacking with powerful access control and filter capabilities. The monitor can operates in a Prevention mode to
Active Authentication: Beyond Passwords
2011-11-18
103m 26-Jul-07 208k 27-Dec-10 4.9m Source: www.privacyrights.org/data-breach Hackers broke into a Gannett Co database containing personal...Pattern • Knuckle Pattern • Lip Pattern • Nail bed Pattern • Nose Pattern • Oto-acoustic Emissions • Palmprint • Retina Pattern • Skin... Palmprint Knuckle Pattern Pulse Electrocardiogram Electroencephalogram Face Geometry Lip Pattern Blue may be suitable for continuous monitoring
Das, Ashok Kumar
2015-03-01
Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Younkin, James R; Kuhn, Michael J; Gradle, Colleen
New Brunswick Laboratory (NBL) has a numerous inventory containing thousands of plutonium and uranium certified reference materials. The current manual inventory process is well established but is a lengthy process which requires significant oversight and double checking to ensure correctness. Oak Ridge National Laboratory has worked with NBL to develop and deploy a new inventory system which utilizes handheld computers with barcode scanners and radio frequency identification (RFID) readers termed the Tagged Item Inventory System (TIIS). Certified reference materials are identified by labels which incorporate RFID tags and barcodes. The label printing process and RFID tag association process are integratedmore » into the main desktop software application. Software on the handheld computers syncs with software on designated desktop machines and the NBL inventory database to provide a seamless inventory process. This process includes: 1) identifying items to be inventoried, 2) downloading the current inventory information to the handheld computer, 3) using the handheld to read item and location labels, and 4) syncing the handheld computer with a designated desktop machine to analyze the results, print reports, etc. The security of this inventory software has been a major concern. Designated roles linked to authenticated logins are used to control access to the desktop software while password protection and badge verification are used to control access to the handheld computers. The overall system design and deployment at NBL will be presented. The performance of the system will also be discussed with respect to a small piece of the overall inventory. Future work includes performing a full inventory at NBL with the Tagged Item Inventory System and comparing performance, cost, and radiation exposures to the current manual inventory process.« less
NASA Astrophysics Data System (ADS)
Haydel, Angela Michelle
The purpose of this dissertation was to advance theoretical understanding about fit between the personal resources of individuals and the characteristics of science achievement tasks. Testing continues to be pervasive in schools, yet we know little about how students perceive tests and what they think and feel while they are actually working on test items. This study focused on both the personal (cognitive and motivational) and situational factors that may contribute to individual differences in achievement-related outcomes. 387 eighth grade students first completed a survey including measures of science achievement goals, capability beliefs, efficacy related to multiple-choice items and performance assessments, validity beliefs about multiple-choice items and performance assessments, and other perceptions of these item formats. Students then completed science achievement tests including multiple-choice items and two performance assessments. A sample of students was asked to verbalize both thoughts and feelings as they worked through the test items. These think-alouds were transcribed and coded for evidence of cognitive, metacognitive and motivational engagement. Following each test, all students completed measures of effort, mood, energy level and strategy use during testing. Students reported that performance assessments were more challenging, authentic, interesting and valid than multiple-choice tests. They also believed that comparisons between students were easier using multiple-choice items. Overall, students tried harder, felt better, had higher levels of energy and used more strategies while working on performance assessments. Findings suggested that performance assessments might be more congruent with a mastery achievement goal orientation, while multiple-choice tests might be more congruent with a performance achievement goal orientation. A variable-centered analytic approach including regression analyses provided information about how students, on average, who differed in terms of their teachers' ratings of their science ability, achievement goals, capability beliefs and experiences with science achievement tasks perceived, engaged in, and performed on multiple-choice items and performance assessments. Person-centered analyses provided information about the perceptions, engagement and performance of subgroups of individuals who had different motivational characteristics. Generally, students' personal goals and capability beliefs related more strongly to test perceptions, but not performance, while teacher ratings of ability and test-specific beliefs related to performance.
Patterns of source monitoring bias in incarcerated youths with and without conduct problems.
Morosan, Larisa; Badoud, Deborah; Salaminios, George; Eliez, Stephan; Van der Linden, Martial; Heller, Patrick; Debbané, Martin
2018-01-01
Antisocial individuals present behaviours that violate the social norms and the rights of others. In the present study, we examine whether biases in monitoring the self-generated cognitive material might be linked to antisocial manifestations during adolescence. We further examine the association with psychopathic traits and conduct problems (CPs). Sixty-five incarcerated adolescents (IAs; M age = 15.85, SD = 1.30) and 88 community adolescents (CAs; M age = 15.78, SD = 1.60) participated in our study. In the IA group, 28 adolescents presented CPs (M age = 16.06, SD = 1.41) and 19 did not meet the diagnostic criteria for CPs (M age = 15.97, SD = 1.20). Source monitoring was assessed through a speech-monitoring task, using items requiring different levels of cognitive effort; recognition and source-monitoring bias scores (internalising and externalising biases) were calculated. Between-group comparisons indicate greater overall biases and different patterns of biases in the source monitoring. IA participants manifest a greater externalising bias, whereas CA participants present a greater internalising bias. In addition, IA with CPs present different patterns of item recognition. These results indicate that the two groups of adolescents present different types of source-monitoring bias for self-generated speech. In addition, the IAs with CPs present impairments in item recognition. Future studies may examine the developmental implications of self-monitoring biases in the perseverance of antisocial behaviours from adolescence to adulthood.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601
Messai, Habib; Farman, Muhammad; Sarraj-Laabidi, Abir; Hammami-Semmar, Asma; Semmar, Nabil
2016-01-01
Background. Olive oils (OOs) show high chemical variability due to several factors of genetic, environmental and anthropic types. Genetic and environmental factors are responsible for natural compositions and polymorphic diversification resulting in different varietal patterns and phenotypes. Anthropic factors, however, are at the origin of different blends’ preparation leading to normative, labelled or adulterated commercial products. Control of complex OO samples requires their (i) characterization by specific markers; (ii) authentication by fingerprint patterns; and (iii) monitoring by traceability analysis. Methods. These quality control and management aims require the use of several multivariate statistical tools: specificity highlighting requires ordination methods; authentication checking calls for classification and pattern recognition methods; traceability analysis implies the use of network-based approaches able to separate or extract mixed information and memorized signals from complex matrices. Results. This chapter presents a review of different chemometrics methods applied for the control of OO variability from metabolic and physical-chemical measured characteristics. The different chemometrics methods are illustrated by different study cases on monovarietal and blended OO originated from different countries. Conclusion. Chemometrics tools offer multiple ways for quantitative evaluations and qualitative control of complex chemical variability of OO in relation to several intrinsic and extrinsic factors. PMID:28231172
Guo, Xin-E; Zhao, Yu-Bin; Xie, Yan-Ming; Zhao, Li-Cai; Li, Yan-Feng; Hao, Zhe
2013-09-01
To establish a nurse based post-marketing safety surveillance model for traditional Chinese medicine injections (TCMIs). A TCMIs safety monitoring team and a research hospital team engaged in the research, monitoring processes, and quality control processes were established, in order to achieve comprehensive, timely, accurate and real-time access to research data, to eliminate errors in data collection. A triage system involving a study nurse, as the first point of contact, clinicians and clinical pharmacists was set up in a TCM hospital. Following the specified workflow involving labeling of TCM injections and using improved monitoring forms it was found that there were no missing reports at the ratio of error was zero. A research nurse as the first and main point of contact in post-marketing safety monitoring of TCM as part of a triage model, ensures that research data collected has the characteristics of authenticity, accuracy, timeliness, integrity, and eliminate errors during the process of data collection. Hospital based monitoring is a robust and operable process.
ERIC Educational Resources Information Center
McCabe, David P.; Soderstrom, Nicholas C.
2011-01-01
Five experiments were conducted to examine whether the nature of the information that is monitored during prospective metamemory judgments affected the relative accuracy of those judgments. We compared item-by-item judgments of learning (JOLs), which involved participants determining how confident they were that they would remember studied items,…
ERIC Educational Resources Information Center
Huff, Mark J.; Bodner, Glen E.
2013-01-01
We compared the effects of item-specific versus relational encoding on recognition memory in the Deese-Roediger-McDermott paradigm. In Experiment 1, we directly compared item-specific and relational encoding instructions, whereas in Experiments 2 and 3 we biased pleasantness and generation tasks, respectively, toward one or the other type of…
Personality assessment of adolescents: an analysis of the Junior Self-Monitoring Scale.
Howells, G N; Fishfader, V L
1995-04-01
The factor structure and reliability of Graziano, Musser, Leone, and Lautenschlager's 1987 Junior Self-monitoring Scale was examined using the responses of 1279 students in Grades 6 to 9. Analyses suggested that the scale contains two main factors which represent Concern for Social Appropriateness and Ability to Modify Self-presentation. We suggest using a 20-item version of the scale (rather than the original 24-item version) to provide increased reliability and that the scale may be more appropriate than the Adolescent Self-monitoring Scale by Pledger for use with younger children because it is easier to read and has abundant situational cues.
Quantum Dialogue with Authentication Based on Bell States
NASA Astrophysics Data System (ADS)
Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping
2013-06-01
We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.
From Sexual Desire Discrepancies to Desirable Sex: Creating the Optimal Connection.
Kleinplatz, Peggy J; Paradis, Nicolas; Charest, Maxime; Lawless, Shannon; Neufeld, Marlene; Neufeld, Robert; Pratt, Danielle; Ménard, A Dana; Buduru, Bogdan; Rosen, Lianne
2017-11-21
Beginning in 2005, our team conducted a series of studies on optimal sexual experiences. We have applied our findings to develop a group therapy intervention for couples presenting with low sexual desire/frequency and sexual desire discrepancy. The goal was to improve the quality of erotic intimacy by focusing on such elements as being fully embodied during sex, increasing authenticity, trustworthiness, and vulnerability. Twenty-eight heterosexual individuals (14 couples) were seen in 16 hours of couples group therapy. Each completed the New Sexual Satisfaction Scale in pretests, posttests and six-month follow-ups. Significant differences in satisfaction (p <.001) were found in overall sample means from pretests to posttests and follow-ups. Significant differences were also found in 10 of 20 items, plus in two of three added items, including satisfaction with intensity of sexual arousal, variety, frequency, partner's initiation, and emotional opening up. Although this is a small sample, the results indicate that this intervention is effective. We interpret these findings in terms of creating just enough safety to enable couples to take erotic risks and thereby create desirable sexual intimacy.
A zero-knowledge protocol for nuclear warhead verification
NASA Astrophysics Data System (ADS)
Glaser, Alexander; Barak, Boaz; Goldston, Robert J.
2014-06-01
The verification of nuclear warheads for arms control involves a paradox: international inspectors will have to gain high confidence in the authenticity of submitted items while learning nothing about them. Proposed inspection systems featuring `information barriers', designed to hide measurements stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of a fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, which is designed in such a way that sensitive information is never measured and so does not need to be hidden. We interrogate submitted items with energetic neutrons, making, in effect, differential measurements of both neutron transmission and emission. Calculations for scenarios in which material is diverted from a test object show that a high degree of discrimination can be achieved while revealing zero information. Our ideas for a physical zero-knowledge system could have applications beyond the context of nuclear disarmament. The proposed technique suggests a way to perform comparisons or computations on personal or confidential data without measuring the data in the first place.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-19
... monitoring, accumulated refuse, surface methane monitoring, and collection and control system exceedances... included a burden item for Agency review of surface methane monitoring reports. Respondents, however, are... adjusted the calculations to exclude any Agency burden associated with surface methane monitoring. We have...
Wang, Hui; Liu, Chunyue; Rong, Luge; Wang, Xiaoxu; Sun, Lina; Luo, Qing; Wu, Hao
2018-01-09
River monitoring networks play an important role in water environmental management and assessment, and it is critical to develop an appropriate method to optimize the monitoring network. In this study, an effective method was proposed based on the attainment rate of National Grade III water quality, optimal partition analysis and Euclidean distance, and Hun River was taken as a method validation case. There were 7 sampling sites in the monitoring network of the Hun River, and 17 monitoring items were analyzed once a month during January 2009 to December 2010. The results showed that the main monitoring items in the surface water of Hun River were ammonia nitrogen (NH 4 + -N), chemical oxygen demand, and biochemical oxygen demand. After optimization, the required number of monitoring sites was reduced from seven to three, and 57% of the cost was saved. In addition, there were no significant differences between non-optimized and optimized monitoring networks, and the optimized monitoring networks could correctly represent the original monitoring network. The duplicate setting degree of monitoring sites decreased after optimization, and the rationality of the monitoring network was improved. Therefore, the optimal method was identified as feasible, efficient, and economic.
Piniewska, Danuta; Sanak, Marek; Wojtas, Marta; Polanska, Nina
2017-05-01
Advances in forensic identification using molecular genetics are helpful in resolving some historical mysteries. The aim of this study was to confirm the authenticity of shrunken-head artifacts exhibited by two Polish museums. Shrunken heads, known as tsantsas, were headhunting trophies of South American Indians (Jivaroan). A special preparation preserved their hair and facial appearance. However, it was quite common to offer counterfeit shrunken heads of sloths or monkeys to collectors of curiosities. We sampled small skin specimens of four shrunken-head skin from the museum collection from Warsaw and Krakow, Poland. Following genomic DNA isolation, highly polymorphic short tandem repeats were genotyped using a commercial chemistry and DNA sequencing analyzer. Haplogroups of human Y chromosome were identified. We obtained an informative genetic profile of genomic short tandem repeats from all the samples of shrunken heads. Moreover, amplification of amelogenin loci allowed for sex determination. All four studied shrunken heads were of human origin. In two ones, a shared Y-chromosome haplogroup Q characteristic for Indigenous Americans was detected. Another artifact was counterfeited because Y-chromosome haplogroup I2 was found, characteristic for the Southeastern European origin. Commercial genetic methods of identification can be applied successfully in studies on the origin and authenticity of some unusual collection items.
Non-RF Chain of Custody Item Monitor (CoCIM) User Manual.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brotz, Jay Kristoffer; Wade, James Rokwel; Schwartz, Steven Robert
This User Manual contains a description of the wired and infrared (IR) variants of the Chain of Custody Item Monitor (CoCIM), the Coordinator for reading stored messages, and the inspector Message Viewer user interface (UI) software, as well as instructions for use. This manual does not include descriptions or use instructions for the radio frequency (RF) variant of the CoCIM. The intended audience is planners and participants in treaty verification exercises where chain of custody (CoC) elements are required.
3. Main Control Switchboard (front), view to the southwest, with ...
3. Main Control Switchboard (front), view to the southwest, with item 1 (the synchronization monitor) on the far left of the photograph and item 14 (the Libby transmission line panel) on the far right of the photograph. The operator's desk, with telephone and computer monitors, is also visible in left foreground of the photograph. - Washington Water Power Clark Fork River Noxon Rapids Hydroelectric Development, Powerhouse, South bank of Clark Fork River at Noxon Rapids, Noxon, Sanders County, MT
Hundertmark, Jan; Apondo, Sandra Karina; Schultz, Jobst-Hendrik
2018-01-01
Background: Direct patient contact is crucial in learning important interactional and examination skills. However, medical students have limited opportunity to self-responsibly practise these skills in authentic clinical settings and typically receive insufficient feedback on their performance. We developed a novel single-session ambulatory teaching concept (Heidelberg Student Ambulatory training, "HeiSA") to prepare students more adequately for clinical-practical responsibilities. Methods: To identify challenges and target group needs, we reviewed current literature and consulted an expert group of faculty lecturers and training researchers. The resulting course concept was put into practice at the University Hospital's general-internistic outpatient department and evaluated in a pilot phase (winter term 2010, ten participants) and a main project phase (summer and winter terms 2011, 14 and 21 participants, respectively). Third and fourth-year students autonomously take a new patient's medical history and conduct a complete physical examination in one hour under supervision, followed by extensive preceptor feedback. To assess learning achievements, participants and a control group self-rated their communication and examination skills before and (participants only) after the session on six-point Likert scales (1=completely able, 6=completely unable). The preceptor also evaluated the participants' performance. Finally, all stakeholders re-evaluated the course concept. Results: HeiSA is a feasible training concept and accepted by staff members and students. It provides opportunities to practise clinical skills in a relevant, authentic learning environment with extensive feedback. Participants report improved anamnesis (0.27±0.51, p =.003) and physical examination (0.25±0.41, p =.008) skills. The preceptor evaluated students' performance to be generally high, with ratings ranging from 1.40±0.55 (item: the student does not interrupt the patient) to 2.51±0.89 (item: psychosocial anamnesis). Conclusions: HeiSA is a viable course concept for teaching anamnesis and physical examination skills. It integrates student teaching into routine care and can potentially be adapted to other outpatient departments.
Tano, R; Takaku, S; Ozaki, T
2017-11-01
The objective of this study was to investigate whether having dental hygiene students monitor video recordings of their dental explorer skills is an effective means of proper self-evaluation in dental hygiene education. The study participants comprised students of a dental hygiene training school who had completed a module on explorer skills using models, and a dental hygiene instructor who was in charge of lessons. Questions regarding 'posture', 'grip', 'finger rest' and 'operation' were set to evaluate explorer skills. Participants rated each item on a two-point scale: 'competent (1)' or 'not competent (0)'. The total score was calculated for each evaluation item in evaluations by students with and without video monitoring, and in evaluations by the instructor with video monitoring. Mean scores for students with and without video monitoring were compared using a t-test, while intraclass correlation coefficients were found by reliability analysis of student and instructor evaluations. A total of 37 students and one instructor were subject to analysis. The mean score for evaluations with and without video monitoring differed significantly for posture (P < 0.0001), finger rest (P = 0.0006) and operation (P < 0.0001). The intraclass correlation coefficient between students and instructors for evaluations with video monitoring ranged from 0.90 to 0.97 for the four evaluation items. The results of this study suggested that having students monitor video recordings of their own explorer skills may be an effective means of proper self-evaluation in specialized basic education using models. © 2016 The Authors. International Journal of Dental Hygiene Published by John Wiley& Sons Ltd.
ERIC Educational Resources Information Center
Daniels, Brian; Volpe, Robert J.; Briesch, Amy M.; Gadow, Kenneth D.
2017-01-01
Direct behavior rating (DBR) represents a feasible method for monitoring student behavior in the classroom; however, limited work to date has focused on the use of multi-item scales. The purposes of the study were to examine the (a) dependability of data obtained from a multi-item DBR designed to assess peer conflict and (b) treatment sensitivity…
ERIC Educational Resources Information Center
Wood, Alex M.; Linley, P. Alex; Maltby, John; Baliousis, Michael; Joseph, Stephen
2008-01-01
This article describes the development of a measure of dispositional authenticity and tests whether authenticity is related to well-being, as predicted by several counseling psychology perspectives. Scales were designed to measure a tripartite conception of authenticity, comprising self-alienation, authentic living, and accepting external…
Measuring Teacher Authenticity: Criteria Students Use in Their Perception of Teacher Authenticity
ERIC Educational Resources Information Center
De Bruyckere, Pedro; Kirschner, Paul A.
2017-01-01
Authenticity is an often-heard term with respect to education. Tasks should be authentic, the learning environment should be authentic and, above all, the teacher should be authentic. Previous qualitative research has shown that there are four primary criteria that students in formal educational settings use when forming their perceptions of…
van den Bosch, Ralph; Taris, Toon W
2014-01-01
Previous research on authenticity has mainly focused on trait conceptualizations of authenticity (e.g., Wood et al., 2008), whereas in specific environments (e.g., at work) state conceptualizations of authenticity (cf. Van den Bosch & Taris, 2013) are at least as relevant. For example, working conditions are subject to change, and this could well have consequences for employees' perceived level of authenticity at work. The current study employs a work-specific, state-like conceptualization of authenticity to investigate the relations between authenticity at work, well-being, and work outcomes. A series of ten separate hierarchical regression analyses using data from 685 participants indicated that after controlling for selected work characteristics and demographic variables, authenticity at work accounted for on average 11% of the variance of various wellbeing and work outcomes. Of the three subscales of authenticity at work (i.e., authentic living, self-alienation, and accepting influence), self-alienation was the strongest predictor of outcomes, followed by authentic living and accepting external influence, respectively. These findings are discussed in the light of their practical and theoretical implications.
Human dietary δ(15)N intake: representative data for principle food items.
Huelsemann, F; Koehler, K; Braun, H; Schaenzer, W; Flenker, U
2013-09-01
Dietary analysis using δ(15)N values of human remains such as bone and hair is usually based on general principles and limited data sets. Even for modern humans, the direct ascertainment of dietary δ(15)N is difficult and laborious, due to the complexity of metabolism and nitrogen fractionation, differing dietary habits and variation of δ(15)N values of food items. The objective of this study was to summarize contemporary regional experimental and global literature data to ascertain mean representative δ(15)N values for distinct food categories. A comprehensive data set of more than 12,000 analyzed food samples was summarized from the literature. Data originated from studies dealing with (1) authenticity tracing or origin control of food items, and (2) effects of fertilization or nutrition on δ(15)N values of plants or animals. Regional German food δ(15)N values revealed no major differences compared with the mean global values derived from the literature. We found that, in contrast to other food categories, historical faunal remains of pig and poultry are significantly enriched in (15)N compared to modern samples. This difference may be due to modern industrialized breeding practices. In some food categories variations in agricultural and feeding regimens cause significant differences in δ(15)N values that may lead to misinterpretations when only limited information is available. Copyright © 2013 Wiley Periodicals, Inc.
Authenticated, private, and secured smart cards (APS-SC)
NASA Astrophysics Data System (ADS)
Szu, Harold; Mehmood, Amir
2006-04-01
From historical perspective, the recent advancements in better antenna designs, low power circuitry integrations and inexpensive fabrication materials have made possible a miniature counter-measure against Radar, a clutter behaving like a fake target return called Digital Reflection Frequency Modulation (DRFM). Such a military counter-measure have found its way in the commerce as a near field communication known as Radio Frequency Identification (RFID), a passive or active item tag T attached to every readable-writable Smart Card (SC): Passports ID, medical patient ID, biometric ID, driver licenses, book ID, library ID, etc. These avalanche phenomena may be due to the 3 rd Gen phones seeking much more versatile & inexpensive interfaces, than the line-of-sight bar-code optical scan. Despite of the popularity of RFID, the lacking of Authenticity, Privacy and Security (APS) protection restricted somewhat the wide spread commercial, financial, medical, legal, and militarily applications. Conventional APS approach can obfuscate a private passkey K of SC with the tag number T or the reader number R, or both, i.e. only T*K or R*K or both will appear on them, where * denotes an invertible operation, e.g. EXOR, but not limited to it. Then, only the authentic owner, knowing all, can inverse the operation, e.g. EXOR*EXOR= I to find K. However, such an encryption could be easily compromised by a hacker seeking exhaustively by comparison based on those frequently used words. Nevertheless, knowing biological wetware lesson for power of pairs sensors and Radar hardware counter-measure history, we can counter the counter-measure DRFM, instead using one RFID tag per SD, we follow the Nature adopting two ears/tags, e.g. each one holding portions of the ID or simply two different ID's readable only by different modes of the interrogating reader, followed by brain central processor in terms of nonlinear invertible shufflers mixing two ID bits. We prefer to adopt such a hardware-software combined hybrid approach because of a too limited phase space of a single RFID for any meaningful encryption approach. Furthermore, a useful biological lesson is not to put all eggs in one basket, "if you don't get it all, you can't hack it". According to the Radar physics, we can choose the amplitude, the frequency, the phase, the polarization, and two radiation energy supply principles, the capacitance coupling (~6m) and the inductance coupling (<1m), to code the pair of tags differently. A casual skimmer equipped with single-mode reader can not read all. We consider near-field and mid-field applications each in this paper. The near-field is at check-out counters or the convey-belt inventory involving sensitive and invariant data. The mid-field search & rescue involves not only item/person identification, but also the geo-location. If more RF power becomes cheaper & portable for longer propagation distance in the near future, then a triangulation with pair of secured readers, located at known geo-locations, could interrogate and identify items/persons and their locations in a GPS-blind environment.
Once Established, What Techniques Work Best for Monitoring the District?
ERIC Educational Resources Information Center
Triverio, Louis E.
Monitoring school budget expenditures is as important as budgeting. School boards should decide which broad financial policies will provide control of expenditures, what financial tools to use in monitoring expenditures, and what areas outside of the budget should be monitored. A board's financial policy ought to deal with the line item transfers,…
Self-Monitoring Strategies as a Unique Predictor of Latino Male Student Achievement
ERIC Educational Resources Information Center
Covarrubias, Rebecca; Stone, Jeff
2015-01-01
We examined how self-monitoring (i.e., regulating one's behaviors; Snyder, 1987) relates to Latino male achievement. In Study 1, college students (N = 413) completed self-monitoring items and reported SAT math scores. As hypothesized, self-monitoring was positively correlated with achievement for Latino male students but was unrelated to…
Data Redistribution through MY NASA DATA: Striving to bring authentic NASA data into education
NASA Astrophysics Data System (ADS)
Lewis, P. M.; Oostra, D.; Oots, P.; Chambers, L. H.; Moore, S.; Crecelius, S.; Taylor, J.
2012-12-01
The Mentoring and inquirY using NASA Data on Atmospheric and Earth science for Teachers and Amateurs (MY NASA DATA or MND) project was launched in 2004 to bring authentic data into K-12 education. The MND website features a Live Access Server (LAS), an open source tool which allows users to customize data sets to suit their individual needs, choosing from among 200 global Level 3 data sets. Approximately 120 lesson plans that utilize the available parameters are offered to help teachers and students get started with data exploration. Grade appropriate data documentation is also provided (with continual efforts to improve it to better meet the needs of this target audience). Through inquiry and lesson utilization, educators have several connection points to the data. As classrooms shift to problem-based and inquiry learning, the need for a data visualizer/server increases. Through numerous and growing connections to NASA satellite missions, and with access to data as a built-in feature, MND effectively fills this niche to provide a first level of data re-use that is friendly to the K-12 community. Offering a wide variety of data sets allows MND to support many science topics within the K-12 curriculum while extending the use of scientific data from NASA Earth science satellites. Lessons, created by educators across the country, allow MND to connect with the classroom teacher and to meet their data needs. As technology continues to evolve, a second level of data re-use becomes both interesting and possible. Thus, the MND team is now exploring new web and mobile platforms that can be built and distributed on an accelerated time cycle to keep up with information technology developments. With implementation of these new platforms come challenges in promoting new items to the education community, the public, and other potential users. Included in the list of challenges are: ever-evolving technology, prediction of the market, web/mobile platforms, and time-to-market for new items. The MND team has addressed some of these barriers by embracing new technologies: 1) the Observe Your World blog utilizes WordPress and provides a central place to announce new resources; 2) The use of HTML5 has enabled cross-platform web application development and avoids native application release pitfalls; 3) close monitoring of server performance and access metrics (using, for example, Google analytics) provides real-time feedback and allows MND to make informed changes to content and delivery methods. Old-fashioned approaches to communication, such as paying close attention to the needs of the end user through relationship building and responsiveness, are also keys to success. Outcome: This paper will show the various platforms through which the MY NASA DATA project has made available data for use in the educational community. Successes and challenges will be shared from 8 years of working on data re-use tools to support the education community.
An, Younghwa
2012-01-01
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.
An, Younghwa
2012-01-01
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887
Babor, Thomas F; Xuan, Ziming; Proctor, Dwayne
2008-03-01
The purposes of this study were to develop reliable procedures to monitor the content of alcohol advertisements broadcast on television and in other media, and to detect violations of the content guidelines of the alcohol industry's self-regulation codes. A set of rating-scale items was developed to measure the content guidelines of the 1997 version of the U.S. Beer Institute Code. Six focus groups were conducted with 60 college students to evaluate the face validity of the items and the feasibility of the procedure. A test-retest reliability study was then conducted with 74 participants, who rated five alcohol advertisements on two occasions separated by 1 week. Average correlations across all advertisements using three reliability statistics (r, rho, and kappa) were almost all statistically significant and the kappas were good for most items, which indicated high test-retest agreement. We also found high interrater reliabilities (intraclass correlations) among raters for item-level and guideline-level violations, indicating that regardless of the specific item, raters were consistent in their general evaluations of the advertisements. Naïve (untrained) raters can provide consistent (reliable) ratings of the main content guidelines proposed in the U.S. Beer Institute Code. The rating procedure may have future applications for monitoring compliance with industry self-regulation codes and for conducting research on the ways in which alcohol advertisements are perceived by young adults and other vulnerable populations.
ERIC Educational Resources Information Center
Lüddecke, Florian
2016-01-01
Whereas the importance of authenticity in relation to educational contexts has been highlighted, educational authenticity (EA) has mainly referred to a real-life/world convergence or the notion of teacher authenticity, implying that authenticity can be taught and learnt. This view, however, has largely overlooked philosophical considerations so…
ERIC Educational Resources Information Center
Nematollahi, Shirin; Maghsoudi, Mojtaba
2015-01-01
In this current study the researchers have tried to investigate the possible effect of authentic and non-authentic texts on Iranian EFL learners' vocabulary retention. Despite the great deal of studies conducted in the area of EFL/ESL learning, the effect of authentic versus non-authentic texts have almost gained little attention and been…
Fulfillment of HTTP Authentication Based on Alcatel OmniSwitch 9700
NASA Astrophysics Data System (ADS)
Liu, Hefu
This paper provides a way of HTTP authentication On Alcatel OmniSwitch 9700. Authenticated VLANs control user access to network resources based on VLAN assignment and user authentication. The user can be authenticated through the switch via any standard Web browser software. Web browser client displays the username and password prompts. Then a way for HTML forms can be given to pass HTTP authentication data when it's submitted. A radius server will provide a database of user information that the switch checks whenever it tries to authenticate through the switch. Before or after authentication, the client can get an address from a Dhcp server.
Li, Chuan; Peng, Juan; Liang, Ming
2014-01-01
Oil debris sensors are effective tools to monitor wear particles in lubricants. For in situ applications, surrounding noise and vibration interferences often distort the oil debris signature of the sensor. Hence extracting oil debris signatures from sensor signals is a challenging task for wear particle monitoring. In this paper we employ the maximal overlap discrete wavelet transform (MODWT) with optimal decomposition depth to enhance the wear particle monitoring capability. The sensor signal is decomposed by the MODWT into different depths for detecting the wear particle existence. To extract the authentic particle signature with minimal distortion, the root mean square deviation of kurtosis value of the segmented signal residue is adopted as a criterion to obtain the optimal decomposition depth for the MODWT. The proposed approach is evaluated using both simulated and experimental wear particles. The results show that the present method can improve the oil debris monitoring capability without structural upgrade requirements. PMID:24686730
Li, Chuan; Peng, Juan; Liang, Ming
2014-03-28
Oil debris sensors are effective tools to monitor wear particles in lubricants. For in situ applications, surrounding noise and vibration interferences often distort the oil debris signature of the sensor. Hence extracting oil debris signatures from sensor signals is a challenging task for wear particle monitoring. In this paper we employ the maximal overlap discrete wavelet transform (MODWT) with optimal decomposition depth to enhance the wear particle monitoring capability. The sensor signal is decomposed by the MODWT into different depths for detecting the wear particle existence. To extract the authentic particle signature with minimal distortion, the root mean square deviation of kurtosis value of the segmented signal residue is adopted as a criterion to obtain the optimal decomposition depth for the MODWT. The proposed approach is evaluated using both simulated and experimental wear particles. The results show that the present method can improve the oil debris monitoring capability without structural upgrade requirements.
How Does Distinctive Processing Reduce False Recall?
Hunt, R. Reed; Smith, Rebekah E.; Dunlap, Kathryn R.
2011-01-01
False memories arising from associatively related lists are a robust phenomenon that resists many efforts to prevent it. However, a few variables have been shown to reduce this form of false memory. Explanations for how the reduction is accomplished have focused on either output monitoring processes or constraints on access, but neither idea alone is sufficient to explain extant data. Our research was driven by a framework that distinguishes item-based and event-based distinctive processing to account for the effects of different variables on both correct recall of study list items and false recall. We report the results of three experiments examining the effect of a deep orienting task and the effect of visual presentation of study items, both of which have been shown to reduce false recall. The experiments replicate those previous findings and add important new information about the effect of the variables on a recall test that eliminates the need for monitoring. The results clearly indicate that both post-access monitoring and constraints on access contribute to reductions in false memories. The results also showed that the manipulations of study modality and orienting task had different effects on correct and false recall, a pattern that was predicted by the item-based/event-based distinctive processing framework. PMID:22003267
How Does Distinctive Processing Reduce False Recall?
Hunt, R Reed; Smith, Rebekah E; Dunlap, Kathryn R
2011-11-01
False memories arising from associatively related lists are a robust phenomenon that resists many efforts to prevent it. However, a few variables have been shown to reduce this form of false memory. Explanations for how the reduction is accomplished have focused on either output monitoring processes or constraints on access, but neither idea alone is sufficient to explain extant data. Our research was driven by a framework that distinguishes item-based and event-based distinctive processing to account for the effects of different variables on both correct recall of study list items and false recall. We report the results of three experiments examining the effect of a deep orienting task and the effect of visual presentation of study items, both of which have been shown to reduce false recall. The experiments replicate those previous findings and add important new information about the effect of the variables on a recall test that eliminates the need for monitoring. The results clearly indicate that both post-access monitoring and constraints on access contribute to reductions in false memories. The results also showed that the manipulations of study modality and orienting task had different effects on correct and false recall, a pattern that was predicted by the item-based/event-based distinctive processing framework.
Using Tests as Learning Opportunities.
ERIC Educational Resources Information Center
Foos, Paul W.; Fisher, Ronald P.
1988-01-01
A study involving 105 undergraduates assessed the value of testing as a means of increasing, rather than simply monitoring, learning. Results indicate that fill-in-the-blank and items requiring student inferences were more effective, respectively, than multiple-choice tests and verbatim items in furthering student learning. (TJH)
Graph State-Based Quantum Group Authentication Scheme
NASA Astrophysics Data System (ADS)
Liao, Longxia; Peng, Xiaoqi; Shi, Jinjing; Guo, Ying
2017-02-01
Motivated by the elegant structure of the graph state, we design an ingenious quantum group authentication scheme, which is implemented by operating appropriate operations on the graph state and can solve the problem of multi-user authentication. Three entities, the group authentication server (GAS) as a verifier, multiple users as provers and the trusted third party Trent are included. GAS and Trent assist the multiple users in completing the authentication process, i.e., GAS is responsible for registering all the users while Trent prepares graph states. All the users, who request for authentication, encode their authentication keys on to the graph state by performing Pauli operators. It demonstrates that a novel authentication scheme can be achieved with the flexible use of graph state, which can synchronously authenticate a large number of users, meanwhile the provable security can be guaranteed definitely.
22 CFR 92.36 - Authentication defined.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication defined. 92.36 Section 92.36... Notarial Acts § 92.36 Authentication defined. An authentication is a certification of the genuineness of... recognized in another jurisdiction. Documents which may require authentication include legal instruments...
Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru
2016-10-01
Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security verification of our scheme using the widely accepted AVISPA tool. High security and extra functionality features allow our proposed scheme to be applicable for telecare medicine information systems which is used for e-health care medical applications. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Hiller, Thomas Stephan; Freytag, Antje; Breitbart, Jörg; Teismann, Tobias; Schöne, Elisabeth; Blank, Wolfgang; Schelle, Mercedes; Vollmar, Horst Christian; Margraf, Jürgen; Gensichen, Jochen
2018-04-01
Behavior therapy-oriented methods are recommended for treating anxiety disorders in primary care. The treatment of patients with long-term conditions can be improved by case management and structured clinical monitoring. The present paper describes the rationale, design and application of the 'Jena Anxiety Monitoring List' (JAMoL), a monitoring tool for the treatment of patients with panic disorder, with or without agoraphobia, in primary care. JAMoL's design was based on established clinical measures, the rationale of exposure-based anxiety treatment, and research on family practice-based case management. After piloting, the JAMoL was used in the clinical study 'Jena-PARADISE' (ISRCTN64669297), where non-physician practice staff monitored patients with panic disorder by telephone. Using semi-structured interviews in concomitant studies, study participants were asked about the instrument's functionality. The JAMoL assesses the severity of anxiety symptoms (6 items) as well as the patient's adherence to therapy (4 items) and fosters the case management-related information exchange (3 items). An integrated traffic light scheme facilitates the evaluation of monitoring results. Within the clinical study, non-physician practice staff carried out a total of 1,525 JAMoL-supported monitoring calls on 177 patients from 30 primary care practices (median calls per patient: 10 [interquartile range, 9-10]). Qualitative analyses revealed that most practice teams and patients rated the JAMoL as a practicable and treatment-relevant tool. The JAMoL enables primary care practice teams to continuously monitor anxiety symptoms and treatment adherence in patients with panic disorder with or without agoraphobia. Within the behavior therapy-oriented treatment program 'Jena-PARADISE', the JAMoL constitutes an important case management tool. Copyright © 2018. Published by Elsevier GmbH.
Authentic feminist? Authenticity and feminist identity in teenage feminists' talk.
Calder-Dawe, Octavia; Gavey, Nicola
2017-12-01
This article explores how young people's feminist identities take shape in conjunction with a contemporary ideal of personal authenticity: to know and to express the 'real me'. Drawing from interviews with 18 teenagers living in Auckland, New Zealand, we examine a novel convergence of authenticity and feminism in participants' identity talk. For social psychologists interested in identity and politics, this convergence is intriguing: individualizing values such as authenticity are generally associated with disengagement with structural critique and with a repudiation of politicized and activist identities. Rather than seeking to categorize authentic feminism as an instance of either 'good/collective' or 'bad/individualized' feminist politics, we use discourse analysis to examine how the identity position of authentic feminist was constructed and to explore implications for feminist politics. On one hand, interviewees mobilized authentic feminism to affirm their commitment to normative liberal values of authenticity and self-expression. At the same time, the position of authentic feminist appeared to authorize risky feminist identifications and to justify counter-normative feelings, desires, and actions. To conclude, we explore how encountering others' intolerance of authentic feminism exposed interviewees to the limits of authenticity discourse, propelling some towards new understandings of the social world and their space for action within it. © 2017 The British Psychological Society.
Research Aircraft - Controlling Instruments from the Ground in a Secure and Authenticated Fashion
NASA Astrophysics Data System (ADS)
Baltzer, T.; Martin, C.; Fawaz, S.; Webster, C.
2012-12-01
At NCAR's Research Aviation Facility (RAF) we're finding a number of factors motivating the desire to be able to control instruments fielded on the aircraft we operate for the NSF. Investigators are increasingly interested in fielding greater numbers of research instruments for projects, instruments are becoming increasingly complicated, and adjustment of instrument behavior to adapt to changing conditions around the aircraft and to meet project goals are just a few of these factors. Usually there are not enough seats on the aircraft to accommodate all the instrument PIs and crew members who do occupy the seats are being asked to monitor and control increasing numbers of instruments about which they have limited knowledge. We use Satellite Communications (SatCom) to allow researchers to communicate with colleagues/crew on the aircraft and so that some of the real-time data can be sent to the ground for helping to optimize the research. Historically, challenges of authentication, security and the disruptive SatCom system have motivated us to avoid providing for remote instrument control. Now we have now reached an era where remote instrument control is a necessity. This poster will discuss the approach we are implementing to provide this capability for our instrument investigators. Particular attention is paid to how we assure authentication and security so that only the instrument investigators are capable of communicating with their instruments.;
Osmosis and Diffusion Conceptual Assessment
ERIC Educational Resources Information Center
Fisher, Kathleen M.; Williams, Kathy S.; Lineback, Jennifer Evarts
2011-01-01
Biology student mastery regarding the mechanisms of diffusion and osmosis is difficult to achieve. To monitor comprehension of these processes among students at a large public university, we developed and validated an 18-item Osmosis and Diffusion Conceptual Assessment (ODCA). This assessment includes two-tiered items, some adopted or modified…
Earned print media in advancing tobacco control in Himachal Pradesh, India: a descriptive study.
Sharma, Renu; Shewade, Hemant Deepak; Gopalan, Balasubramaniam; Badrel, Ramesh Kumar; Rana, Jugdeep Singh
2017-01-01
The Union-Bloomberg Initiative tobacco control projects were implemented in Himachal Pradesh (a hilly state in North India) from 2007 to 2014. The project focused on the establishment of an administrative framework; increasing the capacity of stakeholders; enforcement of legislation; coalition and networking with multiple stakeholders; awareness generation with focus on earned media and monitoring and evaluation with policy-focussed research. This study aimed to systematically analyse all earned print news items related to the projects. In this cross-sectional descriptive study, quantitative content analysis of earned print news items was carried out using predetermined codes related to areas of tobacco control policies. We also carried out a cost description of the hypothetical value of this earned media. The area of the news item in cm 2 was multiplied by the average rate of space for the paid news item in that particular newspaper. There were 6348 news items: the numbers steadily increased with time. Focus on Monitoring tobacco use, Protecting people from tobacco smoke, Offering help to quit, Warning about dangers of tobacco, Enforcing a ban on tobacco advertising and promotion, Raising tax on tobacco products was seen in 24, 17, 9, 23, 22 and 3% of news items, respectively. Press releases were highest at 44% and report by correspondents at 24%. Further, 55, 23 and 21% news items focused on smoking, smokeless and both forms of tobacco use, respectively. Sixty-six per cent and 34% news items, respectively, were focused on youth and women. The news items had a hypothetical value of US$1503 628.3, which was three times more than the funds spent on all project activities. In the absence of funding for paid media, the project strategically used earned media to promote tobacco control policies in the state.
22 CFR 92.38 - Forms of certificate of authentication.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Forms of certificate of authentication. 92.38... SERVICES Specific Notarial Acts § 92.38 Forms of certificate of authentication. The form of a certificate of authentication depends on the statutory requirements of the jurisdiction where the authenticated...
18 CFR 375.102 - Custody and authentication of Commission records.
Code of Federal Regulations, 2010 CFR
2010-04-01
... authentication of Commission records. 375.102 Section 375.102 Conservation of Power and Water Resources FEDERAL... Provisions § 375.102 Custody and authentication of Commission records. (a) Custody of official records. (1...) Authentication of Commission action. All orders and other actions of the Commission shall be authenticated or...
ERIC Educational Resources Information Center
Bialystok, Lauren
2015-01-01
Authenticity is often touted as an important virtue for teachers. But what do we mean when we say that a teacher ought to be "authentic"? Research shows that discussions of teacher authenticity frequently refer to other character traits or simply to teacher effectiveness, but authenticity is a unique concept with a long philosophical…
Richard Peters and Valuing Authenticity
ERIC Educational Resources Information Center
Degenhardt, M. A. B.
2009-01-01
Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…
Do We Need to Design Course-Based Undergraduate Research Experiences for Authenticity?
Rowland, Susan; Pedwell, Rhianna; Lawrie, Gwen; Lovie-Toon, Joseph; Hung, Yu
2016-01-01
The recent push for more authentic teaching and learning in science, technology, engineering, and mathematics indicates a shared agreement that undergraduates require greater exposure to professional practices. There is considerable variation, however, in how “authentic” science education is defined. In this paper we present our definition of authenticity as it applies to an “authentic” large-scale undergraduate research experience (ALURE); we also look to the literature and the student voice for alternate perceptions around this concept. A metareview of science education literature confirmed the inconsistency in definitions and application of the notion of authentic science education. An exploration of how authenticity was explained in 604 reflections from ALURE and traditional laboratory students revealed contrasting and surprising notions and experiences of authenticity. We consider the student experience in terms of alignment with 1) the intent of our designed curriculum and 2) the literature definitions of authentic science education. These findings contribute to the conversation surrounding authenticity in science education. They suggest two things: 1) educational experiences can have significant authenticity for the participants, even when there is no purposeful design for authentic practice, and 2) the continuing discussion of and design for authenticity in UREs may be redundant. PMID:27909029
Application-level regression testing framework using Jenkins
Budiardja, Reuben; Bouvet, Timothy; Arnold, Galen
2017-09-26
Monitoring and testing for regression of large-scale systems such as the NCSA's Blue Waters supercomputer are challenging tasks. In this paper, we describe the solution we came up with to perform those tasks. The goal was to find an automated solution for running user-level regression tests to evaluate system usability and performance. Jenkins, an automation server software, was chosen for its versatility, large user base, and multitude of plugins including collecting data and plotting test results over time. We also describe our Jenkins deployment to launch and monitor jobs on remote HPC system, perform authentication with one-time password, and integratemore » with our LDAP server for its authorization. We show some use cases and describe our best practices for successfully using Jenkins as a user-level system-wide regression testing and monitoring framework for large supercomputer systems.« less
Application-level regression testing framework using Jenkins
DOE Office of Scientific and Technical Information (OSTI.GOV)
Budiardja, Reuben; Bouvet, Timothy; Arnold, Galen
Monitoring and testing for regression of large-scale systems such as the NCSA's Blue Waters supercomputer are challenging tasks. In this paper, we describe the solution we came up with to perform those tasks. The goal was to find an automated solution for running user-level regression tests to evaluate system usability and performance. Jenkins, an automation server software, was chosen for its versatility, large user base, and multitude of plugins including collecting data and plotting test results over time. We also describe our Jenkins deployment to launch and monitor jobs on remote HPC system, perform authentication with one-time password, and integratemore » with our LDAP server for its authorization. We show some use cases and describe our best practices for successfully using Jenkins as a user-level system-wide regression testing and monitoring framework for large supercomputer systems.« less
Six steps to a successful dose-reduction strategy
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bennett, M.
1995-03-01
The increased importance of demonstrating achievement of the ALARA principle has helped produce a proliferation of dose-reduction ideas. Across a company there may be many dose-reduction items being pursued in a variety of areas. However, companies have a limited amount of resource and, therefore, to ensure funding is directed to those items which will produce the most benefit and that all areas apply a common policy, requires the presence of a dose-reduction strategy. Six steps were identified in formulating the dose-reduction strategy for Rolls-Royce and Associates (RRA): (1) collating the ideas; (2) quantitatively evaluating them on a common basis; (3)more » prioritizing the ideas in terms of cost benefit, (4) implementation of the highest priority items; (5) monitoring their success; (6) periodically reviewing the strategy. Inherent in producing the dose-reduction strategy has been a comprehensive dose database and the RRA-developed dose management computer code DOMAIN, which allows prediction of dose rates and dose. The database enabled high task dose items to be identified, assisted in evaluating dose benefits, and monitored dose trends once items had been implemented. The DOMAIN code was used both in quantifying some of the project dose benefits and its results, such as dose contours, used in some of the dose-reduction items themselves. In all, over fifty dose-reduction items were evaluated in the strategy process and the items which will give greatest benefit are being implemented. The strategy has been successful in giving renewed impetus and direction to dose-reduction management.« less
2013-01-01
Background Morbidity and mortality related to Prescription Opioid Analgesics (POAs) have been rising sharply in North America. Non-Medical Prescription Opioid Use (NMPOU) in the general population is a key indicator of POA-related harm, yet the role of question item design for best NMPOU prevalence estimates in general population surveys is unclear, and existing NMPOU survey data for Canada are limited. Methods We tested the impact of different NMPOU question items by comparing an item in the 2008 and 2009 (N = 2,017) samples of the CAMH Monitor surveys – an Ontario adult general population survey – with a newly developed item used in the 2010 (N = 2,015) samples of the Centre for Addiction and Mental Health (CAMH) Monitor surveys. To control for a potential difference in the population demographics between surveys, we adjusted for gender, age, region, income, prescription opioid use, cigarette smoking, weekly binge drinking, cannabis use in the past three months, and psychological distress in our analyses. Results The prevalence of NMPOU as measured by the 2008 and 2009 CAMH monitor (2.0% [95% CI: 1.2% to 2.8%]) was significantly different when compared to the prevalence of NMPOU as measured by the 2010 CAMH monitor (7.7% [95% CI: 6.3% to 9.2%]) (p < 0.001). This difference was also found when stratifying our analysis by sex (p < 0.001) and when adjusting for all potential confounding covariates. Conclusion It is highly unlikely that the extensive NMPOU prevalence differences observed from the different survey items reflect an actual increase of NMPOU or changes in NMPOU determinants, but rather point to measurement effects. It appears that we currently do not have accurate estimates of NMPOU in the Canadian general population, even though these estimates are needed to guide and implement targeted interventions. Given the current substantial morbidity and mortality impact of NMPOU, there is an urgent need to systematically develop, validate and standardize NMPOU items for future general population surveys in Canada. PMID:23286378
48 CFR 252.204-7011 - Alternative Line Item Structure.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Unit Unit price Amount 0001 Computer, Desktop with CPU, Monitor, Keyboard and Mouse 20 EA Alternative... Unit Unit Price Amount 0001 Computer, Desktop with CPU, Keyboard and Mouse 20 EA 0002 Monitor 20 EA...
48 CFR 252.204-7011 - Alternative Line Item Structure.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Unit Unit price Amount 0001 Computer, Desktop with CPU, Monitor, Keyboard and Mouse 20 EA Alternative... Unit Unit Price Amount 0001 Computer, Desktop with CPU, Keyboard and Mouse 20 EA 0002 Monitor 20 EA...
48 CFR 252.204-7011 - Alternative Line Item Structure.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Unit Unit price Amount 0001 Computer, Desktop with CPU, Monitor, Keyboard and Mouse 20 EA Alternative... Unit Unit Price Amount 0001 Computer, Desktop with CPU, Keyboard and Mouse 20 EA 0002 Monitor 20 EA...
48 CFR 252.204-7011 - Alternative Line Item Structure.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Unit Unit price Amount 0001 Computer, Desktop with CPU, Monitor, Keyboard and Mouse 20 EA Alternative... Unit Unit Price Amount 0001 Computer, Desktop with CPU, Keyboard and Mouse 20 EA 0002 Monitor 20 EA...
Agrimonti, Caterina; Bottari, Benedetta; Sardaro, Maria Luisa Savo; Marmiroli, Nelson
2017-09-08
Dairy foods represent an important sector of the food market for their nutritional qualities and their organoleptic characteristics, which are often linked to tradition and to region. These products are typically protected by labels such as PDO (Protected Designation of Origin) and PGI (Protected Geographical Indication). Real-time PCR (qPCR) is a fundamental tool in "Food Genomics;" a discipline concerned with the residual DNA in food, which, alongside traditional physical and chemical methods, is frequently used to determine product safety, quality and authenticity. Compared to conventional or "end-point" PCR, qPCR incorporates continuous monitoring of reaction progress, thereby enabling quantification of target DNA. This review describes qPCR applications to the analysis of microbiota, and to the identification of the animal species source of milk from which dairy products have been made. These are important aspects for ensuring safety and authenticity. The various applications of qPCR are discussed, as well as advantages and disadvantages in comparison with other analytical methods.
Using "Journeys in Film" to Bring Authentic STEM Activities to the K-12 Classroom.
NASA Astrophysics Data System (ADS)
Rock, B. N.
2017-12-01
The "Journeys in Film" project brings important films and documentaries ("The Martian," "Hidden Figures," "River of Gold" and others) and curriculum-based, educational support activities to the classroom. Faculty from the University of New Hampshire, in partnership with selected local middle and high school teachers, developed a STEM Lesson Plan for Journeys in Film" focused on the soon-to-released documentary "River of Gold" which highlights tropical deforestation and illegal gold mining activities in the Peruvian jungles of the Amazon Basin. Using film clips (the Trailer) from the movie and the Lesson Plan, this approach allows pre-college students to learn how to use "Google Earth" to monitor chang-over-time and to quantify the areas of deforestation and mining using multi-date NOAA/USGS Landsat Thematic Mapper and ESA Copernicus satellite data. This approach will allow students to dconduct authentic hands-on science and mathematics to address a wide range of social and environmental issues associated with tropical deforestation in Peru.
Performance on large-scale science tests: Item attributes that may impact achievement scores
NASA Astrophysics Data System (ADS)
Gordon, Janet Victoria
Significant differences in achievement among ethnic groups persist on the eighth-grade science Washington Assessment of Student Learning (WASL). The WASL measures academic performance in science using both scenario and stand-alone question types. Previous research suggests that presenting target items connected to an authentic context, like scenario question types, can increase science achievement scores especially in underrepresented groups and thus help to close the achievement gap. The purpose of this study was to identify significant differences in performance between gender and ethnic subgroups by question type on the 2005 eighth-grade science WASL. MANOVA and ANOVA were used to examine relationships between gender and ethnic subgroups as independent variables with achievement scores on scenario and stand-alone question types as dependent variables. MANOVA revealed no significant effects for gender, suggesting that the 2005 eighth-grade science WASL was gender neutral. However, there were significant effects for ethnicity. ANOVA revealed significant effects for ethnicity and ethnicity by gender interaction in both question types. Effect sizes were negligible for the ethnicity by gender interaction. Large effect sizes between ethnicities on scenario question types became moderate to small effect sizes on stand-alone question types. This indicates the score advantage the higher performing subgroups had over the lower performing subgroups was not as large on stand-alone question types compared to scenario question types. A further comparison examined performance on multiple-choice items only within both question types. Similar achievement patterns between ethnicities emerged; however, achievement patterns between genders changed in boys' favor. Scenario question types appeared to register differences between ethnic groups to a greater degree than stand-alone question types. These differences may be attributable to individual differences in cognition, characteristics of test items themselves and/or opportunities to learn. Suggestions for future research are made.
77 FR 39519 - Records Schedules; Availability and Request for Comments
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-03
... compiled from various sources to track and monitor the effects of past nuclear tests on Armed Forces personnel. 3. Department of Energy, Federal Energy Regulatory Commission (N1- 138-12-2, 1 temporary item... temporary item). Project files, including working papers relating to product reports. 7. Department of Labor...
Hamlet, Jason R; Pierson, Lyndon G
2014-10-21
Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.
Examining the relationship between authenticity and self-handicapping.
Akin, Ahmet; Akin, Umran
2014-12-01
Self-handicapping includes strategies of externalization in which people excuse failure and internalize success, but which also prevents them from behaving in an authentic way. The goal was to investigate the relation of authenticity with self-handicapping. The study was conducted with 366 university students (176 men, 190 women; M age = 20.2 yr.). Participants completed the Turkish version of the Authenticity Scale and the Self-handicapping Scale. Self-handicapping was correlated positively with two factors of authenticity, accepting external influence and self-alienation, and negatively with the authentic living factor. A multiple regression analysis indicated that self-handicapping was predicted positively by self-alienation and accepting external influence and negatively by authentic living, accounting for 21% of the variance collectively. These results demonstrated the negative association of authenticity with self-handicapping.
Stephan-Otto, Christian; Siddi, Sara; Senior, Carl; Cuevas-Esteban, Jorge; Cambra-Martí, Maria Rosa; Ochoa, Susana; Brébion, Gildas
2017-09-01
Previous research suggests that visual hallucinations in schizophrenia consist of mental images mistaken for percepts due to failure of the reality-monitoring processes. However, the neural substrates that underpin such dysfunction are currently unknown. We conducted a brain imaging study to investigate the role of visual mental imagery in visual hallucinations. Twenty-three patients with schizophrenia and 26 healthy participants were administered a reality-monitoring task whilst undergoing an fMRI protocol. At the encoding phase, a mixture of pictures of common items and labels designating common items were presented. On the memory test, participants were requested to remember whether a picture of the item had been presented or merely its label. Visual hallucination scores were associated with a liberal response bias reflecting propensity to erroneously remember pictures of the items that had in fact been presented as words. At encoding, patients with visual hallucinations differentially activated the right fusiform gyrus when processing the words they later remembered as pictures, which suggests the formation of visual mental images. On the memory test, the whole patient group activated the anterior cingulate and medial superior frontal gyrus when falsely remembering pictures. However, no differential activation was observed in patients with visual hallucinations, whereas in the healthy sample, the production of visual mental images at encoding led to greater activation of a fronto-parietal decisional network on the memory test. Visual hallucinations are associated with enhanced visual imagery and possibly with a failure of the reality-monitoring processes that enable discrimination between imagined and perceived events. Copyright © 2017 Elsevier Ltd. All rights reserved.
An Authentication Protocol for Future Sensor Networks.
Bilal, Muhammad; Kang, Shin-Gak
2017-04-28
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.
An Authentication Protocol for Future Sensor Networks
Bilal, Muhammad; Kang, Shin-Gak
2017-01-01
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols. PMID:28452937
Cleaning and disinfection of patient care items, in relation to small animals.
Weese, J Scott
2015-03-01
Patient care involves several medical and surgical items, including those that come into contact with sterile or other high-risk body sites and items that have been used on other patients. These situations create a risk for infection if items are contaminated, and the implications can range from single infections to large outbreaks. To minimize the risk, proper equipment cleaning, disinfection/sterilization, storage, and monitoring practices are required. Risks posed by different items; the required level of cleaning, disinfection, or sterilization; the methods that are available and appropriate; and how to ensure efficacy, must be considered when designing and implementing an infection control program. Copyright © 2015 Elsevier Inc. All rights reserved.
Image authentication using distributed source coding.
Lin, Yao-Chung; Varodayan, David; Girod, Bernd
2012-01-01
We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.
Wang, Wei; Wang, Chunqiu; Zhao, Min
2014-03-01
To ease the burdens on the hospitalization capacity, an emerging swallowable-capsule technology has evolved to serve as a remote gastrointestinal (GI) disease examination technique with the aid of the wireless body sensor network (WBSN). Secure multimedia transmission in such a swallowable-capsule-based WBSN faces critical challenges including energy efficiency and content quality guarantee. In this paper, we propose a joint resource allocation and stream authentication scheme to maintain the best possible video quality while ensuring security and energy efficiency in GI-WBSNs. The contribution of this research is twofold. First, we establish a unique signature-hash (S-H) diversity approach in the authentication domain to optimize video authentication robustness and the authentication bit rate overhead over a wireless channel. Based on the full exploration of S-H authentication diversity, we propose a new two-tier signature-hash (TTSH) stream authentication scheme to improve the video quality by reducing authentication dependence overhead while protecting its integrity. Second, we propose to combine this authentication scheme with a unique S-H oriented unequal resource allocation (URA) scheme to improve the energy-distortion-authentication performance of wireless video delivery in GI-WBSN. Our analysis and simulation results demonstrate that the proposed TTSH with URA scheme achieves considerable gain in both authenticated video quality and energy efficiency.
Authentic leadership: application to women leaders
Hopkins, Margaret M.; O’Neil, Deborah A.
2015-01-01
The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women. PMID:26236254
Xavier's Take on Authentic Writing: Structuring Choices for Expression and Impact
ERIC Educational Resources Information Center
Behizadeh, Nadia
2015-01-01
Because authenticity in education is a subjective judgment regarding the meaningfulness of an activity, a need exists to co-investigate with students classroom factors increasing authenticity of writing. In this case study, one 8th grade student's needs for authentic writing are explored in detail. Xavier's take on authentic writing…
Authentic leadership: application to women leaders.
Hopkins, Margaret M; O'Neil, Deborah A
2015-01-01
The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women.
Localized lossless authentication watermark (LAW)
NASA Astrophysics Data System (ADS)
Celik, Mehmet U.; Sharma, Gaurav; Tekalp, A. Murat; Saber, Eli S.
2003-06-01
A novel framework is proposed for lossless authentication watermarking of images which allows authentication and recovery of original images without any distortions. This overcomes a significant limitation of traditional authentication watermarks that irreversibly alter image data in the process of watermarking and authenticate the watermarked image rather than the original. In particular, authenticity is verified before full reconstruction of the original image, whose integrity is inferred from the reversibility of the watermarking procedure. This reduces computational requirements in situations when either the verification step fails or the zero-distortion reconstruction is not required. A particular instantiation of the framework is implemented using a hierarchical authentication scheme and the lossless generalized-LSB data embedding mechanism. The resulting algorithm, called localized lossless authentication watermark (LAW), can localize tampered regions of the image; has a low embedding distortion, which can be removed entirely if necessary; and supports public/private key authentication and recovery options. The effectiveness of the framework and the instantiation is demonstrated through examples.
Template identification technology of nuclear warheads and components
NASA Astrophysics Data System (ADS)
Liu, Su-Ping; Gong, Jian; Hao, Fan-Hua; Hu, Guang-Chun
2008-02-01
Template identification technology (TIT) is designed for the scenarios where a batch of disarmed nuclear weapons or components would be dismantled to observe a nuclear disarmament treaty. The core function played by the TIT is to make a judgment on whether the verified item belongs to a certain kind of nuclear weapons or component (NW/NC) or to which kind the verified item belongs. This paper analyses the functions played by the TIT in the process of NW/NC dismantlement, and proposes that two phases would be followed when applying the TIT: firstly to establish NW/NC templates with a sample of size n drawn from a certain kind of disarmament NW; secondly to authenticate NW/NC by means of the TIT. This paper also expatiates some terms related to the concept of the TIT and investigates on the development status of NW/NC TIT based on radiation signatures. The study concludes that the design of template structure is crucial to the establishment of an effective TIT and that starting from different research angles and aiming at the same goal of classification different template structures and corresponding template identification methods can be built up to meet specific identification requirements.
40 CFR 60.563 - Monitoring requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
... item as follows: (1) A temperature monitoring device to measure and record continuously the operating temperature to within 1 percent (relative to degrees Celsius) or ±0.5 °C (±0.9 °F), whichever is greater. (2) A flame monitoring device, such as a thermocouple, an ultraviolet sensor, an infrared beam sensor...
40 CFR 60.563 - Monitoring requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
... item as follows: (1) A temperature monitoring device to measure and record continuously the operating temperature to within 1 percent (relative to degrees Celsius) or ±0.5 °C (±0.9 °F), whichever is greater. (2) A flame monitoring device, such as a thermocouple, an ultraviolet sensor, an infrared beam sensor...
40 CFR 60.563 - Monitoring requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
... item as follows: (1) A temperature monitoring device to measure and record continuously the operating temperature to within 1 percent (relative to degrees Celsius) or ±0.5 °C (±0.9 °F), whichever is greater. (2) A flame monitoring device, such as a thermocouple, an ultraviolet sensor, an infrared beam sensor...
40 CFR 60.563 - Monitoring requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
... item as follows: (1) A temperature monitoring device to measure and record continuously the operating temperature to within 1 percent (relative to degrees Celsius) or ±0.5 °C (±0.9 °F), whichever is greater. (2) A flame monitoring device, such as a thermocouple, an ultraviolet sensor, an infrared beam sensor...
40 CFR 60.563 - Monitoring requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... item as follows: (1) A temperature monitoring device to measure and record continuously the operating temperature to within 1 percent (relative to degrees Celsius) or ±0.5 °C (±0.9 °F), whichever is greater. (2) A flame monitoring device, such as a thermocouple, an ultraviolet sensor, an infrared beam sensor...
How to Speak an Authentication Secret Securely from an Eavesdropper
NASA Astrophysics Data System (ADS)
O'Gorman, Lawrence; Brotman, Lynne; Sammon, Michael
When authenticating over the telephone or mobile headphone, the user cannot always assure that no eavesdropper hears the password or authentication secret. We describe an eavesdropper-resistant, challenge-response authentication scheme for spoken authentication where an attacker can hear the user’s voiced responses. This scheme entails the user to memorize a small number of plaintext-ciphertext pairs. At authentication, these are challenged in random order and interspersed with camouflage elements. It is shown that the response can be made to appear random so that no information on the memorized secret can be learned by eavesdroppers. We describe the method along with parameter value tradeoffs of security strength, authentication time, and memory effort. This scheme was designed for user authentication of wireless headsets used for hands-free communication by healthcare staff at a hospital.
A Lightweight Continuous Authentication Protocol for the Internet of Things.
Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-04-05
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.
Personalized professional content recommendation
Xu, Songhua
2015-10-27
A personalized content recommendation system includes a client interface configured to automatically monitor a user's information data stream transmitted on the Internet. A hybrid contextual behavioral and collaborative personal interest inference engine resident to a non-transient media generates automatic predictions about the interests of individual users of the system. A database server retains the user's personal interest profile based on a plurality of monitored information. The system also includes a server programmed to filter items in an incoming information stream with the personal interest profile and is further programmed to identify only those items of the incoming information stream that substantially match the personal interest profile.
NASA Astrophysics Data System (ADS)
Sridevi, B.; Supriya, T. S.; Rajaram, S.
2013-01-01
The current generation of wireless networks has been designed predominantly to support voice and more recently data traffic. WiMAX is currently one of the hottest technologies in wireless. The main motive of the mobile technologies is to provide seamless cost effective mobility. But this is affected by Authentication cost and handover delay since on each handoff the Mobile Station (MS) has to undergo all steps of authentication. Pre-Authentication is used to reduce the handover delay and increase the speed of the Intra-ASN Handover. Proposed Pre-Authentication method is intended to reduce the authentication delay by getting pre authenticated by central authority called Pre Authentication Authority (PAA). MS requests PAA for Pre Authentication Certificate (PAC) before performing handoff. PAA verifies the identity of MS and provides PAC to MS and also to the neighboring target Base Stations (tBSs). MS having time bound PAC can skip the authentication process when recognized by target BS during handoff. It also prevents the DOS (Denial Of Service) attack and Replay attack. It has no wastage of unnecessary key exchange of the resources. The proposed work is simulated by NS2 model and by MATLAB.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ulm, Franz-Josef
2000-03-31
OAK-B135 Monitoring the Durability Performance of Concrete in Nuclear Waste Containment. Technical Progress Report No. 3(NOTE: Part II A item 1 indicates ''PAPER'', but a report is attached electronically)
Schwartze, J; Haarbrandt, B; Fortmeier, D; Haux, R; Seidel, C
2014-01-01
Integration of electronic signatures embedded in health care processes in Germany challenges health care service and supply facilities. The suitability of the signature level of an eligible authentication procedure is confirmed for a large part of documents in clinical practice. However, the concrete design of such a procedure remains unclear. To create a summary of usable user authentication systems suitable for clinical workflows. A Systematic literature review based on nine online bibliographic databases. Search keywords included authentication, access control, information systems, information security and biometrics with terms user authentication, user identification and login in title or abstract. Searches were run between 7 and 12 September 2011. Relevant conference proceedings were searched manually in February 2013. Backward reference search of selected results was done. Only publications fully describing authentication systems used or usable were included. Algorithms or purely theoretical concepts were excluded. Three authors did selection independently. DATA EXTRACTION AND ASSESSMENT: Semi-structured extraction of system characteristics was done by the main author. Identified procedures were assessed for security and fulfillment of relevant laws and guidelines as well as for applicability. Suitability for clinical workflows was derived from the assessments using a weighted sum proposed by Bonneau. Of 7575 citations retrieved, 55 publications meet our inclusion criteria. They describe 48 different authentication systems; 39 were biometric and nine graphical password systems. Assessment of authentication systems showed high error rates above European CENELEC standards and a lack of applicability of biometric systems. Graphical passwords did not add overall value compared to conventional passwords. Continuous authentication can add an additional layer of safety. Only few systems are suitable partially or entirely for use in clinical processes. Suitability strongly depends on national or institutional requirements. Four authentication systems seem to fulfill requirements of authentication procedures for clinical workflows. Research is needed in the area of continuous authentication with biometric methods. A proper authentication system should combine all factors of authentication implementing and connecting secure individual measures.
Enhancing self-report assessment of PTSD: development of an item bank.
Del Vecchio, Nicole; Elwy, A Rani; Smith, Eric; Bottonari, Kathryn A; Eisen, Susan V
2011-04-01
The authors report results of work to enhance self-report posttraumatic stress disorder (PTSD) assessment by developing an item bank for use in a computer-adapted test. Computer-adapted tests have great potential to decrease the burden of PTSD assessment and outcomes monitoring. The authors conducted a systematic literature review of PTSD instruments, created a database of items, performed qualitative review and readability analysis, and conducted cognitive interviews with veterans diagnosed with PTSD. The systematic review yielded 480 studies in which 41 PTSD instruments comprising 993 items met inclusion criteria. The final PTSD item bank includes 104 items representing each of the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition (DSM-IV; American Psychiatric Association [APA], 1994), PTSD symptom clusters (reexperiencing, avoidance, and hyperarousal), and 3 additional subdomains (depersonalization, guilt, and sexual problems) that expanded the assessment item pool. Copyright © 2011 International Society for Traumatic Stress Studies.
Authentic leadership: a new theory for nursing or back to basics?
Wong, Carol; Cummings, Greta
2009-01-01
Authentic leadership is an emerging theoretical model purported to focus on the root component of effective leadership. The purpose of this paper is to describe the relevance of authentic leadership to the advancement of nursing leadership practice and research and address the question of whether this is a new theory for leadership or an old one in new packaging. The paper outlines the origins and key elements of the model, assesses the theoretical, conceptual and measurement issues associated with authentic leadership and compares it with other leadership theories frequently reported in the nursing literature. The emerging authentic leadership theory holds promise for explaining the underlying processes by which authentic leaders and followers influence work outcomes and organizational performance. Construct validity of authentic leadership has preliminary documentation and a few studies have shown positive relationships between authenticity and trust. Furthermore, the clarity of the authenticity construct and comprehensiveness of the overall theoretical framework provide a fruitful base for future research examining the relationship between authentic leadership and the creation of healthier work environments. A clear focus on the relational aspects of leadership, the foundational moral/ethical component, a potential linkage of positive psychological capital to work engagement and the emphasis on leader and follower development in the authentic leadership framework are closely aligned to current and future nursing leadership practice and research priorities for the creation of sustainable changes in nursing work environments.
Drolet, Matthis; Schubotz, Ricarda I; Fischer, Julia
2013-06-01
Context has been found to have a profound effect on the recognition of social stimuli and correlated brain activation. The present study was designed to determine whether knowledge about emotional authenticity influences emotion recognition expressed through speech intonation. Participants classified emotionally expressive speech in an fMRI experimental design as sad, happy, angry, or fearful. For some trials, stimuli were cued as either authentic or play-acted in order to manipulate participant top-down belief about authenticity, and these labels were presented both congruently and incongruently to the emotional authenticity of the stimulus. Contrasting authentic versus play-acted stimuli during uncued trials indicated that play-acted stimuli spontaneously up-regulate activity in the auditory cortex and regions associated with emotional speech processing. In addition, a clear interaction effect of cue and stimulus authenticity showed up-regulation in the posterior superior temporal sulcus and the anterior cingulate cortex, indicating that cueing had an impact on the perception of authenticity. In particular, when a cue indicating an authentic stimulus was followed by a play-acted stimulus, additional activation occurred in the temporoparietal junction, probably pointing to increased load on perspective taking in such trials. While actual authenticity has a significant impact on brain activation, individual belief about stimulus authenticity can additionally modulate the brain response to differences in emotionally expressive speech.
Automated monitoring of medical protocols: a secure and distributed architecture.
Alsinet, T; Ansótegui, C; Béjar, R; Fernández, C; Manyà, F
2003-03-01
The control of the right application of medical protocols is a key issue in hospital environments. For the automated monitoring of medical protocols, we need a domain-independent language for their representation and a fully, or semi, autonomous system that understands the protocols and supervises their application. In this paper we describe a specification language and a multi-agent system architecture for monitoring medical protocols. We model medical services in hospital environments as specialized domain agents and interpret a medical protocol as a negotiation process between agents. A medical service can be involved in multiple medical protocols, and so specialized domain agents are independent of negotiation processes and autonomous system agents perform monitoring tasks. We present the detailed architecture of the system agents and of an important domain agent, the database broker agent, that is responsible of obtaining relevant information about the clinical history of patients. We also describe how we tackle the problems of privacy, integrity and authentication during the process of exchanging information between agents.
Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.
He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk
2014-10-01
The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.
Optical authentication based on moiré effect of nonlinear gratings in phase space
NASA Astrophysics Data System (ADS)
Liao, Meihua; He, Wenqi; Wu, Jiachen; Lu, Dajiang; Liu, Xiaoli; Peng, Xiang
2015-12-01
An optical authentication scheme based on the moiré effect of nonlinear gratings in phase space is proposed. According to the phase function relationship of the moiré effect in phase space, an arbitrary authentication image can be encoded into two nonlinear gratings which serve as the authentication lock (AL) and the authentication key (AK). The AL is stored in the authentication system while the AK is assigned to the authorized user. The authentication procedure can be performed using an optoelectronic approach, while the design process is accomplished by a digital approach. Furthermore, this optical authentication scheme can be extended for multiple users with different security levels. The proposed scheme can not only verify the legality of a user identity, but can also discriminate and control the security levels of legal users. Theoretical analysis and simulation experiments are provided to verify the feasibility and effectiveness of the proposed scheme.
Vein matching using artificial neural network in vein authentication systems
NASA Astrophysics Data System (ADS)
Noori Hoshyar, Azadeh; Sulaiman, Riza
2011-10-01
Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.
48 CFR 52.212-3 - Offeror Representations and Certifications-Commercial Items.
Code of Federal Regulations, 2012 CFR
2012-10-01
...— (i) To restrict the free flow of unbiased information in Iran; or (ii) To disrupt, monitor, or... End Products: Line Item No.: Country of Origin: (List as necessary) (3) The Government will evaluate... will evaluate offers in accordance with the policies and procedures of FAR Part 25. (2) Buy American...
46 CFR 162.050-5 - Contents of application.
Code of Federal Regulations, 2014 CFR
2014-10-01
... control procedures, in-process and final inspections and tests followed in manufacturing the item, and..., and maintenance of the item. (7) For each monitor and bilge alarm and each control on a separator, the vibration test report described in § 162.050-37. (8) For each oil content meter, a statement of whether it...
46 CFR 162.050-5 - Contents of application.
Code of Federal Regulations, 2011 CFR
2011-10-01
... control procedures, in-process and final inspections and tests followed in manufacturing the item, and..., and maintenance of the item. (7) For each monitor and bilge alarm and each control on a separator, the vibration test report described in § 162.050-37. (8) For each oil content meter, a statement of whether it...
46 CFR 162.050-5 - Contents of application.
Code of Federal Regulations, 2013 CFR
2013-10-01
... control procedures, in-process and final inspections and tests followed in manufacturing the item, and..., and maintenance of the item. (7) For each monitor and bilge alarm and each control on a separator, the vibration test report described in § 162.050-37. (8) For each oil content meter, a statement of whether it...
Huff, Mark J; Davis, Sara D; Meade, Michelle L
2013-08-01
In three experiments, participants studied photographs of common household scenes. Following study, participants completed a category-cued recall test without feedback (Exps. 1 and 3), a category-cued recall test with feedback (Exp. 2), or a filler task (no-test condition). Participants then viewed recall tests from fictitious previous participants that contained erroneous items presented either one or four times, and then completed final recall and source recognition tests. The participants in all conditions reported incorrect items during final testing (a social contagion effect), and across experiments, initial testing had no impact on false recall of erroneous items. However, on the final source-monitoring recognition test, initial testing had a protective effect against false source recognition: Participants who were initially tested with and without feedback on category-cued initial tests attributed fewer incorrect items to the original event on the final source-monitoring recognition test than did participants who were not initially tested. These data demonstrate that initial testing may protect individuals' memories from erroneous suggestions.
Kerberos authentication: The security answer for unsecured networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Engert, D.E.
1995-06-01
Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.
SSO - Single-Sign-On Profile: Authentication Mechanisms Version 2.0
NASA Astrophysics Data System (ADS)
Taffoni, Giuliano; Schaaf, André; Rixon, Guy; Major, Brian; Taffoni, Giuliano
2017-05-01
Approved client-server authentication mechanisms are described for the IVOA single-sign-on profile: No Authentication; HTTP Basic Authentication; TLS with passwords; TLS with client certificates; Cookies; Open Authentication; Security Assertion Markup Language; OpenID. Normative rules are given for the implementation of these mechanisms, mainly by reference to pre-existing standards. The Authorization mechanisms are out of the scope of this document.
A Lightweight Continuous Authentication Protocol for the Internet of Things
Chuang, Yo-Hsuan; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-01-01
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments. PMID:29621168
Comparison of Alternate and Original Items on the Montreal Cognitive Assessment.
Lebedeva, Elena; Huang, Mei; Koski, Lisa
2016-03-01
The Montreal Cognitive Assessment (MoCA) is a screening tool for mild cognitive impairment (MCI) in elderly individuals. We hypothesized that measurement error when using the new alternate MoCA versions to monitor change over time could be related to the use of items that are not of comparable difficulty to their corresponding originals of similar content. The objective of this study was to compare the difficulty of the alternate MoCA items to the original ones. Five selected items from alternate versions of the MoCA were included with items from the original MoCA administered adaptively to geriatric outpatients (N = 78). Rasch analysis was used to estimate the difficulty level of the items. None of the five items from the alternate versions matched the difficulty level of their corresponding original items. This study demonstrates the potential benefits of a Rasch analysis-based approach for selecting items during the process of development of parallel forms. The results suggest that better match of the items from different MoCA forms by their difficulty would result in higher sensitivity to changes in cognitive function over time.
4. Main Control Switchboard (south end rear), view to the ...
4. Main Control Switchboard (south end rear), view to the north, with item 2 (the load frequency control panel) visible in right foreground, through item 7 (generator Unit 4 control panel) obliquely visible on left side of the photograph. Part of item 1 (the synchronization monitor) is visible behind the phone on right side of photograph. - Washington Water Power Clark Fork River Noxon Rapids Hydroelectric Development, Powerhouse, South bank of Clark Fork River at Noxon Rapids, Noxon, Sanders County, MT
22 CFR 92.40 - Authentication of foreign extradition papers.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Authentication of foreign extradition papers... RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign extradition papers are authenticated by chiefs of mission. ...
A privacy-strengthened scheme for E-Healthcare monitoring system.
Huang, Chanying; Lee, Hwaseong; Lee, Dong Hoon
2012-10-01
Recent Advances in Wireless Body Area Networks (WBANs) offer unprecedented opportunities and challenges to the development of pervasive electronic healthcare (E-Healthcare) monitoring system. In E-Healthcare system, the processed data are patients' sensitive health data that are directly related to individuals' privacy. For this reason, privacy concern is of great importance for E-Healthcare system. Current existing systems for E-Healthcare services, however, have not yet provided sufficient privacy protection for patients. In order to offer adequate security and privacy, in this paper, we propose a privacy-enhanced scheme for patients' physical condition monitoring, which achieves dual effects: (1) providing unlinkability of health records and individual identity, and (2) supporting anonymous authentication and authorized data access. We also conduct a simulation experiment to evaluate the performance of the proposed scheme. The experimental results demonstrate that the proposed scheme achieves better performance in terms of computational complexity, communication overheads and querying efficiency compared with previous results.
Secure and Efficient Reactive Video Surveillance for Patient Monitoring.
Braeken, An; Porambage, Pawani; Gurtov, Andrei; Ylianttila, Mika
2016-01-02
Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber of patient monitoring applications. In this paper, we propose a symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body. Only authenticated patients are able to activate the video cameras, whereas the patient and authorized people can consult the video data. User and location privacy are at each moment guaranteed for the patient. A tradeoff between security and quality of service is defined in order to ensure that the surveillance system gets activated even in emergency situations. In addition, the solution includes resistance against tampering with the device on the patient's side.
Secure and Efficient Reactive Video Surveillance for Patient Monitoring
Braeken, An; Porambage, Pawani; Gurtov, Andrei; Ylianttila, Mika
2016-01-01
Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber of patient monitoring applications. In this paper, we propose a symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body. Only authenticated patients are able to activate the video cameras, whereas the patient and authorized people can consult the video data. User and location privacy are at each moment guaranteed for the patient. A tradeoff between security and quality of service is defined in order to ensure that the surveillance system gets activated even in emergency situations. In addition, the solution includes resistance against tampering with the device on the patient’s side. PMID:26729130
NASA Astrophysics Data System (ADS)
Gharami, Snigdha; Dinakaran, M.
2017-11-01
We see challenges in authenticating each aspect of electronic usage, starting from transaction to social interaction the authenticity and availability of correct information is guided in various ways. Authentication and authorization follow one another; a process of authentication is calculated on multiple layers of steps. In this paper we discuss various possibilities of modifying and using ways to deal with authentication and authorization mechanism. Idea is to work through authentication with mathematical calculations. We will go through various scenarios and find out the system of information that fits best at the moment of need. We will take account of new approaches of authentication and authorization while working on mathematical paradigm of information. The paper also takes an eye on quantum cryptography and discusses on how it could help one in the present scenario. This paper is divided into sections discussing on various paradigm of authentication and how one can achieve it in secure way, this paper is part of research work where analysis of various constraints are to be followed in the extended research work.
Phone, Email and Video Interactions with Characters in an Epidemiology Game: Towards Authenticity
NASA Astrophysics Data System (ADS)
Ney, Muriel; Gonçalves, Celso; Blacheff, Nicolas; Schwartz, Claudine; Bosson, Jean-Luc
A key concern in game-based learning is the level of authenticity that the game requires in order to have an accurate match of what the learners can expect in the real world with what they need to learn. In this paper, we show how four challenges to the designer of authentic games have been addressed in a game for an undergraduate course in a medical school. We focus in particular on the system of interaction with different characters of the game, namely, the patients and a number of professionals. Students use their personal phone and email application, as well as various web sites. First, we analyze the authenticity of the game through four attributes, authenticity of the character, of the content of the feedback, of the mode and channel of communication and of the constraints. Second, the perceived authenticity (by students) is analyzed. The later is threefold and defined by an external authenticity (perceived likeness with a real life reference), an internal authenticity (perceived internal coherence of the proposed situations) and a didactical authenticity (perceived relevance with respect to learning goals).
Partnering with patients using social media to develop a hypertension management instrument.
Kear, Tamara; Harrington, Magdalena; Bhattacharya, Anand
2015-09-01
Hypertension is a lifelong condition; thus, long-term adherence to lifestyle modification, self-monitoring, and medication regimens remains a challenge for patients. The aim of this study was to develop a patient-reported hypertension instrument that measured attitudes, lifestyle behaviors, adherence, and barriers to hypertension management using patient-reported outcome data. The study was conducted using the Open Research Exchange software platform created by PatientsLikeMe. A total of 360 participants completed the psychometric phase of the study; incomplete responses were obtained from 147 patients, and 150 patients opted out. Principal component analysis with orthogonal (varimax) rotation was executed on a data set with all completed responses (N = 249) and applied to 43 items. Based on the review of the factor solution, eigenvalues, and item loadings, 16 items were eliminated and model with 29 items was tested. The process was repeated two more times until final model with 14 items was established. In interpreting the rotated factor pattern, an item was said to load on any given component if the factor loading was ≥0.40 for that component and was <0.40 for the other. In addition to the newly generated instrument, demographic and self-reported clinical characteristics of the study participants such as the type of prescribed hypertension medications, frequency of blood pressure monitoring, and comorbid conditions were examined. The Open Research Exchange platform allowed for ongoing input from patients through each stage of the 14-item instrument development. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.
Tran, Le-Thuy T.; Brewster, Philip J.; Chidambaram, Valliammai; Hurdle, John F.
2017-01-01
This study presents a method laying the groundwork for systematically monitoring food quality and the healthfulness of consumers’ point-of-sale grocery purchases. The method automates the process of identifying United States Department of Agriculture (USDA) Food Patterns Equivalent Database (FPED) components of grocery food items. The input to the process is the compact abbreviated descriptions of food items that are similar to those appearing on the point-of-sale sales receipts of most food retailers. The FPED components of grocery food items are identified using Natural Language Processing techniques combined with a collection of food concept maps and relationships that are manually built using the USDA Food and Nutrient Database for Dietary Studies, the USDA National Nutrient Database for Standard Reference, the What We Eat In America food categories, and the hierarchical organization of food items used by many grocery stores. We have established the construct validity of the method using data from the National Health and Nutrition Examination Survey, but further evaluation of validity and reliability will require a large-scale reference standard with known grocery food quality measures. Here we evaluate the method’s utility in identifying the FPED components of grocery food items available in a large sample of retail grocery sales data (~190 million transaction records). PMID:28475153
Tran, Le-Thuy T; Brewster, Philip J; Chidambaram, Valliammai; Hurdle, John F
2017-05-05
This study presents a method laying the groundwork for systematically monitoring food quality and the healthfulness of consumers' point-of-sale grocery purchases. The method automates the process of identifying United States Department of Agriculture (USDA) Food Patterns Equivalent Database (FPED) components of grocery food items. The input to the process is the compact abbreviated descriptions of food items that are similar to those appearing on the point-of-sale sales receipts of most food retailers. The FPED components of grocery food items are identified using Natural Language Processing techniques combined with a collection of food concept maps and relationships that are manually built using the USDA Food and Nutrient Database for Dietary Studies, the USDA National Nutrient Database for Standard Reference, the What We Eat In America food categories, and the hierarchical organization of food items used by many grocery stores. We have established the construct validity of the method using data from the National Health and Nutrition Examination Survey, but further evaluation of validity and reliability will require a large-scale reference standard with known grocery food quality measures. Here we evaluate the method's utility in identifying the FPED components of grocery food items available in a large sample of retail grocery sales data (~190 million transaction records).
Medicare Benefits Schedule data to monitor influenza immunisation in Australian adults.
Dyda, Amalie; MacIntyre, C Raina; Banks, Emily; Kaldor, John; Newall, Anthony T; McIntyre, Peter; Liu, Bette
2015-09-30
In Australia, adult immunisation coverage is primarily monitored via periodic telephone surveys that rely on self-reported immunisation status. All Australian residents are eligible for Medicare, so we examined the feasibility of using immunisation-specific Medicare Benefits Schedule (MBS) item numbers to monitor and estimate adult influenza immunisation coverage. Baseline questionnaire data from 267 129 participants from the 45 and Up Study, a prospective cohort study, were linked to data containing information on individual MBS immunisation-specific items from 2006 to 2011. Temporal trends in recording of these items were examined. Self-reported influenza immunisation status obtained from a follow-up questionnaire from 27 036 participants was then compared with the MBS immunisation records. From 2006 to 2011, the pattern of MBS immunisation claims was consistent with self-reported influenza immunisation trends, with annual peaks occurring from March to May. There was fair agreement between MBS immunisation records and self-reported influenza immunisation: 48.8% (95% CI 47.1, 50.4) of participants who self-reported influenza immunisation had a matching MBS record, and 79.6% (95% CI 78.8, 80.4) who reported never having influenza immunisation had no matching MBS record. However, compared with self-reported influenza vaccination for people aged ≥65 years from the 2009 Adult Immunisation Telephone Survey (74.6%), the proportion of participants aged >65 years with an MBS immunisation record was low, with an annual median of 39.3% (range 28.3%-62.1%). MBS immunisation item data are readily available and may be useful to monitor trends in adult influenza immunisation, but they are likely to substantially underestimate coverage. Other approaches, such as capture of general practitioner-delivered influenza vaccine doses or a whole-of-life immunisation register, are needed to comprehensively monitor and estimate adult immunisation coverage for influenza and other recommended adult vaccines.
A Smartphone-Based Driver Safety Monitoring System Using Data Fusion
Lee, Boon-Giin; Chung, Wan-Young
2012-01-01
This paper proposes a method for monitoring driver safety levels using a data fusion approach based on several discrete data types: eye features, bio-signal variation, in-vehicle temperature, and vehicle speed. The driver safety monitoring system was developed in practice in the form of an application for an Android-based smartphone device, where measuring safety-related data requires no extra monetary expenditure or equipment. Moreover, the system provides high resolution and flexibility. The safety monitoring process involves the fusion of attributes gathered from different sensors, including video, electrocardiography, photoplethysmography, temperature, and a three-axis accelerometer, that are assigned as input variables to an inference analysis framework. A Fuzzy Bayesian framework is designed to indicate the driver’s capability level and is updated continuously in real-time. The sensory data are transmitted via Bluetooth communication to the smartphone device. A fake incoming call warning service alerts the driver if his or her safety level is suspiciously compromised. Realistic testing of the system demonstrates the practical benefits of multiple features and their fusion in providing a more authentic and effective driver safety monitoring. PMID:23247416
The Cambridge Behavioural Inventory revised.
Wear, Helen J; Wedderburn, Catherine J; Mioshi, Eneida; Williams-Gray, Caroline H; Mason, Sarah L; Barker, Roger A; Hodges, John R
2008-01-01
Neurobehavioural and psychiatric symptoms are common in a range of neurodegenerative disorders with distinct profiles which are helpful in the diagnosis and monitoring of these disorders. The Cambridge Behavioural Inventory (CBI) has been shown to distinguish frontotemporal dementia (FTD), Alzheimer's disease (AD), Huntington's disease (HD) and Parkinson's disease (PD), but it is lengthy. To develop a shorter version of the 81 item CBI. CBI data from 450 participants with behavioural variant frontotemporal dementia (bv-FTD) (64), AD (96), PD (215) and HD (75) were analysed using Principal Components Analysis and measures of internal consistency (Cronbach alpha). A reduced 45-item questionnaire was developed. The instrument identified distinct behavioural profiles and performed as well as the original version. A shorter (45 item) version of the CBI is capable of differentiating bv-FTD and AD from PD and HD. It may be useful in delineating the type and extent of problems in these disorders as well as monitoring therapeutic interventions.
22 CFR 131.1 - Certification of documents.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Foreign Relations DEPARTMENT OF STATE MISCELLANEOUS CERTIFICATES OF AUTHENTICATION § 131.1 Certification of documents. The Authentication Officer, Acting Authentication Officer, or any Assistant Authentication Officer designated by either of the former officers may, and is hereby authorized to, sign and...
Study on a Biometric Authentication Model based on ECG using a Fuzzy Neural Network
NASA Astrophysics Data System (ADS)
Kim, Ho J.; Lim, Joon S.
2018-03-01
Traditional authentication methods use numbers or graphic passwords and thus involve the risk of loss or theft. Various studies are underway regarding biometric authentication because it uses the unique biometric data of a human being. Biometric authentication technology using ECG from biometric data involves signals that record electrical stimuli from the heart. It is difficult to manipulate and is advantageous in that it enables unrestrained measurements from sensors that are attached to the skin. This study is on biometric authentication methods using the neural network with weighted fuzzy membership functions (NEWFM). In the biometric authentication process, normalization and the ensemble average is applied during preprocessing, characteristics are extracted using Haar-wavelets, and a registration process called “training” is performed in the fuzzy neural network. In the experiment, biometric authentication was performed on 73 subjects in the Physionet Database. 10-40 ECG waveforms were tested for use in the registration process, and 15 ECG waveforms were deemed the appropriate number for registering ECG waveforms. 1 ECG waveforms were used during the authentication stage to conduct the biometric authentication test. Upon testing the proposed biometric authentication method based on 73 subjects from the Physionet Database, the TAR was 98.32% and FAR was 5.84%.
ERIC Educational Resources Information Center
Soderstrom, Nicholas C.; McCabe, David P.
2011-01-01
Two experiments are reported examining how value and relatedness interact to influence metacognitive monitoring and control processes. Participants studied unrelated and related word pairs, each accompanied by point values denoting how important the items were to remember. These values were presented either before or after each pair in a…
Code of Federal Regulations, 2013 CFR
2013-07-01
... recordings of data as specified in § 157.12d(h)(2). Oil discharge monitoring and control system or monitoring... RULES FOR THE PROTECTION OF THE MARINE ENVIRONMENT RELATING TO TANK VESSELS CARRYING OIL IN BULK Design... means a unit in a monitoring system composed of the items specified in § 157.12d(a)(4)(viii). Control...
Code of Federal Regulations, 2012 CFR
2012-07-01
... recordings of data as specified in § 157.12d(h)(2). Oil discharge monitoring and control system or monitoring... RULES FOR THE PROTECTION OF THE MARINE ENVIRONMENT RELATING TO TANK VESSELS CARRYING OIL IN BULK Design... means a unit in a monitoring system composed of the items specified in § 157.12d(a)(4)(viii). Control...
Code of Federal Regulations, 2011 CFR
2011-07-01
... recordings of data as specified in § 157.12d(h)(2). Oil discharge monitoring and control system or monitoring... RULES FOR THE PROTECTION OF THE MARINE ENVIRONMENT RELATING TO TANK VESSELS CARRYING OIL IN BULK Design... means a unit in a monitoring system composed of the items specified in § 157.12d(a)(4)(viii). Control...
Code of Federal Regulations, 2010 CFR
2010-07-01
... recordings of data as specified in § 157.12d(h)(2). Oil discharge monitoring and control system or monitoring... RULES FOR THE PROTECTION OF THE MARINE ENVIRONMENT RELATING TO TANK VESSELS CARRYING OIL IN BULK Design... means a unit in a monitoring system composed of the items specified in § 157.12d(a)(4)(viii). Control...
Code of Federal Regulations, 2014 CFR
2014-07-01
... recordings of data as specified in § 157.12d(h)(2). Oil discharge monitoring and control system or monitoring... RULES FOR THE PROTECTION OF THE MARINE ENVIRONMENT RELATING TO TANK VESSELS CARRYING OIL IN BULK Design... means a unit in a monitoring system composed of the items specified in § 157.12d(a)(4)(viii). Control...
Osmosis and Diffusion Conceptual Assessment
Fisher, Kathleen M.; Williams, Kathy S.; Lineback, Jennifer Evarts
2011-01-01
Biology student mastery regarding the mechanisms of diffusion and osmosis is difficult to achieve. To monitor comprehension of these processes among students at a large public university, we developed and validated an 18-item Osmosis and Diffusion Conceptual Assessment (ODCA). This assessment includes two-tiered items, some adopted or modified from the previously published Diffusion and Osmosis Diagnostic Test (DODT) and some newly developed items. The ODCA, a validated instrument containing fewer items than the DODT and emphasizing different content areas within the realm of osmosis and diffusion, better aligns with our curriculum. Creation of the ODCA involved removal of six DODT item pairs, modification of another six DODT item pairs, and development of three new item pairs addressing basic osmosis and diffusion concepts. Responses to ODCA items testing the same concepts as the DODT were remarkably similar to responses to the DODT collected from students 15 yr earlier, suggesting that student mastery regarding the mechanisms of diffusion and osmosis remains elusive. PMID:22135375
van Bergen, Addi P L; Hoff, Stella J M; Schreurs, Hanneke; van Loon, Annelies; van Hemert, Albert M
2017-03-14
Social exclusion (SE) refers to the inability of certain groups or individuals to fully participate in society. SE is associated with socioeconomic inequalities in health, and its measurement in routine public health monitoring is considered key to designing effective health policies. In an earlier retrospective analysis we demonstrated that in all four major Dutch cities, SE could largely be measured with existing local public health monitoring data. The current prospective study is aimed at constructing and validating an extended national measure for SE that optimally employs available items. In 2012, a stratified general population sample of 258,928 Dutch adults completed a version of the Netherlands Public Health Monitor (PHM) questionnaire in which 9 items were added covering aspects of SE that were found to be missing in our previous research. Items were derived from the SCP social exclusion index, a well-constructed 15-item instrument developed by the Netherlands Institute for Social Research (SCP). The dataset was randomly divided into a development sample (N =129,464) and a validation sample (N = 129,464). Canonical correlation analysis was conducted in the development sample. The psychometric properties were studied and compared with those of the original SCP index. All analyses were then replicated in the validation sample. The analysis yielded a four dimensional index, the Social Exclusion Index for Health Surveys (SEI-HS), containing 8 SCP items and 9 PHM items. The four dimensions: "lack of social participation", "material deprivation", "lack of normative integration" and "inadequate access to basic social rights", were each measured with 3 to 6 items. The SEI-HS showed adequate internal consistency for both the general index and for two of four dimension scales. The internal structure and construct validity of the SEI-HS were satisfactory and similar to the original SCP index. Replication of the SEI-HS in the validation sample confirmed its generalisability. This study demonstrates that the SEI-HS offers epidemiologists and public health researchers a uniform, reliable, valid and efficient means of assessing social exclusion and its underlying dimensions. The study also provides valuable insights in how to develop embedded measures for public health surveillance.
Access control for electronic patient records.
Glagola, M J
1998-01-01
The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.
Bland, Andrew J; Topping, Annie; Tobbell, Jane
2014-07-01
High-fidelity patient simulation is a method of education increasingly utilised by educators of nursing to provide authentic learning experiences. Fidelity and authenticity, however, are not conceptually equivalent. Whilst fidelity is important when striving to replicate a life experience such as clinical practice, authenticity can be produced with low fidelity. A challenge for educators of undergraduate nursing is to ensure authentic representation of the clinical situation which is a core component for potential success. What is less clear is the relationship between fidelity and authenticity in the context of simulation based learning. Authenticity does not automatically follow fidelity and as a result, educators of nursing cannot assume that embracing the latest technology-based educational tools will in isolation provide a learning environment perceived authentic by the learner. As nursing education programmes increasingly adopt simulators that offer the possibility of representing authentic real world situations, there is an urgency to better articulate and understand the terms fidelity and authenticity. Without such understanding there is a real danger that simulation as a teaching and learning resource in nurse education will never reach its potential and be misunderstood, creating a potential barrier to learning. This paper examines current literature to promote discussion within nurse education, concluding that authenticity in the context of simulation-based learning is complex, relying on far more than engineered fidelity. Copyright © 2014 Elsevier Ltd. All rights reserved.
Location-assured, multifactor authentication on smartphones via LTE communication
NASA Astrophysics Data System (ADS)
Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham
2013-05-01
With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using Smartphones. Tight combination of geographical location with classic authentication factors like PINs/Biometrics in a real-time, remote verification scheme over the LTE layer connection assures the authenticator about the client itself (via PIN/biometric) as well as the client's current location, thus defines the important aspects of "who", "when", and "where" of the authentication attempt without eaves dropping or man on the middle attacks. To securely integrate location as an authentication factor into the remote authentication scheme, client's location must be verified independently, i.e. the authenticator should not solely rely on the location determined on and reported by the client's Smartphone. The latest wireless data communication technology for mobile phones (4G LTE, Long-Term Evolution), recently being rolled out in various networks, can be employed to enhance this location-factor requirement of independent location verification. LTE's Control Plane LBS provisions, when integrated with user-based authentication and independent source of localisation factors ensures secure efficient, continuous location tracking of the Smartphone. This feature can be performed during normal operation of the LTE-based communication between client and network operator resulting in the authenticator being able to verify the client's claimed location more securely and accurately. Trials and experiments show that such algorithm implementation is viable for nowadays Smartphone-based banking via LTE communication.
22 CFR 61.3 - Certification and authentication criteria.
Code of Federal Regulations, 2014 CFR
2014-04-01
... AUDIO-VISUAL MATERIALS § 61.3 Certification and authentication criteria. (a) The Department shall certify or authenticate audio-visual materials submitted for review as educational, scientific and... of the material. (b) The Department will not certify or authenticate any audio-visual material...
22 CFR 61.3 - Certification and authentication criteria.
Code of Federal Regulations, 2013 CFR
2013-04-01
... AUDIO-VISUAL MATERIALS § 61.3 Certification and authentication criteria. (a) The Department shall certify or authenticate audio-visual materials submitted for review as educational, scientific and... of the material. (b) The Department will not certify or authenticate any audio-visual material...
22 CFR 61.3 - Certification and authentication criteria.
Code of Federal Regulations, 2012 CFR
2012-04-01
... AUDIO-VISUAL MATERIALS § 61.3 Certification and authentication criteria. (a) The Department shall certify or authenticate audio-visual materials submitted for review as educational, scientific and... of the material. (b) The Department will not certify or authenticate any audio-visual material...
Authentication, privacy, security can exploit brainwave by biomarker
NASA Astrophysics Data System (ADS)
Jenkins, Jeffrey; Sweet, Charles; Sweet, James; Noel, Steven; Szu, Harold
2014-05-01
We seek to augment the current Common Access Control (CAC) card and Personal Identification Number (PIN) verification systems with an additional layer of classified access biometrics. Among proven devices such as fingerprint readers and cameras that can sense the human eye's iris pattern, we introduced a number of users to a sequence of 'grandmother images', or emotionally evoked stimuli response images from other users, as well as one of their own, for the purpose of authentication. We performed testing and evaluation of the Authenticity Privacy and Security (APS) brainwave biometrics, similar to the internal organ of the human eye's iris which cannot easily be altered. `Aha' recognition through stimulus-response habituation can serve as a biomarker, similar to keystroke dynamics analysis for inter and intra key fluctuation time of a memorized PIN number (FIST). Using a non-tethered Electroencephalogram (EEG) wireless smartphone/pc monitor interface, we explore the appropriate stimuli-response biomarker present in DTAB low frequency group waves. Prior to login, the user is shown a series of images on a computer display. They have been primed to click their mouse when the image is presented. DTAB waves are collected with a wireless EEG and are sent via Smartphone to a cloud based processing infrastructure. There, we measure fluctuations in DTAB waves from a wireless, non-tethered, single node EEG device between the Personal Graphic Image Number (PGIN) stimulus image and the response time from an individual's mental performance baseline. Towards that goal, we describe an infrastructure that supports distributed verification for web-based EEG authentication. The performance of machine learning on the relative Power Spectral Density EEG data may uncover features required for subsequent access to web or media content. Our approach provides a scalable framework wrapped into a robust Neuro-Informatics toolkit, viable for use in the Biomedical and mental health communities, as well as numerous consumer applications.
2013-01-01
Patient-reported outcomes (PROs) play an increasingly important role in clinical practice and research. Modern psychometric methods such as item response theory (IRT) enable the creation of item banks that support fixed-length forms as well as computerized adaptive testing (CAT), often resulting in improved measurement precision and responsiveness. Here we describe and discuss the case for developing an international core set of PROs building from the US PROMIS® network. PROMIS is a U.S.-based cooperative group of research sites and centers of excellence convened to develop and standardize PRO measures across studies and settings. If extended to a global collaboration, PROMIS has the potential to transform PRO measurement by creating a shared, unifying terminology and metric for reporting of common symptoms and functional life domains. Extending a common set of standardized PRO measures to the international community offers great potential for improving patient-centered research, clinical trials reporting, population monitoring, and health care worldwide. Benefits of such standardization include the possibility of: international syntheses (such as meta-analyses) of research findings; international population monitoring and policy development; health services administrators and planners access to relevant information on the populations they serve; better assessment and monitoring of patients by providers; and improved shared decision making. The goal of the current PROMIS International initiative is to ensure that item banks are translated and culturally adapted for use in adults and children in as many countries as possible. The process includes 3 key steps: translation/cultural adaptation, calibration, and validation. A universal translation, an approach focusing on commonalities, rather than differences across versions developed in regions or countries speaking the same language, is proposed to ensure conceptual equivalence for all items. International item calibration using nationally representative samples of adults and children within countries is essential to demonstrate that all items possess expected strong measurement properties. Finally, it is important to demonstrate that the PROMIS measures are valid, reliable and responsive to change when used in an international context. IRT item banking will allow for tailoring within countries and facilitate growth and evolution of PROs through contributions from the international measurement community. A number of opportunities and challenges of international development of PROs item banks are discussed. PMID:24359143
Alonso, Jordi; Bartlett, Susan J; Rose, Matthias; Aaronson, Neil K; Chaplin, John E; Efficace, Fabio; Leplège, Alain; Lu, Aiping; Tulsky, David S; Raat, Hein; Ravens-Sieberer, Ulrike; Revicki, Dennis; Terwee, Caroline B; Valderas, Jose M; Cella, David; Forrest, Christopher B
2013-12-20
Patient-reported outcomes (PROs) play an increasingly important role in clinical practice and research. Modern psychometric methods such as item response theory (IRT) enable the creation of item banks that support fixed-length forms as well as computerized adaptive testing (CAT), often resulting in improved measurement precision and responsiveness. Here we describe and discuss the case for developing an international core set of PROs building from the US PROMIS® network.PROMIS is a U.S.-based cooperative group of research sites and centers of excellence convened to develop and standardize PRO measures across studies and settings. If extended to a global collaboration, PROMIS has the potential to transform PRO measurement by creating a shared, unifying terminology and metric for reporting of common symptoms and functional life domains. Extending a common set of standardized PRO measures to the international community offers great potential for improving patient-centered research, clinical trials reporting, population monitoring, and health care worldwide. Benefits of such standardization include the possibility of: international syntheses (such as meta-analyses) of research findings; international population monitoring and policy development; health services administrators and planners access to relevant information on the populations they serve; better assessment and monitoring of patients by providers; and improved shared decision making.The goal of the current PROMIS International initiative is to ensure that item banks are translated and culturally adapted for use in adults and children in as many countries as possible. The process includes 3 key steps: translation/cultural adaptation, calibration, and validation. A universal translation, an approach focusing on commonalities, rather than differences across versions developed in regions or countries speaking the same language, is proposed to ensure conceptual equivalence for all items. International item calibration using nationally representative samples of adults and children within countries is essential to demonstrate that all items possess expected strong measurement properties. Finally, it is important to demonstrate that the PROMIS measures are valid, reliable and responsive to change when used in an international context.IRT item banking will allow for tailoring within countries and facilitate growth and evolution of PROs through contributions from the international measurement community. A number of opportunities and challenges of international development of PROs item banks are discussed.
Tolley, Elizabeth E; Guthrie, Kate Morrow; Zissette, Seth; Fava, Joseph L; Gill, Katherine; Louw, Cheryl E; Kotze, Philip; Reddy, Krishnaveni; MacQueen, Kathleen
2018-01-01
Low adherence in recent HIV prevention clinical trials highlights the need to better understand, measure, and support product use within clinical trials. Conventional self-reported adherence instruments within HIV prevention trials, often relying on single-item questions, have proven ineffective. While objective adherence measures are desirable, none currently exist that apply to both active and placebo arms. Scales are composed of multiple items in the form of questions or statements that, when combined, measure a more complex construct that may not be directly observable. When psychometrically validated, such measures may better assess the multiple factors contributing to adherence/non-adherence. This study aimed to develop and psychometrically evaluate tools to screen and monitor trial participants' adherence to HIV prevention products within the context of clinical trial research. Based on an extensive literature review and conceptual framework, we identified and refined 86 items assessing potential predictors of adherence and 48 items assessing adherence experience. A structured survey, including adherence items and other variables, was administered to former ASPIRE and Ring Study participants and similar non-trial participants (n = 709). We conducted exploratory factor analyses (EFA) to identify a reduced set of constructs and items that could be used at screening to predict potential adherence, and at follow-up to monitor and intervene on adherence. We examined associations with other variables to assess content and construct validity. The EFA of screener items resulted in a 6-factor solution with acceptable to very good internal reliability (α: .62-.84). Similar to our conceptual framework, factors represent trial-related commitment (Distrust of Research and Commitment to Research); alignment with trial requirements (Visit Adherence and Trial Incompatibility); Belief in Trial Benefits and Partner Disclosure. The EFA on monitoring items resulted in 4 Product-specific factors that represent Vaginal Ring Doubts, Vaginal Ring Benefits, Ring Removal, and Side Effects with good to very good internal reliability (α = .71-.82). Evidence of content and construct validity was found; relationship to social desirability bias was examined. These scales are easy and inexpensive to administer, available in several languages, and are applicable regardless of randomization. Once validated prospectively, they could (1) screen for propensity to adhere, (2) target adherence support/counselling, and (3) complement biomarker measures in determining true efficacy of the experimental product.
Managing authenticity: the paradox of great leadership.
Goffee, Rob; Jones, Gareth
2005-12-01
Leaders and followers both associate authenticity with sincerity, honesty, and integrity. It's the real thing--the attribute that uniquely defines great managers. But while the expression of a genuine self is necessary for great leadership, the concept of authenticity is often misunderstood, not least by leaders themselves. They often assume that authenticity is an innate quality--that a person is either genuine or not. In fact, the authors say, authenticity is largely defined by what other people see in you and, as such, can to a great extent be controlled by you. In this article, the authors explore the qualities of authentic leadership. To illustrate their points, they recount the experiences of some of the authentic leaders they have known and studied, including the BBC's Greg Dyke, Nestlé's Peter Brabeck-Letmathe, and Marks & Spencer's Jean Tomlin. Establishing your authenticity as a leader is a two-part challenge. You have to consistently match your words and deeds; otherwise, followers will never accept you as authentic. But it is not enough just to practice what you preach. To get people to follow you, you also have to get them to relate to you. This means presenting different faces to different audiences--a requirement that many people find hard to square with authenticity. But authenticity is not the product of manipulation. It accurately reflects aspects of the leader's inner self, so it can't be an act. Authentic leaders seem to know which personality traits they should reveal to whom, and when. Highly attuned to their environments, authentic leaders rely on an intuition born of formative, sometimes harsh experiences to understand the expectations and concerns of the people they seek to influence. They retain their distinctiveness as individuals, yet they know how to win acceptance in strong corporate and social cultures and how to use elements of those cultures as a basis for radical change.
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.
Rajeswari, S Raja; Seenivasagam, V
2016-01-01
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks
Rajeswari, S. Raja; Seenivasagam, V.
2016-01-01
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272
Emmerich, Astrid I; Rigotti, Thomas
2017-01-01
This study investigates the role of context-specific authenticity at work for work-related outcomes (intrinsic motivation, work ability) and depressivity. Furthermore reciprocal relations between work-related authenticity and healthy psychological functioning are investigated. Longitudinal data from 1,243 employees from 63 subsidiaries of a non-profit organization in the social sector were analyzed using multilevel structural equation modeling. Work-related authenticity at T1 predicted work ability and depressivity, but not intrinsic motivation at T2, about 6 months later. Work-related authenticity at T2 was predicted by intrinsic motivation and depressivity, but not by work ability at T1. We conclude that work-related authenticity and healthy psychological functioning are positively reinforcing each other. Thus, enabling employees to be authentic supposedly increases their well-being and is a pivotal opportunity for organizations to foster health and performance-related indicators like work ability and prevent negative health indicators like depressivity. At the same time, authenticity of employees can be fostered through workplace health promotion.
Kågesten, Anna E; Tunçalp, Özge; Portela, Anayda; Ali, Moazzam; Tran, Nhan; Gülmezoglu, A Metin
2017-08-03
Information about design, implementation, monitoring and evaluation is central to understand the impact of programmes within the field of sexual, reproductive, maternal, newborn, child and adolescent health (SRMNCAH). Existing reporting guidelines do not orient on reporting of contextual and implementation issues in sufficient detail. We therefore developed Programme Reporting Standards (PRS) to be used by SRMNCAH programme implementers and researchers. Building on the first step of the PRS development (a systematic review to identify reporting items), we conducted a three-round online Delphi consensus survey with experts. Consensus was defined a-priori as 80% agreement of items as essential. This was followed by a technical consultation with a group of experts to refine the items, definitions and their structuring. The revised PRS was piloted to assess its relevance to current SRMNCAH programme reports and identify key issues regarding the use of the PRS. Of the 81 participants invited to the Delphi survey, 20 responded to all three rounds. In the final round, 27 items received consensus as essential; three items were ranked as "borderline" essential; 20 items as supplementary. The items were subsequently revised, followed by a technical consultation with 29 experts to further review and refine the PRS. The feedback resulted in substantial changes to the structure and content of the PRS into 24 items across five domains: Programme overview; Programme components and implementation; Monitoring of Implementation; Evaluation and Results; and Synthesis. This version was used in a piloting exercise, where questions regarding how much information to report and how to comment on the quality of the information reported were addressed. All items were kept in the PRS following the pilot although minor changes were made to the flow and description of items. The PRS 1.0 is the result of a structured, collaborative process, including methods to incorporate input from SRMNCAH stakeholders. The World Health Organization will develop a document that explains the items in greater detail, and will also apply the PRS to on-going initiatives. We welcome continuous input from the field, while it is being used, to improve its relevance and usefulness.
Mazefsky, Carla A; Yu, Lan; White, Susan W; Siegel, Matthew; Pilkonis, Paul A
2018-06-01
Individuals with autism spectrum disorder (ASD) often present with prominent emotion dysregulation that requires treatment but can be difficult to measure. The Emotion Dysregulation Inventory (EDI) was created using methods developed by the Patient-Reported Outcomes Measurement Information System (PROMIS ® ) to capture observable indicators of poor emotion regulation. Caregivers of 1,755 youth with ASD completed 66 candidate EDI items, and the final 30 items were selected based on classical test theory and item response theory (IRT) analyses. The analyses identified two factors: (a) Reactivity, characterized by intense, rapidly escalating, sustained, and poorly regulated negative emotional reactions, and (b) Dysphoria, characterized by anhedonia, sadness, and nervousness. The final items did not show differential item functioning (DIF) based on gender, age, intellectual ability, or verbal ability. Because the final items were calibrated using IRT, even a small number of items offers high precision, minimizing respondent burden. IRT co-calibration of the EDI with related measures demonstrated its superiority in assessing the severity of emotion dysregulation with as few as seven items. Validity of the EDI was supported by expert review, its association with related constructs (e.g., anxiety and depression symptoms, aggression), higher scores in psychiatric inpatients with ASD compared to a community ASD sample, and demonstration of test-retest stability and sensitivity to change. In sum, the EDI provides an efficient and sensitive method to measure emotion dysregulation for clinical assessment, monitoring, and research in youth with ASD of any level of cognitive or verbal ability. Autism Res 2018, 11: 928-941. © 2018 International Society for Autism Research, Wiley Periodicals, Inc. This paper describes a new measure of poor emotional control called the Emotion Dysregulation Inventory (EDI). Caregivers of 1,755 youth with ASD completed candidate items, and advanced statistical techniques were applied to identify the best final items. The EDI is unique because it captures common emotional problems in ASD and is appropriate for both nonverbal and verbal youth. It is an efficient and sensitive measure for use in clinical assessments, monitoring, and research with youth with ASD. © 2018 International Society for Autism Research, Wiley Periodicals, Inc.
ERIC Educational Resources Information Center
Maddox, Bryan; Zumbo, Bruno D.; Tay-Lim, Brenda; Qu, Demin
2015-01-01
This article explores the potential for ethnographic observations to inform the analysis of test item performance. In 2010, a standardized, large-scale adult literacy assessment took place in Mongolia as part of the United Nations Educational, Scientific and Cultural Organization Literacy Assessment and Monitoring Programme (LAMP). In a novel form…
Optimization of a large-scale microseismic monitoring network in northern Switzerland
NASA Astrophysics Data System (ADS)
Kraft, Toni; Mignan, Arnaud; Giardini, Domenico
2013-10-01
We have developed a network optimization method for regional-scale microseismic monitoring networks and applied it to optimize the densification of the existing seismic network in northeastern Switzerland. The new network will build the backbone of a 10-yr study on the neotectonic activity of this area that will help to better constrain the seismic hazard imposed on nuclear power plants and waste repository sites. This task defined the requirements regarding location precision (0.5 km in epicentre and 2 km in source depth) and detection capability [magnitude of completeness Mc = 1.0 (ML)]. The goal of the optimization was to find the geometry and size of the network that met these requirements. Existing stations in Switzerland, Germany and Austria were considered in the optimization procedure. We based the optimization on the simulated annealing approach proposed by Hardt & Scherbaum, which aims to minimize the volume of the error ellipsoid of the linearized earthquake location problem (D-criterion). We have extended their algorithm to:
We calculated optimized geometries for networks with 10-35 added stations and tested the stability of the optimization result by repeated runs with changing initial conditions. Further, we estimated the attainable magnitude of completeness (Mc) for the different sized optimal networks using the Bayesian Magnitude of Completeness (BMC) method introduced by Mignan et al. The algorithm developed in this study is also applicable to smaller optimization problems, for example, small local monitoring networks. Possible applications are volcano monitoring, the surveillance of induced seismicity associated with geotechnical operations and many more. Our algorithm is especially useful to optimize networks in populated areas with heterogeneous noise conditions and if complex velocity structures or existing stations have to be considered.
Chang, I-Pin; Lee, Tian-Fu; Lin, Tsung-Hung; Liu, Chuan-Ming
2015-11-30
Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost.
South African managers in public service: On being authentic
Simbhoo, Nirvana
2014-01-01
South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work–life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work. PMID:24434054
South African managers in public service: on being authentic.
Barnard, Antoni; Simbhoo, Nirvana
2014-01-01
South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work-life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work.
Study on the security of the authentication scheme with key recycling in QKD
NASA Astrophysics Data System (ADS)
Li, Qiong; Zhao, Qiang; Le, Dan; Niu, Xiamu
2016-09-01
In quantum key distribution (QKD), the information theoretically secure authentication is necessary to guarantee the integrity and authenticity of the exchanged information over the classical channel. In order to reduce the key consumption, the authentication scheme with key recycling (KR), in which a secret but fixed hash function is used for multiple messages while each tag is encrypted with a one-time pad (OTP), is preferred in QKD. Based on the assumption that the OTP key is perfect, the security of the authentication scheme has be proved. However, the OTP key of authentication in a practical QKD system is not perfect. How the imperfect OTP affects the security of authentication scheme with KR is analyzed thoroughly in this paper. In a practical QKD, the information of the OTP key resulting from QKD is partially leaked to the adversary. Although the information leakage is usually so little to be neglected, it will lead to the increasing degraded security of the authentication scheme as the system runs continuously. Both our theoretical analysis and simulation results demonstrate that the security level of authentication scheme with KR, mainly indicated by its substitution probability, degrades exponentially in the number of rounds and gradually diminishes to zero.
Earned print media in advancing tobacco control in Himachal Pradesh, India: a descriptive study
Sharma, Renu; Shewade, Hemant Deepak; Gopalan, Balasubramaniam; Badrel, Ramesh Kumar; Rana, Jugdeep Singh
2017-01-01
Background The Union-Bloomberg Initiative tobacco control projects were implemented in Himachal Pradesh (a hilly state in North India) from 2007 to 2014. The project focused on the establishment of an administrative framework; increasing the capacity of stakeholders; enforcement of legislation; coalition and networking with multiple stakeholders; awareness generation with focus on earned media and monitoring and evaluation with policy-focussed research. This study aimed to systematically analyse all earned print news items related to the projects. Methods In this cross-sectional descriptive study, quantitative content analysis of earned print news items was carried out using predetermined codes related to areas of tobacco control policies. We also carried out a cost description of the hypothetical value of this earned media. The area of the news item in cm2 was multiplied by the average rate of space for the paid news item in that particular newspaper. Results There were 6348 news items: the numbers steadily increased with time. Focus on Monitoring tobacco use, Protecting people from tobacco smoke, Offering help to quit, Warning about dangers of tobacco, Enforcing a ban on tobacco advertising and promotion, Raising tax on tobacco products was seen in 24, 17, 9, 23, 22 and 3% of news items, respectively. Press releases were highest at 44% and report by correspondents at 24%. Further, 55, 23 and 21% news items focused on smoking, smokeless and both forms of tobacco use, respectively. Sixty-six per cent and 34% news items, respectively, were focused on youth and women. The news items had a hypothetical value of US$1503 628.3, which was three times more than the funds spent on all project activities. Conclusions In the absence of funding for paid media, the project strategically used earned media to promote tobacco control policies in the state. PMID:28589021
Validity and reliability of the South African health promoting schools monitoring questionnaire
Struthers, Patricia; de Koker, Petra; Lerebo, Wondwossen; Blignaut, Renette J.
2017-01-01
Summary Health promoting schools, as conceptualised by the World Health Organisation, have been developed in many countries to facilitate the health-education link. In 1994, the concept of health promoting schools was introduced in South Africa. In the process of becoming a health promoting school, it is important for schools to monitor and evaluate changes and developments taking place. The Health Promoting Schools (HPS) Monitoring Questionnaire was developed to obtain opinions of students about their school as a health promoting school. It comprises 138 questions in seven sections: socio-demographic information; General health promotion programmes; health related Skills and knowledge; Policies; Environment; Community-school links; and support Services. This paper reports on the reliability and face validity of the HPS Monitoring Questionnaire. Seven experts reviewed the questionnaire and agreed that it has satisfactory face validity. A test-retest reliability study was conducted with 83 students in three high schools in Cape Town, South Africa. The kappa-coefficients demonstrate mostly fair (κ-scores between 0.21 and 0.4) to moderate (κ-scores between 0.41 and 0.6) agreement between test-retest General and Environment items; poor (κ-scores up to 0.2) agreement between Skills and Community test-retest items, fair agreement between Policies items, and for most of the questions focussing on Services a fair agreement was found. The study is a first effort at providing a tool that may be used to monitor and evaluate students’ opinions about changes in health promoting schools. Although the HPS Monitoring Questionnaire has face validity, the results of the reliability testing were inconclusive. Further research is warranted. PMID:27694227
Validity and reliability of the South African health promoting schools monitoring questionnaire.
Struthers, Patricia; Wegner, Lisa; de Koker, Petra; Lerebo, Wondwossen; Blignaut, Renette J
2017-04-01
Health promoting schools, as conceptualised by the World Health Organisation, have been developed in many countries to facilitate the health-education link. In 1994, the concept of health promoting schools was introduced in South Africa. In the process of becoming a health promoting school, it is important for schools to monitor and evaluate changes and developments taking place. The Health Promoting Schools (HPS) Monitoring Questionnaire was developed to obtain opinions of students about their school as a health promoting school. It comprises 138 questions in seven sections: socio-demographic information; General health promotion programmes; health related Skills and knowledge; Policies; Environment; Community-school links; and support Services. This paper reports on the reliability and face validity of the HPS Monitoring Questionnaire. Seven experts reviewed the questionnaire and agreed that it has satisfactory face validity. A test-retest reliability study was conducted with 83 students in three high schools in Cape Town, South Africa. The kappa-coefficients demonstrate mostly fair (κ-scores between 0.21 and 0.4) to moderate (κ-scores between 0.41 and 0.6) agreement between test-retest General and Environment items; poor (κ-scores up to 0.2) agreement between Skills and Community test-retest items, fair agreement between Policies items, and for most of the questions focussing on Services a fair agreement was found. The study is a first effort at providing a tool that may be used to monitor and evaluate students' opinions about changes in health promoting schools. Although the HPS Monitoring Questionnaire has face validity, the results of the reliability testing were inconclusive. Further research is warranted. © The Author 2016. Published by Oxford University Press.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 1 2013-01-01 2013-01-01 false Authentication. 1.22 Section 1.22 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Official Records § 1.22 Authentication. When a request is received for an authenticated copy of a document that the agency determines to make...
Authentic Montessori: The Teacher Makes the Difference
ERIC Educational Resources Information Center
Huxel, Alexa C.
2013-01-01
What are the elements that make up authentic Montessori? Is Montessori something concrete or abstract? Are there intangibles that make Montessori what it is? Many classrooms today have Montessori materials and small tables and chairs. Are they authentic Montessori? When examining areas that traditionally make defining authentic Montessori…
36 CFR 1275.66 - Reproduction and authentication of other materials.
Code of Federal Regulations, 2010 CFR
2010-07-01
... authentication of other materials. 1275.66 Section 1275.66 Parks, Forests, and Public Property NATIONAL ARCHIVES... Reproduction and authentication of other materials. (a) Copying of materials, including tape recordings... materials when necessary for the purpose of the research. (c) The fees for reproduction and authentication...
22 CFR 92.37 - Authentication procedure.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication procedure. 92.37 Section 92.37... Notarial Acts § 92.37 Authentication procedure. (a) The consular officer must compare the foreign official...) Where the State law requires the consular officer's certificate of authentication to show that the...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 1 2010-01-01 2010-01-01 false Authentication. 1.22 Section 1.22 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Official Records § 1.22 Authentication. When a request is received for an authenticated copy of a document that the agency determines to make...
Authentic leadership: becoming and remaining an authentic nurse leader.
Murphy, Lin G
2012-11-01
This article explores how chief nurse executives became and remained authentic leaders. Using narrative inquiry, this qualitative study focused on the life stories of participants. Results demonstrate the importance of reframing, reflection in alignment with values, and the courage needed as nurse leaders progress to authenticity.
Stephan-Otto, Christian; Siddi, Sara; Senior, Carl; Muñoz-Samons, Daniel; Ochoa, Susana; Sánchez-Laforga, Ana María; Brébion, Gildas
2017-01-01
Visual mental imagery might be critical in the ability to discriminate imagined from perceived pictures. Our aim was to investigate the neural bases of this specific type of reality-monitoring process in individuals with high visual imagery abilities. A reality-monitoring task was administered to twenty-six healthy participants using functional magnetic resonance imaging. During the encoding phase, 45 words designating common items, and 45 pictures of other common items, were presented in random order. During the recall phase, participants were required to remember whether a picture of the item had been presented, or only a word. Two subgroups of participants with a propensity for high vs. low visual imagery were contrasted. Activation of the amygdala, left inferior occipital gyrus, insula, and precuneus were observed when high visual imagers encoded words later remembered as pictures. At the recall phase, these same participants activated the middle frontal gyrus and inferior and superior parietal lobes when erroneously remembering pictures. The formation of visual mental images might activate visual brain areas as well as structures involved in emotional processing. High visual imagers demonstrate increased activation of a fronto-parietal source-monitoring network that enables distinction between imagined and perceived pictures.
Ninth Grade Student Responses to Authentic Science Instruction
NASA Astrophysics Data System (ADS)
Ellison, Michael Steven
This mixed methods case study documents an effort to implement authentic science and engineering instruction in one teacher's ninth grade science classrooms in a science-focused public school. The research framework and methodology is a derivative of work developed and reported by Newmann and others (Newmann & Associates, 1996). Based on a working definition of authenticity, data were collected for eight months on the authenticity in the experienced teacher's pedagogy and in student performance. Authenticity was defined as the degree to which a classroom lesson, an assessment task, or an example of student performance demonstrates construction of knowledge through use of the meaning-making processes of science and engineering, and has some value to students beyond demonstrating success in school (Wehlage et al., 1996). Instruments adapted for this study produced a rich description of the authenticity of the teacher's instruction and student performance. The pedagogical practices of the classroom teacher were measured as moderately authentic on average. However, the authenticity model revealed the teacher's strategy of interspersing relatively low authenticity instructional units focused on building science knowledge with much higher authenticity tasks requiring students to apply these concepts and skills. The authenticity of the construction of knowledge and science meaning-making processes components of authentic pedagogy were found to be greater, than the authenticity of affordances for students to find value in classroom activities beyond demonstrating success in school. Instruction frequently included one aspect of value beyond school, connections to the world outside the classroom, but students were infrequently afforded the opportunity to present their classwork to audiences beyond the teacher. When the science instruction in the case was measured to afford a greater level of authentic intellectual work, a higher level of authentic student performance on science classwork was also measured. In addition, direct observation measures of student behavioral engagement showed that behavioral engagement was generally high, but not associated with the authenticity of the pedagogy. Direct observation measures of student self-regulation found evidence that when instruction focused on core science and engineering concepts and made stronger connections to the student's world beyond the classroom, student self-regulated learning was greater, and included evidence of student ownership. In light of the alignment between the model of authenticity used in this study and the Next Generation Science Standards (NGSS), the results suggest that further research on the value beyond school component of the model could improve understanding of student engagement and performance in response to the implementation of the NGSS. In particular, it suggests a unique role environmental education can play in affording student success in K-12 science and a tool to measure that role.
Security challenge to using smartphones for SHM
NASA Astrophysics Data System (ADS)
Abueh, Yeka; Liu, Hong
2016-04-01
Pervasive smartphones have demonstrated great potential in structural health monitoring (SHM) of civil infrastructures. Their sensing, processing, and communication capabilities along with crowdsourcing facility ease technical difficulties and reduce financial burdens of instrumentation and monitoring for SHM in civil infrastructures. However, smartphones are vulnerable to unintentional misuses and malicious attacks. This paper analyzes the vulnerabilities of smartphones in performing SHM and reveals the exploitation of those vulnerabilities. The work probes the attack surface of both devices and data. Device attack scenarios include hacking individual smartphones to modify the data stored on them and orchestrating smartphones to launch a distributed denial-of-service attack. Specifically, experiments are conducted to remotely access an Android smartphone and modify the sensing data of structural health stored on it. The work also presents a case study that reveals the sensitivity of a popular perturbation analysis method to faulty data delivered by a smartphone. The paper provides the direction of meeting the security challenge to using smartphones for SHM. As the first line of defense, device authentication is implemented in the smartphone to stop spoofing. Subsequently, message authentication is devised to maintain data integrity. There is a need to apply data science for the SHM immunity system against the sensitivity to data inaccuracy. The work also evaluates the cost-effectiveness of the proposed security measures, recommending varying levels of security to mitigate the adversaries to smartphones used in SHM systems. It calls for security solutions at the design stage of SHM systems rather than patching up after their implementations.
NASA Astrophysics Data System (ADS)
Dricker, I. G.; Friberg, P.; Hellman, S.
2001-12-01
Under the contract with the CTBTO, Instrumental Software Technologies Inc., (ISTI) has designed and developed a Standard Station Interface (SSI) - a set of executable programs and application programming interface libraries for acquisition, authentication, archiving and telemetry of seismic and infrasound data for stations of the CTBTO nuclear monitoring network. SSI (written in C) is fully supported under both the Solaris and Linux operating systems and will be shipped with fully documented source code. SSI consists of several interconnected modules. The Digitizer Interface Module maintains a near-real-time data flow between multiple digitizers and the SSI. The Disk Buffer Module is responsible for local data archival. The Station Key Management Module is a low-level tool for data authentication and verification of incoming signatures. The Data Transmission Module supports packetized near-real-time data transmission from the primary CTBTO stations to the designated Data Center. The AutoDRM module allows transport of seismic and infrasound signed data via electronic mail (auxiliary station mode). The Command Interface Module is used to pass the remote commands to the digitizers and other modules of SSI. A station operator has access to the state-of-health information and waveforms via an the Operator Interface Module. Modular design of SSI will allow painless extension of the software system within and outside the boundaries of CTBTO station requirements. Currently an alpha version of SSI undergoes extensive tests in the lab and onsite.
Lee, Tian-Fu; Liu, Chuan-Ming
2013-06-01
A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.
Kent, Alexander Dale [Los Alamos, NM
2008-09-02
Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.
Van Zant, R Scott; Cape, Kelly Jo; Roach, Katrina; Sweeney, Janie
2013-01-01
Purpose The study purpose was to assess perceptions of physical therapists (PTs) regarding the role of physical therapy in cardiovascular disease (CVD) prevention. Methods A 25-item survey, validated by expert cardiovascular/pulmonary (CVP) PTs, was sent electronically to 2,673 PTs. Each item represented an element of clinical practice behavior: education of CVD/risk factors (EDCVD), administration of primary CVD prevention (PRECVD), identifying underlying CVD/risk factors (IDCVD), monitoring CV status in patients with CVD (MONCVD). Responses were assigned numeric values (strongly agree = 5 to strongly disagree = 1), and mean element scores were analyzed. Results Most of the 516 respondents were APTA Section members (34% CVP Section, 42% other Section membership) and worked in academia (53%). Items showing a high (> 95%) level of agreement included patient education of smoking (97%) and monitoring exercise intensity (99%), assessing exercise benefits (99%), clinically identifying obesity (97%) and hypertension (97%), and monitoring CV response to exercise (99%). Items failing to reach 80% overall agreement were patient education of CVD medications (79%) and blood chemistry (72%), and assessing CVD family history (75%), patient BMI (60%), and body composition (33%). Identifying underlying CVD (77.2%) was the only practice behavior failing to reach 80% agreement. Outpatient PTs agreed significantly less to all elements vs. academics, and to IDCVD vs. all PTs except home health. Conclusions Physical therapists support most CVD prevention behaviors, but not given elements of patient education and identifying underlying CVD/risk factors. PMID:23801901
ERIC Educational Resources Information Center
Gulikers, Judith T. M.; Bastiaens, Theo J.; Kirschner, Paul A.; Kester, Liesbeth
2006-01-01
This article examines the relationships between perceptions of authenticity and alignment on study approach and learning outcome. Senior students of a vocational training program performed an authentic assessment and filled in a questionnaire about the authenticity of various assessment characteristics and the alignment between the assessment and…
School Principals' Authentic Leadership and Teachers' Psychological Capital: Teachers' Perspectives
ERIC Educational Resources Information Center
Feng, Feng-I
2016-01-01
This study examined teachers' perceptions of principals' authentic leadership and the relationship of authentic leadership to teachers' psychological capital in Taiwan. A total of 1,429 elementary and secondary school teachers were surveyed. The results showed that teachers perceived their principals' authentic leadership as moderate and that the…
21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.
Code of Federal Regulations, 2010 CFR
2010-04-01
... substance prescriptions and who has obtained a two-factor authentication credential as provided in § 1311... his two-factor authentication credential to satisfy the logical access controls. The second individual... authentication factor required by the two-factor authentication protocol is lost, stolen, or compromised. Such...
31 CFR 363.21 - When may you require offline authentication and documentary evidence?
Code of Federal Regulations, 2010 CFR
2010-07-01
... authentication and documentary evidence? 363.21 Section 363.21 Money and Finance: Treasury Regulations Relating... TreasuryDirect § 363.21 When may you require offline authentication and documentary evidence? We may require offline authentication and documentary evidence at our option. [74 FR 19419, Apr. 29, 2009] ...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for obtaining an authentication... Prescriptions § 1311.110 Requirements for obtaining an authentication credential—Individual practitioners... credentialing office) may conduct identity proofing and authorize the issuance of the authentication credential...
Toward Developing Authentic Leadership: Team-Based Simulations
ERIC Educational Resources Information Center
Shapira-Lishchinsky, Orly
2014-01-01
Although there is a consensus that authentic leadership should be an essential component in educational leadership, no study to date has ever tried to find whether team-based simulations may promote authentic leadership. The purpose of this study was to identify whether principal trainees can develop authentic leadership through ethical decision…
Learning How to Lead: A Lifetime Journey
ERIC Educational Resources Information Center
Baugher, Shirley L.
2005-01-01
Much has been written about theories of leadership, leadership qualities, and the development of leadership. In this article, the author focuses on the work of Kevin Cashman, who proposed the following "Five Touchstones" that are crucial to authentic leadership: (1) Know Yourself Authentically; (2) Listen Authentically; (3) Express Authentically;…
Authenticity in the Bureau-Enterprise Culture: The Struggle for Authentic Meaning
ERIC Educational Resources Information Center
Woods, Philip A.
2007-01-01
This article emphasizes the extent to which conceptions of authenticity are forged through social interaction and socially mediated identities and how, in turn, authentic leadership involves the transformation of the organizational, social or cultural order in which leadership is situated. The overarching context for this exploration of authentic…
Teachers' Development Model to Authentic Assessment by Empowerment Evaluation Approach
ERIC Educational Resources Information Center
Charoenchai, Charin; Phuseeorn, Songsak; Phengsawat, Waro
2015-01-01
The purposes of this study were 1) Study teachers authentic assessment, teachers comprehension of authentic assessment and teachers needs for authentic assessment development. 2) To create teachers development model. 3) Experiment of teachers development model. 4) Evaluate effectiveness of teachers development model. The research is divided into 4…
Trustworthiness and Authenticity: Alternate Ways To Judge Authentic Assessments.
ERIC Educational Resources Information Center
Hipps, Jerome A.
New methods are needed to judge the quality of alternative student assessment, methods which complement the philosophy underlying authentic assessments. This paper examines assumptions underlying validity, reliability, and objectivity, and why they are not matched to authentic assessment, concentrating on the constructivist paradigm of E. Guba and…
Code of Federal Regulations, 2014 CFR
2014-07-01
... Item 11, Guidelines and Specifications for Oil Discharge Monitoring and Control Systems for Oil Tankers... Monitoring and Control Systems for Oil Tankers (“A.586(14)”), incorporation by reference approved for § 157... 1983, Guidelines for Plan Approval and Installation Survey of Oil Discharge Monitoring and Control...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Item 11, Guidelines and Specifications for Oil Discharge Monitoring and Control Systems for Oil Tankers... Monitoring and Control Systems for Oil Tankers (“A.586(14)”), incorporation by reference approved for § 157... 1983, Guidelines for Plan Approval and Installation Survey of Oil Discharge Monitoring and Control...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Item 11, Guidelines and Specifications for Oil Discharge Monitoring and Control Systems for Oil Tankers... Monitoring and Control Systems for Oil Tankers (“A.586(14)”), incorporation by reference approved for § 157... 1983, Guidelines for Plan Approval and Installation Survey of Oil Discharge Monitoring and Control...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Item 11, Guidelines and Specifications for Oil Discharge Monitoring and Control Systems for Oil Tankers... Monitoring and Control Systems for Oil Tankers (“A.586(14)”), incorporation by reference approved for § 157... 1983, Guidelines for Plan Approval and Installation Survey of Oil Discharge Monitoring and Control...
ERIC Educational Resources Information Center
Fabiano, Gregory A.; Pyle, Kellina; Kelty, Mary Bridget; Parham, Brittany R.
2017-01-01
Direct behavior rating (DBR) may be a viable assessment for documenting current areas of impaired functioning and progress monitoring students' response to a behavioral intervention. Challenging behaviors are often addressed in general education settings using interventions such as the daily report card (DRC). To best implement and monitor such…
ERIC Educational Resources Information Center
Sprafkin, Joyce; Mattison, Richard E.; Gadow, Kenneth D.; Schneider, Jayne; Lavigne, John V.
2011-01-01
Objective: To examine the psychometric properties of the 30-item teacher's version of the Child and Adolescent Symptom Inventory Progress Monitor (CASI-PM-T), a "DSM-IV"-referenced rating scale for monitoring change in ADHD and co-occurring symptoms in youths receiving behavioral or pharmacological interventions. Method: Three separate studies…
The impact of emotion on prospective memory and monitoring: no pain, big gain.
May, Cynthia; Owens, Max; Einstein, Gilles O
2012-12-01
The emotionally enhanced memory effect is robust across studies of retrospective memory, with heightened recall for items with emotional content (e.g., words like "murder") relative to neutral items (e.g., words like "envelope"). Only a handful of studies have examined the influence of emotion on prospective memory (PM), with mixed results. In some cases emotion enhances PM, and in others it impairs PM. Interpretation of these findings is clouded by methodological differences across studies and by the fact that, to date, no study has examined the impact of emotion on PM monitoring. In our study, we assessed PM performance when PM targets were neutral, negative, and positive, and also investigated monitoring across these different PM target types. Participants showed heightened PM performance for positive and negative relative to neutral targets, yet there was no evidence of additional monitoring for emotional targets. In fact, measures of monitoring were significantly reduced when the PM targets were emotional rather than neutral. Our findings suggest that it is possible to boost PM performance in a focal task using emotional cues, and that the use of emotional cues reduces the need for monitoring.
Mobile hybrid LiDAR & infrared sensing for natural gas pipeline monitoring compendium.
DOT National Transportation Integrated Search
2016-01-01
This item consists of several documents that were created throughout the Mobile Hybrid LiDAR & Infrared Sensing for Natural Gas Pipeline Monitoring project, No. RITARS-14-H-RUT, which was conducted from January 15, 2014 to June 30, 2016. Documents in...
[Causes for change in producing areas of geo-authentic herbs].
Liang, Fei; Li, Jian; Zhang, Wei; Zhang, Rui-Xian
2013-05-01
Geo-authentic herbs lay stress on their producing areas. The producing areas of most geo-authentic herbs have never changed since the ancient times. However, many other geo-authentic herbs have experienced significant changes in the long history. There are two main causes for the change in producing areas of herbs-change of natural environment and development of human society, which are restricted by each other and play a great role throughout the development process of geo-authentic herbs.
An Efficient Authenticated Key Transfer Scheme in Client-Server Networks
NASA Astrophysics Data System (ADS)
Shi, Runhua; Zhang, Shun
2017-10-01
In this paper, we presented a novel authenticated key transfer scheme in client-server networks, which can achieve two secure goals of remote user authentication and the session key establishment between the remote user and the server. Especially, the proposed scheme can subtly provide two fully different authentications: identity-base authentication and anonymous authentication, while the remote user only holds a private key. Furthermore, our scheme only needs to transmit 1-round messages from the remote user to the server, thus it is very efficient in communication complexity. In addition, the most time-consuming computation in our scheme is elliptic curve scalar point multiplication, so it is also feasible even for mobile devices.
Comparison of Alternate and Original Items on the Montreal Cognitive Assessment
Lebedeva, Elena; Huang, Mei; Koski, Lisa
2016-01-01
Background The Montreal Cognitive Assessment (MoCA) is a screening tool for mild cognitive impairment (MCI) in elderly individuals. We hypothesized that measurement error when using the new alternate MoCA versions to monitor change over time could be related to the use of items that are not of comparable difficulty to their corresponding originals of similar content. The objective of this study was to compare the difficulty of the alternate MoCA items to the original ones. Methods Five selected items from alternate versions of the MoCA were included with items from the original MoCA administered adaptively to geriatric outpatients (N = 78). Rasch analysis was used to estimate the difficulty level of the items. Results None of the five items from the alternate versions matched the difficulty level of their corresponding original items. Conclusions This study demonstrates the potential benefits of a Rasch analysis-based approach for selecting items during the process of development of parallel forms. The results suggest that better match of the items from different MoCA forms by their difficulty would result in higher sensitivity to changes in cognitive function over time. PMID:27076861
NASA Astrophysics Data System (ADS)
Dong, Yumin; Xiao, Shufen; Ma, Hongyang; Chen, Libo
2016-12-01
Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.
A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks
Chen, Huifang; Ge, Linlin; Xie, Lei
2015-01-01
The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224
A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.
Chen, Huifang; Ge, Linlin; Xie, Lei
2015-07-14
The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.
Secure ADS-B authentication system and method
NASA Technical Reports Server (NTRS)
Viggiano, Marc J (Inventor); Valovage, Edward M (Inventor); Samuelson, Kenneth B (Inventor); Hall, Dana L (Inventor)
2010-01-01
A secure system for authenticating the identity of ADS-B systems, including: an authenticator, including a unique id generator and a transmitter transmitting the unique id to one or more ADS-B transmitters; one or more ADS-B transmitters, including a receiver receiving the unique id, one or more secure processing stages merging the unique id with the ADS-B transmitter's identification, data and secret key and generating a secure code identification and a transmitter transmitting a response containing the secure code and ADSB transmitter's data to the authenticator; the authenticator including means for independently determining each ADS-B transmitter's secret key, a receiver receiving each ADS-B transmitter's response, one or more secure processing stages merging the unique id, ADS-B transmitter's identification and data and generating a secure code, and comparison processing comparing the authenticator-generated secure code and the ADS-B transmitter-generated secure code and providing an authentication signal based on the comparison result.
Reconciling Divisions in the Field of Authentic Education
ERIC Educational Resources Information Center
Sarid, Ariel
2015-01-01
The aim of this article is twofold: first, to identify and address three central divisions in the field of authentic education that introduce ambiguity and at times inconsistencies within the field of authentic education. These divisions concern a) the relationship between autonomy and authenticity; b) the division between the two basic attitudes…
ERIC Educational Resources Information Center
Ramezanzadeh, Akram; Adel, Seyyed Mohammad Reza; Zareian, Gholamreza
2016-01-01
This study probed the conceptualization of authenticity in teaching and its link to teachers' emotional life through critical emotional praxis because emotions are integral to discovering who we really are (McCarthy, E. D. 2009. "Emotional Performances as Dramas of Authenticity." In "Authenticity in Culture, Self, and Society,"…
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Authentication and certification... Suspension and Revocation Hearings § 20.1303 Authentication and certification of extracts from shipping...) Authentication and certification must include a statement that the person acting has seen the original, compared...
An Examination of Teacher Authenticity in the College Classroom
ERIC Educational Resources Information Center
Johnson, Zac D.; LaBelle, Sara
2017-01-01
This study sought to generate a more robust understanding of teacher (in)authenticity. In other contexts, authenticity is regarded as a display of true self and has been positively linked to beneficial psychological (e.g., increased self-esteem) and social outcomes (e.g., higher relational satisfaction). However, what it means to be authentic in…
Commonalities and Specificities of Authentic Leadership in Ghana and New Zealand
ERIC Educational Resources Information Center
Owusu-Bempah, Justice; Addison, Ramzi; Fairweather, John
2014-01-01
The authentic leadership literature suggests that there are three critical elements that precede the bestowal of authentic leadership: first, the espoused values and actions of authentic leaders must be congruent; second, the expectation of the leaders and the followers must be congruent; and, third, the leaders must behave with high moral…
ERIC Educational Resources Information Center
Everett, Donna R.
This guide presents performance-based authentic assessment ideas, samples, and suggestions to help marketing teachers and students respond to changes and pressures from outside the classroom. It contains 21 activities, each accompanied by a method of authentic assessment. In most cases, the authentic assessment method is a scoring device. The…
ERIC Educational Resources Information Center
Stone, Anne H.
2012-01-01
Purpose: The purpose of this study was to identify what leadership coaches perceive to be the benefits of authenticity to their clients' success. Another purpose was to identify what barriers leadership coaches perceive as preventing their clients from developing authenticity. A final purpose of this study was to identify which strategies…
Authentic e-Learning in a Multicultural Context: Virtual Benchmarking Cases from Five Countries
ERIC Educational Resources Information Center
Leppisaari, Irja; Herrington, Jan; Vainio, Leena; Im, Yeonwook
2013-01-01
The implementation of authentic learning elements at education institutions in five countries, eight online courses in total, is examined in this paper. The International Virtual Benchmarking Project (2009-2010) applied the elements of authentic learning developed by Herrington and Oliver (2000) as criteria to evaluate authenticity. Twelve…
Developmental Changes in Judgments of Authentic Objects
ERIC Educational Resources Information Center
Frazier, Brandy N.; Gelman, Susan A.
2009-01-01
This study examined the development of an understanding of authenticity among 112 children (preschoolers, kindergarten, 1st graders, and 4th graders) and 119 college students. Participants were presented with pairs of photographs depicting authentic and non-authentic objects and asked to pick which one belongs in a museum and which one they would…
Using Horses to Teach Authentic Leadership Skills to At-Risk Youth
ERIC Educational Resources Information Center
Adams, Brittany Lee
2013-01-01
The primary purpose of this study was to determine the impact of an equine-facilitated authentic leadership development program on at-risk youth. Participants were asked to participate in two focus groups and a 3-day equine-facilitated authentic leadership development program based on Bill George's Model of Authentic Leadership. Participants were…
Emmerich, Astrid I.; Rigotti, Thomas
2017-01-01
This study investigates the role of context-specific authenticity at work for work-related outcomes (intrinsic motivation, work ability) and depressivity. Furthermore reciprocal relations between work-related authenticity and healthy psychological functioning are investigated. Longitudinal data from 1,243 employees from 63 subsidiaries of a non-profit organization in the social sector were analyzed using multilevel structural equation modeling. Work-related authenticity at T1 predicted work ability and depressivity, but not intrinsic motivation at T2, about 6 months later. Work-related authenticity at T2 was predicted by intrinsic motivation and depressivity, but not by work ability at T1. We conclude that work-related authenticity and healthy psychological functioning are positively reinforcing each other. Thus, enabling employees to be authentic supposedly increases their well-being and is a pivotal opportunity for organizations to foster health and performance-related indicators like work ability and prevent negative health indicators like depressivity. At the same time, authenticity of employees can be fostered through workplace health promotion. PMID:28316581
Manticore and CS mode : parallelizable encryption with joint cipher-state authentication.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Torgerson, Mark Dolan; Draelos, Timothy John; Schroeppel, Richard Crabtree
2004-10-01
We describe a new mode of encryption with inexpensive authentication, which uses information from the internal state of the cipher to provide the authentication. Our algorithms have a number of benefits: (1) the encryption has properties similar to CBC mode, yet the encipherment and authentication can be parallelized and/or pipelined, (2) the authentication overhead is minimal, and (3) the authentication process remains resistant against some IV reuse. We offer a Manticore class of authenticated encryption algorithms based on cryptographic hash functions, which support variable block sizes up to twice the hash output length and variable key lengths. A proof ofmore » security is presented for the MTC4 and Pepper algorithms. We then generalize the construction to create the Cipher-State (CS) mode of encryption that uses the internal state of any round-based block cipher as an authenticator. We provide hardware and software performance estimates for all of our constructions and give a concrete example of the CS mode of encryption that uses AES as the encryption primitive and adds a small speed overhead (10-15%) compared to AES alone.« less
A Key Establishment Protocol for RFID User in IPTV Environment
NASA Astrophysics Data System (ADS)
Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho
In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.
Formazin, Maren; Burr, Hermann; Aagestad, Cecilie; Tynes, Tore; Thorsen, Sannie Vester; Perkio-Makela, Merja; Díaz Aramburu, Clara Isabel; Pinilla García, Francisco Javier; Galiana Blanco, Luz; Vermeylen, Greet; Parent-Thirion, Agnes; Hooftman, Wendela; Houtman, Irene
2014-12-09
In most countries in the EU, national surveys are used to monitor working conditions and health. Since the development processes behind the various surveys are not necessarily theoretical, but certainly practical and political, the extent of similarity among the dimensions covered in these surveys has been unclear. Another interesting question is whether prominent models from scientific research on work and health are present in the surveys--bearing in mind that the primary focus of these surveys is on monitoring status and trends, not on mapping scientific models. Moreover, it is relevant to know which other scales and concepts not stemming from these models have been included in the surveys. The purpose of this paper is to determine (1) the similarity of dimensions covered in the surveys included and (2) the congruence of dimensions of scientific research and of dimensions present in the monitoring systems. Items from surveys representing six European countries and one European wide survey were classified into the dimensions they cover, using a taxonomy agreed upon among all involved partners from the six countries. The classification reveals that there is a large overlap of dimensions, albeit not in the formulation of items, covered in the seven surveys. Among the available items, the two prominent work-stress-models--job-demand-control-support-model (DCS) and effort-reward-imbalance-model (ERI)--are covered in most surveys even though this has not been the primary aim in the compilation of these surveys. In addition, a large variety of items included in the surveillance systems are not part of these models and are--at least partly--used in nearly all surveys. These additional items reflect concepts such as "restructuring", "meaning of work", "emotional demands" and "offensive behaviour/violence & harassment". The overlap of the dimensions being covered in the various questionnaires indicates that the interests of the parties deciding on the questionnaires in the different countries overlap. The large number of dimensions measured in the questionnaires and not being part of the DCS and ERI models is striking. These "new" dimensions could inspire the research community to further investigate their possible health and labour market effects.
Chang, I-Pin; Lee, Tian-Fu; Lin, Tsung-Hung; Liu, Chuan-Ming
2015-01-01
Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost. PMID:26633396
Practical and Secure Recovery of Disk Encryption Key Using Smart Cards
NASA Astrophysics Data System (ADS)
Omote, Kazumasa; Kato, Kazuhiko
In key-recovery methods using smart cards, a user can recover the disk encryption key in cooperation with the system administrator, even if the user has lost the smart card including the disk encryption key. However, the disk encryption key is known to the system administrator in advance in most key-recovery methods. Hence user's disk data may be read by the system administrator. Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication. In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost. In our scheme, the disk encryption key is not preserved anywhere and then the system administrator cannot know the key before key-recovery phase. Only someone who has a user's smart card and knows the user's password can decrypt that user's disk data. Furthermore, we measured the processing time required for user authentication in an experimental environment using a virtual machine monitor. As a result, we found that this processing time is short enough to be practical.
The examination, analysis and conservation of a bronze Egyptian Horus statuette
NASA Astrophysics Data System (ADS)
Smith, A.; Botha, H.; de Beer, F. C.; Ferg, E.
2011-09-01
The production techniques, corrosive deterioration, conservation and questions regarding authenticity of a small Egyptian bronze statuette of the Child Horus (in the collection of the Ditsong: National Museum of Cultural History in Pretoria) was scientifically examined and analysed. The statuette dates to Egypt's 12th Dynasty. When the statuette was damaged, it was considered the appropriate time to obtain valuable information about its history and background through scientific research. Neutron tomography (NT), a relatively new non-destructive technique (NDT) to the South African R&D community to study museum objects, was applied to perform this research. The results from NT were supported by additional tests done through XRF and XRD analyses of samples taken from the damaged statuette. Results revealed that the lost-wax method was used in the manufacturing process. The extent of the restoration and materials used can be verified and as a result the deterioration of the object can now be monitored. This paper describes in detail the analytical techniques used in the study and how it contributed to the conservation of the statuette and its authenticity.
Two RFID standard-based security protocols for healthcare environments.
Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E
2013-10-01
Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.
Eat-by-light fiber-optic and micro-optic devices for food quality and safety assessment
NASA Astrophysics Data System (ADS)
Mignani, A. G.; Ciaccheri, L.; Cucci, C.; Mencaglia, A. A.; Cimato, A.; Attilio, C.; Thienpont, H.; Ottevaere, H.; Paolesse, R.; Mastroianni, M.; Monti, D.; Buonocore, G.; Del Nobile, A.; Mentana, A.; Grimaldi, M. F.; Dall'Asta, C.; Faccini, A.; Galaverna, G.; Dossena, A.
2007-06-01
A selection is presented of fiber-optic and micro-optic devices that have been designed and tested for guaranteeing the quality and safety of typical foods, such as extra virgin olive oil, beer, and milk. Scattered colorimetry is used to authenticate various types of extra virgin olive oil and beer, while a fiber-optic-based device for UV-VIS-NIR absorption spectroscopy is exploited in order to obtain the hyperspectral optical signature of olive oil. This is done not only for authentication purposes, but also so as to correlate the spectral data with the content of fatty acids, which are important nutritional factors. A micro-optic sensor for the detection of olive oil aroma that is capable of distinguishing different ageing levels of extra virgin olive oil is also presented. It shows effective potential for acting as a smart cap of bottled olive oil in order to achieve a non-destructive olfactory perception of oil ageing. Lastly, a compact portable fluorometer for the rapid monitoring of the carcinogenic M1 aflatoxin in milk, is experimented.
Printable, scannable biometric templates for secure documents and materials
NASA Astrophysics Data System (ADS)
Cambier, James L.; Musgrave, Clyde
2000-04-01
Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.
Pirbhulal, Sandeep; Zhang, Heye; Mukhopadhyay, Subhas Chandra; Li, Chunyue; Wang, Yumei; Li, Guanglin; Wu, Wanqing; Zhang, Yuan-Ting
2015-01-01
Body Sensor Network (BSN) is a network of several associated sensor nodes on, inside or around the human body to monitor vital signals, such as, Electroencephalogram (EEG), Photoplethysmography (PPG), Electrocardiogram (ECG), etc. Each sensor node in BSN delivers major information; therefore, it is very significant to provide data confidentiality and security. All existing approaches to secure BSN are based on complex cryptographic key generation procedures, which not only demands high resource utilization and computation time, but also consumes large amount of energy, power and memory during data transmission. However, it is indispensable to put forward energy efficient and computationally less complex authentication technique for BSN. In this paper, a novel biometric-based algorithm is proposed, which utilizes Heart Rate Variability (HRV) for simple key generation process to secure BSN. Our proposed algorithm is compared with three data authentication techniques, namely Physiological Signal based Key Agreement (PSKA), Data Encryption Standard (DES) and Rivest Shamir Adleman (RSA). Simulation is performed in Matlab and results suggest that proposed algorithm is quite efficient in terms of transmission time utilization, average remaining energy and total power consumption. PMID:26131666
Pirbhulal, Sandeep; Zhang, Heye; Mukhopadhyay, Subhas Chandra; Li, Chunyue; Wang, Yumei; Li, Guanglin; Wu, Wanqing; Zhang, Yuan-Ting
2015-06-26
Body Sensor Network (BSN) is a network of several associated sensor nodes on, inside or around the human body to monitor vital signals, such as, Electroencephalogram (EEG), Photoplethysmography (PPG), Electrocardiogram (ECG), etc. Each sensor node in BSN delivers major information; therefore, it is very significant to provide data confidentiality and security. All existing approaches to secure BSN are based on complex cryptographic key generation procedures, which not only demands high resource utilization and computation time, but also consumes large amount of energy, power and memory during data transmission. However, it is indispensable to put forward energy efficient and computationally less complex authentication technique for BSN. In this paper, a novel biometric-based algorithm is proposed, which utilizes Heart Rate Variability (HRV) for simple key generation process to secure BSN. Our proposed algorithm is compared with three data authentication techniques, namely Physiological Signal based Key Agreement (PSKA), Data Encryption Standard (DES) and Rivest Shamir Adleman (RSA). Simulation is performed in Matlab and results suggest that proposed algorithm is quite efficient in terms of transmission time utilization, average remaining energy and total power consumption.
Limitations and requirements of content-based multimedia authentication systems
NASA Astrophysics Data System (ADS)
Wu, Chai W.
2001-08-01
Recently, a number of authentication schemes have been proposed for multimedia data such as images and sound data. They include both label based systems and semifragile watermarks. The main requirement for such authentication systems is that minor modifications such as lossy compression which do not alter the content of the data preserve the authenticity of the data, whereas modifications which do modify the content render the data not authentic. These schemes can be classified into two main classes depending on the model of image authentication they are based on. One of the purposes of this paper is to look at some of the advantages and disadvantages of these image authentication schemes and their relationship with fundamental limitations of the underlying model of image authentication. In particular, we study feature-based algorithms which generate an authentication tag based on some inherent features in the image such as the location of edges. The main disadvantage of most proposed feature-based algorithms is that similar images generate similar features, and therefore it is possible for a forger to generate dissimilar images that have the same features. On the other hand, the class of hash-based algorithms utilizes a cryptographic hash function or a digital signature scheme to reduce the data and generate an authentication tag. It inherits the security of digital signatures to thwart forgery attacks. The main disadvantage of hash-based algorithms is that the image needs to be modified in order to be made authenticatable. The amount of modification is on the order of the noise the image can tolerate before it is rendered inauthentic. The other purpose of this paper is to propose a multimedia authentication scheme which combines some of the best features of both classes of algorithms. The proposed scheme utilizes cryptographic hash functions and digital signature schemes and the data does not need to be modified in order to be made authenticatable. Several applications including the authentication of images on CD-ROM and handwritten documents will be discussed.
ERIC Educational Resources Information Center
Smith, Rhonda L.; Eklund, Katie; Kilgus, Stephen P.
2018-01-01
The purpose of this study was to evaluate the concurrent validity, sensitivity to change, and teacher acceptability of Direct Behavior Rating single-item scales (DBR-SIS), a brief progress monitoring measure designed to assess student behavioral change in response to intervention. Twenty-four elementary teacher-student dyads implemented a daily…
Physical cryptographic verification of nuclear warheads
Kemp, R. Scott; Danagoulian, Areg; Macdonald, Ruaridh R.; Vavrek, Jayson R.
2016-01-01
How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times. PMID:27432959
Physical cryptographic verification of nuclear warheads
NASA Astrophysics Data System (ADS)
Kemp, R. Scott; Danagoulian, Areg; Macdonald, Ruaridh R.; Vavrek, Jayson R.
2016-08-01
How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times.
Physical cryptographic verification of nuclear warheads.
Kemp, R Scott; Danagoulian, Areg; Macdonald, Ruaridh R; Vavrek, Jayson R
2016-08-02
How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times.
Furlong, Michael J; Fullchange, Aileen; Dowdy, Erin
2017-09-01
Student surveys are often used for school-based mental health screening; hence, it is critical to evaluate the authenticity of information obtained via the self-report format. The objective of this study was to examine the possible effects of mischievous response patterns on school-based screening results. The present study included 1,857 high school students who completed a schoolwide screening for complete mental health. Student responses were reviewed to detect possible mischievous responses and to examine their association with other survey results. Consistent with previous research, mischievous responding was evaluated by items that are legitimate to ask of all students (e.g., How much do you weigh? and How many siblings do you have?). Responses were considered "mischievous" when a student selected multiple extreme, unusual (less than 5% incidence) response options, such as weighing more than 225 pounds and having 10 or more siblings. Only 1.8% of the students responded in extreme ways to 2 or more of 7 mischievous response items. When compared with other students, the mischievous responders were less likely to declare that they answered items honestly, were more likely to finish the survey in less than 10 min, reported lower levels of life satisfaction and school connectedness, and reported higher levels of emotional and behavioral distress. When applying a dual-factor mental health screening framework to the responses, mischievous responders were less likely to be categorized as having complete mental health. Implications for school-based mental health screening are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Roberts, Laura; Kim, Jane Paik
2018-04-30
Clinical research is predicated ethically on the authentic voluntarism of individuals who choose to enroll in human studies. Existing literature has focused on aspects of informed consent for clinical research other than voluntarism. The objective of this study was to compare the perspectives of clinical research participants who are in good health and who are ill regarding voluntarism-related aspects of informed consent and to assess situational influences that enable voluntarism in the process of obtaining clinical research consent. A 23-item written survey, the Informed Consent Questionnaire (ICQ), was administered in a "piggyback" semi-structured interview study of ill and healthy volunteers enrolled in IRB-approved clinical research studies. A total of 150 (60 mentally ill, 43 physically ill, and 47 healthy) clinical research participants participated. Respondents expressed positive views of their experiences with the informed consent processes for their respective clinical research protocols and respondents strongly endorsed items related to voluntarism irrespective of their illness type (range of means = [3.9, 4.8]). Ill participants more highly endorsed items relating to informed consent conditions (mentally ill vs healthy: 0.54 on a 5-point scale, P value = 0.01) (physically ill vs. healthy: 0.47 on a 5-point scale, P value = 0.01). The favorable views of clinical research participants regarding their experience of giving informed consent to enroll in a study were not surprising. Contrary to our a priori hypothesis, healthy individuals did not feel as positively as their ill counterparts. Copyright © 2018 Elsevier Ltd. All rights reserved.
Neutron multiplicity counting: Confidence intervals for reconstruction parameters
Verbeke, Jerome M.
2016-03-09
From nuclear materials accountability to homeland security, the need for improved nuclear material detection, assay, and authentication has grown over the past decades. Starting in the 1940s, neutron multiplicity counting techniques have enabled quantitative evaluation of masses and multiplications of fissile materials. In this paper, we propose a new method to compute uncertainties on these parameters using a model-based sequential Bayesian processor, resulting in credible regions in the fissile material mass and multiplication space. These uncertainties will enable us to evaluate quantitatively proposed improvements to the theoretical fission chain model. Additionally, because the processor can calculate uncertainties in real time,more » it is a useful tool in applications such as portal monitoring: monitoring can stop as soon as a preset confidence of non-threat is reached.« less
Razzak, Md Abdur; Hamid, Sharifah Bee Abd; Ali, Md Eaqub
2015-01-01
Food forgery has posed considerable risk to public health, religious rituals, personal budget and wildlife. Pig, dog, cat, rat and monkey meat are restricted in most religions, but their sporadic adulteration are rampant. Market controllers need a low-cost but reliable technique to track and trace suspected species in the food chain. Considering the need, here we documented a lab-on-a-chip-based multiplex polymerase chain reaction (PCR) assay for the authentication of five non-halal meat species in foods. Using species-specific primers, 172, 163, 141, 129 and 108-bp sites of mitochondrial ND5, ATPase 6 and cytochrome b genes were amplified to detect cat, dog, pig, monkey and rat species under complex matrices. Species-specificity was authenticated against 20 different species with the potential to be used in food. The targets were stable under extreme sterilisation (121°C at 45 psi for 2.5 h) which severely degrades DNA. The assay was optimised under the backgrounds of various commercial meat products and validated for the analysis of meatballs, burgers and frankfurters, which are popular fast food items across the globe. The assay was tested to detect 0.1% suspected meats under commercial backgrounds of marketed foods. Instead of simplex PCR which detects only one species at a time, such a multiplex platform can reduce cost by at least fivefolds by detecting five different species in a single assay platform.
ERIC Educational Resources Information Center
Smith, Jane; Wiese, Patricia
2006-01-01
This article discusses the importance of authentic picture-storybook adaptations of multicultural folktales and describes an action research project through which a children's picture-book adaptation of a traditional tale can be authenticated using an inquiry-based process. In addition to modeling an actual authentication project using "The Golden…
21 CFR 20.3 - Certification and authentication of Food and Drug Administration records.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Certification and authentication of Food and Drug... authentication of Food and Drug Administration records. (a) Upon request, the Food and Drug Administration will... or for authentication of records shall be sent in writing to the Freedom of Information Staff (HFI-35...
Children's and Adolescents' Perception of the Authenticity of Smiles
ERIC Educational Resources Information Center
Thibault, Pascal; Gosselin, Pierre; Brunel, Marie-Lise; Hess, Ursula
2009-01-01
Recently, Thibault and colleagues described the Duchenne marker as a cultural dialect for the perception of smile authenticity. The current study had the goal to follow up on this finding and to investigate the cues that French Canadian children use to evaluate the authenticity of smiles from members of three ethnic groups. The authenticity of six…
Meeting EFL Learners Halfway by Using Locally Relevant Authentic Materials
ERIC Educational Resources Information Center
Thomas, Catherine
2014-01-01
The author defines and describes authentic materials and discusses their benefits--citing the Input Hypothesis and the Output Principle in support of such materials--as well as some challenges of using authentic materials. Five categories of authentic materials are presented, and sources for materials and ways to use them in the EFL classroom are…
Service Oriented Architecture Security Risks and their Mitigation
2012-10-01
this section can be mitigated by making use of suitable authentication , confidentiality, integrity, and authorisation standards such as Security...for authorisation . Machines/non-human users should be clearly identified and authenticated by the identity provision and authentication services... authentication , any security related attributes for the subject, and the authorisation decisions given based on the security and privilege attributes
A Framework for Determining the Authenticity of Assessment Tasks: Applied to an Example in Law
ERIC Educational Resources Information Center
Burton, Kelley
2011-01-01
Authentic assessment tasks enhance engagement, retention and the aspirations of students. This paper explores the discipline-generic features of authentic assessment, which reflect what students need to achieve in the real world. Some assessment tasks are more authentic than others and this paper designs a proposed framework supported by the…
ERIC Educational Resources Information Center
Hardre, Patricia L.
2013-01-01
Authenticity is a key to using technology for instruction in ways that enhance learning and support learning transfer. Simply put, a representation is authentic when it shows learners clearly what a task, context, or experience will be like in real practice. More authentic representations help people learn and understand better. They support…
Authentic leadership: develop the leader within.
Yasinski, Lesia
2014-03-01
Great leadership usually starts with a willing heart, a positive attitude, and a desire to make a difference. Strong leadership is important, in today's health care climate, to ensure optimal patient outcomes and the fostering of future generations of knowledgeable, motivated and enthusiastic perioperative nurses. This article will explore key elements necessary for the development of authentic leadership. While highlighting the role that personal development plays in leadership skills, this article will also discuss ways to cultivate authenticity in leadership. The following questions will be addressed: What is authentic leadership? How does one become an authentic leader?
[Brief introduction of geo-authentic herbs].
Liang, Fei; Li, Jian; Zhang, Wei; Zhang, Rui-Xian
2013-05-01
The science of geo-authentic herbs is a characteristic discipline of traditional Chinese medicine established during thousands of years of clinical practices. It has a long history under the guidance of profound theories of traditional Chinese medicine. The words of "geo-authentic product" were derived from an administrative division unit in the ancient times, which layed stress on the good quality of products in particular regions. In ancient records of traditional Chinese medicine, the words of "geo-authentic product" were first found in Concise Herbal Foundation Compilation of the Ming dynasty, and the words of "geo-authentic herbs" were first discovered in Peony Pavilion of the late Ming dynasty. After all, clinical effect is the fundamental evaluation standard of geo-authentic herbs.
Women outperform men in distinguishing between authentic and nonauthentic smiles.
Spies, Maren; Sevincer, A Timur
2017-11-28
Women tend to be more accurate in decoding facial expressions than men. We hypothesized that women's better performance in decoding facial expressions extends to distinguishing between authentic and nonauthentic smiles. We showed participants portrait photos of persons who smiled because either they saw a pleasant picture (authentic smile) or were instructed to smile by the experimenter (nonauthentic smile) and asked them to identify the smiles. Participants judged single photos of persons depicting either an authentic or a nonauthentic smile, and they judged adjacent photos of the same person depicting an authentic smile and a nonauthentic smile. Women outperformed men in identifying the smiles when judging the adjacent photos. We discuss implications for judging smile authenticity in real life and limitations for the observed sex difference.
A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography
NASA Astrophysics Data System (ADS)
Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan
Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.
Relationship authenticity partially mediates the effects of attachment on relationship satisfaction.
Rasco, Danney; Warner, Rebecca M
2017-01-01
Individuals with anxious and avoidant attachment tend to experience less satisfaction in their relationships. Past research suggests the negative effects of attachment on relationship satisfaction may be partially mediated by self-disclosure and self-concealment; the present study evaluated relationship authenticity as a potential additional mediator. Confirmatory factor analysis indicated that relationship authenticity is distinct from self-disclosure and self-concealment. Relationship authenticity predicted additional variance in relationship satisfaction controlling for attachment, self-disclosure, and self-concealment. The results were consistent with relationship authenticity, along with self-disclosure and self-concealment, partially mediating the effects of attachment on relationship satisfaction. These findings suggest that relationship authenticity may play a unique role in understanding how attachment influences relationship satisfaction. Theoretical and clinical implications are discussed.
Self-Monitors Apply for a Job: Self-Presentation and Affective Consequences.
ERIC Educational Resources Information Center
Larkin, Judith E.; Pines, Harvey A.
High and low self-monitors were given the task of applying for a position that was or was not a good fit with their personality. Subjects were 97 introductory psychology students who had previously taken the 18-item Self-Monitoring Scale (SMS). They took the SMS again--as if it were being used to decide whether they would be offered a very…
Application of Arrester Simulation Device in Training
NASA Astrophysics Data System (ADS)
Baoquan, Zhang; Ziqi, Chai; Genghua, Liu; Wei, Gao; Kaiyue, Wu
2017-12-01
Combining with the arrester simulation device put into use successfully, this paper introduces the application of arrester test in the insulation resistance measurement, counter test, Leakage current test under DC 1mA voltage and leakage current test under 0.75U1mA. By comparing with the existing training, this paper summarizes the arrester simulation device’s outstanding advantages including real time monitoring, multi-type fault data analysis and acousto-optic simulation. It effectively solves the contradiction between authenticity and safety in the existing test training, and provides a reference for further training.
Coane, Jennifer H; McBride, Dawn M; Termonen, Miia-Liisa; Cutting, J Cooper
2016-01-01
The goal of the present study was to examine the contributions of associative strength and similarity in terms of shared features to the production of false memories in the Deese/Roediger-McDermott list-learning paradigm. Whereas the activation/monitoring account suggests that false memories are driven by automatic associative activation from list items to nonpresented lures, combined with errors in source monitoring, other accounts (e.g., fuzzy trace theory, global-matching models) emphasize the importance of semantic-level similarity, and thus predict that shared features between list and lure items will increase false memory. Participants studied lists of nine items related to a nonpresented lure. Half of the lists consisted of items that were associated but did not share features with the lure, and the other half included items that were equally associated but also shared features with the lure (in many cases, these were taxonomically related items). The two types of lists were carefully matched in terms of a variety of lexical and semantic factors, and the same lures were used across list types. In two experiments, false recognition of the critical lures was greater following the study of lists that shared features with the critical lure, suggesting that similarity at a categorical or taxonomic level contributes to false memory above and beyond associative strength. We refer to this phenomenon as a "feature boost" that reflects additive effects of shared meaning and association strength and is generally consistent with accounts of false memory that have emphasized thematic or feature-level similarity among studied and nonstudied representations.
ERIC Educational Resources Information Center
Westerberg, Carmen E.; Hawkins, Christopher A.; Rendon, Lauren
2018-01-01
Reality-monitoring errors occur when internally generated thoughts are remembered as external occurrences. We hypothesized that sleep-dependent memory consolidation could reduce them by strengthening connections between items and their contexts during an afternoon nap. Participants viewed words and imagined their referents. Pictures of the…
Language Assessment in a Snap: Monitoring Progress up to 36 Months
ERIC Educational Resources Information Center
Gilkerson, Jill; Richards, Jeffrey A.; Greenwood, Charles R.; Montgomery, Judy K.
2017-01-01
This article describes the development and validation of the Developmental Snapshot, a 52-item parent questionnaire on child language and vocal communication development that can be administered monthly and scored automatically. The Snapshot was created to provide an easily administered monthly progress monitoring tool that enables parents to…
Measuring Happiness: From Fluctuating Happiness to Authentic–Durable Happiness
Dambrun, Michaël; Ricard, Matthieu; Després, Gérard; Drelon, Emilie; Gibelin, Eva; Gibelin, Marion; Loubeyre, Mélanie; Py, Delphine; Delpy, Aurore; Garibbo, Céline; Bray, Elise; Lac, Gérard; Michaux, Odile
2012-01-01
On the basis of the theoretical distinction between self-centeredness and selflessness (Dambrun and Ricard, 2011), the main goal of this research was to develop two new scales assessing distinct dimensions of happiness. By trying to maximize pleasures and to avoid displeasures, we propose that a self-centered functioning induces a fluctuating happiness in which phases of pleasure and displeasure alternate repeatedly (i.e., Fluctuating Happiness). In contrast, a selfless psychological functioning postulates the existence of a state of durable plenitude that is less dependent upon circumstances but rather is related to a person’s inner resources and abilities to deal with whatever comes his way in life (i.e., Authentic–Durable Happiness). Using various samples (n = 735), we developed a 10-item Scale measuring Subjective Fluctuating Happiness (SFHS) and a 13-item scale assessing Subjective Authentic–Durable Happiness (SA–DHS). Results indicated high internal consistencies, satisfactory test–retest validities, and adequate convergent and discriminant validities with various constructs including a biological marker of stress (salivary cortisol). Consistent with our theoretical framework, while self-enhancement values were related only to fluctuating happiness, self-transcendence values were related only to authentic–durable happiness. Support for the distinction between contentment and inner-peace, two related markers of authentic happiness, also was found. PMID:22347202
NASA Astrophysics Data System (ADS)
Hardyanti, R. C.; Hartono; Fianti
2018-03-01
Physics Learning in Curriculum of 2013 is closely related to the implementation of scientific approach and authentic assessment in learning. This study aims to analyze the implementation of scientific approaches and authentic assessment in physics learning, as well as to analyze the constraints of scientific approach and authentic assessment in physics learning. The data collection techniques used in this study are questionnaires, observations, interviews, and documentation. The calculation results used are percentage techniques and analyzed by using qualitative descriptive approach. Based on the results of research and discussion, the implementation of physics learning based on the scientific approach goes well with the percentage of 84.60%. Physical learning activity based on authentic assessment also goes well with the percentage of 88%. The results of the percentage of scientific approaches and authentic assessment approaches are less than 100%. It shows that there are obstacles to the implementation of the scientific approach and the constraints of authentic assessment. The obstacles to the implementation of scientific approach include time, heavy load of material, input or ability of learners, the willingness of learners in asking questions, laboratory support, and the ability of students to process data. While the obstacles to the implementation of authentic assessment include the limited time for carrying out of authentic assessment, the components of the criteria in carrying out the authentic assessment, the lack of discipline in administering the administration, the difficulty of changing habits in carrying out the assessment from traditional assessment to the authentic assessment, the obstacle to process the score in accordance with the format Curriculum of 2013.
Discovering your authentic leadership.
George, Bill; Sims, Peter; McLean, Andrew N; Mayer, Diana
2007-02-01
The ongoing problems in business leadership over the past five years have underscored the need for a new kind of leader in the twenty-first century: the authentic leader. Author Bill George, a Harvard Business School professor and the former chairman and CEO of Medtronic, and his colleagues, conducted the largest leadership development study ever undertaken. They interviewed 125 business leaders from different racial, religious, national, and socioeconomic backgrounds to understand how leaders become and remain authentic. Their interviews showed that you do not have to be born with any particular characteristics or traits to lead. You also do not have to be at the top of your organization. Anyone can learn to be an authentic leader. The journey begins with leaders understanding their life stories. Authentic leaders frame their stories in ways that allow them to see themselves not as passive observers but as individuals who learn from their experiences. These leaders make time to examine their experiences and to reflect on them, and in doing so they grow as individuals and as leaders. Authentic leaders also work hard at developing self-awareness through persistent and often courageous self-exploration. Denial can be the greatest hurdle that leaders face in becoming self-aware, but authentic leaders ask for, and listen to, honest feedback. They also use formal and informal support networks to help them stay grounded and lead integrated lives. The authors argue that achieving business results over a sustained period of time is the ultimate mark of authentic leadership. It may be possible to drive short-term outcomes without being authentic, but authentic leadership is the only way to create long-term results.
A Continuous Identity Authentication Scheme Based on Physiological and Behavioral Characteristics.
Wu, Guannan; Wang, Jian; Zhang, Yongrong; Jiang, Shuai
2018-01-10
Wearable devices have flourished over the past ten years providing great advantages to people and, recently, they have also been used for identity authentication. Most of the authentication methods adopt a one-time authentication manner which cannot provide continuous certification. To address this issue, we present a two-step authentication method based on an own-built fingertip sensor device which can capture motion data (e.g., acceleration and angular velocity) and physiological data (e.g., a photoplethysmography (PPG) signal) simultaneously. When the device is worn on the user's fingertip, it will automatically recognize whether the wearer is a legitimate user or not. More specifically, multisensor data is collected and analyzed to extract representative and intensive features. Then, human activity recognition is applied as the first step to enhance the practicability of the authentication system. After correctly discriminating the motion state, a one-class machine learning algorithm is applied for identity authentication as the second step. When a user wears the device, the authentication process is carried on automatically at set intervals. Analyses were conducted using data from 40 individuals across various operational scenarios. Extensive experiments were executed to examine the effectiveness of the proposed approach, which achieved an average accuracy rate of 98.5% and an F1-score of 86.67%. Our results suggest that the proposed scheme provides a feasible and practical solution for authentication.
A Continuous Identity Authentication Scheme Based on Physiological and Behavioral Characteristics
Wu, Guannan; Wang, Jian; Zhang, Yongrong; Jiang, Shuai
2018-01-01
Wearable devices have flourished over the past ten years providing great advantages to people and, recently, they have also been used for identity authentication. Most of the authentication methods adopt a one-time authentication manner which cannot provide continuous certification. To address this issue, we present a two-step authentication method based on an own-built fingertip sensor device which can capture motion data (e.g., acceleration and angular velocity) and physiological data (e.g., a photoplethysmography (PPG) signal) simultaneously. When the device is worn on the user’s fingertip, it will automatically recognize whether the wearer is a legitimate user or not. More specifically, multisensor data is collected and analyzed to extract representative and intensive features. Then, human activity recognition is applied as the first step to enhance the practicability of the authentication system. After correctly discriminating the motion state, a one-class machine learning algorithm is applied for identity authentication as the second step. When a user wears the device, the authentication process is carried on automatically at set intervals. Analyses were conducted using data from 40 individuals across various operational scenarios. Extensive experiments were executed to examine the effectiveness of the proposed approach, which achieved an average accuracy rate of 98.5% and an F1-score of 86.67%. Our results suggest that the proposed scheme provides a feasible and practical solution for authentication. PMID:29320463
42 CFR 401.140 - Fees and charges.
Code of Federal Regulations, 2010 CFR
2010-10-01
... for records; and (3) Certification or authentication of records. (b) Fee schedules. The fee schedule.... (3) Certification or authentication of records. Three dollars per certification or authentication. (4...
Code of Federal Regulations, 2010 CFR
2010-07-01
... that my password or other form of authentication has become compromised? 363.19 Section 363.19 Money... that my password or other form of authentication has become compromised? If you become aware that your password has become compromised, that any other form of authentication has been compromised, lost, stolen...
ERIC Educational Resources Information Center
Mattord, Herbert J.
2012-01-01
Organizations continue to rely on password-based authentication methods to control access to many Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS). It developed an Authentication Method System Index (AMSI) to analyze collected data from…
ERIC Educational Resources Information Center
Thompson, Merlin B.
2015-01-01
The problem with authenticity--the idea of being "true to one's self"--is that its somewhat checkered reputation garners a complete range of favorable and unfavorable reactions. In educational settings, authenticity is lauded as one of the top two traits students desire in their teachers. Yet, authenticity is criticized for its tendency…
Robust authentication through stochastic femtosecond laser filament induced scattering surfaces
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Haisu; Tzortzakis, Stelios, E-mail: stzortz@iesl.forth.gr; Materials Science and Technology Department, University of Crete, 71003 Heraklion
2016-05-23
We demonstrate a reliable authentication method by femtosecond laser filament induced scattering surfaces. The stochastic nonlinear laser fabrication nature results in unique authentication robust properties. This work provides a simple and viable solution for practical applications in product authentication, while also opens the way for incorporating such elements in transparent media and coupling those in integrated optical circuits.
Obfuscated authentication systems, devices, and methods
Armstrong, Robert C; Hutchinson, Robert L
2013-10-22
Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu
2016-01-01
People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
Girls' relationship authenticity and self-esteem across adolescence.
Impett, Emily A; Sorsoli, Lynn; Schooler, Deborah; Henson, James M; Tolman, Deborah L
2008-05-01
Feminist psychologists have long posited that relationship authenticity (i.e., the congruence between what one thinks and feels and what one does and says in relational contexts) is integral to self-esteem and well-being. Guided by a feminist developmental framework, the authors investigated the role of relationship authenticity in promoting girls' self-esteem over the course of adolescence. Latent growth curve modeling was used to test the association between relationship authenticity and self-esteem with data from a 5-year, 3-wave longitudinal study of 183 adolescent girls. Results revealed that both relationship authenticity and self-esteem increased steadily in a linear fashion from the 8th to the 12th grade. Girls who scored high on the measure of relationship authenticity in the 8th grade experienced greater increases in self-esteem over the course of adolescence than girls who scored low on relationship authenticity. Further, girls who increased in authenticity also tended to increase in self-esteem over the course of adolescence. The importance of a feminist developmental framework for identifying and understanding salient dimensions of female adolescence is discussed. (PsycINFO Database Record (c) 2008 APA, all rights reserved).
Mishra, Raghavendra; Barnwal, Amit Kumar
2015-05-01
The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.
Spell, Rachelle M.; Guinan, Judith A.; Miller, Kristen R.; Beck, Christopher W.
2014-01-01
Incorporating authentic research experiences in introductory biology laboratory classes would greatly expand the number of students exposed to the excitement of discovery and the rigor of the scientific process. However, the essential components of an authentic research experience and the barriers to their implementation in laboratory classes are poorly defined. To guide future reform efforts in this area, we conducted a national survey of biology faculty members to determine 1) their definitions of authentic research experiences in laboratory classes, 2) the extent of authentic research experiences currently experienced in their laboratory classes, and 3) the barriers that prevent incorporation of authentic research experiences into these classes. Strikingly, the definitions of authentic research experiences differ among faculty members and tend to emphasize either the scientific process or the discovery of previously unknown data. The low level of authentic research experiences in introductory biology labs suggests that more development and support is needed to increase undergraduate exposure to research experiences. Faculty members did not cite several barriers commonly assumed to impair pedagogical reform; however, their responses suggest that expanded support for development of research experiences in laboratory classes could address the most common barrier. PMID:24591509
Spell, Rachelle M; Guinan, Judith A; Miller, Kristen R; Beck, Christopher W
2014-01-01
Incorporating authentic research experiences in introductory biology laboratory classes would greatly expand the number of students exposed to the excitement of discovery and the rigor of the scientific process. However, the essential components of an authentic research experience and the barriers to their implementation in laboratory classes are poorly defined. To guide future reform efforts in this area, we conducted a national survey of biology faculty members to determine 1) their definitions of authentic research experiences in laboratory classes, 2) the extent of authentic research experiences currently experienced in their laboratory classes, and 3) the barriers that prevent incorporation of authentic research experiences into these classes. Strikingly, the definitions of authentic research experiences differ among faculty members and tend to emphasize either the scientific process or the discovery of previously unknown data. The low level of authentic research experiences in introductory biology labs suggests that more development and support is needed to increase undergraduate exposure to research experiences. Faculty members did not cite several barriers commonly assumed to impair pedagogical reform; however, their responses suggest that expanded support for development of research experiences in laboratory classes could address the most common barrier.
Adulteration of apple with pear juice: emphasis on major carbohydrates, proline, and arbutin.
Thavarajah, Pushparajah; Low, Nicholas H
2006-06-28
Detection of juice-to-juice adulteration based on chemical composition studies is a common method used by government regulatory agencies and food companies. This study investigated the use of major carbohydrate (fructose, glucose and sucrose), polyol (sorbitol), proline, and phenolic profiles as indicators of pear adulteration of apple juice (PAAJ). For this work, a total of 105 authentic apple juice samples from 13 countries and 27 authentic pear juice samples from 5 countries were analyzed. Because the major carbohydrate ranges for these juices showed significant overlap their use as markers for PAAJ detection would be very limited. It was found that sorbitol and proline means for apple and pear were significantly different; however, their broad natural ranges would afford PAAJ at levels up to 30% without detection. In addition, careful selection of the pear juice used as the adulterant would further limit the usefulness of these markers for PAAJ detection. Arbutin was conclusively identified as a marker for pear juice on the basis of its presence in all 27 authentic pear samples and its absence (<0.5 microg/mL) in all 105 apple juice samples analyzed in this study. The application of the developed HPLC-PDA method for arbutin analysis to detect PAAJ at levels as low as 2% (v/v) was demonstrated. A confirmation method for the presence of arbutin in pure pear juice and apple adulterated with pear juice was introduced on the basis of the hydrolysis of arbutin to hydroquinone employing beta-glucosidase, with reactant and product monitoring by HPLC-PDA.
Foley, Mary Ann; Foy, Jeffrey; Schlemmer, Emily; Belser-Ehrlich, Janna
2010-11-01
Imagery encoding effects on source-monitoring errors were explored using the Deese-Roediger-McDermott paradigm in two experiments. While viewing thematically related lists embedded in mixed picture/word presentations, participants were asked to generate images of objects or words (Experiment 1) or to simply name the items (Experiment 2). An encoding task intended to induce spontaneous images served as a control for the explicit imagery instruction conditions (Experiment 1). On the picture/word source-monitoring tests, participants were much more likely to report "seeing" a picture of an item presented as a word than the converse particularly when images were induced spontaneously. However, this picture misattribution error was reversed after generating images of words (Experiment 1) and was eliminated after simply labelling the items (Experiment 2). Thus source misattributions were sensitive to the processes giving rise to imagery experiences (spontaneous vs deliberate), the kinds of images generated (object vs word images), and the ways in which materials were presented (as pictures vs words).
Artificial neural networks for modeling time series of beach litter in the southern North Sea.
Schulz, Marcus; Matthies, Michael
2014-07-01
In European marine waters, existing monitoring programs of beach litter need to be improved concerning litter items used as indicators of pollution levels, efficiency, and effectiveness. In order to ease and focus future monitoring of beach litter on few important litter items, feed-forward neural networks consisting of three layers were developed to relate single litter items to general categories of marine litter. The neural networks developed were applied to seven beaches in the southern North Sea and modeled time series of five general categories of marine litter, such as litter from fishing, shipping, and tourism. Results of regression analyses show that general categories were predicted significantly moderately to well. Measured and modeled data were in the same order of magnitude, and minima and maxima overlapped well. Neural networks were found to be eligible tools to deliver reliable predictions of marine litter with low computational effort and little input of information. Copyright © 2014 Elsevier Ltd. All rights reserved.
Bayen, Ute J.; Kuhlmann, Beatrice G.
2010-01-01
The authors investigated conditions under which judgments in source-monitoring tasks are influenced by prior schematic knowledge. According to a probability-matching account of source guessing (Spaniol & Bayen, 2002), when people do not remember the source of information, they match source guessing probabilities to the perceived contingency between sources and item types. When they do not have a representation of a contingency, they base their guesses on prior schematic knowledge. The authors provide support for this account in two experiments with sources presenting information that was expected for one source and somewhat unexpected for another. Schema-relevant information about the sources was provided at the time of encoding. When contingency perception was impeded by dividing attention, participants showed schema-based guessing (Experiment 1). Manipulating source - item contingency also affected guessing (Experiment 2). When this contingency was schema-inconsistent, it superseded schema-based expectations and led to schema-inconsistent guessing. PMID:21603251
The Cambridge Behavioural Inventory revised
Wear, Helen J.; Wedderburn, Catherine J.; Mioshi, Eneida; Williams-Gray, Caroline H.; Mason, Sarah L.; Barker, Roger A.; Hodges, John R.
2008-01-01
Neurobehavioural and psychiatric symptoms are common in a range of neurodegenerative disorders with distinct profiles which are helpful in the diagnosis and monitoring of these disorders. The Cambridge Behavioural Inventory (CBI) has been shown to distinguish frontotemporal dementia (FTD), Alzheimer’s disease (AD), Huntington’s disease (HD) and Parkinson’s disease (PD), but it is lengthy. Objective To develop a shorter version of the 81 item CBI. Methods CBI data from 450 participants with behavioural variant frontotemporal dementia (bv-FTD) (64), AD (96), PD (215) and HD (75) were analysed using Principal Components Analysis and measures of internal consistency (Cronbach alpha). Results A reduced 45-item questionnaire was developed. The instrument identified distinct behavioural profiles and performed as well as the original version. Conclusions A shorter (45 item) version of the CBI is capable of differentiating bv-FTD and AD from PD and HD. It may be useful in delineating the type and extent of problems in these disorders as well as monitoring therapeutic interventions. PMID:29213551
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho
2014-01-01
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.
Authentic leadership and its effect on employees' organizational citizenship behaviours.
Edú Valsania, Sergio; Moriano León, Juan A; Molero Alonso, Fernando; Topa Cantisano, Gabriela
2012-11-01
The studies that have verified the positive association of authentic leadership with organizational citizenship behaviours (OCBs), have used global measures of both constructs. Therefore, the goal of this work is to analyze the effect of authentic leadership on employees' OCBs, specifically focusing on the relations of the four components of authentic leadership with the individual and organizational dimensions of the OCBs. The participants of this study were 220 Spanish employees (30.9% men and 69.1% women) who completed a questionnaire that included the variables of interest in this study: Authentic Leadership, OCB and Sociobiographical control variables. The results, obtained with stepwise multiple regression analysis, show that two components of authentic leadership-moral perspective and relational transparency-present significant relationships with OCB. Moreover, authentic leadership is a better predictor of employees' OCB when these behaviors are impersonal and directed towards the organization than when they are directed towards other people. These results have practical implications for human resources management in organizations, especially in selection processes and when training top executives.
Security of fragile authentication watermarks with localization
NASA Astrophysics Data System (ADS)
Fridrich, Jessica
2002-04-01
In this paper, we study the security of fragile image authentication watermarks that can localize tampered areas. We start by comparing the goals, capabilities, and advantages of image authentication based on watermarking and cryptography. Then we point out some common security problems of current fragile authentication watermarks with localization and classify attacks on authentication watermarks into five categories. By investigating the attacks and vulnerabilities of current schemes, we propose a variation of the Wong scheme18 that is fast, simple, cryptographically secure, and resistant to all known attacks, including the Holliman-Memon attack9. In the new scheme, a special symmetry structure in the logo is used to authenticate the block content, while the logo itself carries information about the block origin (block index, the image index or time stamp, author ID, etc.). Because the authentication of the content and its origin are separated, it is possible to easily identify swapped blocks between images and accurately detect cropped areas, while being able to accurately localize tampered pixels.
Schmader, Toni; Sedikides, Constantine
2017-10-01
People seek out situations that "fit," but the concept of fit is not well understood. We introduce State Authenticity as Fit to the Environment (SAFE), a conceptual framework for understanding how social identities motivate the situations that people approach or avoid. Drawing from but expanding the authenticity literature, we first outline three types of person-environment fit: self-concept fit, goal fit, and social fit. Each type of fit, we argue, facilitates cognitive fluency, motivational fluency, and social fluency that promote state authenticity and drive approach or avoidance behaviors. Using this model, we assert that contexts subtly signal social identities in ways that implicate each type of fit, eliciting state authenticity for advantaged groups but state inauthenticity for disadvantaged groups. Given that people strive to be authentic, these processes cascade down to self-segregation among social groups, reinforcing social inequalities. We conclude by mapping out directions for research on relevant mechanisms and boundary conditions.
Monitoring system including an electronic sensor platform and an interrogation transceiver
Kinzel, Robert L.; Sheets, Larry R.
2003-09-23
A wireless monitoring system suitable for a wide range of remote data collection applications. The system includes at least one Electronic Sensor Platform (ESP), an Interrogator Transceiver (IT) and a general purpose host computer. The ESP functions as a remote data collector from a number of digital and analog sensors located therein. The host computer provides for data logging, testing, demonstration, installation checkout, and troubleshooting of the system. The IT transmits signals from one or more ESP's to the host computer to the ESP's. The IT host computer may be powered by a common power supply, and each ESP is individually powered by a battery. This monitoring system has an extremely low power consumption which allows remote operation of the ESP for long periods; provides authenticated message traffic over a wireless network; utilizes state-of-health and tamper sensors to ensure that the ESP is secure and undamaged; has robust housing of the ESP suitable for use in radiation environments; and is low in cost. With one base station (host computer and interrogator transceiver), multiple ESP's may be controlled at a single monitoring site.
22 CFR 61.5 - Authentication procedures-Imports.
Code of Federal Regulations, 2012 CFR
2012-04-01
... AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking Department authentication of foreign produced audio-visual materials shall submit to the Department a bona fide foreign...
22 CFR 61.5 - Authentication procedures-Imports.
Code of Federal Regulations, 2013 CFR
2013-04-01
... AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking Department authentication of foreign produced audio-visual materials shall submit to the Department a bona fide foreign...
22 CFR 61.5 - Authentication procedures-Imports.
Code of Federal Regulations, 2014 CFR
2014-04-01
... AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking Department authentication of foreign produced audio-visual materials shall submit to the Department a bona fide foreign...
[Inheritance and innovation of traditional Chinese medicinal authentication].
Zhao, Zhong-zhen; Chen, Hu-biao; Xiao, Pei-gen; Guo, Ping; Liang, Zhi-tao; Hung, Fanny; Wong, Lai-lai; Brand, Eric; Liu, Jing
2015-09-01
Chinese medicinal authentication is fundamental for the standardization and globalization of Chinese medicine. The discipline of authentication addresses difficult issues that have remained unresolved for thousands of years, and is essential for preserving safety. Chinese medicinal authentication has both scientific and traditional cultural connotations; the use of scientific methods to elucidate traditional experience-based differentiation carries the legacy of Chinese medicine forward, and offers immediate practical significance and long-term scientific value. In this paper, a path of inheritance and innovation is explored through the scientific exposition of Chinese medicinal authentication, featuring a review of specialized publications, the establishment of a Chinese medicine specimen center and Chinese medicinal image databases, the expansion of authentication technologies, and the formation of a cultural project dedicated to the Compedium of Materia Medica.
Rapp-Santos, Kamala; Havas, Karyn; Vest, Kelly
2015-01-01
The Destination Monitoring Program, operated by the US Army Public Health Command (APHC), is one component that supports the APHC Veterinary Service's mission to ensure safety and quality of food procured for the Department of Defense (DoD). This program relies on retail product testing to ensure compliance of production facilities and distributors that supply food to the DoD. This program was assessed to determine the validity and timeliness by specifically evaluating whether sample size of items collected was adequate, if food samples collected were representative of risk, and whether the program returns results in a timely manner. Data was collected from the US Army Veterinary Services Lotus Notes database, including all food samples collected and submitted from APHC Region-North for the purposes of destination monitoring from January 1, 2013 to December 31, 2013. For most food items, only one sample was submitted for testing. The ability to correctly identify a contaminated food lot may be limited by reliance on test results from only one sample, as the level of confidence in a negative test result is low. The food groups most frequently sampled by APHC correlated with the commodities that were implicated in foodborne illness in the United States. Food items to be submitted were equally distributed among districts and branches, but sections within large branches submitted relatively few food samples compared to sections within smaller branches and districts. Finally, laboratory results were not available for about half the food items prior to their respective expiration dates.
ERIC Educational Resources Information Center
Czernochowski, Daniela; Mecklinger, Axel; Johansson, Mikael
2009-01-01
We examined developmental aspects of the ability to monitor the temporal context of an item's previous occurrence while event-related potentials (ERPs) were recorded. In a continuous recognition task, children between 10 and 12 years and young adults watched a stream of pictures repeated with a lag of 10-15 intervening items and indicated…
Backup key generation model for one-time password security protocol
NASA Astrophysics Data System (ADS)
Jeyanthi, N.; Kundu, Sourav
2017-11-01
The use of one-time password (OTP) has ushered new life into the existing authentication protocols used by the software industry. It introduced a second layer of security to the traditional username-password authentication, thus coining the term, two-factor authentication. One of the drawbacks of this protocol is the unreliability of the hardware token at the time of authentication. This paper proposes a simple backup key model that can be associated with the real world applications’user database, which would allow a user to circumvent the second authentication stage, in the event of unavailability of the hardware token.
LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP
NASA Astrophysics Data System (ADS)
Chenait, Manel
Mobile IP represents a simple and scalable global mobility solution. However, it inhibits various vulnerabilities to malicious attacks and, therefore, requires the integration of appropriate security services. In this paper, we discuss two authentication schemes suggested for Mobile IP: standard authentication and Mobile IP/AAA authentication. In order to provide Mobile IP roaming services including identity verication, we propose an improvement to Mobile/AAA authentication scheme by applying a local politic key management in each domain, hence we reduce hando latency by avoiding the involvement of AAA infrastructure during mobile node roaming.
Chauhan, Kiran P; Trivedi, Amit P; Patel, Dharmik; Gami, Bhakti; Haridas, N
2014-10-01
Quality can be defined as the ability of a product or service to satisfy the needs and expectations of the customer. Laboratories are more focusing on technical and analytical quality for reliability and accuracy of test results. Patients and clinicians however are interested in rapid, reliable and efficient service from laboratory. Turn around time (TAT), the timeliness with which laboratory personnel deliver test results, is one of the most noticeable signs of laboratory service and is often used as a key performance indicator of laboratory performance. This study is aims to provide clue for laboratory TAT monitoring and root cause analysis. In a 2 year period a total of 75,499 specimens of outdoor patient department were monitor, of this a total of 4,142 specimens exceeded TAT. With consistent efforts to monitor, root cause analysis and corrective measures, we are able to decreased the specimens exceeding TAT from 7-8 to 3.7 %. Though it is difficult task to monitor TAT with the help of laboratory information system, real time documentation and authentic data retrievable, along with identification of causes for delays and its remedial measures, improve laboratory TAT and thus patient satisfaction.
Context cue focality influences strategic prospective memory monitoring.
Hunter Ball, B; Bugg, Julie M
2018-02-12
Monitoring the environment for the occurrence of prospective memory (PM) targets is a resource-demanding process that produces cost (e.g., slower responding) to ongoing activities. However, research suggests that individuals are able to monitor strategically by using contextual cues to reduce monitoring in contexts in which PM targets are not expected to occur. In the current study, we investigated the processes supporting context identification (i.e., determining whether or not the context is appropriate for monitoring) by testing the context cue focality hypothesis. This hypothesis predicts that the ability to monitor strategically depends on whether the ongoing task orients attention to the contextual cues that are available to guide monitoring. In Experiment 1, participants performed an ongoing lexical decision task and were told that PM targets (TOR syllable) would only occur in word trials (focal context cue condition) or in items starting with consonants (nonfocal context cue condition). In Experiment 2, participants performed an ongoing first letter judgment (consonant/vowel) task and were told that PM targets would only occur in items starting with consonants (focal context cue condition) or in word trials (nonfocal context cue condition). Consistent with the context cue focality hypothesis, strategic monitoring was only observed during focal context cue conditions in which the type of ongoing task processing automatically oriented attention to the relevant features of the contextual cue. These findings suggest that strategic monitoring is dependent on limited-capacity processing resources and may be relatively limited when the attentional demands of context identification are sufficiently high.
Stephan-Otto, Christian; Siddi, Sara; Senior, Carl; Muñoz-Samons, Daniel; Ochoa, Susana; Sánchez-Laforga, Ana María; Brébion, Gildas
2017-01-01
Background Visual mental imagery might be critical in the ability to discriminate imagined from perceived pictures. Our aim was to investigate the neural bases of this specific type of reality-monitoring process in individuals with high visual imagery abilities. Methods A reality-monitoring task was administered to twenty-six healthy participants using functional magnetic resonance imaging. During the encoding phase, 45 words designating common items, and 45 pictures of other common items, were presented in random order. During the recall phase, participants were required to remember whether a picture of the item had been presented, or only a word. Two subgroups of participants with a propensity for high vs. low visual imagery were contrasted. Results Activation of the amygdala, left inferior occipital gyrus, insula, and precuneus were observed when high visual imagers encoded words later remembered as pictures. At the recall phase, these same participants activated the middle frontal gyrus and inferior and superior parietal lobes when erroneously remembering pictures. Conclusions The formation of visual mental images might activate visual brain areas as well as structures involved in emotional processing. High visual imagers demonstrate increased activation of a fronto-parietal source-monitoring network that enables distinction between imagined and perceived pictures. PMID:28046076
Development of a golf-specific load monitoring tool: Content validity and feasibility.
Williams, Scott B; Gastin, Paul B; Saw, Anna E; Robertson, Sam
2018-05-01
Athletes often record details of their training and competitions, supported by information such as environmental conditions, travel, as well as how they felt. However, it is not known how prevalent these practices are in golfers, or how valuable this process is perceived. The purpose of this study was to develop a golf-specific load monitoring tool (GLMT), and establish the content validity and feasibility of this tool amongst high-level golfers. In the first phase of development, 21 experts were surveyed to determine the suitability of items for inclusion in the GLMT. Of the 36 items, 21 received >78% agreement, a requirement to establish content validity and for inclusion in the GLMT. Total duration was the preferred metric for golf-specific activities, whilst rating of perceived exertion (RPE) was preferred for measuring physical training. In the second phase, feasibility of the tool was assessed by surveying 13 high-level male golfers following 28-days of daily GLMT use. All items included in the GLMT were deemed feasible to record, with all players participating in the feasibility study providing high to very high ratings. Golfers responded that they would consider using a load monitoring tool of this nature long term, provided it can be completed in less than five minutes per day.
Johansson, Mikael; Mecklinger, Axel
2003-10-01
The focus of the present paper is a late posterior negative slow wave (LPN) that has frequently been reported in event-related potential (ERP) studies of memory. An overview of these studies suggests that two broad classes of experimental conditions tend to elicit this component: (a) item recognition tasks associated with enhanced action monitoring demands arising from response conflict and (b) memory tasks that require the binding of items with contextual information specifying the study episode. A combined stimulus- and response-locked analysis of data from two studies mapping onto these classes allowed a temporal and functional decomposition of the LPN. While only the LPN observed in the item recognition task could be attributed to the involvement of a posteriorly distributed response-locked error-related negativity (or error negativity; ERN/Ne) occurring immediately after the response, the source-memory task was associated with a stimulus-locked negative slow wave occurring prior and during response execution that was evident when data were matched for response latencies. We argue that the presence of the former reflects action monitoring due to high levels of response conflict, whereas the latter reflects retrieval processes that may act to reconstruct the prior study episode when task-relevant attribute conjunctions are not readily recovered or need continued evaluation.
Antecedents, mediators, and outcomes of authentic leadership in healthcare: A systematic review.
Alilyyani, Bayan; Wong, Carol A; Cummings, Greta
2018-07-01
Leaders are essential in every organization to achieve patient safety and healthy work environments. Authentic leadership is a relational leadership style purported to promote healthy work environments that influence staff performance and organizational outcomes. Given recent growth in authentic leadership research in healthcare and the importance of new knowledge to inform leadership development, there is an obligation to determine what is known about the antecedents and outcomes of authentic leadership in healthcare settings and clarify mechanisms by which authentic leadership affects healthcare staff and patient outcomes. The aim of this systematic review was to examine the antecedents, mediators and outcomes associated with authentic leadership in healthcare. Systematic review. The search strategy included 11 electronic databases: ABI Inform Dateline, Academic Search Complete, Cochrane Database of Systematic Reviews, PubMed, CINAHL, Embase, ERIC, PsycINFO, Scopus, Web of Science, and ProQuest Dissertations & Theses. The search was conducted in January 2017. Published English-only quantitative research that examined the antecedents, mediators and outcomes of authentic leadership practices of leaders in healthcare settings was included. Quality assessment, data extractions, and analysis were completed on all included studies. Data extracted from included studies were analyzed through descriptive and narrative syntheses. Content analysis was used to group antecedents, outcomes and mediators into categories which were then compared to authentic leadership theory. 1036 titles and abstracts were screened yielding 136 manuscripts for full-text review which resulted in 21 included studies reported in 38 manuscripts. Significant associations between authentic leadership and 43 outcomes were grouped into two major themes: healthcare staff outcomes with 5 subthemes (personal psychological states, satisfaction with work, work environment factors, health & well-being, and performance) and patient outcomes. There were 23 mediators between authentic leadership and 35 different outcomes in the included studies and one antecedent of authentic leadership. Findings of this review provide support for authentic leadership theory and suggest need for additional testing in future studies using longitudinal and interventional designs in more varied healthcare settings with diverse and interprofessional healthcare samples. Knowledge generated through this systematic review provides a more comprehensive understanding of authentic leadership, which can be used to educate future leaders and has the potential to improve leadership development strategies and positive outcomes in healthcare workplaces. Copyright © 2018 Elsevier Ltd. All rights reserved.
Monitoring item and source information: evidence for a negative generation effect in source memory.
Jurica, P J; Shimamura, A P
1999-07-01
Item memory and source memory were assessed in a task that simulated a social conversation. Participants generated answers to questions or read statements presented by one of three sources (faces on a computer screen). Positive generation effects were observed for item memory. That is, participants remembered topics of conversation better if they were asked questions about the topics than if they simply read statements about topics. However, a negative generation effect occurred for source memory. That is, remembering the source of some information was disrupted if participants were required to answer questions pertaining to that information. These findings support the notion that item and source memory are mediated, as least in part, by different processes during encoding.
Automated Iodine Monitoring System Development (AIMS). [shuttle prototype
NASA Technical Reports Server (NTRS)
1975-01-01
The operating principle of the automated iodine monitoring/controller system (AIMS) is described along with several design modifications. The iodine addition system is also discussed along with test setups and calibration; a facsimile of the optical/mechanical portion of the iodine monitor was fabricated and tested. The appendices include information on shuttle prototype AIMS, preliminary prime item development specifications, preliminary failure modes and effects analysis, and preliminary operating and maintenance instructions.
Neural mechanisms of mood-induced modulation of reality monitoring in schizophrenia
Subramaniam, Karuna; Ranasinghe, Kamalini G.; Mathalon, Daniel; Nagarajan, Srikantan; Vinogradov, Sophia
2017-01-01
Reality monitoring is the ability to accurately distinguish the source of self-generated information from externally-presented information. Although people with schizophrenia (SZ) show impaired reality monitoring, nothing is known about how mood state influences this higher-order cognitive process. Accordingly, we induced positive, neutral and negative mood states to test how different mood states modulate subsequent reality monitoring performance. Our findings indicate that mood affected reality monitoring performance in HC and SZ participants in both similar and dissociable ways. Only a positive mood facilitated task performance in Healthy Control (HC) subjects, whereas a negative mood facilitated task performance in SZ subjects. Yet, when both HC and SZ participants were in a positive mood, they recruited medial prefrontal cortex (mPFC) to bias better subsequent self-generated item identification, despite the fact that mPFC signal was reduced in SZ participants. Additionally, in SZ subjects, negative mood states also modulated left and right dorsal mPFC signal to bias better externally-presented item identification. Together our findings reveal that although the mPFC is hypoactive in SZ participants, mPFC signal plays a functional role in mood–cognition interactions during both positive and negative mood states to facilitate subsequent reality monitoring decision-making. PMID:28162778
38 CFR 3.202 - Evidence from foreign countries.
Code of Federal Regulations, 2010 CFR
2010-07-01
... country, such authentication may be made as follows: (1) By a consular agent of a friendly government... of the investigation concerning its authenticity. (b) Authentication will not be required: (1) On...
Orr, Daniela; Baram-Tsabari, Ayelet; Landsman, Keren
2016-01-01
Social media can act as an important platform for debating, discussing, and disseminating information about vaccines. Our objectives were to map and describe the roles played by web-based mainstream media and social media as platforms for vaccination-related public debates and discussions during the Polio crisis in Israel in 2013: where and how did the public debate and discuss the issue, and how can these debates and discussions be characterized? Polio-related coverage was collected from May 28 to October 31, 2013, from seven online Hebrew media platforms and the Facebook groups discussing the Polio vaccination were mapped and described. In addition, 2,289 items from the Facebook group "Parents talk about Polio vaccination" were analyzed for socio-demographic and thematic characteristics. The traditional media mainly echoed formal voices from the Ministry of Health. The comments on the Facebook vaccination opposition groups could be divided into four groups: comments with individualistic perceptions, comments that expressed concerns about the safety of the OPV, comments that expressed distrust in the Ministry of Health, and comments denying Polio as a disease. In the Facebook group "Parents talk about the Polio vaccination", an active group with various participants, 321 commentators submitted 2289 comments, with 64 % of the comments written by women. Most (92 %) people involved were parents. The comments were both personal (referring to specific situations) and general in nature (referring to symptoms or wide implications). A few (13 %) of the commentators were physicians ( n = 44), who were responsible for 909 (40 %) of the items in the sample. Half the doctors and 6 % of the non-doctors wrote over 10 items each. This Facebook group formed a unique platform where unmediated debates and discussions between the public and medical experts took place. The comments on the social media, as well as the socio-demographic profiles of the commentators, suggest that social media is an active and versatile debate and discussion-facilitating platform in the context of vaccinations. This paper presents public voices, which should be seen as authentic (i.e. unmediated by the media or other political actors) and useful for policy making purposes. The policy implications include identifying social media as a main channel of communication during health crises, and acknowledging the voices heard on social media as authentic and useful for policy making. Human and financial resources need to be devolved specifically to social media. Health officials and experts need to be accessible on social media, and be equipped to readily provide the information, support and advice the public is looking for.
Secure Biometric Multi-Logon System Based on Current Authentication Technologies
NASA Astrophysics Data System (ADS)
Tait, Bobby L.
The need for accurate authentication in the current IT world is of utmost importance. Users rely on current IT technologies to facilitate in day to day interactions with nearly all environments. Strong authentication technologies like the various biometric technologies have been in existence for many years. Many of these technologies, for instance fingerprint biometrics, have reached maturity. However, passwords and pins are still the most commonly used authentication mechanisms at this stage. An average user has to be authenticated in various situations during daily interaction with his or her environment, by means of a pin or a password. This results in many different passwords and pins that the user has to remember. The user will eventually either start documenting these passwords and pins, or often, simply use the same password and pin for all authentication situations.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng
2015-11-01
To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.
Authentic leaders creating healthy work environments for nursing practice.
Shirey, Maria R
2006-05-01
Implementation of authentic leadership can affect not only the nursing workforce and the profession but the healthcare delivery system and society as a whole. Creating a healthy work environment for nursing practice is crucial to maintain an adequate nursing workforce; the stressful nature of the profession often leads to burnout, disability, and high absenteeism and ultimately contributes to the escalating shortage of nurses. Leaders play a pivotal role in retention of nurses by shaping the healthcare practice environment to produce quality outcomes for staff nurses and patients. Few guidelines are available, however, for creating and sustaining the critical elements of a healthy work environment. In 2005, the American Association of Critical-Care Nurses released a landmark publication specifying 6 standards (skilled communication, true collaboration, effective decision making, appropriate staffing, meaningful recognition, and authentic leadership) necessary to establish and sustain healthy work environments in healthcare. Authentic leadership was described as the "glue" needed to hold together a healthy work environment. Now, the roles and relationships of authentic leaders in the healthy work environment are clarified as follows: An expanded definition of authentic leadership and its attributes (eg, genuineness, trustworthiness, reliability, compassion, and believability) is presented. Mechanisms by which authentic leaders can create healthy work environments for practice (eg, engaging employees in the work environment to promote positive behaviors) are described. A practical guide on how to become an authentic leader is advanced. A research agenda to advance the study of authentic leadership in nursing practice through collaboration between nursing and business is proposed.
Attacks on quantum key distribution protocols that employ non-ITS authentication
NASA Astrophysics Data System (ADS)
Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.
2016-01-01
We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.
ERIC Educational Resources Information Center
Abe, D.; And Others
This discussion shows that "authentic documents" are a basic tool for the acquisition of communicative competence in a second language. An authentic document is a sort of photograph of discourse produced at a given time and in a given place. Like a cliche, it has its own existence. Two reasons for choosing authentic documents in second language…
Efficient authentication scheme based on near-ring root extraction problem
NASA Astrophysics Data System (ADS)
Muthukumaran, V.; Ezhilmaran, D.
2017-11-01
An authentication protocolis the type of computer communication protocol or cryptography protocol specifically designed for transfer of authentication data between two entities. We have planned a two new entity authentication scheme on the basis of root extraction problem near-ring in this article. We suggest that this problem is suitably difficult to serve as a cryptographic assumption over the platform of near-ring N. The security issues also discussed.
NASA Astrophysics Data System (ADS)
Komogortsev, Oleg V.; Karpov, Alexey; Holland, Corey D.
2012-06-01
The widespread use of computers throughout modern society introduces the necessity for usable and counterfeit-resistant authentication methods to ensure secure access to personal resources such as bank accounts, e-mail, and social media. Current authentication methods require tedious memorization of lengthy pass phrases, are often prone to shouldersurfing, and may be easily replicated (either by counterfeiting parts of the human body or by guessing an authentication token based on readily available information). This paper describes preliminary work toward a counterfeit-resistant usable eye movement-based (CUE) authentication method. CUE does not require any passwords (improving the memorability aspect of the authentication system), and aims to provide high resistance to spoofing and shoulder-surfing by employing the combined biometric capabilities of two behavioral biometric traits: 1) oculomotor plant characteristics (OPC) which represent the internal, non-visible, anatomical structure of the eye; 2) complex eye movement patterns (CEM) which represent the strategies employed by the brain to guide visual attention. Both OPC and CEM are extracted from the eye movement signal provided by an eye tracking system. Preliminary results indicate that the fusion of OPC and CEM traits is capable of providing a 30% reduction in authentication error when compared to the authentication accuracy of individual traits.
Choi, Han Gyo; Ahn, Sung Hee
2016-02-01
The aim of this study was to examine the mediating effect of empowerment in the relationship of nurse managers' authentic leadership, with nurses' organizational commitment and job satisfaction. The participants in this study were 273 registered nurses working in five University hospitals located in Seoul and Gyeonggi Province. The measurements included the Authentic Leadership Questionnaire, Condition of Work Effectiveness Questionnaire-II, Organizational Commitment Questionnaire and Korea-Minnesota Satisfaction Questionnaire. Data were analyzed using t-test, ANOVA, Scheffé test, Pearson correlation coefficients, simple and multiple regression techniques with the SPSS 18.0 program. Mediation analysis was performed according to the Baron and Kenny method and Sobel test. There were significant correlations among authentic leadership, empowerment, organizational commitment and job satisfaction. Empowerment showed perfect mediating effects in the relationship between authentic leadership and organizational commitment. It had partial mediating effects in the relationship between authentic leadership and job satisfaction. In this study, nurse managers' authentic leadership had significant influences on nurses organizational commitment and job satisfaction via empowerment. Therefore, to enhance nurses' organizational commitment and job satisfaction, it is necessary to build effective strategies to enhance nurse manager's authentic leadership and to develop empowering education programs for nurses.
[Source monitoring: general presentation and review of literature in schizophrenia].
Ferchiou, A; Schürhoff, F; Bulzacka, E; Mahbouli, M; Leboyer, M; Szöke, A
2010-09-01
SOURCE MONITORING FRAMEWORK: Source monitoring refers to the ability to remember the origin of information. Three source monitoring processes can be distinguished: external source monitoring, internal or self-monitoring and reality monitoring (i.e. discrimination between internal and external sources of information). Source monitoring decisions are based on memory characteristics recorded such as perceptions, contextual information or emotional reactions and heuristic or more controlled judgement processes. Several studies suggested that specific structures in the prefrontal and the mediotemporal lobes are the main areas implicated in source monitoring. A typical source monitoring paradigm includes an items generation stage and a second stage of recognition of items (old versus new) and identification of their sources: external (usually the examiner) or internal (the subject). Several indices can be calculated based on the raw data such as the number of false alarms, attribution biases or discrimination indexes. To date, there is no standardized source monitoring task and differences in the type of items used (words, pictures), in the cognitive or emotional effort involved or in the delay between the two test stages, contribute to the heterogeneity of results. Factors such as age (either very young or very old) and emotions influence source monitoring performances. Influence of gender was not properly explored, whereas the role of IQ and selective attention is still debated. Source monitoring deficits are observed mainly in disorders affecting frontotemporal areas, such as frontal trauma, Alzheimer's disease or frontotemporal dementia. Source monitoring errors (e.g. external misattribution of self-generated information) are observed in schizophrenia and seem to correlate with positive symptomatology, in particular auditory hallucinations, thought intrusion and alien control symptoms. These results are of particular interest in clinical research because source monitoring is one of the rare cognitive tests showing a correlation with the positive dimension. Source monitoring deficits have been proposed as a potential explanation for the positive symptoms and some, but not all studies lent support to this hypothesis. Heterogeneity of studied samples, in particular different criteria to define hallucinating subjects (e.g. currently versus anytime during their lives), could explain the discordant results. Source monitoring impairments were observed in pharmacological models of psychosis, in first degree relatives of schizophrenic patients, and also in the general population associated with schizotypal dimensions. These results support a relationship between source monitoring deficits and some of the symptomatic dimensions of the schizophrenic spectrum but still await replication. Some studies found source monitoring deficits in other psychiatric conditions such as mania or obsessive-compulsive disorder. Thus, those studies suggest that source monitoring deficits may be not specific to schizophrenia. Source monitoring competencies are critical for good (i.e. adapted) everyday functioning. Source monitoring deficits have been suggested as a potential explanation for some (or all) positive psychotic symptoms. However, to date, methodological inconsistencies (especially with regard to test design and choice of subjects' samples) have precluded firm, definite conclusions. Copyright © 2010 L’Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.
Children Can Accurately Monitor and Control Their Number-Line Estimation Performance
ERIC Educational Resources Information Center
Wall, Jenna L.; Thompson, Clarissa A.; Dunlosky, John; Merriman, William E.
2016-01-01
Accurate monitoring and control are essential for effective self-regulated learning. These metacognitive abilities may be particularly important for developing math skills, such as when children are deciding whether a math task is difficult or whether they made a mistake on a particular item. The present experiments investigate children's ability…
Progress Monitoring in Grade 5 Science for Low Achievers
ERIC Educational Resources Information Center
Vannest, Kimberly J.; Parker, Richard; Dyer, Nicole
2011-01-01
This article presents procedures and results from a 2-year project developing science key vocabulary (KV) short tests suitable for progress monitoring Grade 5 science in Texas public schools using computer-generated, -administered, and -scored assessments. KV items included KV definitions and important usages in a multiple-choice cloze format. A…
User Authentication in Smartphones for Telehealth
SMITH, KATHERINE A.; ZHOU, LEMING; WATZLAF, VALERIE J. M.
2017-01-01
Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed. PMID:29238444
User Authentication in Smartphones for Telehealth.
Smith, Katherine A; Zhou, Leming; Watzlaf, Valerie J M
2017-01-01
Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed.
Counterfeit-resistant materials and a method and apparatus for authenticating materials
Ramsey, J. Michael; Klatt, Leon N.
2001-01-01
Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&
Counterfeit-resistant materials and a method and apparatus for authenticating materials
Ramsey, J. Michael; Klatt, Leon N.
2000-01-01
Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.
Finding the authentic self in a communal culture: developmental goals in emerging adulthood.
Scharf, Miri; Mayseless, Ofra
2010-01-01
Finding and cultivating a sense of authentic self is an important life goal for emerging adults. In collectivist cultures, youngsters might need to distance themselves to find and discover their authentic selves separate of the expectations of society and significant others. Creating an autonomous time bubble that focuses on the present allows youngsters to forge a sense of personal meaning and authenticity that subsequently paves the way to reintegration into long-term life goals. The results focusing on Israeli emerging adults demonstrate that a sense of authentic self plays a central role in their well-being and socioemotional functioning. © Wiley Periodicals, Inc.
Analysis of MD5 authentication in various routing protocols using simulation tools
NASA Astrophysics Data System (ADS)
Dinakaran, M.; Darshan, K. N.; Patel, Harsh
2017-11-01
Authentication being an important paradigm of security and Computer Networks require secure paths to make the flow of the data even more secure through some security protocols. So MD-5(Message Digest 5) helps in providing data integrity to the data being sent through it and authentication to the network devices. This paper gives a brief introduction to the MD-5, simulation of the networks by including MD-5 authentication using various routing protocols like OSPF, EIGRP and RIPv2. GNS3 is being used to simulate the scenarios. Analysis of the MD-5 authentication is done in the later sections of the paper.
Mollison, Matthew V; Curran, Tim
2012-09-01
Familiarity and recollection are thought to be separate processes underlying recognition memory. Event-related potentials (ERPs) dissociate these processes, with an early (approximately 300-500ms) frontal effect relating to familiarity (the FN400) and a later (500-800ms) parietal old/new effect relating to recollection. It has been debated whether source information for a studied item (i.e., contextual associations from when the item was previously encountered) is only accessible through recollection, or whether familiarity can contribute to successful source recognition. It has been shown that familiarity can assist in perceptual source monitoring when the source attribute is an intrinsic property of the item (e.g., an object's surface color), but few studies have examined its contribution to recognizing extrinsic source associations. Extrinsic source associations were examined in three experiments involving memory judgments for pictures of common objects. In Experiment 1, source information was spatial and results suggested that familiarity contributed to accurate source recognition: the FN400 ERP component showed a source accuracy effect, and source accuracy was above chance for items judged to only feel familiar. Source information in Experiment 2 was an extrinsic color association; source accuracy was at chance for familiar items and the FN400 did not differ between correct and incorrect source judgments. Experiment 3 replicated the results using a within-subjects manipulation of spatial vs. color source. Overall, the results suggest that familiarity's contribution to extrinsic source monitoring depends on the type of source information being remembered. Copyright © 2012 Elsevier Ltd. All rights reserved.
Evidence for top-down control of eye movements during visual decision making.
Glaholt, Mackenzie G; Wu, Mei-Chun; Reingold, Eyal M
2010-05-01
Participants' eye movements were monitored while they viewed displays containing 6 exemplars from one of several categories of everyday items (belts, sunglasses, shirts, shoes), with a column of 3 items presented on the left and another column of 3 items presented on the right side of the display. Participants were either required to choose which of the two sets of 3 items was the most expensive (2-AFC) or which of the 6 items was the most expensive (6-AFC). Importantly, the stimulus display, and the relevant stimulus dimension, were held constant across conditions. Consistent with the hypothesis of top-down control of eye movements during visual decision making, we documented greater selectivity in the processing of stimulus information in the 6-AFC than the 2-AFC decision. In addition, strong spatial biases in looking behavior were demonstrated, but these biases were largely insensitive to the instructional manipulation, and did not substantially influence participants' choices.
Quality analysis of patient information about knee arthroscopy on the World Wide Web.
Sambandam, Senthil Nathan; Ramasamy, Vijayaraj; Priyanka, Priyanka; Ilango, Balakrishnan
2007-05-01
This study was designed to ascertain the quality of patient information available on the World Wide Web on the topic of knee arthroscopy. For the purpose of quality analysis, we used a pool of 232 search results obtained from 7 different search engines. We used a modified assessment questionnaire to assess the quality of these Web sites. This questionnaire was developed based on similar studies evaluating Web site quality and includes items on illustrations, accessibility, availability, accountability, and content of the Web site. We also compared results obtained with different search engines and tried to establish the best possible search strategy to attain the most relevant, authentic, and adequate information with minimum time consumption. For this purpose, we first compared 100 search results from the single most commonly used search engine (AltaVista) with the pooled sample containing 20 search results from each of the 7 different search engines. The search engines used were metasearch (Copernic and Mamma), general search (Google, AltaVista, and Yahoo), and health topic-related search engines (MedHunt and Healthfinder). The phrase "knee arthroscopy" was used as the search terminology. Excluding the repetitions, there were 117 Web sites available for quality analysis. These sites were analyzed for accessibility, relevance, authenticity, adequacy, and accountability by use of a specially designed questionnaire. Our analysis showed that most of the sites providing patient information on knee arthroscopy contained outdated information, were inadequate, and were not accountable. Only 16 sites were found to be providing reasonably good patient information and hence can be recommended to patients. Understandably, most of these sites were from nonprofit organizations and educational institutions. Furthermore, our study revealed that using multiple search engines increases patients' chances of obtaining more relevant information rather than using a single search engine. Our study shows the difficulties encountered by patients in obtaining information regarding knee arthroscopy and highlights the duty of knee surgeons in helping patients to identify the relevant and authentic information in the most efficient manner from the World Wide Web. This study highlights the importance of the role of orthopaedic surgeons in helping their patients to identify the best possible information on the World Wide Web.
NASA Astrophysics Data System (ADS)
Holbert, Nathan Ryan
Video games have recently become a popular space for educational design due to their interactive and engaging nature and the ubiquity of the gaming experience among youth. Though many researchers argue video games can provide opportunities for learning, educational game design has focused on the classroom rather than the informal settings where games are typically played. Educational games have been moderately successful at achieving learning gains on standardized items, but have failed to show improvements on related but distal problems. In this dissertation I develop and assess a new design principle, called constructible authentic representations for creating informal gaming experiences that players will actively draw on when reasoning in formal and real world contexts. These games provide players with opportunities to engage in meaningful construction with components that integrate relevant concepts to create in-game representations that visually and epistemologically align with related tools and representations utilized in the target domain. In the first phase of the dissertation, I observed children playing popular video games to better understand what in-game representations children attend to and how interactions with these representations contribute to intuitive ideas of encountered STEM content. Results from this study fed into the iterative design of two prototype video games, FormulaT Racing and Particles!, intending to give players useful knowledge resources for reasoning about kinematics and the particulate nature of matter respectively. Designed games encourage players to utilize and refine intuitive ideas about target content through the construction of domain relevant representations. To assess the effectiveness of these designs I conducted two studies of children ages 7-14 playing prototype games in informal settings. An analysis of pre- and post-game clinical interviews, domain specific tasks, and video and logging data of gameplay suggests players developed useful knowledge resources, likely gained and/or refined from experiences in-game, that are employed to solve non-game problems and tasks. Furthermore, players utilized in-game representations as objects-to-think-with when explaining real world phenomena and formal concepts. The results suggest that games designed to include constructible authentic representations can provide players with powerful and useful knowledge resources accessible when thinking and reasoning in a variety of contexts.
Authentication techniques for smart cards
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nelson, R.A.
1994-02-01
Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thoroughmore » understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.« less
Authentication of meat and meat products.
Ballin, N Z
2010-11-01
In recent years, interest in meat authenticity has increased. Many consumers are concerned about the meat they eat and accurate labelling is important to inform consumer choice. Authentication methods can be categorised into the areas where fraud is most likely to occur: meat origin, meat substitution, meat processing treatment and non-meat ingredient addition. Within each area the possibilities for fraud can be subcategorised as follows: meat origin-sex, meat cuts, breed, feed intake, slaughter age, wild versus farmed meat, organic versus conventional meat, and geographic origin; meat substitution-meat species, fat, and protein; meat processing treatment-irradiation, fresh versus thawed meat and meat preparation; non-meat ingredient addition-additives and water. Analytical methods used in authentication are as diverse as the authentication problems, and include a diverse range of equipment and techniques. This review is intended to provide an overview of the possible analytical methods available for meat and meat products authentication. In areas where no authentication methods have been published, possible strategies are suggested. Copyright © 2010 The American Meat Science Association. Published by Elsevier Ltd. All rights reserved.
[Molecular authentication of Jinyinhua formula granule by using allele-specific PCR].
Jiang, Chao; Tu, Li-Chan; Yuan, Yuan; Huang, Lu-Qi; Gao, Wei; Jin, Yan
2017-07-01
Traditional authentication method is hard to identify herb's authenticity of traditional Chinese medicine(TCM) formula granules because they have lost all their morphological characteristics. In this study, a new allele-specific PCR method was established for identifying the authentication of Jinyinhua formula granule (made from Lonicerae Japonicae Flos) based on an SNP site in trnL-trnF fragment. Genomic DNA was successfully extracted from Lonicerae Japonicae Flos and its formula granules by using an improved spin column method and then PCR was performed with the designed primer. Approximately 110 bp specific bands was obtained only in the authentic Lonicerae Japonicae Flos and its formula granules, while no bands were found in fake mixed products. In addition, the PCR product sequence was proved from Lonicerae Japonicae Flos trnL-trnF sequence by using BLAST method. Therefore, DNA molecular authentication method could make up the limitations of character identification method and microscopic identification, and quickly identify herb's authenticity of TCM formula granules, with enormous potential for market supervision and quality control. Copyright© by the Chinese Pharmaceutical Association.
Developmental Changes in Judgments of Authentic Objects
Frazier, Brandy N.; Gelman, Susan A.
2009-01-01
This study examined the development of an understanding of authenticity among 112 children (preschoolers, kindergarten, 1st-graders, and 4th-graders) and 119 college students. Participants were presented with pairs of photographs depicting authentic and non-authentic objects and asked to pick which one belongs in a museum and which one they would want to have. Results suggest that both children and adults recognize the special nature of authentic objects by reporting that they belong in a museum. However, this belief broadens with age, at first just for famous associations (preschool), then also for original creations (kindergarten), and finally for personal associations as well (4th grade). At all ages, an object's authentic nature is distinct from its desirability. Thus, from an early age, children appear to understand that the historical path of an authentic object affects its nature. This work demonstrates the importance of non-obvious properties in children's concepts. For preschool as well as older children, history (a non-visible property) adds meaning beyond the material or functional worth of an object. PMID:20160988
A Generic Authentication LoA Derivation Model
NASA Astrophysics Data System (ADS)
Yao, Li; Zhang, Ning
One way of achieving a more fine-grained access control is to link an authentication level of assurance (LoA) derived from a requester’s authentication instance to the authorisation decision made to the requester. To realise this vision, there is a need for designing a LoA derivation model that supports the use and quantification of multiple LoA-effecting attributes, and analyse their composite effect on a given authentication instance. This paper reports the design of such a model, namely a generic LoA derivation model (GEA- LoADM). GEA-LoADM takes into account of multiple authentication attributes along with their relationships, abstracts the composite effect by the multiple attributes into a generic value, authentication LoA, and provides algorithms for the run-time derivation of LoA. The algorithms are tailored to reflect the relationships among the attributes involved in an authentication instance. The model has a number of valuable properties, including flexibility and extensibility; it can be applied to different application contexts and support easy addition of new attributes and removal of obsolete ones.
Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho
2017-01-01
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. PMID:28335572
Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho
2017-03-21
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho
2014-01-01
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847
Lister, Jamey J; Wohl, Michael J A; Davis, Christopher G
2015-09-01
Engaging in activities that make people feel authentic or real is typically associated with a host of positive psychological and physiological outcomes (i.e., being authentic serves to increase well-being). In the current study, we tested the idea that authenticity might have a dark side among people engaged in an addictive or risky behavior (gambling). To test this possibility, we assessed gamblers (N = 61) who were betting on the National Hockey League playoff games at a sports bar. As predicted, people who felt authentic when gambling reported behavior associated with problem gambling (high frequency of betting) as well as problematic play (a big monetary loss and a big monetary win). Moreover, such behavior and gambling outcomes were particularly high among people who were motivated to gamble for the purpose of enhancement. The interaction of feeling authentic when betting and gambling for purposes of enhancing positive emotions proved especially troublesome for problematic forms of play. Implications of authenticity as a potential vulnerability factor for sports betting and other types of gambling are discussed.
Huang, Frederick Y; Chung, Henry; Kroenke, Kurt; Delucchi, Kevin L; Spitzer, Robert L
2006-06-01
The Patient Health Questionnaire depression scale (PHQ-9) is a well-validated, Diagnostic and Statistical Manual of Mental Disorders- Fourth Edition (DSM-IV) criterion-based measure for diagnosing depression, assessing severity and monitoring treatment response. The performance of most depression scales including the PHQ-9, however, has not been rigorously evaluated in different racial/ethnic populations. Therefore, we compared the factor structure of the PHQ-9 between different racial/ethnic groups as well as the rates of endorsement and differential item functioning (DIF) of the 9 items of the PHQ-9. The presence of DIF would indicate that responses to an individual item differ significantly between groups, controlling for the level of depression. A combined dataset from 2 separate studies of 5,053 primary care patients including non-Hispanic white (n=2,520), African American (n=598), Chinese American (n=941), and Latino (n=974) patients was used for our analysis. Exploratory principal components factor analysis was used to derive the factor structure of the PHQ-9 in each of the 4 racial/ethnic groups. A generalized Mantel-Haenszel statistic was used to test for DIF. One main factor that included all PHQ-9 items was found in each racial/ethnic group with alpha coefficients ranging from 0.79 to 0.89. Although endorsement rates of individual items were generally similar among the 4 groups, evidence of DIF was found for some items. Our analyses indicate that in African American, Chinese American, Latino, and non-Hispanic white patient groups the PHQ-9 measures a common concept of depression and can be effective for the detection and monitoring of depression in these diverse populations.
Natural Channel Design Review Checklist
This document presents a brief description of the checklist items by the following sections: Watershed and Geomorphic Assessment, Preliminary Design, Final Design, and Maintenance and Monitoring Plans.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Denton, M.S.; Bostick, W.D.; Dinsmore, S.R.
1978-08-01
We describe a new concept in continuously referenced monitoring of the isoenzyme activities of creatine kinase (EC 2.7.3.2) after liquid-chromatographic separation. After separation on a diethylaminoethyl-Sephacel column, the three isoenzymes of creatine kinase undergo a series of coupled enzyme reactions, ultimately resulting in the formation of ultraviolet-detectable NADPH. A major advantage of this detection system is the immobilized-enzyme microreactor (2 x 17 mm), which may be removed and stored refrigerated when not in use. A split-stream configuration allows self-blanking of endogenous ultraviolet-absorbing constituents in authentic sera samples, which would otherwise make definitive diagnosis and quantitation difficult or impossible. This detectionmore » system is applicable to the automated analysis of creatine kinase isoenzymes in the clinical laboratory.« less
Detecting insider activity using enhanced directory virtualization.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shin, Dongwan; Claycomb, William R.
2010-07-01
Insider threats often target authentication and access control systems, which are frequently based on directory services. Detecting these threats is challenging, because malicious users with the technical ability to modify these structures often have sufficient knowledge and expertise to conceal unauthorized activity. The use of directory virtualization to monitor various systems across an enterprise can be a valuable tool for detecting insider activity. The addition of a policy engine to directory virtualization services enhances monitoring capabilities by allowing greater flexibility in analyzing changes for malicious intent. The resulting architecture is a system-based approach, where the relationships and dependencies between datamore » sources and directory services are used to detect an insider threat, rather than simply relying on point solutions. This paper presents such an architecture in detail, including a description of implementation results.« less
Li, Wenlong; Qu, Haibin
2017-01-25
The industry of traditional Chinese medicine (TCM) encounters problems like quality fluctuation of raw materials and unstandardized production process. Near infrared (NIR) spectroscopy technology is widely used in quality control of TCM because of its abundant information, fast and nondestructive characters. The main applications include quantitative analysis of Chinese medicinal materials, intermediates and Chinese patent medicines; the authenticity of TCM, species, origins and manufacturers; monitoring and control of the extraction, alcohol precipitation, column chromatography and blending process. This article reviews the progress on the application of NIR spectroscopy technology in TCM field. In view of the problems existing in the application, the article proposes that the standardization of NIR analysis method should be developed according to specific characteristics of TCM, which will promote the application of NIR technology in the TCM industry.
36 CFR 1012.10 - What must I, as an employee, do upon receiving a request?
Code of Federal Regulations, 2010 CFR
2010-07-01
... you can grant a request for authentication of records; and (2) Consult the General Counsel concerning the proper form of the authentication (as authentication requirements may vary by jurisdiction). ...
Authentic Assessment of Special Learners: Problem or Promise?
ERIC Educational Resources Information Center
Choate, Joyce S.; Evans, Susan S.
1992-01-01
This article outlines differences between traditional assessment and authentic assessment procedures, discusses problems with each type of assessment in relation to special learners, and offers certain cautions that must be observed when implementing authentic assessment. (JDD)
Research on user behavior authentication model based on stochastic Petri nets
NASA Astrophysics Data System (ADS)
Zhang, Chengyuan; Xu, Haishui
2017-08-01
A behavioural authentication model based on stochastic Petri net is proposed to meet the randomness, uncertainty and concurrency characteristics of user behaviour. The use of random models in the location, changes, arc and logo to describe the characteristics of a variety of authentication and game relationships, so as to effectively implement the graphical user behaviour authentication model analysis method, according to the corresponding proof to verify the model is valuable.
Creating contextually authentic science in a low-performing urban elementary school
NASA Astrophysics Data System (ADS)
Buxton, Cory A.
2006-09-01
This article reports on a 2-year collaborate project to reform the teaching and learning of science in the context of Mae Jemison Elementary, the lowest performing elementary school in the state of Louisiana. I outline a taxonomy of authentic science inquiry experiences and then use the resulting framework to focus on how project participants interpreted and enacted ideas about collaboration and authenticity. The resulting contextually authentic science inquiry model links the strengths of a canonically authentic model of science inquiry (grounded in the Western scientific canon) with the strengths of a youth-centered model of authenticity (grounded in student-generated inquiry), thus bringing together relevant content standards and topics with critical social relevance. I address the question of how such enactments may or may not promote doing science together and consider the implications of this model for urban science education.