Sample records for legitimation code theory

  1. Creating Semantic Waves: Using Legitimation Code Theory as a Tool to Aid the Teaching of Chemistry

    ERIC Educational Resources Information Center

    Blackie, Margaret A. L.

    2014-01-01

    This is a conceptual paper aimed at chemistry educators. The purpose of this paper is to illustrate the use of the semantic code of Legitimation Code Theory in chemistry teaching. Chemistry is an abstract subject which many students struggle to grasp. Legitimation Code Theory provides a way of separating out abstraction from complexity both of…

  2. Economic Education within the BME Research Community: Rejoinder to "Identifying Research Topic Development in Business and Management Education Research Using Legitimation Code Theory"

    ERIC Educational Resources Information Center

    Asarta, Carlos J.

    2016-01-01

    Carlos Asarta comments here that Arbaugh, Fornaciari, and Hwang (2016) are to be commended for their work ("Identifying Research Topic Development in Business and Management Education Research Using Legitimation Code Theory" "Journal of Management Education," Dec 2016, see EJ1118407). Asarta says that they make several…

  3. Rediscovering Paideia and the Meaning of a Scholarly Career: Rejoinder to "Identifying Research Topic Development in Business and Management Education Research Using Legitimation Code Theory"

    ERIC Educational Resources Information Center

    Antonacopoulou, Elena P.

    2016-01-01

    In "Identifying Research Topic Development in Business and Management Education Research Using Legitimation Code Theory," authors J.B. Arbaugh, Charles J. Fornaciari, and Alvin Hwang ("Journal of Management Education," December 2016 vol. 40 no. 6 p654-691, see EJ1118407) used citation analysis to track the development of…

  4. Progress in the Legitimacy of Business and Management Education Research: Rejoinder to "Identifying Research Topic Development in Business and Management Education Research Using Legitimation Code Theory"

    ERIC Educational Resources Information Center

    Bacon, Donald R.

    2016-01-01

    In this rejoinder to "Identifying Research Topic Development in Business and Management Education Research Using Legitimation Code Theory," published in the "Journal of Management Education," Dec 2016 (see EJ1118407), Donald R. Bacon discusses the similarities between Arbaugh et al.'s (2016) findings and the scholarship…

  5. Reframing the Principle of Specialisation in Legitimation Code Theory: A Blended Learning Perspective

    ERIC Educational Resources Information Center

    Owusu-Agyeman, Yaw; Larbi-Siaw, Otu

    2017-01-01

    This study argues that in developing a robust framework for students in a blended learning environment, Structural Alignment (SA) becomes the third principle of specialisation in addition to Epistemic Relation (ER) and Social Relation (SR). We provide an extended code: (ER+/-, SR+/-, SA+/-) that present strong classification and framing to the…

  6. Making Semantic Waves: A Key to Cumulative Knowledge-Building

    ERIC Educational Resources Information Center

    Maton, Karl

    2013-01-01

    The paper begins by arguing that knowledge-blindness in educational research represents a serious obstacle to understanding knowledge-building. It then offers sociological concepts from Legitimation Code Theory--"semantic gravity" and "semantic density"--that systematically conceptualize one set of organizing principles underlying knowledge…

  7. Unraveling High School English Literature Pedagogic Practices: A Legitimation Code Theory Analysis

    ERIC Educational Resources Information Center

    Jackson, Fiona

    2016-01-01

    Mapping the knowledge formations of language teachers within their pedagogic practices is underresearched, particularly for subject English, a multi-faceted, elusively defined discipline. Deeper knowledge of the pedagogy of subject English teachers is critical, especially within South African education, given the socio-economic power of English in…

  8. Theorising Knowledge Practices: A Missing Piece of the Educational Technology Puzzle

    ERIC Educational Resources Information Center

    Howard, Sarah; Maton, Karl

    2011-01-01

    Educational technology research has been characterised as lacking theoretical frameworks that can enable cumulative knowledge-building across the field. This article explores the value of Legitimation Code Theory (LCT) for addressing these issues by discussing research into the key of integration of information and communication technologies in…

  9. Assessing Assessment: In Pursuit of Meaningful Learning

    ERIC Educational Resources Information Center

    Rootman-le Grange, Ilse; Blackie, Margaret A. L.

    2018-01-01

    The challenge of supporting the development of meaningful learning is prevalent in chemistry education research. One of the core activities used in the learning process is assessments. The aim of this paper is to illustrate how the semantics dimension of Legitimation Code Theory can be a helpful tool to critique the quality of assessments and…

  10. Exploring the Nature of Disciplinary Teaching and Learning Using Legitimation Code Theory Semantics

    ERIC Educational Resources Information Center

    Clarence, Sherran

    2016-01-01

    Teaching and learning is a growing field of research and practice globally, and increasing investments are being made in developing academics as teachers. An inability to adequately account for disciplinary knowledge can lead to academic development inputs that are unable to fully address the needs of students, educators, or disciplines…

  11. Time Travel: The Role of Temporality in Enabling Semantic Waves in Secondary School Teaching

    ERIC Educational Resources Information Center

    Matruglio, Erika; Maton, Karl; Martin, J. R.

    2013-01-01

    Based on the theoretical understandings from Legitimation Code Theory (Maton, 2013) and Systemic Functional Linguistics (Martin, 2013) underpinning the research discussed in this special issue, this paper focuses on classroom pedagogy to illustrate an important strategy for making semantic waves in History teaching, namely "temporal shifting". We…

  12. "I Take Engineering with Me": Epistemological Transitions across an Engineering Curriculum

    ERIC Educational Resources Information Center

    Winberg, Christine; Winberg, Simon; Jacobs, Cecilia; Garraway, James; Engel-Hills, Penelope

    2016-01-01

    In this paper we study epistemological transitions across an intended engineering curriculum and recommend strategies to assist students in attaining the increasingly complex concepts and insights that are necessary for transition to advanced levels of study. We draw on Legitimation Code Theory [Maton, Karl. 2014, "Knowledge and Knowers:…

  13. Foregrounding Knowledge in E-Learning Design: An Illustration in a Museum Setting

    ERIC Educational Resources Information Center

    Carvalho, Lucila; Dong, Andy; Maton, Karl

    2015-01-01

    The nature of knowledge, and the various forms knowledge may take, is a neglected aspect of the development of e-learning environments. This paper uses Legitimation Code Theory (LCT) to conceptualise the organising principles of knowledge practices. As we will illustrate, when it comes to the design of e-learning, the organising principles of the…

  14. Identifying Research Topic Development in Business and Management Education Research Using Legitimation Code Theory

    ERIC Educational Resources Information Center

    Arbaugh, J. B.; Fornaciari, Charles J.; Hwang, Alvin

    2016-01-01

    Although the volume of business and management education (BME) research has expanded substantially, concerns remain about the field's legitimacy and its ability to attract new and dedicated scholars. An obstacle that may impede field development is lack of knowledge about influential works and authors to frame topical areas of inquiry and future…

  15. Recovering Knowledge for Science Education Research: Exploring the "Icarus Effect" in Student Work

    ERIC Educational Resources Information Center

    Georgiou, Helen; Maton, Karl; Sharma, Manjula

    2014-01-01

    Science education research has built a strong body of work on students' understandings but largely overlooked the nature of science knowledge itself. Legitimation Code Theory (LCT), a rapidly growing approach to education, offers a way of analyzing the organizing principles of knowledge practices and their effects on science education. This…

  16. What, Who, or Where? Rejoinder to "Identifying Research Topic Development in Business and Management Education Research Using Legitimation Code Theory"

    ERIC Educational Resources Information Center

    Harzing, Anne-Wil

    2016-01-01

    This brief commentary investigates whether article topic, author profile, or journal rank significantly influence an article's citation levels. Anne-Wil Harzing's regression analysis shows that, when all factors are taken into account at the same time, it is "what" is published (topic) and "who" has published it (author) that…

  17. Gender, Legitimation, and Identity Verification in Groups

    ERIC Educational Resources Information Center

    Burke, Peter J.; Stets, Jan E.; Cerven, Christine

    2007-01-01

    Drawing upon identity theory, expectation states theory, and legitimation theory, we examine how the task leader identity in task-oriented groups is more likely to be verified for persons with high status characteristics. We hypothesize that identity verification will be accomplished more readily for male group members and legitimated task leaders…

  18. Comment legitimer une innovation theorique en grammaire transformationelle: la theorie des traces (How to Legitimize a Theoretical Innovation in Transformational Grammar: The Trace Theory)

    ERIC Educational Resources Information Center

    Pollock, J. Y.

    1976-01-01

    Taking as an example the "trace theory" of movement rules developed at MIT, the article shows the conditions to which a theoretical innovation must conform in order to be considered legitimate in the context of transformational grammar's "Extended Standard Theory." (Text is in French.) (CDSH/AM)

  19. When in London, It's a Burger and Neapolitan Ice Cream for You: Rejoinder to "Identifying Research Topic Development in Business and Management Education Research Using Legitimation Code Theory"

    ERIC Educational Resources Information Center

    Kenworthy, Amy L.; Hrivnak, George A.

    2016-01-01

    In this rejoinder, Kenworthy and Hrivnak, recognized as thought leaders in the tertiary education domain, report their greatest concern with Arbaugh et al.'s (2016) work is its inherently narrow and restrictive nature. In their rejoinder they report, first, the search terms use to identify the BME top 100 are confined to business education.…

  20. Ask the Business School Ranking Media to Walk Their Talk: Rejoinder to "Identifying Research Topic Development in Business and Management Education Research Using Legitimation Code Theory"

    ERIC Educational Resources Information Center

    Pearce, Jone L.

    2016-01-01

    Arbaugh, Fornaciari, and Hwang (2016) are to be commended for undertaking two worthy tasks: demonstrating the value of citation counts in the business and management education (BME) field and attracting new scholars to the field by drawing on rigorous citation analyses. In this commentary, Jone Pearce first addresses the use of citation counts in…

  1. Seeing and Being Seen as a Management Learning and Education Scholar: Rejoinder to "Identifying Research Topic Development in Business and Management Education Research Using Legitimation Code Theory"

    ERIC Educational Resources Information Center

    Bridgman, Todd; Bell, Emma

    2016-01-01

    In this rejoinder to Arbaugh et al. (2016), the authors write that they want to reflect critically on two assumptions Arbaugh et al. make about what constitutes successful academic fields. They suggest: (1) such fields have taken-for-granted knowledge that forms the foundation that future research can build on; and (2) they have a high degree of…

  2. Professional Challenges in School Counseling: Organizational, Institutional and Political

    ERIC Educational Resources Information Center

    Hatch, Trish A.

    2008-01-01

    The school counseling profession has struggled throughout history to secure a legitimate integral position in the educational mission of school. The profession is more likely to gain acceptance and be seen as a legitimate profession if we understand three theories that form the foundation of professional legitimacy: Organizational Theory,…

  3. Political Theory, Values and Public Health

    PubMed Central

    Latham, Stephen R.

    2016-01-01

    This article offers some general criticisms of the idea that any political theory can legitimate public health interventions, and then some particular criticisms of Civic Republicanism as a political theory for public health. Civic Republicanism, I argue, legitimizes liberty-infringing public health interventions by demanding high levels of civic engagement in framing and reviewing them; to demand such engagement in pursuit of such a baseline value as health will leave insufficient civic energy for the pursuit of higher values. PMID:27551295

  4. Cracking the code of change.

    PubMed

    Beer, M; Nohria, N

    2000-01-01

    Today's fast-paced economy demands that businesses change or die. But few companies manage corporate transformations as well as they would like. The brutal fact is that about 70% of all change initiatives fail. In this article, authors Michael Beer and Nitin Nohria describe two archetypes--or theories--of corporate transformation that may help executives crack the code of change. Theory E is change based on economic value: shareholder value is the only legitimate measure of success, and change often involves heavy use of economic incentives, layoffs, downsizing, and restructuring. Theory O is change based on organizational capability: the goal is to build and strengthen corporate culture. Most companies focus purely on one theory or the other, or haphazardly use a mix of both, the authors say. Combining E and O is directionally correct, they contend, but it requires a careful, conscious integration plan. Beer and Nohria present the examples of two companies, Scott Paper and Champion International, that used a purely E or purely O strategy to create change--and met with limited levels of success. They contrast those corporate transformations with that of UK-based retailer ASDA, which has successfully embraced the paradox between the opposing theories of change and integrated E and O. The lesson from ASDA? To thrive and adapt in the new economy, companies must make sure the E and O theories of business change are in sync at their own organizations.

  5. "I Don't Want to Hear That!": Legitimating Whiteness through Silence in Schools

    ERIC Educational Resources Information Center

    Castagno, Angelina E.

    2008-01-01

    In this article, I examine the ways in which silences around race contribute to the maintenance and legitimation of Whiteness. Drawing on ethnographic data from two demographically different schools, I highlight patterns of racially coded language, teacher silence, silencing students' race talk, and the conflating of culture with race, equality…

  6. Dress Codes. Legal Brief.

    ERIC Educational Resources Information Center

    Zirkel, Perry A.

    2000-01-01

    As illustrated by two recent decisions, the courts in the past decade have demarcated wide boundaries for school officials considering dress codes, whether in the form of selective prohibitions or required uniforms. Administrators must warn the community, provide legitimate justification and reasonable clarity, and comply with state law. (MLH)

  7. Before You Bring Back School Dress Codes, Recognize that the Courts Frown upon Attempts to "Restrict" Students' Rights.

    ERIC Educational Resources Information Center

    Sparks, Richard K.

    1983-01-01

    Courts will support school boards' dress codes if based on needs rather than opinions. Courts have affirmed that minors have constitutional rights. Hair length, clothing style, and beards may be protected by students' right to freedom of expression. Codes must be carefully written and consistent with schools' legitimate goals. (PB)

  8. Act No. 42/1988 instituting the Preliminary Title and First Book of the Civil Code, 27 October 1988.

    PubMed

    1988-01-01

    This document contains major provisions of the Preliminary Title and First Book (dealing with persons and the family) of the Civil Code enacted by Rwanda in 1988. These include the portions of Part 1 (physical persons) which deal with personality, birth, identification of physical persons, legal names, residence and domicile, and proof of civil status. Included sections of Part 2 (the family) cover marriage, engagement, the conclusion of marriage (with sections devoted to general provisions, substantive conditions, obligations arising from marriage, and respective rights and duties of spouses), the annulment of marriages and the effects of an annulled marriage, the dissolution of marriage and separation (divorce for specific reasons, divorce by mutual consent, and the effects of divorce), kinship and filiation (the kinship of children born legitimately or in marriage; proof of legitimate filiation; and legitimization, recognition, and support of natural children), adoption, and parental authority (general provisions, the right of custody, legal administration, legal enjoyment, loss of parental authority). The only section of Part 3 contained herein relates to the duty of the customary family council.

  9. IT Security: Target: The Web

    ERIC Educational Resources Information Center

    Waters, John K.

    2009-01-01

    In December, Microsoft announced a major security flaw affecting its Internet Explorer web browser. The flaw allowed hackers to use hidden computer code they had already injected into legitimate websites to steal the passwords of visitors to those sites. Reportedly, more than 10,000 websites were infected with the destructive code by the time…

  10. Speaking out or Keeping Silent: International Students' Identity as Legitimate Speakers and Teachers of English

    ERIC Educational Resources Information Center

    Xuan, Pham Thi Thanh

    2014-01-01

    Few studies have focused on the identity formation of non-native English speaking teachers (NNESTs) as legitimate speakers and teachers of English. Drawing on Norton's (2000) poststructuralist theory of identity as a process of struggling and changing, this study examined whether and how Asian international students studying for a Masters in…

  11. Authorities' Coercive and Legitimate Power: The Impact on Cognitions Underlying Cooperation

    PubMed Central

    Hofmann, Eva; Hartl, Barbara; Gangl, Katharina; Hartner-Tiefenthaler, Martina; Kirchler, Erich

    2017-01-01

    The execution of coercive and legitimate power by an authority assures cooperation and prohibits free-riding. While coercive power can be comprised of severe punishment and strict monitoring, legitimate power covers expert, and informative procedures. The perception of these powers wielded by authorities stimulates specific cognitions: trust, relational climates, and motives. With four experiments, the single and combined impact of coercive and legitimate power on these processes and on intended cooperation of n1 = 120, n2 = 130, n3 = 368, and n4 = 102 student participants is investigated within two exemplary contexts (tax contributions, insurance claims). Findings reveal that coercive power increases an antagonistic climate and enforced compliance, whereas legitimate power increases reason-based trust, a service climate, and voluntary cooperation. Unexpectedly, legitimate power is additionally having a negative effect on an antagonistic climate and a positive effect on enforced compliance; these findings lead to a modification of theoretical assumptions. However, solely reason-based trust, but not climate perceptions and motives, mediates the relationship between power and intended cooperation. Implications for theory and practice are discussed. PMID:28149286

  12. Theory-of-Mind Development Influences Suggestibility and Source Monitoring

    ERIC Educational Resources Information Center

    Bright-Paul, Alexandra; Jarrold, Christopher; Wright, Daniel B.

    2008-01-01

    According to the mental-state reasoning model of suggestibility, 2 components of theory of mind mediate reductions in suggestibility across the preschool years. The authors examined whether theory-of-mind performance may be legitimately separated into 2 components and explored the memory processes underlying the associations between theory of mind…

  13. Evolution & Intelligent Design

    ERIC Educational Resources Information Center

    Staver, John R.

    2003-01-01

    Advocates of Intelligent Design (ID) theory argue that evolution is a theory in crisis, ID is a legitimate scientific theory, and biology teachers should teach the controversy. Supporters of evolutionary theory testify that ID is a religious, not scientific, concept, and evolution is in no danger of bankruptcy, having survived 140 years of…

  14. Sustaining quality improvement and patient safety training in graduate medical education: lessons from social theory.

    PubMed

    Wong, Brian M; Kuper, Ayelet; Hollenberg, Elisa; Etchells, Edward E; Levinson, Wendy; Shojania, Kaveh G

    2013-08-01

    Despite an official mandate to incorporate formal quality improvement (QI) and patient safety (PS) training into graduate medical education, many QI/PS curricular efforts face implementation challenges and are not sustained. Educators are increasingly turning to sociocultural theories to address issues such as curricular uptake in medical education. The authors conducted a case study using Bourdieu's concepts of "field" and "habitus" to identify theoretically derived strategies that can promote sustained implementation of QI/PS curricula. From October 2010 through May 2011, the authors conducted semistructured interviews with principal authors of studies included in a systematic review of QI/PS curricula and with key informants (identified by study participants) who did not publish on their QI/PS curricular efforts. The authors purposively sampled to theoretical saturation and analyzed data concurrently with iterative data gathering within Bourdieu's theoretical framework. The study included 16 participants representing six specialties in the United States and Canada. Data analysis revealed that academic physicians belong to, and compete for legitimate forms of capital within, two separate but related fields associated with QI/PScurricular implementation: the "academic field" and the "health care delivery field." Respondents used specific strategies toexploit and/or redefine the prevailingforms of legitimate capital in each field to encourage changes inacademic physicians' habitus that would legitimizeQI/PS. Situating study findings in a sociocultural theory enables articulation of concrete strategies that can legitimize QI/PS in the academic and health care delivery fields. These strategies can promote sustained QI/PS curricula in graduate medical education.

  15. Image authentication using distributed source coding.

    PubMed

    Lin, Yao-Chung; Varodayan, David; Girod, Bernd

    2012-01-01

    We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.

  16. Legitimate vs. illegitimate restrictions – a motivational and physiological approach investigating reactance processes

    PubMed Central

    Sittenthaler, Sandra; Steindl, Christina; Jonas, Eva

    2015-01-01

    Threats to our freedom are part of our daily social interactions. They are accompanied by an aversive state of motivational arousal, called reactance, which leads people to strive to reestablish their threatened freedom. This is especially the case if the threat seems to be illegitimate in nature. However, reactance theory suggests that reactance should also be aroused when people are exposed to legitimate freedom threats. In this article we first aim to show that both illegitimate and legitimate freedom threats evoke reactance. Second, we aim to extend past work on reactance by exploring the underlying process of experiencing a legitimate vs. an illegitimate restriction. In the current study (N= 57) participants were restricted in an illegitimate (unexpected and inappropriate) or legitimate (unexpected but appropriate) way, or were not restricted at all. We assessed participants’ experience of reactance, their behavioral intentions to restore their freedom, their approach motivational states, as well as their physiological arousal (heart rate). Results indicated that when restricted in an illegitimate or a legitimate way, participants indicated the same amount of reactance as well as anger. However, when looking at people’s physiological reactions, important differences between illegitimate and legitimate restrictions become apparent. Illegitimate restrictions led to an immediate arousal, whereas legitimate restrictions led to a time delayed arousal. This suggests that illegitimate restrictions lead to a sudden increase in aversive arousal. Legitimate restrictions, however, seem to be associated with a more cognitive process in which people first need to structure their thoughts and reflect upon the situation before getting into the feeling of reactance in a physiologically arousing sense. Moreover a mediation analysis could show that behavioral intentions to regain one’s freedom result in positive and negative approach motivation. In sum we propose a combined dual-process and intertwined-process model explaining people’s reactions to legitimate vs. illegitimate restrictions. PMID:26042065

  17. The Legitimation of Novel Technologies: The Case of Nanotechnology

    NASA Astrophysics Data System (ADS)

    Thyroff, Anastasia E.

    Nanotechnology is the control, manipulation, and application of matter on an atomic and molecular level. The technology is complex and confusing to consumers, and its long-term safety and effect on the human body, as well as the environment, are unknown. However, for the past decade, nanotechnology has been used to develop consumer products and food with novel and attractive attributes. Since nanotechnology is still not well known, it is not legitimized; that is, it has not been deemed safe and accepted by society. However, the market for nanotechnology is in the legitimation process. It will take an entire network of key stakeholders playing a specific roles for nanotechnology to legitimize. Specifically, each key stakeholder will align with a certain cultural discourse to frame nanotechnology in a particular way that complements their values. In Essay 1, I follow previous market system dynamic's literature and combine Actor Network Theory (ANT), Foucault's Discourse on Power and Goffman's Frame analysis to theoretically explore what the actor network for nanotechnology looks like. Four dominate frames are identified: 1) Advancement (i.e., government), 2) Management (i.e., industry), 3) Development (i.e., academia/scientists), and 4) Informant (i.e., NGO). Essay 2 empirically explores each actor's perspective on the nanotechnology network through a total of 24 interviews. A hermeneutic approach is used to analyze the 208 page text and themes describing each actor's role from a self and other's perspective are discussed. Additionally, three overarching themes (i.e., contradiction, constance, and cutoff) emerge; these themes describe the degree of similarity in how actors view their role in the nanotechnology network compared to how other actor's view that actor's role. In Essay 3, I bring critical theory into market system's research to better contextualize market formation theories. Specifically, I discuss how critical theory can be used to supplement ANT. I suggest that ANT can be combined with critical theory to better understand the process of translation through exploring conflicts and contradictions among key stakeholders. To show this process, I explore the juxtaposition of economic benefits vs. cultural concerns that has emerged in the nanotechnology marketplace. It is determined that this exploration process can determine why mobilization has not occurred.

  18. Becoming Socialized into a New Professional Role: LPN to BN Student Nurses' Experiences with Legitimation

    PubMed Central

    Melrose, Sherri; Miller, Jean; Gordon, Kathryn; Janzen, Katherine J.

    2012-01-01

    This paper presents findings from a qualitative descriptive study that explored the professional socialization experiences of Licensed Practical Nurses (LPNs) who attended an online university to earn a Baccalaureate degree in nursing (BN), a prerequisite to writing the Canadian Registered Nurse (RN) qualifying exam. The project was framed from a constructivist worldview and Haas and Shaffir's theory of legitimation. Participants were 27 nurses in a Post-LPN to BN program who came from across Canada to complete required practicums. Data was collected from digital recordings of four focus groups held in different cities. Transcripts were analyzed for themes and confirmed with participants through member checking. Two overarching themes were identified and are presented to explain how these unique adult learners sought to legitimize their emerging identity as Registered Nurses (RNs). First, Post-LPN to BN students need little, if any, further legitimation to affirm their identities as “nurse.” Second, practicum interactions with instructors and new clinical experiences are key socializing agents. PMID:22548165

  19. Becoming Socialized into a New Professional Role: LPN to BN Student Nurses' Experiences with Legitimation.

    PubMed

    Melrose, Sherri; Miller, Jean; Gordon, Kathryn; Janzen, Katherine J

    2012-01-01

    This paper presents findings from a qualitative descriptive study that explored the professional socialization experiences of Licensed Practical Nurses (LPNs) who attended an online university to earn a Baccalaureate degree in nursing (BN), a prerequisite to writing the Canadian Registered Nurse (RN) qualifying exam. The project was framed from a constructivist worldview and Haas and Shaffir's theory of legitimation. Participants were 27 nurses in a Post-LPN to BN program who came from across Canada to complete required practicums. Data was collected from digital recordings of four focus groups held in different cities. Transcripts were analyzed for themes and confirmed with participants through member checking. Two overarching themes were identified and are presented to explain how these unique adult learners sought to legitimize their emerging identity as Registered Nurses (RNs). First, Post-LPN to BN students need little, if any, further legitimation to affirm their identities as "nurse." Second, practicum interactions with instructors and new clinical experiences are key socializing agents.

  20. The Infant Formula Controversy: Is the Boycott Justified?

    ERIC Educational Resources Information Center

    Murphy, Elaine M.; Cancellier, Patricia H.

    1982-01-01

    Discusses problems involved with the use of infant formulas in developing countries and then examines the other side of the story, the legitimate need for infant formula. The International Code for the Marketing of Breastmilk Substitutes is also presented and discussed. (RM)

  1. Warden’s Five-Ring System Theory: Legitimate Wartime Military Targeting or an Increased Potential to Violate the Law and Norms of Expected Behavior?

    DTIC Science & Technology

    2000-04-01

    the five-ring system theory that dramatically improves the warfighters ability to systematically identify wartime targets. However, for all of its...acclaim, little has been written about Warden’s five-ring system theory . Even less has been written about the legal and moral implications of using Warden’s theory to identify wartime targets.

  2. Position-based coding and convex splitting for private communication over quantum channels

    NASA Astrophysics Data System (ADS)

    Wilde, Mark M.

    2017-10-01

    The classical-input quantum-output (cq) wiretap channel is a communication model involving a classical sender X, a legitimate quantum receiver B, and a quantum eavesdropper E. The goal of a private communication protocol that uses such a channel is for the sender X to transmit a message in such a way that the legitimate receiver B can decode it reliably, while the eavesdropper E learns essentially nothing about which message was transmitted. The ɛ -one-shot private capacity of a cq wiretap channel is equal to the maximum number of bits that can be transmitted over the channel, such that the privacy error is no larger than ɛ \\in (0,1). The present paper provides a lower bound on the ɛ -one-shot private classical capacity, by exploiting the recently developed techniques of Anshu, Devabathini, Jain, and Warsi, called position-based coding and convex splitting. The lower bound is equal to a difference of the hypothesis testing mutual information between X and B and the "alternate" smooth max-information between X and E. The one-shot lower bound then leads to a non-trivial lower bound on the second-order coding rate for private classical communication over a memoryless cq wiretap channel.

  3. 75 FR 16235 - Electronic Prescriptions for Controlled Substances

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-31

    ... 21 of the Code of Federal Regulations (CFR), Parts 1300 to 1399. These regulations are designed to ensure an adequate supply of controlled substances for legitimate medical, scientific, research, and... research or chemical analysis with controlled substances must register with DEA (unless exempt) and comply...

  4. McCarthyism's Rhetorical Norms.

    ERIC Educational Resources Information Center

    Townsend, Rebecca M.

    Rhetorical norms of early McCarthyist discourse reveal a reliance upon images of chaos and the body. Through such metaphors, rhetors crafted a model of discussion that feminized "democracy" and "tolerance" to support anti-Communist measures and de-legitimize their opponents. Political variety was coded as deviant to national…

  5. High-efficiency reconciliation for continuous variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bai, Zengliang; Yang, Shenshen; Li, Yongmin

    2017-04-01

    Quantum key distribution (QKD) is the most mature application of quantum information technology. Information reconciliation is a crucial step in QKD and significantly affects the final secret key rates shared between two legitimate parties. We analyze and compare various construction methods of low-density parity-check (LDPC) codes and design high-performance irregular LDPC codes with a block length of 106. Starting from these good codes and exploiting the slice reconciliation technique based on multilevel coding and multistage decoding, we realize high-efficiency Gaussian key reconciliation with efficiency higher than 95% for signal-to-noise ratios above 1. Our demonstrated method can be readily applied in continuous variable QKD.

  6. Using Situated Cognition Theory in Researching Student Experience of the Workplace

    ERIC Educational Resources Information Center

    Case, Jennifer; Jawitz, Jeff

    2004-01-01

    It has been proposed that situated cognition theory, in which learning is conceptualized as induction into a community of practice through the activity of legitimate peripheral participation, offers an appropriate theoretical perspective for examining issues of gender in science education. This study critically engages with this proposal by means…

  7. Institutional Theory in College Restructuring: Myth or Reality?

    ERIC Educational Resources Information Center

    Bealing, William, Jr.; Riordan, Diane; Riordan, Michael

    2011-01-01

    In response to external pressure for change, the subject university engaged in major restructuring activities during the mid to late 1990's. As predicted by organizational theory, faculty reacted to the restructuring in order to define the conditions and methods of their work and to legitimate their professional autonomy. Although this university…

  8. Cinderella Syndrome: A Philosophical View of Supervision as a Field of Study.

    ERIC Educational Resources Information Center

    Smyth, W. John

    The theory and practice of supervision developed during a period in which the legitimization of any enterprise was most effectively sought through appeals to science and scientific methods for problem-solving. The failure of scientific discipline to develop conclusively effective theories in many social fields, including supervision, suggests that…

  9. The Political Discourse of the Campaign against Bilingual Education: From "Proposition 227" to "Horne v. Flores"

    ERIC Educational Resources Information Center

    Yamagami, Mai

    2012-01-01

    Using the frameworks of critical discourse analysis, representation theory, and legitimization theory, this study examines the political discourse of the campaign for Proposition 227 in California--particularly, the key social representations of languages, their speakers, and the main political actors in the campaign. The analysis examines the…

  10. Higher Education: Handbook of Theory and Research, Volume XVI.

    ERIC Educational Resources Information Center

    Smart, John C., Ed.

    This volume contains essays related to various aspects of higher education, focusing on both educational theory and research. The chapters are: (1) "Apologia pro Vita Mia" (Robert Berdahl); (2) "Varieties of Validity: Quality in Qualitative Research" (Yvonna S. Lincoln); (3) "Academic Freedom and Federal Courts in the 1990s: The Legitimation of…

  11. The Constant Comparative Analysis Method Outside of Grounded Theory

    ERIC Educational Resources Information Center

    Fram, Sheila M.

    2013-01-01

    This commentary addresses the gap in the literature regarding discussion of the legitimate use of Constant Comparative Analysis Method (CCA) outside of Grounded Theory. The purpose is to show the strength of using CCA to maintain the emic perspective and how theoretical frameworks can maintain the etic perspective throughout the analysis. My…

  12. Acts of Endearment

    PubMed Central

    Stephens, G. Gayle

    1992-01-01

    Legitimate and clinically useful affection between physicians and patients can be nurtured by attending to duties enjoined by traditional codes of ethics. Three acts of endearment have special importance for today's family physicians: smoothing the bed of death; keeping patients' secrets; and not abandoning patients on account of incurability. PMID:20469528

  13. Rape and its relation to social disorganization, pornography and inequality in the USA.

    PubMed

    Baron, L; Straus, M A

    1989-01-01

    A theoretical model seeks to integrate social disorganization and feminist theories of rape, reporting an empirical test of that model using data on rapes per 100,000 population known to the police in the 50 states of the United States. The model includes the following aspects of the social organization of the states: social disorganization (measured by a six item index), sexual inequality (measured by a status of women index to men), pornography (measured by a sex magazine circulation index for eight sexually explicit magazines) and the level of culturally legitimate violence (measured by a 12 item legitimate violence index using indicators like corporal punishment in schools. There were marked differences between states of the USA in the incidence of rape during the 1980-82. Path analysis was used to test the theoretical model, which posits rape as a function of the direct and indirect effects of social disorganization, sexual inequality, pornography, legitimate violence and seven control variables. The results show that all four variables play an important part in explaining differences between states in rape; and that together, the variables in the model explain 83 per cent of the state-to-state variation in rape. Women are in much greater danger of being raped in some American states than in others. Since the FBI began compiling statistics on rape, states like Alaska, Nevada, and California have consistently registered many more rapes per capita than North Dakota, Maine, and Iowa. What factors account for such differences between states? Could the variation in the rape rate be explained by four aspects of the social structure of states: (1) the proliferation of pornography (2) sexual inequality (3) culturally legitimate violence and (4) social disorganization. Each factor represents a theory which will be examined within the context of an integrated theory on rape.

  14. Meaning and Identities: A Visual Performative Pedagogy for Socio-Cultural Learning

    ERIC Educational Resources Information Center

    Grushka, Kathryn

    2009-01-01

    In this article I present personalised socio-cultural inquiry in visual art education as a critical and expressive material praxis. The model of "Visual Performative Pedagogy and Communicative Proficiency for the Visual Art Classroom" is presented as a legitimate means of manipulating visual codes, communicating meaning and mediating…

  15. A Proposed Theory Seeded Methodology for Design Based Research into Effective Use of MUVES in Vocational Education Contexts

    ERIC Educational Resources Information Center

    Cochrane, Todd; Davis, Niki; Morrow, Donna

    2013-01-01

    A methodology for design based research (DBR) into effective development and use of Multi-User Virtual Environments (MUVE) in vocational education is proposed. It blends software development with DBR with two theories selected to inform the methodology. Legitimate peripheral participation LPP (Lave & Wenger, 1991) provides a filter when…

  16. Consensus, contracts, and committees.

    PubMed

    Moreno, J D

    1991-08-01

    Following a brief account of the puzzle that ethics committees present for the Western Philosophical tradition, I will examine the possibility that social contract theory can contribute to a philosophical account of these committees. Passing through classical as well as contemporary theories, particularly Rawls' recent constructivist approach, I will argue that social contract theory places severe constraints on the authority that may legitimately be granted to ethics committees. This, I conclude, speaks more about the suitability of the theory to this level of analysis than about the ethics committee phenomenon itself.

  17. When are do-gooders treated badly? Legitimate power, role expectations, and reactions to moral objection in organizations.

    PubMed

    Wellman, Ned; Mayer, David M; Ong, Madeline; DeRue, D Scott

    2016-06-01

    Organization members who engage in "moral objection" by taking a principled stand against ethically questionable activities help to prevent such activities from persisting. Unfortunately, research suggests that they also may be perceived as less warm (i.e., pleasant, nice) than members who comply with ethically questionable procedures. In this article, we draw on role theory to explore how legitimate power influences observers' responses to moral objection. We argue that individuals expect those high in legitimate power to engage in moral objection, but expect those low in legitimate power to comply with ethically questionable practices. We further propose that these contrasting role expectations influence the extent to which moral objectors are perceived as warm and subjected to social sanctions (i.e., insults, pressure, unfriendly behavior). We test our predictions with 3 experiments. Study 1, which draws on participants' prior workplace experiences, supports the first section of our mediated moderation model in which the negative association between an actor's moral objection (vs. compliance) and observers' warmth perceptions is weaker when the actor is high rather than low in legitimate power and this effect is mediated by observers' met role expectations. Study 2, an online experiment featuring a biased hiring task, reveals that the warmth perceptions fostered by the Behavior × Legitimate Power interaction influence observers' social sanctioning intentions. Finally, Study 3, a laboratory experiment which exposes participants to unethical behavior in a virtual team task, replicates Study 2's findings and extends the results to actual as well as intended social sanctions. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  18. The institutional workers of biomedical science: Legitimizing academic entrepreneurship and obscuring conflicts of interest.

    PubMed

    Axler, Renata E; Miller, Fiona A; Lehoux, Pascale; Lemmens, Trudo

    2018-06-01

    Given growing initiatives incentivizing academic researchers to engage in 'entrepreneurial' activities, this article examines how these academic entrepreneurs claim value in their entrepreneurial engagements, and navigate concerns related to conflicts of interest. Using data from qualitative interviews with twenty-four academic entrepreneurs in Canada, we show how these scientists value entrepreneurial activities for providing financial and intellectual resources to academic science, as well as for their potential to create impact through translation. Simultaneously, these scientists claimed to maintain academic norms of disinterested science and avoid conflicts of interest. Using theories of institutional work, we demonstrate how entrepreneurial scientists engage in processes of institutional change-through-maintenance, drawing on the maintenance of academic norms as institutional resources to legitimize entrepreneurial activities. As entrepreneurial scientists work to legitimize new zones of academic scientific practice, there is a need to carefully regulate and scrutinize these activities so that their potential harms do not become obscured.

  19. Transformative Rendering of Internet Resources

    DTIC Science & Technology

    2012-10-01

    4 Securing WiFi Connections...comes from legitimate web sites that have themselves been hacked . There is no way of anticipating which of these sites have been hacked and therefore...pose a security threat to visitors. The purpose of most of this web page hacking is to plant malicious code on the web site that will attack any

  20. The Ideological and Political Dimensions of the Anti-Smoking and Anti-Drinking Video Advertisements in the Republic of Moldova.

    PubMed

    Stanchevici, Dmitri

    2017-06-01

    Based on the critical approach in health communication, along with Habermas's theory of legitimation and Ellul's theory of propaganda, this qualitative study analyzes the political and ideological dimensions of the video advertisements used in the 2012 anti-smoking and 2014 anti-drinking campaigns in the Republic of Moldova. This analysis shows that these health videos support male domination and exclusion of the poor and legitimate the current political leadership with its declared pro-European orientation. This study uniquely contributes to the critical approach in health communication by focusing on the post-Soviet context in which statehood and national identity are unstable and societies are torn between the Russian and (post-)Soviet influences on one hand and European aspirations on the other. Drawing on critical scholarship in global health communication, this article calls for greater respect and recognition of Moldova's local culture and definition of health.

  1. Using situated cognition theory in researching student experience of the workplace

    NASA Astrophysics Data System (ADS)

    Case, Jennifer; Jawitz, Jeff

    2004-05-01

    It has been proposed that situated cognition theory, in which learning is conceptualized as induction into a community of practice through the activity of legitimate peripheral participation, offers an appropriate theoretical perspective for examining issues of gender in science education. This study critically engages with this proposal by means of an investigation of the vacation work experiences of a group of South African final-year civil and chemical engineering students. Issues of race and gender appeared prominently and spontaneously in focus group and interview data. An analysis of these data using the situated cognition framework allowed for a deeper understanding of these issues and their impact on learning. It was found that access to legitimate peripheral participation was critical for good learning outcomes (associated with positive identity formation) while denial of this access (as sometimes experienced by black and female students) appeared to be related to less effective learning and poor feelings of self-worth.

  2. Understanding the devaluation of vulnerable groups: A novel application of Institutional Anomie Theory.

    PubMed

    Hövermann, Andreas; Groß, Eva M; Zick, Andreas; Messner, Steven F

    2015-07-01

    Prejudices legitimize the discrimination against groups by declaring them to be of unequal, especially of less, worth. This legitimizing power is highly relevant in social conflicts of modern societies that are governed by market-oriented value systems. However, prejudice research has yet to be linked to sociological discourses on the marketization of society. We argue that Institutional Anomie Theory (IAT), a theory originally developed to explain crime rates, offers a fruitful macro-sociological framework for a better understanding of micro-social prejudices that emerge along with processes of marketization. Extending IAT to explain prejudices in a German study based on survey data offers a first attempt to underpin our theoretical hypotheses with empirical data. Although the results need to be interpreted with due caution, they suggest that the extended IAT model can be usefully applied to explain how a marketized mentality is related to different forms of institutional integration, and how it is conducive to specific prejudices that emerge in market-dominated societies against purported economically burdening social groups. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. UNDERSTANDING THE DEVALUATION OF VULNERABLE GROUPS: A NOVEL APPLICATION OF INSTITUTIONAL ANOMIE THEORY

    PubMed Central

    Groß, Eva M.; Zick, Andreas; Messner, Steven F.

    2015-01-01

    Prejudices legitimize the discrimination against groups by declaring them to be of unequal, especially of less, worth. This legitimizing power is highly relevant in social conflicts of modern societies that are governed by market-oriented value systems. However, prejudice research has yet to be linked to sociological discourses on the marketization of society. We argue that Institutional Anomie Theory (IAT), a theory originally developed to explain crime rates, offers a fruitful macro-sociological framework for a better understanding of micro-social prejudices that emerge along with processes of marketization. Extending IAT to explain prejudices in a German study based on survey data offers a first attempt to underpin our theoretical hypotheses with empirical data. Although the results need to be interpreted with due caution, they suggest that the extended IAT model can be usefully applied to explain how a marketized mentality is related to different forms of institutional integration, and how it is conducive to specific prejudices that emerge in market-dominated societies against purported economically burdening social groups. PMID:26004470

  4. Rape revisited: sexual violence against women in the former Yugoslavia.

    PubMed

    Valentich, M

    1994-01-01

    This article presents information on the rape of women in the former Yugoslavia, focusing more on Muslim women in Bosnia-Herzegovina, and examines the evolutionary, sociological, psychological, and feminist theories of this form of sexual violence. Using a case study approach, through documentation from newspapers and other media accounts, this paper investigated the sexual violence that featured strongly in the campaign of ethnic cleansing or genocide of Muslims in Bosnia-Herzegovina. It was noted that the variables of power, sex, and aggression in the context of war seem to be linked. This is particularly evident when authority legitimates sexual aggression. Without the backing of authority, some rape is expected, but not of such proportion or brutality. In terms of the theories, the evolutionary perspective appears to have limited applicability in explaining rape as an act of war. However, the feminist and macrosociological multivariate theories that focus on heterogeneity of the population, a cultural foundation of very traditional gender roles, and a historical tradition that legitimates sexual violence by armies in war-time, provide more persuasive insights.

  5. Legitimating Racial Discrimination: Emotions, Not Beliefs, Best Predict Discrimination in a Meta-Analysis

    PubMed Central

    Talaska, Cara A.; Chaiken, Shelly

    2013-01-01

    Investigations of racial bias have emphasized stereotypes and other beliefs as central explanatory mechanisms and as legitimating discrimination. In recent theory and research, emotional prejudices have emerged as another, more direct predictor of discrimination. A new comprehensive meta-analysis of 57 racial attitude-discrimination studies finds a moderate relationship between overall attitudes and discrimination. Emotional prejudices are twices as closely related to racial discrimination as stereotypes and beliefs are. Moreover, emotional prejudices are closely related to both observed and self-reported discrimination, whereas stereotypes and beliefs are related only to self-reported discrimination. Implications for justifying discrimination are discussed. PMID:24052687

  6. DROP: Detecting Return-Oriented Programming Malicious Code

    NASA Astrophysics Data System (ADS)

    Chen, Ping; Xiao, Hai; Shen, Xiaobin; Yin, Xinchun; Mao, Bing; Xie, Li

    Return-Oriented Programming (ROP) is a new technique that helps the attacker construct malicious code mounted on x86/SPARC executables without any function call at all. Such technique makes the ROP malicious code contain no instruction, which is different from existing attacks. Moreover, it hides the malicious code in benign code. Thus, it circumvents the approaches that prevent control flow diversion outside legitimate regions (such as W ⊕ X ) and most malicious code scanning techniques (such as anti-virus scanners). However, ROP has its own intrinsic feature which is different from normal program design: (1) uses short instruction sequence ending in "ret", which is called gadget, and (2) executes the gadgets contiguously in specific memory space, such as standard GNU libc. Based on the features of the ROP malicious code, in this paper, we present a tool DROP, which is focused on dynamically detecting ROP malicious code. Preliminary experimental results show that DROP can efficiently detect ROP malicious code, and have no false positives and negatives.

  7. Impacts of Space System Acquisition on National Security

    DTIC Science & Technology

    2012-12-01

    and observation have indicated that differences in the theory and practice of acquisition, conflicts in values among the acquisition community, and...budgets, requirements and acquisition. The “DAPA Report January 2006,” states, “In theory , new weapon systems are delivered as the result of the... stockholder confidence.86 Additionally, the “DAPA Executive Report December 2005” states: “While each of these sets of values is legitimate, pursuing them

  8. The Two Faces of Wisdom: Wisdom as a General Theory of Knowledge and Judgment about Excellence in Mind and Virtue vs. Wisdom as Everyday Realization in People and Products

    ERIC Educational Resources Information Center

    Baltesa, Paul B.; Kunzmann, Ute

    2004-01-01

    There are several legitimate ways of conceptualizing and studying wisdom. One is largely informed by Western philosophy and treats wisdom as an analytic theory of expert knowledge, judgment, and advice about difficult and uncertain matters of life. Another is more consistent with Asian philosophical nonsecularized traditions and treats wisdom as…

  9. The role of legitimation in the professional socialization of second-year undergraduate athletic training students.

    PubMed

    Klossner, Joanne

    2008-01-01

    Professional socialization during formal educational preparation can help students learn professional roles and can lead to improved organizational socialization as students emerge as members of the occupation's culture. Professional socialization research in athletic training is limited. To present the role of legitimation and how it influences the professional socialization of second-year athletic training students. Modified constructivist grounded theory and case study methods were used for this qualitative study. An accredited undergraduate athletic training education program. Twelve second-year students were selected purposively. The primary sample group (n = 4) was selected according to theoretical sampling guidelines. The remaining students made up the cohort sample (n = 8). Theoretically relevant data were gathered from 14 clinical instructors to clarify emergent student data. Data collection included document examination, observations, and interviews during 1 academic semester. Data were collected and analyzed through constant comparative analysis. Data triangulation, member checking, and peer-review strategies were used to ensure trustworthiness. Legitimation from various socializing agents initiated professional socialization. Students viewed trust and team membership as rewards for role fulfillment. My findings are consistent with the socialization literature that shows how learning a social or professional role, using rewards to facilitate role performance, and building trusting relationships with socializing agents are important aspects of legitimation and, ultimately, professional socialization.

  10. In defense of bioethics.

    PubMed

    Baker, Robert

    2009-01-01

    Although bioethics societies are developing standards for clinical ethicists and a code of ethics, they have been castigated in this journal as "a moral, if not an ethics, disaster" for not having completed this task. Compared with the development of codes of ethics and educational standards in law and medicine, however, the pace of professionalization in bioethics appears appropriate. Assessed by this metric, none of the charges leveled against bioethics are justified. The specific charges leveled against the American Society for Bioethics and Humanities (ASBH) and its Core Competencies report are analyzed and rejected as artifacts of an ahistoric conception of the stages by which organizations professionalize. For example, the charge that the ASBH should provide definitive criteria for what counts as "medical ethics consultation" antecedent to further progress towards professionalization is assessed by comparing it with the American Medical Association's decades-long struggle to define who can legitimately claim the title "medical doctor." Historically, clarity about who is legitimately a doctor, a lawyer - or a "clinical ethicist"- is a byproduct of, and never antecedent to, the decades-long process by which a field professionalizes. The charges leveled against ASBH thus appear to be a function of impatient, ahistoric perfectionism.

  11. Physical-layer security analysis of a quantum-noise randomized cipher based on the wire-tap channel model.

    PubMed

    Jiao, Haisong; Pu, Tao; Zheng, Jilin; Xiang, Peng; Fang, Tao

    2017-05-15

    The physical-layer security of a quantum-noise randomized cipher (QNRC) system is, for the first time, quantitatively evaluated with secrecy capacity employed as the performance metric. Considering quantum noise as a channel advantage for legitimate parties over eavesdroppers, the specific wire-tap models for both channels of the key and data are built with channel outputs yielded by quantum heterodyne measurement; the general expressions of secrecy capacities for both channels are derived, where the matching codes are proved to be uniformly distributed. The maximal achievable secrecy rate of the system is proposed, under which secrecy of both the key and data is guaranteed. The influences of various system parameters on secrecy capacities are assessed in detail. The results indicate that QNRC combined with proper channel codes is a promising framework of secure communication for long distance with high speed, which can be orders of magnitude higher than the perfect secrecy rates of other encryption systems. Even if the eavesdropper intercepts more signal power than the legitimate receiver, secure communication (up to Gb/s) can still be achievable. Moreover, the secrecy of running key is found to be the main constraint to the systemic maximal secrecy rate.

  12. The modern mental health system in Nepal: organizational persistence in the absence of legitimating myths.

    PubMed

    Tausig, M; Subedi, S

    1997-08-01

    This paper advances an organizational explanation for the slow pace of modernization of mental health care systems in developing societies. In complement to cultural and political economic explanations of this condition, we suggest that the value of establishing modern systems in developing societies lies in the legitimation such structures provide for indigenous modernizing efforts vis-a-vis both indigenous and external audiences. The system need not meet actual levels of service demand. Its importance is in its symbolic value as an indicator of modernity. The result is a system in "permanent failure". Implications for institutional theory and the growth of modern mental health systems in developing societies are discussed.

  13. Theory as a Second Story: Extending a Tale

    ERIC Educational Resources Information Center

    Benedict, Cathy

    2011-01-01

    In this article, the author states that she supports Wayne Bowman's (2006) concern with the impact narratives can have, including their potential to legitimize "existing patterns of privilege and possibility." She argues that "there is nothing inherently emancipatory about narrative." In fact, narrative "may, and often…

  14. Barriers to and Facilitators of Feminist Pedagogy in College and University Teaching. ASHE Annual Meeting Paper.

    ERIC Educational Resources Information Center

    Wakai, Sara T.

    This study examined faculty characteristics and teaching environments of higher education institutions that may hinder or facilitate student-centered pedagogical practices derived from feminist theory. Feminist pedagogy generally advocates democratizing the classroom, building cooperative learning environments, legitimizing personal experiences as…

  15. The False Security of Inclusivity.

    ERIC Educational Resources Information Center

    Delisle, James R.

    2003-01-01

    This article argues that the adoption of schoolwide enrichment options has resulted in the broadening of services to all children and a paucity of services for gifted children and that the theory of multiple intelligences has been used as a legitimate-sounding reason for administrators to dismiss gifted programs as superfluous. (Contains…

  16. Assessment and Decision-Making in Early Childhood Education and Intervention

    ERIC Educational Resources Information Center

    Strand, Paul S.; Cerna, Sandra; Skucy, Jim

    2007-01-01

    Assessment within the fields of early childhood education and early childhood intervention is guided by the "deductive-psychometric model", which is a framework for legitimizing constructs that arise from theories. An alternative approach, termed the "inductive-experimental model", places significantly more restrictions on what constitutes a…

  17. Towards a New Era of Character Education in Theory and in Practice

    ERIC Educational Resources Information Center

    Walker, David I.; Roberts, Michael P.; Kristjánsson, Kristján

    2015-01-01

    The authors use a Bourdieuean framework of "legitimating principles" and the "symbolic capital" of dominant "discursive themes" to explore (a) the genealogy and (b) the current state of the discourse on "character education" (understood broadly as any approach to moral education that foregrounds the…

  18. Political Redistricting and Geographic Theory. Resource Publications in Geography.

    ERIC Educational Resources Information Center

    Morrill, Richard L.

    Intended for geography students, professors, and researchers, this publication deals with the process of political redistricting and shows how geographers can help devise plans that are responsible to office-holders, to voters, to legitimate community interests, and to a sense of territorial integrity. There are eight chapters. Chapter 1 examines…

  19. The Role of Legitimation in the Professional Socialization of Second-Year Undergraduate Athletic Training Students

    PubMed Central

    Klossner, Joanne

    2008-01-01

    Context: Professional socialization during formal educational preparation can help students learn professional roles and can lead to improved organizational socialization as students emerge as members of the occupation's culture. Professional socialization research in athletic training is limited. Objective: To present the role of legitimation and how it influences the professional socialization of second-year athletic training students. Design: Modified constructivist grounded theory and case study methods were used for this qualitative study. Setting: An accredited undergraduate athletic training education program. Patients or Other Participants: Twelve second-year students were selected purposively. The primary sample group (n  =  4) was selected according to theoretical sampling guidelines. The remaining students made up the cohort sample (n  =  8). Theoretically relevant data were gathered from 14 clinical instructors to clarify emergent student data. Data Collection and Analysis: Data collection included document examination, observations, and interviews during 1 academic semester. Data were collected and analyzed through constant comparative analysis. Data triangulation, member checking, and peer-review strategies were used to ensure trustworthiness. Results: Legitimation from various socializing agents initiated professional socialization. Students viewed trust and team membership as rewards for role fulfillment. Conclusions: My findings are consistent with the socialization literature that shows how learning a social or professional role, using rewards to facilitate role performance, and building trusting relationships with socializing agents are important aspects of legitimation and, ultimately, professional socialization. PMID:18668171

  20. Society's symbolic order and political trials: toward sacrificing the self for the "Big Other".

    PubMed

    Lubin, Avi

    2005-12-01

    The need to establish a borderline between legitimate and illegitimate political trial is one of the central societal discourses. In this paper the author claims that the issues are complex and that a political trial can remain legitimate as long as it is not dealing with a confrontation with the symbolic order on which the society (and the court itself) is founded and as long as the subject (or action) it is dealing with does not threaten the symbolic order's (or the "Big Other") existence. When the symbolic order's existence is in danger, the court is bound to participate in an act of "sacrifice" that is intended to protect the "order." The author uses Jacques Lacan's psychoanalytic theory of the "Big Other" (and its development to ideological-political terms) in examining three categories of sacrifice. Through these categories the author claims that in extreme cases of confrontation with the existence of the symbolic order, the court cannot remain objective and it would be difficult to justify the trial as legitimate (especially in historical perspective).

  1. The cultural dimension of uncertainty avoidance impacts police-civilian interaction.

    PubMed

    Giebels, Ellen; Oostinga, Miriam S D; Taylor, Paul J; Curtis, Joanna L

    2017-02-01

    This research examines how the cultural dimension of uncertainty avoidance-a person's (in)tolerance for uncertain or unknown situations-impacts communication alignment in crisis negotiations. We hypothesized that perpetrators high on uncertainty avoidance would respond better to negotiators who use formal language and legitimize their position with reference to law, procedures, and moral codes. Data were transcriptions of 53 negotiations from a Dutch-German police training initiative, where police negotiators interacted with a high (German) and low (Dutch) uncertainty-avoidant mock perpetrator. Consistent with accounts of cross-cultural interaction, negotiators tended to achieve more alignment in within-culture interactions compared to cross-cultural interactions. Moreover, German negotiators, who scored higher on uncertainty avoidance than the Dutch negotiators, were found to use more legitimizing messages and more formal language than their Dutch counterparts. Critically, irrespective of the negotiators cultural background, the use of these behaviors was a significant moderator of the degree to which negotiator and perpetrator aligned their communicative frames: Using legitimizing and formal language helped with German perpetrators but had no effect on Dutch perpetrators. Our findings show the effects of cultural background on communication alignment and demonstrate the benefits of using more formal language and messages that emphasize law and regulations when interacting with perpetrators high on uncertainty avoidance. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  2. Teachers and Students Together in a Professional Learning Community

    ERIC Educational Resources Information Center

    Wennergren, Ann-Christine; Blossing, Ulf

    2017-01-01

    Students represent the majority of the people in a school organisation, but are rarely considered as participants in literature on professional learning communities (PLC). This article explored a PLC with the legitimate participation of students in the classroom. Data was based on interviews with 11 teachers. Community of practice theory provides…

  3. Learning To Control Democratically: Ethical Questions in Situated Adult Education.

    ERIC Educational Resources Information Center

    Heaney, Tom

    Lave and Wenger (1991) reject individualistic and psychologistic theories of learning in favor of a more broadly social and contextual approach. They observe that all learning is situated not only in space and time, but also inextricably in relation to social practice. Learning is "legitimate peripheral participation in a community of…

  4. Zoo Praxis and Theories: Teaching the Well-Being of Nonhuman Primates

    ERIC Educational Resources Information Center

    Burton, Frances

    2004-01-01

    Zoo projects that encourage reflective learning and are legitimate undertakings for untrained undergraduates are hard to develop. In this article, the author, as a professor in anthropology, discusses and teaches primate studies. His pedagogical goal in teaching primate studies is to enhance the process of learning, and to consider that students…

  5. The Transition of Adult Students to Higher Education: Legitimate Peripheral Participation in a Community of Practice?

    ERIC Educational Resources Information Center

    O'Donnell, Victoria L.; Tobbell, Jane

    2007-01-01

    This article presents empirical research exploring adult students' transition to higher education (HE) through a program designed to enable that transition. Wenger's Communities of Practice theory has been applied to informal adult learning by Merriam, Courtenay, and Baumgartner (2003), who suggested its potential for understanding formal…

  6. Discourse in Adult Education: The Language Education of Adult Immigrants in Sweden.

    ERIC Educational Resources Information Center

    Hill, Hannah

    1990-01-01

    A shortcoming of adult education theories is lack of attention to social, historical, and institutional contexts. A case study of language education programs for adult immigrants in Sweden illustrates how assumptions about participant-centered, needs-based education justified and legitimated the use of these programs as a tool for employment…

  7. Humanism and science: a reaction.

    PubMed

    Wampold, Bruce E

    2012-12-01

    Authors in this section have noted that humanism is intrinsic to psychotherapy, although disagreements remain. One of the disagreements is about the role of science in humanism. In this reaction, I contend that humanism, as discussed in these articles, is a legitimate theory to be subjected to scientific scrutiny. (c) 2012 APA, all rights reserved.

  8. Critical Literacy: Using Nonfiction to Learn about Islam

    ERIC Educational Resources Information Center

    Phelps, Stephen

    2010-01-01

    Schools have a legitimate and vital role in providing Americans with a better and more accurate understanding of the Muslim world. Given the cultural and ideological issues at play in any understanding of Islam, the theories and practices of critical literacy can provide useful guidance to teachers. The purposes of this article are to counteract…

  9. Music and Music Education: Theory and Praxis for "Making a Difference"

    ERIC Educational Resources Information Center

    Regelski, Thomas A.

    2005-01-01

    The "music appreciation as contemplation" paradigm of traditional aesthetics and music education assumes that music exists to be contemplated for itself. The resulting distantiation of music and music education from life creates a legitimation crisis for music education. Failing to make a noteworthy musical difference for society, a politics of…

  10. Degrees of Doubt: Legitimate, Real and Fake Qualifications in a Global Market

    ERIC Educational Resources Information Center

    Brown, George M.

    2006-01-01

    This paper provides an analysis into the global phenomenon known as credential/qualification fraud, a $US 1 billion dollar "cottage" industry which has tainted higher education in Australia, and does not appear to be abating. The study is developed through a conceptual framework of credentialism, degree creep and screening theory, which…

  11. Getting the Measure of Measurement: Global Educational Opportunity

    ERIC Educational Resources Information Center

    Enslin, Penny; Tjiattas, Mary

    2017-01-01

    Although measurement is widely misused in education, it is indispensable in addressing the problems of injustice in global educational opportunity. Considering how the case can be made for legitimate use of measurement in normative analysis and argument, we explore ways in which metrics have featured in the formulation of theories of justice, with…

  12. Young children's emotional practices while engaged in long-term science investigation

    NASA Astrophysics Data System (ADS)

    Zembylas, Michalinos

    2004-09-01

    In this article, the role of young children's emotional practices in science learning is described and analyzed. From the standpoint of performativity theory and social-constructionist theory of emotion, it is argued that emotion is performative and the expression of emotion in the classroom has its basis in social relationships. Arising from these relationships is the emotional culture of the classroom that plays a key role in the development of classroom emotional rules as well as the legitimation of science knowledge. These relationships are reflected in two levels of classroom dialogue: talking about and doing science, and expressing emotions about science and its learning. The dynamics of the negotiations of classroom emotional rules and science knowledge legitimation may dispose students to act positively or negatively toward science learning. This analysis is illustrated in the experiences of a teacher and her students during a 3-year ethnographic study of emotions in science teaching and learning. This research suggests the importance of the interrelationship between emotions and science learning and the notion that emotional practices can be powerful in nurturing effective and exciting science learning environments.

  13. Gesellschaft, Lebensgemeinschaft, Ökosystem - Über die Kongruenz von politischen und ökologischen Theorien der Entwicklung

    NASA Astrophysics Data System (ADS)

    Voigt, Annette

    Im Jahr 1859 veröffentlichte Charles Darwin "On the Origin of Species“. Seine Evolutionstheorie ist das wohl spektakulärste Beispiel einer naturwissenschaftlichen Theorie großer gesellschaftlicher Relevanz. Ihre verschiedenen Facetten wurden in der Öffentlichkeit kontrovers diskutiert, unter anderem auch ihre Anwendung zur Erklärung von Zuständen und Prozessen menschlicher Gesellschaften. Zum Teil wurde die Seiensweise der Natur - scheinbar unabhängig von gesellschaftlichen Interessen - für die Erklärung und Legitimation gesellschaftlicher Zustände oder die Legitimation von politischen Ideologien herangezogen (Sozialdarwinismus). Denn Gesellschaft funktioniere ja so, wie Darwin die Natur erklärt habe: es herrsche z. B. Konkurrenzkampf, Auslese und Arbeitsteilung, Erfolg hätten diejenigen, die sich an die Bedingungen am Besten anpassten.

  14. The Symbolic Boundary of Sports: Middle School Athletic Culture and Mexican Immigrant Girls

    ERIC Educational Resources Information Center

    Meador, Elizabeth

    2012-01-01

    In this article the author presents an analysis of the hidden curriculum of school sports in mediating the achievement of Mexican immigrant girls in middle schools in the southwestern United States. Using Bourdieu's theory of taste, the author shows how symbolic boundaries expressed by students and teachers legitimize cultural practices that…

  15. Master Teachers: Making a Difference on the Edge of Chaos

    ERIC Educational Resources Information Center

    Chapin, Dexter

    2008-01-01

    The No Child Left Behind legislation, by legitimizing a stark, one-size-fits-all, industrial model of education, has denied the inherent complexity and richness of what teachers do. Discussing teaching in terms of Chaos Theory, Chapin explains that while excellent teaching may occur at the edge of chaos, it is not chaotic. There are patterns…

  16. From Marginality to Legitimate Peripherality: Understanding the Essential Functions of a Women's Program

    ERIC Educational Resources Information Center

    Kahveci, Ajda; Southerland, Sherry A.; Gilmer, Penny J.

    2008-01-01

    The focus of this research was to understand how a program for women in science, mathematics, and engineering (SM&E) at college level in the southeastern United States functioned to influence women's decision making in terms of participation in these fields. By employing Lave and Wenger's theory of situated learning, we explored this program…

  17. Class, Control, and Contestation in Educational Organisations. ESA 841, Theory and Practice in Educational Administration.

    ERIC Educational Resources Information Center

    Watkins, Peter

    The introductory essay in this volume presents a case study of class-based organizational control and contestation in secondary schools in Victoria (Australia) in the 1970s, based on a critical perspective derived from the Frankfurt school, a perspective that undertakes to reveal the power structures, class hierarchy, and legitimating ideologies…

  18. A game theory perspective on environmental assessment: What games are played and what does this tell us about decision making rationality and legitimacy?

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bond, Alan; Research Unit for Environmental Sciences and Management, North-West University; Pope, Jenny

    Game theory provides a useful theoretical framework to examine the decision process operating in the context of environmental assessment, and to examine the rationality and legitimacy of decision-making subject to Environmental Assessment (EA). The research uses a case study of the Environmental Impact Assessment and Sustainability Appraisal processes undertaken in England. To these are applied an analytical framework, based on the concept of decision windows to identify the decisions to be assessed. The conditions for legitimacy are defined, based on game theory, in relation to the timing of decision information, the behaviour type (competitive, reciprocal, equity) exhibited by the decisionmore » maker, and the level of public engagement; as, together, these control the type of rationality which can be brought to bear on the decision. Instrumental rationality is based on self-interest of individuals, whereas deliberative rationality seeks broader consensus and is more likely to underpin legitimate decisions. The results indicate that the Sustainability Appraisal process, conducted at plan level, is better than EIA, conducted at project level, but still fails to provide conditions that facilitate legitimacy. Game theory also suggests that Sustainability Appraisal is likely to deliver ‘least worst’ outcomes rather than best outcomes when the goals of the assessment process are considered; this may explain the propensity of such ‘least worst’ decisions in practise. On the basis of what can be learned from applying this game theory perspective, it is suggested that environmental assessment processes need to be redesigned and better integrated into decision making in order to guarantee the legitimacy of the decisions made. - Highlights: • Decision legitimacy is defined in terms of game theory. • Game theory is applied to EIA and SA decision windows. • Game theory suggests least worst outcomes prevail. • SA is more likely to be perceived legitimate than EIA.« less

  19. When craft and science collide: Improving therapeutic practices through evidence-based innovations.

    PubMed

    Justice, Laura M

    2010-04-01

    Evidence-based practice (EBP) is a model of clinical decision-making that is increasingly being advocated for use in the field of speech-language pathology. With the increased emphasis on scientific evidence as a form of knowledge important to EBP, clinicians may wonder whether their craft-based knowledge (i.e., knowledge derived from theory and practice), remains a legitimate form of knowledge for use in clinician decisions. This article describes forms of knowledge that may be used to address clinical questions, to include both craft and science. Additionally, the steps used when engaging in EBP are described so that clinicians understand when and how craft comes into play. The major premise addressed within this article is that craft is a legitimate form of knowledge and that engagement in EBP requires one to employ craft-based knowledge.

  20. Autonomy-Supportive Teaching and Its Antecedents: Differences between Teachers and Teaching Assistants and the Predictive Role of Perceived Competence

    ERIC Educational Resources Information Center

    Bennett, Marcus; Ng-Knight, Terry; Hayes, Ben

    2017-01-01

    Research predicated on self-determination theory (SDT) has established a positive relationship between autonomy-supportive teaching and a range of desired student outcomes. Therefore, the enhancement of autonomy-supportive teaching is a legitimate focus of efforts to improve student outcomes. In this study, we compared self-reported levels of…

  1. Helping Preservice Reading Teachers Learn to Read and Conduct Research to Inform Their Instruction

    ERIC Educational Resources Information Center

    Frager, Alan M.

    2010-01-01

    Schools have a legitimate and vital role in providing Americans with a better and more accurate understanding of the Muslim world. Given the cultural and ideological issues at play in any understanding of Islam, the theories and practices of critical literacy can provide useful guidance to teachers. The purposes of this article are to counteract…

  2. From the Margins to the Center: A Critical Examination of the Identity Constructions of Bosnian Adolescent Refugees in New York City

    ERIC Educational Resources Information Center

    Mosselson, Jacqueline

    2009-01-01

    This article explores the role of culture and social networks as relations of difference in refugee experiences by challenging the assumptions in mainstream psychology that objectify the experiences of refugees and act as gatekeepers to their subjectivity. The deterministic bent of existing psychological theories legitimates an essentialist…

  3. How will it work? A qualitative study of strategic stakeholders' accounts of a patient safety initiative.

    PubMed

    Dixon-Woods, M; Tarrant, C; Willars, J; Suokas, A

    2010-02-01

    Implementation of quality improvement programmes may suffer if the stakeholders involved do not share a common understanding of the theory of change or do not accept it as legitimate. We aimed to identify how strategic stakeholders understood and responded to the first phase of the Health Foundation's Safer Patients Initiative, a programme aimed at making hospitals safer for patients in the UK. Semistructured telephone interviews were conducted with 60 strategic-level hospital stakeholders and with five stakeholders involved in commissioning, designing and introducing the initiative. Analysis was based on the constant comparative method. The aims of the initiative were seen as legitimate and sound by most hospital stakeholders, and the theory of change was generally understood and accepted, but seven hospital stakeholders were unable to describe it. Although participants had specific doubts, particularly relating to feasibility of implementation and scientific legitimacy of some elements of the initiative, overall there was a broadly shared vision and commitment to the principles and practices associated with the theory of change, and considerable enthusiasm and optimism. Contestations about the legitimacy and relevance of the initiative among front-line staff, local resistance to changes that went against established norms, and resource and structural issues were, however, seen as potentially threatening to implementation. It is possible to get strategic-level individuals, even when widely dispersed, to understand and agree upon a theory of change that can be used in their organisations. These individuals are also able to recognise the contexts of negotiation in which programmes of change are enacted.

  4. Law No. 91, Amendment to the Penal Code, 5 September 1987.

    PubMed

    1989-01-01

    This Law replaces Article 398 of the Iraq Penal Code with the following language: "If a sound contract of marriage has been made between a perpetrator of one of the crimes mentioned in this chapter and the victim, it shall be a legal extenuating excuse for the purpose of implementing the provisions of Articles (130 and 131) of the Penal Code. If the marriage contract has been terminated by a divorce issued by the husband without a legitimate reason, or by a divorce passed by the court for such reasons related [to] a mistake or a misconduct of the husband, three years before the expiry of the sentence of the action, then, the punishment shall be reconsidered with a view to intensifying it due to a request from the public prosecution, the victim herself, or any interested person." Among the crimes mentioned in the chapter referred to in Article 398 is rape.

  5. The social value of research: interrogating the paradoxes.

    PubMed

    Ghoshal, Rakhi

    2018-01-01

    The relation between science and society is, simply put, very complex. In the history of global bioethics, it is the Code of Nuremberg which foregrounded the acute ways in which biomedical/scientific research could (negatively) impact society; this 1947 Code became the point of reference for subsequent research concerning humans. The Code "required that medical experiments on human beings must have the potential to yield fruitful results for the good of society". The Declaration of Helsinki (DoH), 1964 reinstated this concern by stressing that "clinical research cannot be legitimately carried out unless the risks to participants are justified by the importance of the research" - invoking the idea of the "social value" of research. However, in these initial days, "social value" of research was interpreted more in terms of the moral balance of research, a balance to ensure that the benefits of research unambiguously outweighed its risks as far as its participants were concerned.

  6. Combinatorial neural codes from a mathematical coding theory perspective.

    PubMed

    Curto, Carina; Itskov, Vladimir; Morrison, Katherine; Roth, Zachary; Walker, Judy L

    2013-07-01

    Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining the error correction capabilities of familiar receptive field codes (RF codes). We find, perhaps surprisingly, that the high levels of redundancy present in these codes do not support accurate error correction, although the error-correcting performance of receptive field codes catches up to that of random comparison codes when a small tolerance to error is introduced. However, receptive field codes are good at reflecting distances between represented stimuli, while the random comparison codes are not. We suggest that a compromise in error-correcting capability may be a necessary price to pay for a neural code whose structure serves not only error correction, but must also reflect relationships between stimuli.

  7. Can Didactics Say How to Teach? The Beginning of a Dialogue between the Anthropological Theory of the Didactic and Other Approaches

    ERIC Educational Resources Information Center

    Gascón, Josep; Nicolás, Pedro

    2017-01-01

    Value judgments, prescriptions and proscriptions concerning instructional proposals seem to be very frequent in works in Didactics (papers, communications,…). In this paper we tackle the question of whether claims of this kind are legitimate. In few words, we wonder whether didactics can say how to teach. For that, we analyse and compare the…

  8. Reclaiming the Disengaged: Reform of New Zealand's Vocational Education and Training and Social Welfare Systems

    ERIC Educational Resources Information Center

    Strathdee, Rob

    2013-01-01

    This paper uses Habermas' theory of the state and his idea of legitimation crisis to critically evaluate recent reforms in New Zealand designed to engage young people (16-24 years of age) in paid employment and/or education and training. The paper identifies three broad strategies adopted by the state to reclaim the disengaged and hence, resolve…

  9. Basque and Catalan Nationalism: A Comparison

    DTIC Science & Technology

    1993-05-01

    ethnicity, geography, history, language, patterns of domination, and religion ) and then spends less than one sentence explaining each variable. The...states, economics and religion . Fifth, nationalism in Europe is basically a diffused theory imitated from one or perhaps two countries and spreading...will came into question. Patriotism (as a civic religion ) served to legitimize a growing impersonal state in the eyes of its citizens by engendering a

  10. From neuro-functional to neuro-computational models. Comment on "The quartet theory of human emotions: An integrative and neurofunctional model" by S. Koelsch et al.

    NASA Astrophysics Data System (ADS)

    Briesemeister, Benny B.

    2015-06-01

    Historically, there has been a strong opposition between psychological theories of human emotion that suggest a limited number of distinct functional categories, such as anger, fear, happiness and so forth (e.g. [1]), and theories that suggest processing along affective dimensions, such as valence and arousal (e.g. [2]). Only few current models acknowledge that both of these perspectives seem to be legitimate [3], and at their core, even fewer models connect these insights with knowledge about neurophysiology [4]. In this regard, the Quartet Theory of Human Emotions (QTHE) [5] makes a very important and useful contribution to the field of emotion research - but in my opinion, there is still at least one more step to go.

  11. 40 CFR 260.43 - Legitimate recycling of hazardous secondary materials regulated under § 260.34, § 261.2(a)(2)(ii...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 26 2011-07-01 2011-07-01 false Legitimate recycling of hazardous... (CONTINUED) HAZARDOUS WASTE MANAGEMENT SYSTEM: GENERAL Rulemaking Petitions § 260.43 Legitimate recycling of... demonstrate that the recycling is legitimate. Hazardous secondary material that is not legitimately recycled...

  12. 40 CFR 260.43 - Legitimate recycling of hazardous secondary materials regulated under § 260.34, § 261.2(a)(2)(ii...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 27 2013-07-01 2013-07-01 false Legitimate recycling of hazardous... (CONTINUED) HAZARDOUS WASTE MANAGEMENT SYSTEM: GENERAL Rulemaking Petitions § 260.43 Legitimate recycling of... demonstrate that the recycling is legitimate. Hazardous secondary material that is not legitimately recycled...

  13. 40 CFR 260.43 - Legitimate recycling of hazardous secondary materials regulated under § 260.34, § 261.2(a)(2)(ii...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 27 2012-07-01 2012-07-01 false Legitimate recycling of hazardous... (CONTINUED) HAZARDOUS WASTE MANAGEMENT SYSTEM: GENERAL Rulemaking Petitions § 260.43 Legitimate recycling of... demonstrate that the recycling is legitimate. Hazardous secondary material that is not legitimately recycled...

  14. 40 CFR 260.43 - Legitimate recycling of hazardous secondary materials regulated under § 260.34, § 261.2(a)(2)(ii...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 26 2014-07-01 2014-07-01 false Legitimate recycling of hazardous... (CONTINUED) HAZARDOUS WASTE MANAGEMENT SYSTEM: GENERAL Rulemaking Petitions § 260.43 Legitimate recycling of... demonstrate that the recycling is legitimate. Hazardous secondary material that is not legitimately recycled...

  15. 40 CFR 260.43 - Legitimate recycling of hazardous secondary materials regulated under § 260.34, § 261.2(a)(2)(ii...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Legitimate recycling of hazardous... (CONTINUED) HAZARDOUS WASTE MANAGEMENT SYSTEM: GENERAL Rulemaking Petitions § 260.43 Legitimate recycling of... demonstrate that the recycling is legitimate. Hazardous secondary material that is not legitimately recycled...

  16. Majority Group Members' Negative Reactions to Future Demographic Shifts Depend on the Perceived Legitimacy of Their Status: Findings from the United States and Portugal.

    PubMed

    Outten, H Robert; Lee, Timothy; Costa-Lopes, Rui; Schmitt, Michael T; Vala, Jorge

    2018-01-01

    Using concepts from social identity theory (Tajfel and Turner, 1979), we examined whether racial/ethnic majority group members' reactions to future demographic shifts is a function of the degree to which they perceive their ingroup's higher-status in society to be legitimate. In two studies, participants who varied in the degree to which they perceived their group's status to be legitimate were either exposed to real projections for 2060 (i.e., large decline in proportion of population that is the "majority" group), or fake projections for 2060-that resembled current figures (i.e., small decline). In Study 1, White Americans who perceived their status to be highly legitimate expressed greater intergroup threat, and negative feelings (anger and fear) toward minorities after exposure to projections with a large decline in the relative size of the White American population. In contrast, demographic shift condition had no effect on intergroup threat and negative feelings toward minorities among White Americans who perceived their status to be relatively illegitimate; negative feelings and threat remained low across both conditions. Similarly, in Study 2, ethnic Portuguese people in Portugal exposed to projections in which there was a large decline in the relative size of the ethnic Portuguese population experienced more intergroup threat and expressed a greater desire to engage in anti-immigration behaviors. The effect of demographic shift condition on intergroup threat and anti-immigration behaviors was stronger among ethnic Portuguese who perceived their status to be legitimate compared to ethnic Portuguese people who perceived their status to be relatively illegitimate. These results highlight that across different cultural contexts, majority group members' beliefs about the legitimacy of intergroup relations can affect their reactions to the prospect of increased diversity.

  17. Dual Coding, Reasoning and Fallacies.

    ERIC Educational Resources Information Center

    Hample, Dale

    1982-01-01

    Develops the theory that a fallacy is not a comparison of a rhetorical text to a set of definitions but a comparison of one person's cognition with another's. Reviews Paivio's dual coding theory, relates nonverbal coding to reasoning processes, and generates a limited fallacy theory based on dual coding theory. (PD)

  18. Coding Issues in Grounded Theory

    ERIC Educational Resources Information Center

    Moghaddam, Alireza

    2006-01-01

    This paper discusses grounded theory as one of the qualitative research designs. It describes how grounded theory generates from data. Three phases of grounded theory--open coding, axial coding, and selective coding--are discussed, along with some of the issues which are the source of debate among grounded theorists, especially between its…

  19. Reevaluating the United States’ Approach to Conflict and Military Intervention

    DTIC Science & Technology

    2009-12-11

    conflict. This paradigm views conflict as a legitimate incompatibly of interests between parties caused by scarcity of resources, power imbalances...if the problem is properly framed and the parties are able to work together. The systems perspective uses the biological metaphor of a simple...and resolution that could increase the US military’s effectiveness in its current operations? Significance There is a plethora of research and theory

  20. A Political Theory of Hegemonic Sustainability: A Legitimate Grand Strategy for America

    DTIC Science & Technology

    2013-06-01

    the population.114 Marxism defines the working class as “the people.” The modern US defines adults above the age eighteen as the people. The... France saw little value in Wilson’s proposal, instead preferring to dismember 27 Ikenberry...Leaders – US, UK, and France b. Present society – UN member nations’ representatives i. Societal sub-group – Western Liberal nations b. Content i

  1. Do scientific theories affect men's evaluations of sex crimes?

    PubMed

    Dar-Nimrod, Ilan; Heine, Steven J; Cheung, Benjamin Y; Schaller, Mark

    2011-01-01

    Evolutionary psychology accounts of gender differences in sexual behaviors in general and men's sexual aggression, in particular, has been criticized for legitimizing males' sexual misconduct. To empirically assess such critiques, two studies examined how men's judgments of male sex crimes (solicitation of sex from a prostitute; rape) are influenced by exposure to (a) evolutionary psychological theories and (b) social-constructivist theories. Across two studies, a consistent pattern emerged compared with a control condition (a) exposure to evolutionary psychology theories had no observable impact on male judgments of men's criminal sexual behavior, whereas (b) exposure to social-constructivist theories did affect judgments, leading men to evaluate sex crimes more harshly. Additional results (from Study 2) indicate that this effect is mediated by perceptions of male control over sexual urges. These results have implications for journalists, educators, and scientists. Aggr. Behav. 37:440-449, 2011. © 2011 Wiley-Liss, Inc. © 2011 Wiley-Liss, Inc.

  2. Do scientific theories affect men’s evaluations of sex crimes?

    PubMed Central

    DAR-NIMROD, ILAN; HEINE, STEVEN J.; CHEUNG, BENJAMIN Y.; SCHALLER, MARK

    2012-01-01

    Evolutionary Psychology accounts of gender differences in sexual behaviors in general and men’s sexual aggression in particular, have been criticized for legitimizing males’ sexual misconduct. To empirically assess such critiques, two studies examined how men’s judgments of male sex crimes (solicitation of sex from a prostitute; rape) are influenced by exposure to (a) evolutionary psychological theories, and (b) social-constructivist theories. Across two studies a consistent pattern emerged: compared to a control condition, (a) exposure to evolutionary psychology theories had no observable impact on male judgments of men’s criminal sexual behavior, whereas (b) exposure to social-constructivist theories did affect judgments, leading men to evaluate sex crimes more harshly. Additional results (from Study 2) indicate that this effect is mediated by perceptions of male control over sexual urges. These results have implications, for journalists, educators, and scientists. PMID:21678431

  3. Theory-of-mind development influences suggestibility and source monitoring.

    PubMed

    Bright-Paul, Alexandra; Jarrold, Christopher; Wright, Daniel B

    2008-07-01

    According to the mental-state reasoning model of suggestibility, 2 components of theory of mind mediate reductions in suggestibility across the preschool years. The authors examined whether theory-of-mind performance may be legitimately separated into 2 components and explored the memory processes underlying the associations between theory of mind and suggestibility, independent of verbal ability. Children 3 to 6 years old completed 6 theory-of-mind tasks and a postevent misinformation procedure. Contrary to the model's prediction, a single latent theory-of-mind factor emerged, suggesting a single-component rather than a dual-component conceptualization of theory-of-mind performance. This factor provided statistical justification for computing a single composite theory-of-mind score. Improvements in theory of mind predicted reductions in suggestibility, independent of verbal ability (Study 1, n = 72). Furthermore, once attribution biases were controlled (Study 2, n = 45), there was also a positive relationship between theory of mind and source memory, but not recognition performance. The findings suggest a substantial, and possibly causal, association between theory-of-mind development and resistance to suggestion, driven specifically by improvements in source monitoring.

  4. Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Wang, Chao; Song, Xiao-Tian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2015-10-01

    Measurement-device-independent quantum key distribution (MDI QKD) is a substantial step toward practical information-theoretic security for key sharing between remote legitimate users (Alice and Bob). As with other standard device-dependent quantum key distribution protocols, such as BB84, MDI QKD assumes that the reference frames have been shared between Alice and Bob. In practice, a nontrivial alignment procedure is often necessary, which requires system resources and may significantly reduce the secure key generation rate. Here, we propose a phase-coding reference-frame-independent MDI QKD scheme that requires no phase alignment between the interferometers of two distant legitimate parties. As a demonstration, a proof-of-principle experiment using Faraday-Michelson interferometers is presented. The experimental system worked at 1 MHz, and an average secure key rate of 8.309 bps was obtained at a fiber length of 20 km between Alice and Bob. The system can maintain a positive key generation rate without phase compensation under normal conditions. The results exhibit the feasibility of our system for use in mature MDI QKD devices and its value for network scenarios.

  5. Contrasting Five Different Theories of Letter Position Coding: Evidence from Orthographic Similarity Effects

    ERIC Educational Resources Information Center

    Davis, Colin J.; Bowers, Jeffrey S.

    2006-01-01

    Five theories of how letter position is coded are contrasted: position-specific slot-coding, Wickelcoding, open-bigram coding (discrete and continuous), and spatial coding. These theories make different predictions regarding the relative similarity of three different types of pairs of letter strings: substitution neighbors,…

  6. The Idea of Legitimate Authority in the Practice of Medicine.

    PubMed

    Applbaum, Arthur Isak

    2017-02-01

    Legitimate authority is the normative power to govern, where a normative power is the ability to change the normative situation of others. Correlatively, when one has the normative power to govern others, these others face a normative liability to be governed. So understood, physicians do not have legitimate authority over their patients, and patients do not have legitimate authority over their physicians. An authority is legitimate only when it is a free group agent constituted by its free members. On this conception, associations of physicians sometimes have legitimate authority over individual physicians, and physicians sometimes count as members subject to the legitimate authority of these associations. This might be so even when they have not consented to membership. © 2017 American Medical Association. All Rights Reserved.

  7. 78 FR 75910 - Impact of the Implementation of the Chemical Weapons Convention (CWC) on Legitimate Commercial...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-13

    ... (CWC) on Legitimate Commercial Chemical, Biotechnology, and Pharmaceutical Activities Involving... legitimate commercial activities and interests of chemical, biotechnology, and pharmaceutical firms are being... Biotechnology,'' calls for the President to certify to Congress on an annual basis that ``the legitimate...

  8. Developing an ethical code for engineers: the discursive approach.

    PubMed

    Lozano, J Félix

    2006-04-01

    From the Hippocratic Oath on, deontological codes and other professional self-regulation mechanisms have been used to legitimize and identify professional groups. New technological challenges and, above all, changes in the socioeconomic environment require adaptable codes which can respond to new demands. We assume that ethical codes for professionals should not simply focus on regulative functions, but must also consider ideological and educative functions. Any adaptations should take into account both contents (values, norms and recommendations) and the drafting process itself. In this article we propose a process for developing a professional ethical code for an official professional association (Colegio Oficial de Ingenieros Industriales de Valencia (COIIV) starting from the philosophical assumptions of discursive ethics but adapting them to critical hermeneutics. Our proposal is based on the Integrity Approach rather than the Compliance Approach. A process aiming to achieve an effective ethical document that fulfils regulative and ideological functions requires a participative, dialogical and reflexive methodology. This process must respond to moral exigencies and demands for efficiency and professional effectiveness. In addition to the methodological proposal we present our experience of producing an ethical code for the industrial engineers' association in Valencia (Spain) where this methodology was applied, and we evaluate the detected problems and future potential.

  9. A discriminative test among the different theories proposed to explain the origin of the genetic code: the coevolution theory finds additional support.

    PubMed

    Giulio, Massimo Di

    2018-05-19

    A discriminative statistical test among the different theories proposed to explain the origin of the genetic code is presented. Gathering the amino acids into polarity and biosynthetic classes that are the first expression of the physicochemical theory of the origin of the genetic code and the second expression of the coevolution theory, these classes are utilized in the Fisher's exact test to establish their significance within the genetic code table. Linking to the rows and columns of the genetic code of probabilities that express the statistical significance of these classes, I have finally been in the condition to be able to calculate a χ value to link to both the physicochemical theory and to the coevolution theory that would express the corroboration level referred to these theories. The comparison between these two χ values showed that the coevolution theory is able to explain - in this strictly empirical analysis - the origin of the genetic code better than that of the physicochemical theory. Copyright © 2018 Elsevier B.V. All rights reserved.

  10. The politics of grief and continuing bonds with the dead: the cases of Maoist China and Wahhabi Islam.

    PubMed

    Klass, Dennis; Goss, Robert

    2003-11-01

    The article is a contribution to a cross-cultural theory of grief. It examines the relationship between individual/family continuing bonds with the dead and cultural narratives that legitimize political power. The dead are collective representations (Dirkheim) that mediate the larger culture to individuals and to smaller communities and that reinforce social solidarity and identity. The political question is which collective--family, community, church, party, nation--owns the dead and controls the rituals by which bonds with the dead are maintained or relinquished? The article discusses one historical condition: times of rapid change in power arrangements. Bonds with the dead have a power in individual, family, or tribal life that can threaten the narrative that legitimizes the new political power holders. Ancestor rituals that support identity as a family or tribal member are surpressed and replaced by allegiance to collective representations of the new political order. Two historical examples are given: China under Chairman Mao and the Wahhabi reform in Arabic Islam.

  11. A system justification view of sexual violence: legitimizing gender inequality and reduced moral outrage are connected to greater rape myth acceptance.

    PubMed

    Chapleau, Kristine M; Oswald, Debra L

    2014-01-01

    Rape is a pervasive social problem that causes serious physical and psychological repercussions. Rape victims' recovery is often complicated by the public's failure to believe the victim and restore justice. This study applied system justification theory to examine whether the justification of gender inequality is related to moral outrage (an emotional precursor to corrective action) and rape myth acceptance; we also examined whether rape myth acceptance is associated with moral outrage at injustice. Results showed that gender-specific system justification correlated with less moral outrage at human suffering as well as greater rape myth acceptance. The relationships between these variables were similar for men and for women, a finding that suggests that rape myths are system justifying for women. When we controlled for gender-specific system justification, rape myth acceptance correlated with less moral outrage. Results are discussed in the context of how legitimizing ideologies reduce moral outrage at injustice and perpetuate a system of sexual violence.

  12. Sifting, sorting and saturating data in a grounded theory study of information use by practice nurses: a worked example.

    PubMed

    Hoare, Karen J; Mills, Jane; Francis, Karen

    2012-12-01

    The terminology used to analyse data in a grounded theory study can be confusing. Different grounded theorists use a variety of terms which all have similar meanings. In the following study, we use terms adopted by Charmaz including: initial, focused and axial coding. Initial codes are used to analyse data with an emphasis on identifying gerunds, a verb acting as a noun. If initial codes are relevant to the developing theory, they are grouped with similar codes into categories. Categories become saturated when there are no new codes identified in the data. Axial codes are used to link categories together into a grounded theory process. Memo writing accompanies this data sifting and sorting. The following article explains how one initial code became a category providing a worked example of the grounded theory method of constant comparative analysis. The interplay between coding and categorization is facilitated by the constant comparative method. © 2012 Wiley Publishing Asia Pty Ltd.

  13. Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

    NASA Astrophysics Data System (ADS)

    Picard, Justin; Vielhauer, Claus; Thorwirth, Niels

    2004-06-01

    Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterfeiters that can effectively forge documents. Today, with only limited knowledge of technology and a small amount of money, a counterfeiter can effortlessly replace a photo or modify identity information on a legitimate document to the extent that it is very diffcult to differentiate from the original. This paper proposes a virtually fraud-proof ID document based on a combination of three different data hiding technologies: digital watermarking, 2-D bar codes, and Copy Detection Pattern, plus additional biometric protection. As will be shown, that combination of data hiding technologies protects the document against any forgery, in principle without any requirement for other security features. To prevent a genuine document to be used by an illegitimate user,biometric information is also covertly stored in the ID document, to be used for identification at the detector.

  14. Finite-block-length analysis in classical and quantum information theory.

    PubMed

    Hayashi, Masahito

    2017-01-01

    Coding technology is used in several information processing tasks. In particular, when noise during transmission disturbs communications, coding technology is employed to protect the information. However, there are two types of coding technology: coding in classical information theory and coding in quantum information theory. Although the physical media used to transmit information ultimately obey quantum mechanics, we need to choose the type of coding depending on the kind of information device, classical or quantum, that is being used. In both branches of information theory, there are many elegant theoretical results under the ideal assumption that an infinitely large system is available. In a realistic situation, we need to account for finite size effects. The present paper reviews finite size effects in classical and quantum information theory with respect to various topics, including applied aspects.

  15. Finite-block-length analysis in classical and quantum information theory

    PubMed Central

    HAYASHI, Masahito

    2017-01-01

    Coding technology is used in several information processing tasks. In particular, when noise during transmission disturbs communications, coding technology is employed to protect the information. However, there are two types of coding technology: coding in classical information theory and coding in quantum information theory. Although the physical media used to transmit information ultimately obey quantum mechanics, we need to choose the type of coding depending on the kind of information device, classical or quantum, that is being used. In both branches of information theory, there are many elegant theoretical results under the ideal assumption that an infinitely large system is available. In a realistic situation, we need to account for finite size effects. The present paper reviews finite size effects in classical and quantum information theory with respect to various topics, including applied aspects. PMID:28302962

  16. Secure multiple access for indoor optical wireless communications with time-slot coding and chaotic phase.

    PubMed

    Liang, Tian; Wang, Ke; Lim, Christina; Wong, Elaine; Song, Tingting; Nirmalathas, Ampalavanapillai

    2017-09-04

    In this paper, we report a novel mechanism to simultaneously provide secure connections for multiple users in indoor optical wireless communication systems by employing the time-slot coding scheme together with chaotic phase sequence. The chaotic phase sequence is generated according to the logistic map and applied to each symbol to secure the transmission. Proof-of-concept experiments are carried out for multiple system capacities based on both 4-QAM and 16-QAM modulation formats, i.e. 1.25 Gb/s, 2 Gb/s and 2.5 Gb/s for 4-QAM, and 2.5 Gb/s, 3.33 Gb/s and 4 Gb/s for 16-QAM. Experimental results show that in all cases the added chaotic phase does not degrade the legitimate user's signal quality while the illegal user cannot detect the signal without the key.

  17. The Academy for Future Science Faculty: randomized controlled trial of theory-driven coaching to shape development and diversity of early-career scientists.

    PubMed

    Thakore, Bhoomi K; Naffziger-Hirsch, Michelle E; Richardson, Jennifer L; Williams, Simon N; McGee, Richard

    2014-08-02

    Approaches to training biomedical scientists have created a talented research community. However, they have failed to create a professional workforce that includes many racial and ethnic minorities and women in proportion to their representation in the population or in PhD training. This is particularly true at the faculty level. Explanations for the absence of diversity in faculty ranks can be found in social science theories that reveal processes by which individuals develop identities, experiences, and skills required to be seen as legitimate within the profession. Using the social science theories of Communities of Practice, Social Cognitive Career Theory, identity formation, and cultural capital, we have developed and are testing a novel coaching-based model to address some of the limitations of previous diversity approaches. This coaching intervention (The Academy for Future Science Faculty) includes annual in-person meetings of students and trained faculty Career Coaches, along with ongoing virtual coaching, group meetings and communication. The model is being tested as a randomized controlled trial with two cohorts of biomedical PhD students from across the U.S., one recruited at the start of their PhDs and one nearing completion. Stratification into the experimental and control groups, and to coaching groups within the experimental arms, achieved equal numbers of students by race, ethnicity and gender to the extent possible. A fundamental design element of the Academy is to teach and make visible the social science principles which highly influence scientific advancement, as well as acknowledging the extra challenges faced by underrepresented groups working to be seen as legitimate within the scientific communities. The strategy being tested is based upon a novel application of the well-established principles of deploying highly skilled coaches, selected and trained for their ability to develop talents of others. This coaching model is intended to be a complement, rather than a substitute, for traditional mentoring in biomedical research training, and is being tested as such.

  18. Fetal protection and potential liability: judicial application of the Pregnancy Discrimination Act and the disparate impact theory.

    PubMed

    Moelis, L S

    1985-01-01

    "Fetal vulnerability programs," which are employer attempts to protect employees' unborn fetuses from harm caused by the mothers' exposure to hazardous material in the workplace, have been challenged as a form of employment discrimination. This Note analyzes the recent judicial application of the Pregnancy Discrimination Act (PDA) and the disparate impact theory to fetal vulnerability cases. The Note also examines the business necessity defense's accommodation of legitimate employer interests. The Note concludes that a more potent business necessity defense, a stricter standard for evaluating alternative protective measures, and a judicial interpretation of the PDA which is more consistent with congressional intent are necessary for fair and reasonable resolution of these cases.

  19. Familiarity, legitimation, and frequency: the influence of others on the criminal self-view.

    PubMed

    Asencio, Emily K

    2011-01-01

    From an identity theory perspective, reflected appraisals from others are relevant for social behavior, because behavior is motivated by the desire to achieve congruence between reflected appraisals and the self-view for a particular identity. This study extends prior identity theory work from the laboratory setting by examining identity processes with respect to the criminal identity in the unique “natural” setting of a total institution. The findings build on prior work which finds that reflected appraisals do have an influence on identities and behavior by demonstrating that the relationship one has to the source of reflected appraisals is important for the way in which reflected appraisals influence the criminal self-view for an incarcerated population.

  20. Mechanism on brain information processing: Energy coding

    NASA Astrophysics Data System (ADS)

    Wang, Rubin; Zhang, Zhikang; Jiao, Xianfa

    2006-09-01

    According to the experimental result of signal transmission and neuronal energetic demands being tightly coupled to information coding in the cerebral cortex, the authors present a brand new scientific theory that offers a unique mechanism for brain information processing. They demonstrate that the neural coding produced by the activity of the brain is well described by the theory of energy coding. Due to the energy coding model's ability to reveal mechanisms of brain information processing based upon known biophysical properties, they cannot only reproduce various experimental results of neuroelectrophysiology but also quantitatively explain the recent experimental results from neuroscientists at Yale University by means of the principle of energy coding. Due to the theory of energy coding to bridge the gap between functional connections within a biological neural network and energetic consumption, they estimate that the theory has very important consequences for quantitative research of cognitive function.

  1. Energy coding in biological neural networks

    PubMed Central

    Zhang, Zhikang

    2007-01-01

    According to the experimental result of signal transmission and neuronal energetic demands being tightly coupled to information coding in the cerebral cortex, we present a brand new scientific theory that offers an unique mechanism for brain information processing. We demonstrate that the neural coding produced by the activity of the brain is well described by our theory of energy coding. Due to the energy coding model’s ability to reveal mechanisms of brain information processing based upon known biophysical properties, we can not only reproduce various experimental results of neuro-electrophysiology, but also quantitatively explain the recent experimental results from neuroscientists at Yale University by means of the principle of energy coding. Due to the theory of energy coding to bridge the gap between functional connections within a biological neural network and energetic consumption, we estimate that the theory has very important consequences for quantitative research of cognitive function. PMID:19003513

  2. Bodily cleanliness in modern nursing.

    PubMed

    Boge, Jeanne; Kristoffersen, Kjell; Martinsen, Kari

    2013-04-01

    Why are bodily washing practices the way they are in nursing? Michel Foucault argues that modern democratic societies discipline human bodies in accordance with political interests. In the extension of that argumentation we will show that bodily cleanliness in modern nursing may have been used as a disciplining tool. The first part of our discussion takes as its point of departure the second half of the 19th/the beginning of the 20th centuries, the period in which modern nursing emerged. At that time scientific theories on hygiene seem to have legitimized the political effort to produce a clean, pleasant-smelling, decent, obedient, and productive population. Doctors, nurses and teachers played important roles in the implementation of hygienic bodily washing practices. The second part of the discussion focuses on the post-war period. At that time humanistic needs theories seem to have legitimized political argumentation for independent patients who washed themselves if possible. Those who could not manage on their own, should, as far as possible, be washed by cheaper staff, so that nurses could concentrate on medical treatment. Finally we argue that present day bodily washing practices in nursing are in accordance with the norms of appearance and smell that arose in the second half of the 19th and the first part of the 20th centuries. We further argue that staff with little or no education perform much of the bodily nursing work. Self-care seems to be of interest only when it reduces public expenses. © 2013 Blackwell Publishing Ltd.

  3. Psychology as a theoretical foundation for health education in nursing: empowerment or social control?

    PubMed

    Piper, S M; Brown, P A

    1998-11-01

    This article explores the relationship between psychology and health education and illustrates how ostensibly 'neutral' models and theories of psychology can be used by conflicting health education philosophies and ideologies. We contend both that health education is an intrinsic element of nursing (which, for the purpose of this article, also includes health visiting and midwifery) and that psychology legitimately underpins practice. Our concern in this article is in the potential application of models and theories of health-related behaviour such as the health belief model (Rosenstock et al 1988), the theory of reasoned action (Fishbein & Ajzen 1985) and the stages of change model (Prochaska & DiClemente 1982) to the health education elements of nursing practice without an awareness and scrutiny of their particular ideological standpoint, and contrasting relationships to power, and thus an understanding of the potential ambiguity regarding their role and function.

  4. Why are men more likely to support group-based dominance than women? The mediating role of gender identification.

    PubMed

    Dambrun, Michaël; Duarte, Sandra; Guimond, Serge

    2004-06-01

    Arguing from a sociobiological perspective, Sidanius and Pratto (1999) have shown that the male/female difference in social dominance orientation (SDO) is largely invariant across cultural, situational and contextual boundaries. The main objective of this study was to test the validity of Social Dominance Theory (SDT) by contrasting it with a model derived from Social Identity Theory (SIT). More specifically, while SIT predicts that gender identification mediates the effect of gender on SDO, SDT predicts the reverse. According to SDT, the degree to which men and women endorse status legitimizing ideology should determine to what extent they identify with their gender group. Using structural equation modelling, the results provide strong support for the SIT model and no support for SDT predictions. Implications of these results for social dominance theory and its sociobiologically based invariance hypothesis are discussed.

  5. Question 6: coevolution theory of the genetic code: a proven theory.

    PubMed

    Wong, Jeffrey Tze-Fei

    2007-10-01

    The coevolution theory proposes that primordial proteins consisted only of those amino acids readily obtainable from the prebiotic environment, representing about half the twenty encoded amino acids of today, and the missing amino acids entered the system as the code expanded along with pathways of amino acid biosynthesis. The isolation of genetic code mutants, and the antiquity of pretran synthesis revealed by the comparative genomics of tRNAs and aminoacyl-tRNA synthetases, have combined to provide a rigorous proof of the four fundamental tenets of the theory, thus solving the riddle of the structure of the universal genetic code.

  6. Some pungent arguments against the physico-chemical theories of the origin of the genetic code and corroborating the coevolution theory.

    PubMed

    Di Giulio, Massimo

    2017-02-07

    Whereas it is extremely easy to prove that "if the biosynthetic relationships between amino acids were fundamental in the structuring of the genetic code, then their physico-chemical properties might also be revealed in the genetic code table"; it is, on the contrary, impossible to prove that "if the physico-chemical properties of amino acids were fundamental in the structuring of the genetic code, then the presence of the biosynthetic relationships between amino acids should not be revealed in the genetic code". And, given that in the genetic code table are mirrored both the biosynthetic relationships between amino acids and their physico-chemical properties, all this would be a test that would falsify the physico-chemical theories of the origin of the genetic code. That is to say, if the physico-chemical properties of amino acids had a fundamental role in organizing the genetic code, then we would not have duly revealed the presence - in the genetic code - of the biosynthetic relationships between amino acids, and on the contrary this has been observed. Therefore, this falsifies the physico-chemical theories of genetic code origin. Whereas, the coevolution theory of the origin of the genetic code would be corroborated by this analysis, because it would be able to give a description of evolution of the genetic code more coherent with the indisputable empirical observations that link both the biosynthetic relationships of amino acids and their physico-chemical properties to the evolutionary organization of the genetic code. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. School Experience, Relational Justice and Legitimation of Institutional Authorities

    ERIC Educational Resources Information Center

    Gouveia-Pereira, Maria; Vala, Jorge; Palmonari, Augusto; Rubini, Monica

    2003-01-01

    This study analysis the relationship between perceptions of the justice of teacher' behaviour and (a) the legitimation of school authority and (b) the legitimation of institutional authorities outside school. 448 adolescent students participated in the study. In a questionnaire participants were asked about (a) perceptions of the justice of…

  8. An Empirical Test of Legitimation as a Status Process

    ERIC Educational Resources Information Center

    Shelly, Ann Converse; Shelly, Robert K.

    2011-01-01

    Legitimation includes authorization of position occupants by external authority figures or their endorsement by members of task groups. Endorsed authority figures are more likely to direct interaction and influence the actions of group members than authorized authority figures. Interaction dynamics that lead to legitimation in groups are explored…

  9. The irreducibility of value-freedom to theory assessment.

    PubMed

    Bueter, Anke

    2015-02-01

    The current ideal of value-freedom holds non-cognitive values to be illegitimate in theory appraisal but legitimate in earlier stages of the research process, for example, when affecting the selection of topics or the generation of hypotheses. Respective decisions are often considered as part of a context of discovery and as irrelevant for the justification and assessment of theories. I will argue that this premise of an epistemic independence of theory appraisal, though often taken for granted, is false. Due to the possibility of value-laden blind spots, decisions in discovery can have an indirect impact on theory assessment that the value-free ideal cannot deal with. This argument is illustrated by a case study from women's health research, namely the assessment of hormone replacement therapy as a prevention of coronary heart diseases. In consequence, the epistemic trustworthiness of science is promoted more by a pluralism of non-cognitive values than by their exclusion; and a normative philosophy of science needs to enlarge its focus to include the context of discovery as well as the social conditions of science. Copyright © 2014 Elsevier Ltd. All rights reserved.

  10. Recent advances in coding theory for near error-free communications

    NASA Technical Reports Server (NTRS)

    Cheung, K.-M.; Deutsch, L. J.; Dolinar, S. J.; Mceliece, R. J.; Pollara, F.; Shahshahani, M.; Swanson, L.

    1991-01-01

    Channel and source coding theories are discussed. The following subject areas are covered: large constraint length convolutional codes (the Galileo code); decoder design (the big Viterbi decoder); Voyager's and Galileo's data compression scheme; current research in data compression for images; neural networks for soft decoding; neural networks for source decoding; finite-state codes; and fractals for data compression.

  11. RELAP-7 Theory Manual

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Berry, Ray Alden; Zou, Ling; Zhao, Haihua

    This document summarizes the physical models and mathematical formulations used in the RELAP-7 code. In summary, the MOOSE based RELAP-7 code development is an ongoing effort. The MOOSE framework enables rapid development of the RELAP-7 code. The developmental efforts and results demonstrate that the RELAP-7 project is on a path to success. This theory manual documents the main features implemented into the RELAP-7 code. Because the code is an ongoing development effort, this RELAP-7 Theory Manual will evolve with periodic updates to keep it current with the state of the development, implementation, and model additions/revisions.

  12. On the biological plausibility of grandmother cells: implications for neural network theories in psychology and neuroscience.

    PubMed

    Bowers, Jeffrey S

    2009-01-01

    A fundamental claim associated with parallel distributed processing (PDP) theories of cognition is that knowledge is coded in a distributed manner in mind and brain. This approach rejects the claim that knowledge is coded in a localist fashion, with words, objects, and simple concepts (e.g. "dog"), that is, coded with their own dedicated representations. One of the putative advantages of this approach is that the theories are biologically plausible. Indeed, advocates of the PDP approach often highlight the close parallels between distributed representations learned in connectionist models and neural coding in brain and often dismiss localist (grandmother cell) theories as biologically implausible. The author reviews a range a data that strongly challenge this claim and shows that localist models provide a better account of single-cell recording studies. The author also contrast local and alternative distributed coding schemes (sparse and coarse coding) and argues that common rejection of grandmother cell theories in neuroscience is due to a misunderstanding about how localist models behave. The author concludes that the localist representations embedded in theories of perception and cognition are consistent with neuroscience; biology only calls into question the distributed representations often learned in PDP models.

  13. System Design Description for the TMAD Code

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Finfrock, S.H.

    This document serves as the System Design Description (SDD) for the TMAD Code System, which includes the TMAD code and the LIBMAKR code. The SDD provides a detailed description of the theory behind the code, and the implementation of that theory. It is essential for anyone who is attempting to review or modify the code or who otherwise needs to understand the internal workings of the code. In addition, this document includes, in Appendix A, the System Requirements Specification for the TMAD System.

  14. Linguistic Legitimation of Political Events in Newspaper Discourse

    ERIC Educational Resources Information Center

    Ali, Marwah Kareem; Christopher, Anne A.; Nordin, Munif Zarirruddin Fikri B.

    2016-01-01

    This paper examines the discursive structures employed in legitimizing the event of U.S. forces withdrawal from Iraq and identifies them in relation to linguistic features. It attempts to describe the relation between language use and legitimation discursive structures in depicting political events. The paper focuses on the political event of U.S.…

  15. 38 CFR 10.42 - Claim of child other than legitimate child.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Claim of child other than legitimate child. 10.42 Section 10.42 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS ADJUSTED COMPENSATION Adjusted Compensation; General § 10.42 Claim of child other than legitimate child. A...

  16. 38 CFR 10.42 - Claim of child other than legitimate child.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2012-07-01 2012-07-01 false Claim of child other than legitimate child. 10.42 Section 10.42 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS ADJUSTED COMPENSATION Adjusted Compensation; General § 10.42 Claim of child other than legitimate child. A...

  17. 38 CFR 10.42 - Claim of child other than legitimate child.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2013-07-01 2013-07-01 false Claim of child other than legitimate child. 10.42 Section 10.42 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS ADJUSTED COMPENSATION Adjusted Compensation; General § 10.42 Claim of child other than legitimate child. A...

  18. 38 CFR 10.42 - Claim of child other than legitimate child.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2014-07-01 2014-07-01 false Claim of child other than legitimate child. 10.42 Section 10.42 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS ADJUSTED COMPENSATION Adjusted Compensation; General § 10.42 Claim of child other than legitimate child. A...

  19. 38 CFR 10.42 - Claim of child other than legitimate child.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2011-07-01 2011-07-01 false Claim of child other than legitimate child. 10.42 Section 10.42 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS ADJUSTED COMPENSATION Adjusted Compensation; General § 10.42 Claim of child other than legitimate child. A...

  20. The merit of meritocracy.

    PubMed

    Son Hing, Leanne S; Bobocel, D Ramona; Zanna, Mark P; Garcia, Donna M; Gee, Stephanie S; Orazietti, Katie

    2011-09-01

    We argue that the preference for the merit principle is a separate construct from hierarchy-legitimizing ideologies (i.e., system justification beliefs, prejudice, social dominance orientation), including descriptive beliefs that meritocracy currently exists in society. Moreover, we hypothesized that prescriptive beliefs about merit should have a stronger influence on reactions to the status quo when hierarchy-legitimizing ideologies are weak (vs. strong). In 4 studies, participants' preference for the merit principle and hierarchy-legitimizing ideologies were assessed; later, the participants evaluated organizational selection practices that support or challenge the status quo. Participants' prescriptive and descriptive beliefs about merit were separate constructs; only the latter predicted other hierarchy-legitimizing ideologies. In addition, as hypothesized, among participants who weakly endorsed hierarchy-legitimizing ideologies, the stronger their preference for the merit principle, the more they opposed selection practices that were perceived to be merit violating but the more they supported practices that were perceived to be merit restoring. In contrast, those who strongly endorsed hierarchy-legitimizing ideologies were always motivated to support the status quo, regardless of their preference for the merit principle. PsycINFO Database Record (c) 2011 APA, all rights reserved.

  1. The aminoacyl-tRNA synthetases had only a marginal role in the origin of the organization of the genetic code: Evidence in favor of the coevolution theory.

    PubMed

    Di Giulio, Massimo

    2017-11-07

    The coevolution theory of the origin of the genetic code suggests that the organization of the genetic code coevolved with the biosynthetic relationships between amino acids. The mechanism that allowed this coevolution was based on tRNA-like molecules on which-this theory-would postulate the biosynthetic transformations between amino acids to have occurred. This mechanism makes a prediction on how the role conducted by the aminoacyl-tRNA synthetases (ARSs), in the origin of the genetic code, should have been. Indeed, if the biosynthetic transformations between amino acids occurred on tRNA-like molecules, then there was no need to link amino acids to these molecules because amino acids were already charged on tRNA-like molecules, as the coevolution theory suggests. In spite of the fact that ARSs make the genetic code responsible for the first interaction between a component of nucleic acids and that of proteins, for the coevolution theory the role of ARSs should have been entirely marginal in the genetic code origin. Therefore, I have conducted a further analysis of the distribution of the two classes of ARSs and of their subclasses-in the genetic code table-in order to perform a falsification test of the coevolution theory. Indeed, in the case in which the distribution of ARSs within the genetic code would have been highly significant, then the coevolution theory would be falsified since the mechanism on which it is based would not predict a fundamental role of ARSs in the origin of the genetic code. I found that the statistical significance of the distribution of the two classes of ARSs in the table of the genetic code is low or marginal, whereas that of the subclasses of ARSs statistically significant. However, this is in perfect agreement with the postulates of the coevolution theory. Indeed, the only case of statistical significance-regarding the classes of ARSs-is appreciable for the CAG code, whereas for its complement-the UNN/NUN code-only a marginal significance is measurable. These two codes codify roughly for the two ARS classes, in particular, the CAG code for the class II while the UNN/NUN code for the class I. Furthermore, the subclasses of ARSs show a statistical significance of their distribution in the genetic code table. Nevertheless, the more sensible explanation for these observations would be the following. The observation that would link the two classes of ARSs to the CAG and UNN/NUN codes, and the statistical significance of the distribution of the subclasses of ARSs in the genetic code table, would be only a secondary effect due to the highly significant distribution of the polarity of amino acids and their biosynthetic relationships in the genetic code. That is to say, the polarity of amino acids and their biosynthetic relationships would have conditioned the evolution of ARSs so that their presence in the genetic code would have been detectable. Even if the ARSs would not have-on their own-influenced directly the evolutionary organization of the genetic code. In other words, the role that ARSs had in the origin of the genetic code would have been entirely marginal. This conclusion would be in perfect accord with the predictions of the coevolution theory. Conversely, this conclusion would be in contrast-at least partially-with the physicochemical theories of the origin of the genetic code because they would foresee an absolutely more active role of ARSs in the origin of the organization of the genetic code. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. A Survey of Progress in Coding Theory in the Soviet Union. Final Report.

    ERIC Educational Resources Information Center

    Kautz, William H.; Levitt, Karl N.

    The results of a comprehensive technical survey of all published Soviet literature in coding theory and its applications--over 400 papers and books appearing before March 1967--are described in this report. Noteworthy Soviet contributions are discussed, including codes for the noiseless channel, codes that correct asymetric errors, decoding for…

  3. Dual coding theory, word abstractness, and emotion: a critical review of Kousta et al. (2011).

    PubMed

    Paivio, Allan

    2013-02-01

    Kousta, Vigliocco, Del Campo, Vinson, and Andrews (2011) questioned the adequacy of dual coding theory and the context availability model as explanations of representational and processing differences between concrete and abstract words. They proposed an alternative approach that focuses on the role of emotional content in the processing of abstract concepts. Their dual coding critique is, however, based on impoverished and, in some respects, incorrect interpretations of the theory and its implications. This response corrects those gaps and misinterpretations and summarizes research findings that show predicted variations in the effects of dual coding variables in different tasks and contexts. Especially emphasized is an empirically supported dual coding theory of emotion that goes beyond the Kousta et al. emphasis on emotion in abstract semantics. 2013 APA, all rights reserved

  4. An optimization program based on the method of feasible directions: Theory and users guide

    NASA Technical Reports Server (NTRS)

    Belegundu, Ashok D.; Berke, Laszlo; Patnaik, Surya N.

    1994-01-01

    The theory and user instructions for an optimization code based on the method of feasible directions are presented. The code was written for wide distribution and ease of attachment to other simulation software. Although the theory of the method of feasible direction was developed in the 1960's, many considerations are involved in its actual implementation as a computer code. Included in the code are a number of features to improve robustness in optimization. The search direction is obtained by solving a quadratic program using an interior method based on Karmarkar's algorithm. The theory is discussed focusing on the important and often overlooked role played by the various parameters guiding the iterations within the program. Also discussed is a robust approach for handling infeasible starting points. The code was validated by solving a variety of structural optimization test problems that have known solutions obtained by other optimization codes. It has been observed that this code is robust: it has solved a variety of problems from different starting points. However, the code is inefficient in that it takes considerable CPU time as compared with certain other available codes. Further work is required to improve its efficiency while retaining its robustness.

  5. Multi-Touch Tablets, E-Books, and an Emerging Multi-Coding/Multi-Sensory Theory for Reading Science E-Textbooks: Considering the Struggling Reader

    ERIC Educational Resources Information Center

    Rupley, William H.; Paige, David D.; Rasinski, Timothy V.; Slough, Scott W.

    2015-01-01

    Pavio's Dual-Coding Theory (1991) and Mayer's Multimedia Principal (2000) form the foundation for proposing a multi-coding theory centered around Multi-Touch Tablets and the newest generation of e-textbooks to scaffold struggling readers in reading and learning from science textbooks. Using E. O. Wilson's "Life on Earth: An Introduction"…

  6. Language Policy in Japanese Ethnic Churches in Canada and the Legitimization of Church Member Identities

    ERIC Educational Resources Information Center

    Barrett, Tyler

    2017-01-01

    This paper is aimed at understanding the language policy of Japanese ethnic churches and the legitimization of church member identities in the midst of dominant languages in Canada. While church members often construct Japanese ethnic Christian churches with 'grassroots' language policies that seem to legitimize their Japanese language and…

  7. Mapping Legitimation of Civic Engagement through Undergrad, Graduate, and Faculty Participation

    ERIC Educational Resources Information Center

    De Blasio, Gregory G.; Woeste, Emma

    2013-01-01

    The authors provide a framework for understanding the process of legitimation and the status of legitimacy as it applies to civic engagement and community-based initiatives. They apply their own case study experience with a social circus organization as an example of how legitimation occurs during the practice of civic engagement. The authors…

  8. An analysis of the metabolic theory of the origin of the genetic code

    NASA Technical Reports Server (NTRS)

    Amirnovin, R.; Bada, J. L. (Principal Investigator)

    1997-01-01

    A computer program was used to test Wong's coevolution theory of the genetic code. The codon correlations between the codons of biosynthetically related amino acids in the universal genetic code and in randomly generated genetic codes were compared. It was determined that many codon correlations are also present within random genetic codes and that among the random codes there are always several which have many more correlations than that found in the universal code. Although the number of correlations depends on the choice of biosynthetically related amino acids, the probability of choosing a random genetic code with the same or greater number of codon correlations as the universal genetic code was found to vary from 0.1% to 34% (with respect to a fairly complete listing of related amino acids). Thus, Wong's theory that the genetic code arose by coevolution with the biosynthetic pathways of amino acids, based on codon correlations between biosynthetically related amino acids, is statistical in nature.

  9. The general theory of convolutional codes

    NASA Technical Reports Server (NTRS)

    Mceliece, R. J.; Stanley, R. P.

    1993-01-01

    This article presents a self-contained introduction to the algebraic theory of convolutional codes. This introduction is partly a tutorial, but at the same time contains a number of new results which will prove useful for designers of advanced telecommunication systems. Among the new concepts introduced here are the Hilbert series for a convolutional code and the class of compact codes.

  10. Theory and practice in the design and conduct of graduate medical education.

    PubMed

    Hodges, Brian David; Kuper, Ayelet

    2012-01-01

    Medical education practice is more often the result of tradition, ritual, culture, and history than of any easily expressed theoretical or conceptual framework. The authors explain the importance and nature of the role of theory in the design and conduct of graduate medical education. They outline three groups of theories relevant to graduate medical education: bioscience theories, learning theories, and sociocultural theories. Bioscience theories are familiar to many medical educators but are often misperceived as truths rather than theories. Theories from such disciplines as neuroscience, kinesiology, and cognitive psychology offer insights into areas such as memory formation, motor skills acquisition, diagnostic decision making, and instructional design. Learning theories, primarily emerging from psychology and education, are also popular within medical education. Although widely employed, not all learning theories have robust evidence bases. Nonetheless, many important notions within medical education are derived from learning theories, including self-monitoring, legitimate peripheral participation, and simulation design enabling sustained deliberate practice. Sociocultural theories, which are common in the wider education literature but have been largely overlooked within medical education, are inherently concerned with contexts and systems and provide lenses that selectively highlight different aspects of medical education. They challenge educators to reconceptualize the goals of medical education, to illuminate maladaptive processes, and to untangle problems such as career choice, interprofessional communication, and the hidden curriculum.Theories make visible existing problems and enable educators to ask new and important questions. The authors encourage medical educators to gain greater understanding of theories that guide their educational practices.

  11. The mathematical theory of signal processing and compression-designs

    NASA Astrophysics Data System (ADS)

    Feria, Erlan H.

    2006-05-01

    The mathematical theory of signal processing, named processor coding, will be shown to inherently arise as the computational time dual of Shannon's mathematical theory of communication which is also known as source coding. Source coding is concerned with signal source memory space compression while processor coding deals with signal processor computational time compression. Their combination is named compression-designs and referred as Conde in short. A compelling and pedagogically appealing diagram will be discussed highlighting Conde's remarkable successful application to real-world knowledge-aided (KA) airborne moving target indicator (AMTI) radar.

  12. Ethical decision-making in intensive care: are nurses suitable patient advocates?

    PubMed

    Norrie, P

    1997-06-01

    According to the United Kingdom Central Council for Nursing, Midwifery and Health Visiting (UKCC) code of conduct (1992), nurses in Britain are expected to act as patient advocates. An advocate is someone who 'pleads for another' (Concise Oxford Dictionary 1982). However, it has been shown that advocacy is a complex issue and it is debatable as to whether or not it is a legitimate attribute of the role of the nurse (Gates 1995). Mallik (1997) also finds that advocacy can be a risky career option. Professional codes of conduct spell out duties, but do not give moral guidance. Phrases such as 'promote and safeguard the well-being of the patient' (UKCC 1992) are used, but although undoubtedly well-intentioned, this is platitudinous and these codes commonly shed little light on how to define an action that is to the patient's benefit or detriment. It is tempting to suggest that they are used as a drunken man uses a street lamp; more for support than illumination. Castledine (1981) identified a number of factors that would make a nurse an inappropriate advocate and these will be discussed within the context of intensive care units (ICUs).

  13. An extension of the coevolution theory of the origin of the genetic code

    PubMed Central

    Di Giulio, Massimo

    2008-01-01

    Background The coevolution theory of the origin of the genetic code suggests that the genetic code is an imprint of the biosynthetic relationships between amino acids. However, this theory does not seem to attribute a role to the biosynthetic relationships between the earliest amino acids that evolved along the pathways of energetic metabolism. As a result, the coevolution theory is unable to clearly define the very earliest phases of genetic code origin. In order to remove this difficulty, I here suggest an extension of the coevolution theory that attributes a crucial role to the first amino acids that evolved along these biosynthetic pathways and to their biosynthetic relationships, even when defined by the non-amino acid molecules that are their precursors. Results It is re-observed that the first amino acids to evolve along these biosynthetic pathways are predominantly those codified by codons of the type GNN, and this observation is found to be statistically significant. Furthermore, the close biosynthetic relationships between the sibling amino acids Ala-Ser, Ser-Gly, Asp-Glu, and Ala-Val are not random in the genetic code table and reinforce the hypothesis that the biosynthetic relationships between these six amino acids played a crucial role in defining the very earliest phases of genetic code origin. Conclusion All this leads to the hypothesis that there existed a code, GNS, reflecting the biosynthetic relationships between these six amino acids which, as it defines the very earliest phases of genetic code origin, removes the main difficulty of the coevolution theory. Furthermore, it is here discussed how this code might have naturally led to the code codifying only for the domains of the codons of precursor amino acids, as predicted by the coevolution theory. Finally, the hypothesis here suggested also removes other problems of the coevolution theory, such as the existence for certain pairs of amino acids with an unclear biosynthetic relationship between the precursor and product amino acids and the collocation of Ala between the amino acids Val and Leu belonging to the pyruvate biosynthetic family, which the coevolution theory considered as belonging to different biosyntheses. Reviewers This article was reviewed by Rob Knight, Paul Higgs (nominated by Laura Landweber), and Eugene Koonin. PMID:18775066

  14. Expansive learning in the university setting: the case for simulated clinical experience.

    PubMed

    Haigh, Jacquelyn

    2007-03-01

    This paper argues that simulated practice in the university setting is not just a second best to learning in the clinical area but one which offers the potential for deliberation and deep learning [Eraut, M., 2000. Non-formal learning, implicit learning and tacit knowledge in professional work. Journal of Educational Psychology, 70, 113-136]. The context of student learning in an undergraduate midwifery programme is analysed using human activity theory [Engeström, Y., 2001. Expansive learning at work: toward an activity theoretical reconceptualization. Journal of Education and Work, 14, 133-156]. The advantages of this approach to student learning as opposed to situated learning theory and the concept of legitimate peripheral participation [Lave, J., Wenger, E., 1991. Situated Learning: Legitimate Peripheral Participation. Cambridge University Press, New York] are discussed. An activity system changes as a result of contradictions and tensions between what it purports to produce and the views of stakeholders (multi-voicedness) as well as its historical context (Historicity of activity). A focus group with students highlights their expressed need for more simulated practice experience. The views of midwifery lecturers are sought as an alternative voice on this tension in the current programme. Qualitative differences in types of simulated experience are explored and concerns about resources are raised in the analysis. Discussion considers the value of well planned simulations in encouraging the expression of tacit understanding through a group deliberative learning process [Eraut, M., 2000. Non-formal learning, implicit learning and tacit knowledge in professional work. Journal of Educational Psychology, 70, 113-136].

  15. A Critique of Schema Theory in Reading and a Dual Coding Alternative (Commentary).

    ERIC Educational Resources Information Center

    Sadoski, Mark; And Others

    1991-01-01

    Evaluates schema theory and presents dual coding theory as a theoretical alternative. Argues that schema theory is encumbered by lack of a consistent definition, its roots in idealist epistemology, and mixed empirical support. Argues that results of many empirical studies used to demonstrate the existence of schemata are more consistently…

  16. Questioning fairness: the relationship of mental health and psychopathic characteristics with young offenders' perceptions of procedural justice and legitimacy.

    PubMed

    Penner, Erika K; Shaffer, Catherine S; Viljoen, Jodi L

    2017-10-01

    Theories of procedural justice suggest that individuals who experience the criminal justice system as fair are more likely to perceive it as legitimate and, in turn, are less likely to reoffend. However, when individuals come into contact with the legal system, they are not blank slates - they have beliefs and personality characteristics that may systematically influence such perceptions. Our aim was to establish the extent to which demographic characteristics, legal history and clinical features, including personality characteristics, systematically influenced the degree to which young people experience the justice system as fair and legitimate. Self-report, file and interview data were collected from ninety-two 12 to 17-year-olds on probation in Western Canada. Substance use and traumatic experiences were inversely correlated with perceptions of procedural justice and legal legitimacy. Young people with higher scores on interpersonal, lifestyle and antisocial facets of the psychopathy checklist: youth version believed less strongly in the legitimacy of the law, but regression analyses confirmed that only history of trauma was independently associated with perceived procedural justice and legitimacy. Those in the youngest age group were more likely to have positive perceptions of justice than older youths, but demographics and legal history otherwise did not relate to outcomes. Our findings suggest that examining the relationship between procedural justice, legitimacy and offending without taking intra-individual variables into account may neglect important influences on those relationships. Other research has begun to show that young people who do not accept the law as legitimate or the criminal justice system as fair are more likely to offend. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  17. The Academy for Future Science Faculty: randomized controlled trial of theory-driven coaching to shape development and diversity of early-career scientists

    PubMed Central

    2014-01-01

    Background Approaches to training biomedical scientists have created a talented research community. However, they have failed to create a professional workforce that includes many racial and ethnic minorities and women in proportion to their representation in the population or in PhD training. This is particularly true at the faculty level. Explanations for the absence of diversity in faculty ranks can be found in social science theories that reveal processes by which individuals develop identities, experiences, and skills required to be seen as legitimate within the profession. Methods/Design Using the social science theories of Communities of Practice, Social Cognitive Career Theory, identity formation, and cultural capital, we have developed and are testing a novel coaching-based model to address some of the limitations of previous diversity approaches. This coaching intervention (The Academy for Future Science Faculty) includes annual in-person meetings of students and trained faculty Career Coaches, along with ongoing virtual coaching, group meetings and communication. The model is being tested as a randomized controlled trial with two cohorts of biomedical PhD students from across the U.S., one recruited at the start of their PhDs and one nearing completion. Stratification into the experimental and control groups, and to coaching groups within the experimental arms, achieved equal numbers of students by race, ethnicity and gender to the extent possible. A fundamental design element of the Academy is to teach and make visible the social science principles which highly influence scientific advancement, as well as acknowledging the extra challenges faced by underrepresented groups working to be seen as legitimate within the scientific communities. Discussion The strategy being tested is based upon a novel application of the well-established principles of deploying highly skilled coaches, selected and trained for their ability to develop talents of others. This coaching model is intended to be a complement, rather than a substitute, for traditional mentoring in biomedical research training, and is being tested as such. PMID:25084625

  18. Falling out: authoritative knowledge and women's experiences with pelvic organ prolapse.

    PubMed

    Low, Lisa Kane; Tumbarello, Julie A

    2012-01-01

    Despite the high prevalence of pelvic organ prolapse, many women suffer in silence, lacking the language and opportunity to describe their condition. There are limited descriptions of women's experiences with pelvic organ prolapse in the literature. This qualitative study addressed the knowledge and experience of women with pelvic organ prolapse. Semistructured interviews were conducted with 13 women who had been previously diagnosed with pelvic organ prolapse. Transcripts of the interviews were reviewed and coded using a process of content analysis compared against the framework of authoritative knowledge, developed by Brigitte Jordan. By applying the concept of authoritative knowledge, we identified 3 themes of how women construct understanding about pelvic organ prolapse and how they demonstrate deference to the authoritative knowledge of medical providers. First, we found through women's narratives that authoritative knowledge was held by the health care provider and is considered consequential and legitimate by all participants. Second, women reported that the health care provider's authoritative knowledge was valued over personal, experiential knowledge. Finally, women described how they work with their health care providers to create a system of authoritative knowledge as they seek treatment for or discuss their condition. Throughout the narratives, women's experiences are not legitimized by the women or the medical community, perpetuating the "hidden" nature of these conditions. This analysis provides qualitative evidence of Jordan's authoritative knowledge: women and health care providers contribute to dimensions of authoritative knowledge surrounding pelvic organ prolapse. Despite what women experience, the health care provider's definition and understanding of pelvic organ prolapse is seen as legitimate and consequential. Because of their construction of their condition, and the power dynamic at play, women are silenced, and their expertise about their bodies is delegitimized, limiting their active participation in seeking care for this condition. © 2012 by the American College of Nurse-Midwives.

  19. Evaluation of Persons of Varying Ages.

    ERIC Educational Resources Information Center

    Stolte, John F.

    1996-01-01

    Reviews two experiments that strongly support dual coding theory. Dual coding theory holds that communicating concretely (tactile, auditory, or visual stimuli) affects evaluative thinking stronger than communicating abstractly through words and numbers. The experiments applied this theory to the realm of age and evaluation. (MJP)

  20. Computational Nuclear Physics and Post Hartree-Fock Methods

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lietz, Justin; Sam, Novario; Hjorth-Jensen, M.

    We present a computational approach to infinite nuclear matter employing Hartree-Fock theory, many-body perturbation theory and coupled cluster theory. These lectures are closely linked with those of chapters 9, 10 and 11 and serve as input for the correlation functions employed in Monte Carlo calculations in chapter 9, the in-medium similarity renormalization group theory of dense fermionic systems of chapter 10 and the Green's function approach in chapter 11. We provide extensive code examples and benchmark calculations, allowing thereby an eventual reader to start writing her/his own codes. We start with an object-oriented serial code and end with discussions onmore » strategies for porting the code to present and planned high-performance computing facilities.« less

  1. Understanding Legitimate Teacher Authority in a Cross-Cultural Teaching Context: Pre-Service Chinese Language Teachers Undertaking Teaching Practicum in International Schools in Hong Kong

    ERIC Educational Resources Information Center

    Lai, Chun; Gu, Mingyue; Hu, Jingjing

    2015-01-01

    Legitimate teacher authority is fundamental to effective teaching, but is often a thorny issue that teachers need to grapple with when teaching in cross-cultural teaching contexts. By interviewing 18 pre-service Chinese language teachers on their understanding of legitimate teacher authority throughout teaching practicum at international schools…

  2. A Comparison of Social Dominance Theory and System Justification: The Role of Social Status in 19 Nations.

    PubMed

    Vargas-Salfate, Salvador; Paez, Dario; Liu, James H; Pratto, Felicia; Gil de Zúñiga, Homero

    2018-07-01

    This study tests specific competing hypotheses from social dominance theory/realistic conflict theory (RCT) versus system justification theory about the role of social status. In particular, it examines whether system justification belief and effects are stronger among people with low socioeconomic status, and in less socially developed and unequal nations than among better-off people and countries. A cross-national survey was carried out in 19 nations from the Americas, Western and Eastern Europe, Asia, and Oceania using representative online samples ( N = 14,936, 50.15% women, M age = 41.61 years). At the individual level, system justification beliefs, right-wing authoritarianism, social dominance orientation, national identification, sociopolitical conservatism, sex, age, and social status were measured. At the national level, the human development index and the Gini index were used. Multilevel analyses performed indicated that results fit better with the social dominance/RCT approach, as system justification was higher in high-status and developed nations; further, associations between legitimizing ideologies and system justification were stronger among high-status people.

  3. Predicting radiative heat transfer in thermochemical nonequilibrium flow fields. Theory and user's manual for the LORAN code

    NASA Technical Reports Server (NTRS)

    Chambers, Lin Hartung

    1994-01-01

    The theory for radiation emission, absorption, and transfer in a thermochemical nonequilibrium flow is presented. The expressions developed reduce correctly to the limit at equilibrium. To implement the theory in a practical computer code, some approximations are used, particularly the smearing of molecular radiation. Details of these approximations are presented and helpful information is included concerning the use of the computer code. This user's manual should benefit both occasional users of the Langley Optimized Radiative Nonequilibrium (LORAN) code and those who wish to use it to experiment with improved models or properties.

  4. Correcting quantum errors with entanglement.

    PubMed

    Brun, Todd; Devetak, Igor; Hsieh, Min-Hsiu

    2006-10-20

    We show how entanglement shared between encoder and decoder can simplify the theory of quantum error correction. The entanglement-assisted quantum codes we describe do not require the dual-containing constraint necessary for standard quantum error-correcting codes, thus allowing us to "quantize" all of classical linear coding theory. In particular, efficient modern classical codes that attain the Shannon capacity can be made into entanglement-assisted quantum codes attaining the hashing bound (closely related to the quantum capacity). For systems without large amounts of shared entanglement, these codes can also be used as catalytic codes, in which a small amount of initial entanglement enables quantum communication.

  5. Phenotypic Graphs and Evolution Unfold the Standard Genetic Code as the Optimal

    NASA Astrophysics Data System (ADS)

    Zamudio, Gabriel S.; José, Marco V.

    2018-03-01

    In this work, we explicitly consider the evolution of the Standard Genetic Code (SGC) by assuming two evolutionary stages, to wit, the primeval RNY code and two intermediate codes in between. We used network theory and graph theory to measure the connectivity of each phenotypic graph. The connectivity values are compared to the values of the codes under different randomization scenarios. An error-correcting optimal code is one in which the algebraic connectivity is minimized. We show that the SGC is optimal in regard to its robustness and error-tolerance when compared to all random codes under different assumptions.

  6. Under What Conditions Does Caseworker-Caregiver Racial/Ethnic Similarity Matter for Housing Service Provision? An Application of Representative Bureaucracy Theory.

    PubMed

    McBeath, Bowen; Chuang, Emmeline; Bunger, Alicia; Blakeslee, Jennifer

    2014-03-01

    In this article, we examine child welfare caseworkers' housing-related service strategies when they serve culturally similar versus culturally dissimilar clients. Testing hypotheses drawn from representative bureaucracy theory and using data from the second cohort of the National Survey of Child and Adolescent Well-Being, we find that when non-Caucasian caseworkers share the same racial/ethnic background as caregivers, caseworkers use more active strategies to connect caregivers to needed housing services. The relationship between racial/ethnic matching and frontline workers' repertoire of service strategies is most pronounced when the need for housing has been registered formally via referrals and case plans and thus legitimated institutionally. These results reinforce basic tenets of representative bureaucracy theory and provide evidence of the benefits of racial and ethnic diversity in the human service workforce. Our findings also highlight the need for research identifying institutional and frontline organizational factors that enhance the quality of service provision.

  7. Under What Conditions Does Caseworker-Caregiver Racial/Ethnic Similarity Matter for Housing Service Provision? An Application of Representative Bureaucracy Theory

    PubMed Central

    McBeath, Bowen; Chuang, Emmeline; Bunger, Alicia; Blakeslee, Jennifer

    2014-01-01

    In this article, we examine child welfare caseworkers’ housing-related service strategies when they serve culturally similar versus culturally dissimilar clients. Testing hypotheses drawn from representative bureaucracy theory and using data from the second cohort of the National Survey of Child and Adolescent Well-Being, we find that when non-Caucasian caseworkers share the same racial/ethnic background as caregivers, caseworkers use more active strategies to connect caregivers to needed housing services. The relationship between racial/ethnic matching and frontline workers’ repertoire of service strategies is most pronounced when the need for housing has been registered formally via referrals and case plans and thus legitimated institutionally. These results reinforce basic tenets of representative bureaucracy theory and provide evidence of the benefits of racial and ethnic diversity in the human service workforce. Our findings also highlight the need for research identifying institutional and frontline organizational factors that enhance the quality of service provision. PMID:25745270

  8. New approaches within the history and theory of medicine and their relevance for homeopathy.

    PubMed

    Schmidt, Josef M

    2014-04-01

    Conventional sciences have brought forth a wealth of knowledge and benefits, but they have not always been clear and precise about their legitimate scope and methodological limitations. In contrast, new and critical approaches in modern sciences question and reflect their own presuppositions, dependencies, and constraints. Examples are quantum physics, theory and history of science, as well as theory and history of medicine, sociology, and economics. In this way, deprecative dogmatism and animosity amongst sciences ought to be lessened, while the field opens up for each science to redefine its appropriate place in society. This would appear to be a chance for homeopathy, as new approaches, especially within the social and economic sciences, suggest that being a follower of Samuel Hahnemann (1755-1843) may have advantages and privileges that conventional medicine seems to be lacking and whose relevance was overlooked during the rise of economic thinking in the last two centuries. Copyright © 2013 The Faculty of Homeopathy. Published by Elsevier Ltd. All rights reserved.

  9. From sick role to practices of health and illness.

    PubMed

    Frank, Arthur W

    2013-01-01

    Health care research generally, and medical education research specifically, make increasingly sophisticated use of social science methods, but these methods are often detached from the theories that are the substantive core of the social sciences. Enhanced understanding of theory is especially valuable for gaining a broader perspective on how issues in medical education reflect the social processes that contextualise them. This article reviews five social science theories, emphasising their relevance to medical education, beginning with the emergence of the sociology of health and illness in the 1950s, with Talcott Parsons' concept of the 'sick role'. Four turning points since Parsons are then discussed with reference to the theory developed by, respectively, Harold Garfinkel, Michel Foucault and Pierre Bourdieu, and what is called the 'narrative or dialogical turn'. In considering these, the author argues for a theory-grounded research that relates specific problems to what Max Weber called the 'fate of our times'. The conclusion considers how medical education research can critique the reproduction of a discourse of scarcity in health care, rather than participating in this discourse and legitimating the disciplinary techniques that it renders self-evident. © Blackwell Publishing Ltd 2013.

  10. n-Nucleotide circular codes in graph theory.

    PubMed

    Fimmel, Elena; Michel, Christian J; Strüngmann, Lutz

    2016-03-13

    The circular code theory proposes that genes are constituted of two trinucleotide codes: the classical genetic code with 61 trinucleotides for coding the 20 amino acids (except the three stop codons {TAA,TAG,TGA}) and a circular code based on 20 trinucleotides for retrieving, maintaining and synchronizing the reading frame. It relies on two main results: the identification of a maximal C(3) self-complementary trinucleotide circular code X in genes of bacteria, eukaryotes, plasmids and viruses (Michel 2015 J. Theor. Biol. 380, 156-177. (doi:10.1016/j.jtbi.2015.04.009); Arquès & Michel 1996 J. Theor. Biol. 182, 45-58. (doi:10.1006/jtbi.1996.0142)) and the finding of X circular code motifs in tRNAs and rRNAs, in particular in the ribosome decoding centre (Michel 2012 Comput. Biol. Chem. 37, 24-37. (doi:10.1016/j.compbiolchem.2011.10.002); El Soufi & Michel 2014 Comput. Biol. Chem. 52, 9-17. (doi:10.1016/j.compbiolchem.2014.08.001)). The univerally conserved nucleotides A1492 and A1493 and the conserved nucleotide G530 are included in X circular code motifs. Recently, dinucleotide circular codes were also investigated (Michel & Pirillo 2013 ISRN Biomath. 2013, 538631. (doi:10.1155/2013/538631); Fimmel et al. 2015 J. Theor. Biol. 386, 159-165. (doi:10.1016/j.jtbi.2015.08.034)). As the genetic motifs of different lengths are ubiquitous in genes and genomes, we introduce a new approach based on graph theory to study in full generality n-nucleotide circular codes X, i.e. of length 2 (dinucleotide), 3 (trinucleotide), 4 (tetranucleotide), etc. Indeed, we prove that an n-nucleotide code X is circular if and only if the corresponding graph [Formula: see text] is acyclic. Moreover, the maximal length of a path in [Formula: see text] corresponds to the window of nucleotides in a sequence for detecting the correct reading frame. Finally, the graph theory of tournaments is applied to the study of dinucleotide circular codes. It has full equivalence between the combinatorics theory (Michel & Pirillo 2013 ISRN Biomath. 2013, 538631. (doi:10.1155/2013/538631)) and the group theory (Fimmel et al. 2015 J. Theor. Biol. 386, 159-165. (doi:10.1016/j.jtbi.2015.08.034)) of dinucleotide circular codes while its mathematical approach is simpler. © 2016 The Author(s).

  11. Towards an ethical theory in disaster situations.

    PubMed

    Mallia, Pierre

    2015-02-01

    Health Care professionals working in disaster situations have to face urgent choices which diverge from their normal deontological ethos and are more utilitarian. Such is the triage system used to choose whom to treat. Instead of entering a crisis these professionals should be thought that ethics is not harmonizable to all situations and that there are situations in which saving as many lives as possible mean sacrificing others. This calls for defining a perimeter zone in which such choices occur, and a time frame (a space-time niche) in which it ought to be considered ethical and legitimate to use such value laden choices.

  12. The Great Whoosh: Connecting an Online Personal Health Narrative and Communication Privacy Management.

    PubMed

    Smith, Stephanie A; Brunner, Steven R

    2016-01-01

    This research study examined Bud Goodall's online health narrative as a case study through the use of a thematic analysis to investigate the presence of communication privacy management (CPM) theory. Emergent themes of humor as a privacy management strategy, legitimization of co-owners, shifting privacy rules at end of life, and metaphors as privacy protection were used to recount Goodall's cancer experience on his personal blog, connecting to the components of CPM. The themes the authors analyzed represent the push-pull dialectical tension experienced to reveal and conceal information, conceptualization of private information, shared boundaries, and boundary linkages.

  13. Sexism and gender inequality across 57 societies.

    PubMed

    Brandt, Mark J

    2011-11-01

    Theory predicts that individuals' sexism serves to exacerbate inequality in their society's gender hierarchy. Past research, however, has provided only correlational evidence to support this hypothesis. In this study, I analyzed a large longitudinal data set that included representative data from 57 societies. Multilevel modeling showed that sexism directly predicted increases in gender inequality. This study provides the first evidence that sexist ideologies can create gender inequality within societies, and this finding suggests that sexism not only legitimizes the societal status quo, but also actively enhances the severity of the gender hierarchy. Three potential mechanisms for this effect are discussed briefly.

  14. Research on high power intra-channel crosstalk attack in optical networks

    NASA Astrophysics Data System (ADS)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  15. Enhancing Undergraduate Mathematics Curriculum via Coding Theory and Cryptography

    ERIC Educational Resources Information Center

    Aydin, Nuh

    2009-01-01

    The theory of error-correcting codes and cryptography are two relatively recent applications of mathematics to information and communication systems. The mathematical tools used in these fields generally come from algebra, elementary number theory, and combinatorics, including concepts from computational complexity. It is possible to introduce the…

  16. Factors Affecting Christian Parents' School Choice Decision Processes: A Grounded Theory Study

    ERIC Educational Resources Information Center

    Prichard, Tami G.; Swezey, James A.

    2016-01-01

    This study identifies factors affecting the decision processes for school choice by Christian parents. Grounded theory design incorporated interview transcripts, field notes, and a reflective journal to analyze themes. Comparative analysis, including open, axial, and selective coding, was used to reduce the coded statements to five code families:…

  17. Beller Lecture: Is Understanding the Past in Its Own Terms Understanding?

    NASA Astrophysics Data System (ADS)

    Wootton, David

    History of Science is in a state of intellectual confusion symbolized by its hostility to what is called ``Whig history''. The fundamental issue is whether it is legitimate to use hindsight in the writing of history. In this lecture I will defend retrospective history in three key respects: a) retrospection is generally a legitimate procedure in historical writing, primarily because historical outcomes are often unintended and unpredictable; b) retrospection is particularly legitimate where science is concerned because scientific development is path dependent; c) restrospection is particularly legitimate in history of science because science progresses, and progress can only be identified retrospectively. Defending retrospection is entirely compatible with recognizing that science is culturally specific; thus retrospection need not involve anachronism. See www.inventionofscience.com

  18. Dual coding: a cognitive model for psychoanalytic research.

    PubMed

    Bucci, W

    1985-01-01

    Four theories of mental representation derived from current experimental work in cognitive psychology have been discussed in relation to psychoanalytic theory. These are: verbal mediation theory, in which language determines or mediates thought; perceptual dominance theory, in which imagistic structures are dominant; common code or propositional models, in which all information, perceptual or linguistic, is represented in an abstract, amodal code; and dual coding, in which nonverbal and verbal information are each encoded, in symbolic form, in separate systems specialized for such representation, and connected by a complex system of referential relations. The weight of current empirical evidence supports the dual code theory. However, psychoanalysis has implicitly accepted a mixed model-perceptual dominance theory applying to unconscious representation, and verbal mediation characterizing mature conscious waking thought. The characterization of psychoanalysis, by Schafer, Spence, and others, as a domain in which reality is constructed rather than discovered, reflects the application of this incomplete mixed model. The representations of experience in the patient's mind are seen as without structure of their own, needing to be organized by words, thus vulnerable to distortion or dissolution by the language of the analyst or the patient himself. In these terms, hypothesis testing becomes a meaningless pursuit; the propositions of the theory are no longer falsifiable; the analyst is always more or less "right." This paper suggests that the integrated dual code formulation provides a more coherent theoretical framework for psychoanalysis than the mixed model, with important implications for theory and technique. In terms of dual coding, the problem is not that the nonverbal representations are vulnerable to distortion by words, but that the words that pass back and forth between analyst and patient will not affect the nonverbal schemata at all. Using the dual code formulation, and applying an investigative methodology derived from experimental cognitive psychology, a new approach to the verification of interpretations is possible. Some constructions of a patient's story may be seen as more accurate than others, by virtue of their linkage to stored perceptual representations in long-term memory. We can demonstrate that such linking has occurred in functional or operational terms--through evaluating the representation of imagistic content in the patient's speech.

  19. A Nonvolume Preserving Plasticity Theory with Applications to Powder Metallurgy

    NASA Technical Reports Server (NTRS)

    Cassenti, B. N.

    1983-01-01

    A plasticity theory has been developed to predict the mechanical response of powder metals during hot isostatic pressing. The theory parameters were obtained through an experimental program consisting of hydrostatic pressure tests, uniaxial compression and uniaxial tension tests. A nonlinear finite element code was modified to include the theory and the results of themodified code compared favorably to the results from a verification experiment.

  20. Experimental evaluation of a flat wake theory for predicting rotor inflow-wake velocities

    NASA Technical Reports Server (NTRS)

    Wilson, John C.

    1992-01-01

    The theory for predicting helicopter inflow-wake velocities called flat wake theory was correlated with several sets of experimental data. The theory was developed by V. E. Baskin of the USSR, and a computer code known as DOWN was developed at Princeton University to implement the theory. The theory treats the wake geometry as rigid without interaction between induced velocities and wake structure. The wake structure is assumed to be a flat sheet of vorticity composed of trailing elements whose strength depends on the azimuthal and radial distributions of circulation on a rotor blade. The code predicts the three orthogonal components of flow velocity in the field surrounding the rotor. The predictions can be utilized in rotor performance and helicopter real-time flight-path simulation. The predictive capability of the coded version of flat wake theory provides vertical inflow patterns similar to experimental patterns.

  1. Concreteness effects in semantic processing: ERP evidence supporting dual-coding theory.

    PubMed

    Kounios, J; Holcomb, P J

    1994-07-01

    Dual-coding theory argues that processing advantages for concrete over abstract (verbal) stimuli result from the operation of 2 systems (i.e., imaginal and verbal) for concrete stimuli, rather than just 1 (for abstract stimuli). These verbal and imaginal systems have been linked with the left and right hemispheres of the brain, respectively. Context-availability theory argues that concreteness effects result from processing differences in a single system. The merits of these theories were investigated by examining the topographic distribution of event-related brain potentials in 2 experiments (lexical decision and concrete-abstract classification). The results were most consistent with dual-coding theory. In particular, different scalp distributions of an N400-like negativity were elicited by concrete and abstract words.

  2. Coding, Constant Comparisons, and Core Categories: A Worked Example for Novice Constructivist Grounded Theorists.

    PubMed

    Giles, Tracey M; de Lacey, Sheryl; Muir-Cochrane, Eimear

    2016-01-01

    Grounded theory method has been described extensively in the literature. Yet, the varying processes portrayed can be confusing for novice grounded theorists. This article provides a worked example of the data analysis phase of a constructivist grounded theory study that examined family presence during resuscitation in acute health care settings. Core grounded theory methods are exemplified, including initial and focused coding, constant comparative analysis, memo writing, theoretical sampling, and theoretical saturation. The article traces the construction of the core category "Conditional Permission" from initial and focused codes, subcategories, and properties, through to its position in the final substantive grounded theory.

  3. Impact of Concreteness on Comprehensibility, Interest, and Memory for Text: Implications for Dual Coding Theory and Text Design.

    ERIC Educational Resources Information Center

    Sadoski, Mark; And Others

    1993-01-01

    The comprehensibility, interestingness, familiarity, and memorability of concrete and abstract instructional texts were studied in 4 experiments involving 221 college students. Results indicate that concreteness (ease of imagery) is the variable overwhelmingly most related to comprehensibility and recall. Dual coding theory and schema theory are…

  4. Factors influencing pharmacists’ adoption of prescribing: qualitative application of the diffusion of innovations theory

    PubMed Central

    2013-01-01

    Background In 2007, Alberta became the first Canadian jurisdiction to grant pharmacists a wide range of prescribing privileges. Our objective was to understand what factors influence pharmacists’ adoption of prescribing using a model for the Diffusion of Innovations in healthcare services. Methods Pharmacists participated in semi-structured telephone interviews to discuss their prescribing practices and explore the facilitators and barriers to implementation. Pharmacists working in community, hospital, PCN, or other settings were selected using a mix of random and purposive sampling. Two investigators independently analyzed each transcript using an Interpretive Description approach to identify themes. Analyses were informed by a model explaining the Diffusion of Innovations in health service organizations. Results Thirty-eight participants were interviewed. Prescribing behaviours varied from non-adoption through to product, disease, and patient focused use of prescribing. Pharmacists’ adoption of prescribing was dependent on the innovation itself, adopter, system readiness, and communication and influence. Adopting pharmacists viewed prescribing as a legitimization of previous practice and advantageous to instrumental daily tasks. The complexity of knowledge required for prescribing increased respectively in product, disease and patient focused prescribing scenarios. Individual adopters had higher levels of self-efficacy toward prescribing skills. At a system level, pharmacists who were in practice settings that were patient focused were more likely to adopt advanced prescribing practices, over those in product-focused settings. All pharmacists stated that physician relationships impacted their prescribing behaviours and individual pharmacists’ decisions to apply for independent prescribing privileges. Conclusions Diffusion of Innovations theory was helpful in understanding the multifaceted nature of pharmacists’ adoption of prescribing. The characteristics of the prescribing model itself which legitimized prior practices, the model of practice in a pharmacy setting, and relationships with physicians were prominent influences on pharmacists’ prescribing behaviours. PMID:24034176

  5. Factors influencing pharmacists' adoption of prescribing: qualitative application of the diffusion of innovations theory.

    PubMed

    Makowsky, Mark J; Guirguis, Lisa M; Hughes, Christine A; Sadowski, Cheryl A; Yuksel, Nese

    2013-09-14

    In 2007, Alberta became the first Canadian jurisdiction to grant pharmacists a wide range of prescribing privileges. Our objective was to understand what factors influence pharmacists' adoption of prescribing using a model for the Diffusion of Innovations in healthcare services. Pharmacists participated in semi-structured telephone interviews to discuss their prescribing practices and explore the facilitators and barriers to implementation. Pharmacists working in community, hospital, PCN, or other settings were selected using a mix of random and purposive sampling. Two investigators independently analyzed each transcript using an Interpretive Description approach to identify themes. Analyses were informed by a model explaining the Diffusion of Innovations in health service organizations. Thirty-eight participants were interviewed. Prescribing behaviours varied from non-adoption through to product, disease, and patient focused use of prescribing. Pharmacists' adoption of prescribing was dependent on the innovation itself, adopter, system readiness, and communication and influence. Adopting pharmacists viewed prescribing as a legitimization of previous practice and advantageous to instrumental daily tasks. The complexity of knowledge required for prescribing increased respectively in product, disease and patient focused prescribing scenarios. Individual adopters had higher levels of self-efficacy toward prescribing skills. At a system level, pharmacists who were in practice settings that were patient focused were more likely to adopt advanced prescribing practices, over those in product-focused settings. All pharmacists stated that physician relationships impacted their prescribing behaviours and individual pharmacists' decisions to apply for independent prescribing privileges. Diffusion of Innovations theory was helpful in understanding the multifaceted nature of pharmacists' adoption of prescribing. The characteristics of the prescribing model itself which legitimized prior practices, the model of practice in a pharmacy setting, and relationships with physicians were prominent influences on pharmacists' prescribing behaviours.

  6. Proposal to designate Methylothermus subterraneus Hirayama et al. 2011 as the type species of the genus Methylothermus. Request for an Opinion.

    PubMed

    Boden, Rich; Oren, Aharon

    2017-09-01

    Methylothermus thermalis, the designated type species of the genus Methylothermus, is not available from culture collections and its nomenclatural type is a patent strain. According to Rule 20a of the International Code of Nomenclature of Prokaryotes, only species whose names are legitimate may serve as types of genera. Therefore, the name Methylothermus and the names of the species Methylothermus thermalis and Methylothermus subterraneus are not validly published and are illegitimate. We therefore submit a Request for an Opinion to the Judicial Commission of the ICSP to consider the later-named Methylothermus subterraneus as the new type species of the genus Methylothermus based on Rule 20e(2).

  7. [Conscientious objection and the values of medical profession].

    PubMed

    Besio, Mauricio

    2016-03-01

    It is usual to understand conscientious objection as a doctor’s refusal to perform a legitimate intervention, for subjective personal reasons unrelated to medicine. It is then accepted only by respect to professional autonomy and freedom of beliefs. Understood in that way it would be thus reasonable to limit it, curtail it or delete it, since the objector would not be willing to grant benefits that correspond to his medical profession. This work aims to show exactly the opposite, taking as an example the project of law that pretends to decriminalize abortion in some situations in Chile. Is the objector who defends medical activity relying on ethic codes that seek to preserve the values and principles of our profession.

  8. Android application for handwriting segmentation using PerTOHS theory

    NASA Astrophysics Data System (ADS)

    Akouaydi, Hanen; Njah, Sourour; Alimi, Adel M.

    2017-03-01

    The paper handles the problem of segmentation of handwriting on mobile devices. Many applications have been developed in order to facilitate the recognition of handwriting and to skip the limited numbers of keys in keyboards and try to introduce a space of drawing for writing instead of using keyboards. In this one, we will present a mobile theory for the segmentation of for handwriting uses PerTOHS theory, Perceptual Theory of On line Handwriting Segmentation, where handwriting is defined as a sequence of elementary and perceptual codes. In fact, the theory analyzes the written script and tries to learn the handwriting visual codes features in order to generate new ones via the generated perceptual sequences. To get this classification we try to apply the Beta-elliptic model, fuzzy detector and also genetic algorithms in order to get the EPCs (Elementary Perceptual Codes) and GPCs (Global Perceptual Codes) that composed the script. So, we will present our Android application M-PerTOHS for segmentation of handwriting.

  9. Information Theory, Inference and Learning Algorithms

    NASA Astrophysics Data System (ADS)

    Mackay, David J. C.

    2003-10-01

    Information theory and inference, often taught separately, are here united in one entertaining textbook. These topics lie at the heart of many exciting areas of contemporary science and engineering - communication, signal processing, data mining, machine learning, pattern recognition, computational neuroscience, bioinformatics, and cryptography. This textbook introduces theory in tandem with applications. Information theory is taught alongside practical communication systems, such as arithmetic coding for data compression and sparse-graph codes for error-correction. A toolbox of inference techniques, including message-passing algorithms, Monte Carlo methods, and variational approximations, are developed alongside applications of these tools to clustering, convolutional codes, independent component analysis, and neural networks. The final part of the book describes the state of the art in error-correcting codes, including low-density parity-check codes, turbo codes, and digital fountain codes -- the twenty-first century standards for satellite communications, disk drives, and data broadcast. Richly illustrated, filled with worked examples and over 400 exercises, some with detailed solutions, David MacKay's groundbreaking book is ideal for self-learning and for undergraduate or graduate courses. Interludes on crosswords, evolution, and sex provide entertainment along the way. In sum, this is a textbook on information, communication, and coding for a new generation of students, and an unparalleled entry point into these subjects for professionals in areas as diverse as computational biology, financial engineering, and machine learning.

  10. Qualitative Data Analysis for Health Services Research: Developing Taxonomy, Themes, and Theory

    PubMed Central

    Bradley, Elizabeth H; Curry, Leslie A; Devers, Kelly J

    2007-01-01

    Objective To provide practical strategies for conducting and evaluating analyses of qualitative data applicable for health services researchers. Data Sources and Design We draw on extant qualitative methodological literature to describe practical approaches to qualitative data analysis. Approaches to data analysis vary by discipline and analytic tradition; however, we focus on qualitative data analysis that has as a goal the generation of taxonomy, themes, and theory germane to health services research. Principle Findings We describe an approach to qualitative data analysis that applies the principles of inductive reasoning while also employing predetermined code types to guide data analysis and interpretation. These code types (conceptual, relationship, perspective, participant characteristics, and setting codes) define a structure that is appropriate for generation of taxonomy, themes, and theory. Conceptual codes and subcodes facilitate the development of taxonomies. Relationship and perspective codes facilitate the development of themes and theory. Intersectional analyses with data coded for participant characteristics and setting codes can facilitate comparative analyses. Conclusions Qualitative inquiry can improve the description and explanation of complex, real-world phenomena pertinent to health services research. Greater understanding of the processes of qualitative data analysis can be helpful for health services researchers as they use these methods themselves or collaborate with qualitative researchers from a wide range of disciplines. PMID:17286625

  11. Qualitative data analysis for health services research: developing taxonomy, themes, and theory.

    PubMed

    Bradley, Elizabeth H; Curry, Leslie A; Devers, Kelly J

    2007-08-01

    To provide practical strategies for conducting and evaluating analyses of qualitative data applicable for health services researchers. DATA SOURCES AND DESIGN: We draw on extant qualitative methodological literature to describe practical approaches to qualitative data analysis. Approaches to data analysis vary by discipline and analytic tradition; however, we focus on qualitative data analysis that has as a goal the generation of taxonomy, themes, and theory germane to health services research. We describe an approach to qualitative data analysis that applies the principles of inductive reasoning while also employing predetermined code types to guide data analysis and interpretation. These code types (conceptual, relationship, perspective, participant characteristics, and setting codes) define a structure that is appropriate for generation of taxonomy, themes, and theory. Conceptual codes and subcodes facilitate the development of taxonomies. Relationship and perspective codes facilitate the development of themes and theory. Intersectional analyses with data coded for participant characteristics and setting codes can facilitate comparative analyses. Qualitative inquiry can improve the description and explanation of complex, real-world phenomena pertinent to health services research. Greater understanding of the processes of qualitative data analysis can be helpful for health services researchers as they use these methods themselves or collaborate with qualitative researchers from a wide range of disciplines.

  12. Early reactions to Harvey's circulation theory: the impact on medicine.

    PubMed

    Lubitz, Steven A

    2004-09-01

    In early 17th century Europe, scientific concepts were still based largely on ancient philosophical and theological explanations. During this same era, however, experimentation began to take hold as a legitimate component of scientific investigation. In 1628, the English physician William Harvey announced a revolutionary theory stating that blood circulates repeatedly throughout the body. He relied on experimentation, comparative anatomy and calculation to arrive at his conclusions. His theory contrasted sharply with the accepted beliefs of the time, which were based on the 1400-year-old teachings of Galen and denied the presence of circulation. As with many new ideas, Harvey's circulation theory was received with a great deal of controversy among his colleagues. An examination of their motives reveals that many proponents agreed with his theory largely because of the logic of his argument and his use of experimentation and quantitative methods. However, some proponents agreed for religious, mystical and philosophical reasons, while some were convinced only because of the change in public opinion with time. Many opposed the circulation theory because of their rigid commitment to ancient doctrines, the questionable utility of experimentation, the lack of proof that capillaries exist, and a failure to recognize the clinical applications of his theory. Other opponents were motivated by personal resentments and professional "territorialism." Beyond the immediate issues and arguments, however, the controversy is important because it helped establish use of the scientific method.

  13. Lexicons, contexts, events, and images: commentary on Elman (2009) from the perspective of dual coding theory.

    PubMed

    Paivio, Allan; Sadoski, Mark

    2011-01-01

    Elman (2009) proposed that the traditional role of the mental lexicon in language processing can largely be replaced by a theoretical model of schematic event knowledge founded on dynamic context-dependent variables. We evaluate Elman's approach and propose an alternative view, based on dual coding theory and evidence that modality-specific cognitive representations contribute strongly to word meaning and language performance across diverse contexts which also have effects predictable from dual coding theory. Copyright © 2010 Cognitive Science Society, Inc.

  14. Are You Taking Medication as Prescribed?

    MedlinePlus

    ... as their brand-name counterparts. You can also shop around your neighborhood or legitimate online pharmacies for the best prices on prescription drugs. For useful information about finding a legitimate online ...

  15. A Theoretical Analysis of Learning with Graphics--Implications for Computer Graphics Design.

    ERIC Educational Resources Information Center

    ChanLin, Lih-Juan

    This paper reviews the literature pertinent to learning with graphics. The dual coding theory provides explanation about how graphics are stored and precessed in semantic memory. The level of processing theory suggests how graphics can be employed in learning to encourage deeper processing. In addition to dual coding theory and level of processing…

  16. On the Biological Plausibility of Grandmother Cells: Implications for Neural Network Theories in Psychology and Neuroscience

    ERIC Educational Resources Information Center

    Bowers, Jeffrey S.

    2009-01-01

    A fundamental claim associated with parallel distributed processing (PDP) theories of cognition is that knowledge is coded in a distributed manner in mind and brain. This approach rejects the claim that knowledge is coded in a localist fashion, with words, objects, and simple concepts (e.g. "dog"), that is, coded with their own dedicated…

  17. A new theory of development: the generation of complexity in ontogenesis.

    PubMed

    Barbieri, Marcello

    2016-03-13

    Today there is a very wide consensus on the idea that embryonic development is the result of a genetic programme and of epigenetic processes. Many models have been proposed in this theoretical framework to account for the various aspects of development, and virtually all of them have one thing in common: they do not acknowledge the presence of organic codes (codes between organic molecules) in ontogenesis. Here it is argued instead that embryonic development is a convergent increase in complexity that necessarily requires organic codes and organic memories, and a few examples of such codes are described. This is the code theory of development, a theory that was originally inspired by an algorithm that is capable of reconstructing structures from incomplete information, an algorithm that here is briefly summarized because it makes it intuitively appealing how a convergent increase in complexity can be achieved. The main thesis of the new theory is that the presence of organic codes in ontogenesis is not only a theoretical necessity but, first and foremost, an idea that can be tested and that has already been found to be in agreement with the evidence. © 2016 The Author(s).

  18. A New Principle in Physiscs: the Principle "Finiteness", and Some Consequences

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abraham Sternlieb

    2010-06-25

    In this paper I propose a new principle in physics: the principle of "finiteness". It stems from the definition of physics as a science that deals (among other things) with measurable dimensional physical quantities. Since measurement results, including their errors, are always finite, the principle of finiteness postulates that the mathematical formulation of "legitimate" laws of physics should prevent exactly zero or infinite solutions. Some consequences of the principle of finiteness are discussed, in general, and then more specifically in the fields of special relativity, quantum mechanics, and quantum gravity. The consequences are derived independently of any other theory ormore » principle in physics. I propose "finiteness" as a postulate (like the constancy of the speed of light in vacuum, "c"), as opposed to a notion whose validity has to be corroborated by, or derived theoretically or experimentally from other facts, theories, or principles.« less

  19. Perceptions of Usefulness: Using the Holland Code Theory, Multiple Intelligences Theory, and Role Model Identification to Determine a Career Niche in the Fashion Industry for First-Quarter Fashion Students

    ERIC Educational Resources Information Center

    Green, Crystal D.

    2010-01-01

    This action research study investigated the perceptions that student participants had on the development of a career exploration model and a career exploration project. The Holland code theory was the primary assessment used for this research study, in addition to the Multiple Intelligences theory and the identification of a role model for the…

  20. Using grounded theory to create a substantive theory of promoting schoolchildren's mental health.

    PubMed

    Puolakka, Kristiina; Haapasalo-Pesu, Kirsi-Maria; Kiikkala, Irma; Astedt-Kurki, Päivi; Paavilainen, Eija

    2013-01-01

    To discuss the creation of a substantive theory using grounded theory. This article provides an example of generating theory from a study of mental health promotion at a high school in Finland. Grounded theory is a method for creating explanatory theory. It is a valuable tool for health professionals when studying phenomena that affect patients' health, offering a deeper understanding of nursing methods and knowledge. Interviews with school employees, students and parents, and verbal responses to the 'school wellbeing profile survey', as well as working group memos related to the development activities. Participating children were aged between 12 and 15. The analysis was conducted by applying the grounded theory method and involved open coding of the material, constant comparison, axial coding and selective coding after identifying the core category. The analysis produced concepts about mental health promotion in school and assumptions about relationships. Grounded theory proved to be an effective means of eliciting people's viewpoints on mental health promotion. The personal views of different parties make it easier to identify an action applicable to practice.

  1. Implementing accountability for reasonableness--the case of pharmaceutical reimbursement in Sweden.

    PubMed

    Jansson, Sandra

    2007-04-01

    This paper aims to describe the priority-setting procedure for new original pharmaceuticals practiced by the Swedish Pharmaceutical Benefits Board (LFN), to analyse the outcome of the procedure in terms of decisions and the relative importance of ethical principles, and to examine the reactions of stakeholders. All the 'principally important' decisions made by the LFN during its first 33 months of operation were analysed. The study is theoretically anchored in the theory of fair and legitimate priority-setting procedures by Daniels and Sabin, and is based on public documents, media articles, and semi-structured interviews. Only nine cases resulted in a rejection of a subsidy by the LFN and 15 in a limited or conditional subsidy. Total rejections rather than limitations gave rise to actions by stakeholders. Primarily, the principle of cost-effectiveness was used when limiting/conditioning or totally rejecting a subsidy. This study suggests that implementing a priority-setting process that fulfils the conditions of accountability for reasonableness can result in a priority-setting process which is generally perceived as fair and legitimate by the major stakeholders and may increase social learning in terms of accepting the necessity of priority setting in health care. The principle of cost-effectiveness increased in importance when the demand for openness and transparency increased.

  2. Muslim gay men: identity conflict and politics in a Muslim majority nation.

    PubMed

    Hamdi, Nassim; Lachheb, Monia; Anderson, Eric

    2017-12-08

    While a number of investigations have examined how gay Muslim men view homosexuality in relation to religious Western homophobia, this research constitutes the first account of the experiences of self-identified gay men living in an African, Muslim nation, where same-sex sex is both illegal and actively persecuted. We interviewed 28 gay men living in Tunisia in order to understand how they assimilate their sexual, religious and ethnic identities within a highly homophobic culture. Utilizing notions of homoerasure and homohysteria (McCormack and Eric Anderson ,b), and examining the intersection of identity conflict and new social movement theory, we highlight four strategies that participants use to negotiate the dissonance of living with conflicting identities in a context of religious homophobia: (1) privileging their Islamic identities and rejecting homosexuality as a legitimate sexual identity; (2) rejecting Islam and accepting homosexuality as a legitimate sexual identity; (3) interpreting Islam to be supportive of homosexuality; and (4) creating a non-penetrative homosexuality to be compatible with literal Qur'anic interpretations. We discuss the multiple difficulties these men face in relation to religious intolerance and ethnic heteronormativity, and reflect upon the possibilities and obstacles of using Western identity politics towards the promotion of social justice within a framework of growing homohysteria. © London School of Economics and Political Science 2017.

  3. Subluxation: dogma or science?

    PubMed Central

    Keating, Joseph C; Charlton, Keith H; Grod, Jaroslaw P; Perle, Stephen M; Sikorski, David; Winterstein, James F

    2005-01-01

    Subluxation syndrome is a legitimate, potentially testable, theoretical construct for which there is little experimental evidence. Acceptable as hypothesis, the widespread assertion of the clinical meaningfulness of this notion brings ridicule from the scientific and health care communities and confusion within the chiropractic profession. We believe that an evidence-orientation among chiropractors requires that we distinguish between subluxation dogma vs. subluxation as the potential focus of clinical research. We lament efforts to generate unity within the profession through consensus statements concerning subluxation dogma, and believe that cultural authority will continue to elude us so long as we assert dogma as though it were validated clinical theory. PMID:16092955

  4. Discriminating Between Legitimate and Predatory Open Access Journals: Report from the International Federation for Emergency Medicine Research Committee

    PubMed Central

    Hansoti, Bhakti; Langdorf, Mark I.; Murphy, Linda S.

    2016-01-01

    Introduction Open access (OA) medical publishing is growing rapidly. While subscription-based publishing does not charge the author, OA does. This opens the door for “predatory” publishers who take authors’ money but provide no substantial peer review or indexing to truly disseminate research findings. Discriminating between predatory and legitimate OA publishers is difficult. Methods We searched a number of library indexing databases that were available to us through the University of California, Irvine Libraries for journals in the field of emergency medicine (EM). Using criteria from Jeffrey Beall, University of Colorado librarian and an expert on predatory publishing, and the Research Committee of the International Federation for EM, we categorized EM journals as legitimate or likely predatory. Results We identified 150 journal titles related to EM from all sources, 55 of which met our criteria for OA (37%, the rest subscription based). Of these 55, 25 (45%) were likely to be predatory. We present lists of clearly legitimate OA journals, and, conversely, likely predatory ones. We present criteria a researcher can use to discriminate between the two. We present the indexing profiles of legitimate EM OA journals, to inform the researcher about degree of dissemination of research findings by journal. Conclusion OA journals are proliferating rapidly. About half in EM are legitimate. The rest take substantial money from unsuspecting, usually junior, researchers and provide no value for true dissemination of findings. Researchers should be educated and aware of scam journals. PMID:27625710

  5. Discriminating Between Legitimate and Predatory Open Access Journals: Report from the International Federation for Emergency Medicine Research Committee.

    PubMed

    Hansoti, Bhakti; Langdorf, Mark I; Murphy, Linda S

    2016-09-01

    Open access (OA) medical publishing is growing rapidly. While subscription-based publishing does not charge the author, OA does. This opens the door for "predatory" publishers who take authors' money but provide no substantial peer review or indexing to truly disseminate research findings. Discriminating between predatory and legitimate OA publishers is difficult. We searched a number of library indexing databases that were available to us through the University of California, Irvine Libraries for journals in the field of emergency medicine (EM). Using criteria from Jeffrey Beall, University of Colorado librarian and an expert on predatory publishing, and the Research Committee of the International Federation for EM, we categorized EM journals as legitimate or likely predatory. We identified 150 journal titles related to EM from all sources, 55 of which met our criteria for OA (37%, the rest subscription based). Of these 55, 25 (45%) were likely to be predatory. We present lists of clearly legitimate OA journals, and, conversely, likely predatory ones. We present criteria a researcher can use to discriminate between the two. We present the indexing profiles of legitimate EM OA journals, to inform the researcher about degree of dissemination of research findings by journal. OA journals are proliferating rapidly. About half in EM are legitimate. The rest take substantial money from unsuspecting, usually junior, researchers and provide no value for true dissemination of findings. Researchers should be educated and aware of scam journals.

  6. Theory of epigenetic coding.

    PubMed

    Elder, D

    1984-06-07

    The logic of genetic control of development may be based on a binary epigenetic code. This paper revises the author's previous scheme dealing with the numerology of annelid metamerism in these terms. Certain features of the code had been deduced to be combinatorial, others not. This paradoxical contrast is resolved here by the interpretation that these features relate to different operations of the code; the combinatiorial to coding identity of units, the non-combinatorial to coding production of units. Consideration of a second paradox in the theory of epigenetic coding leads to a new solution which further provides a basis for epimorphic regeneration, and may in particular throw light on the "regeneration-duplication" phenomenon. A possible test of the model is also put forward.

  7. Number crunching vs. number theory: computers and FLT, from Kummer to SWAC (1850-1960), and beyond

    NASA Astrophysics Data System (ADS)

    Corry, Leo

    2008-07-01

    The article discusses the computational tools (both conceptual and material) used in various attempts to deal with individual cases of FLT [Fermat's Last Theorem], as well as the changing historical contexts in which these tools were developed and used, and affected research. It also explores the changing conceptions about the role of computations within the overall disciplinary picture of number theory, how they influenced research on the theorem, and the kinds of general insights thus achieved. After an overview of Kummer's contributions and its immediate influence, the author presents work that favored intensive computations of particular cases of FLT as a legitimate, fruitful, and worth-pursuing number-theoretical endeavor, and that were part of a coherent and active, but essentially low-profile tradition within nineteenth century number theory. This work was related to table making activity that was encouraged by institutions and individuals whose motivations came mainly from applied mathematics, astronomy, and engineering, and seldom from number theory proper. A main section of the article is devoted to the fruitful collaboration between Harry S. Vandiver and Emma and Dick Lehmer. The author shows how their early work led to the hesitant introduction of electronic computers for research related with FLT. Their joint work became a milestone for computer-assisted activity in number theory at large.

  8. Academic leadership in nursing: legitimating the discipline in contested spaces.

    PubMed

    McNamara, Martin S

    2009-05-01

    To investigate the potential of recent conceptual developments in the sociology of education for conceptualising academic leadership in nursing. During an investigation into the current status and future trajectory of academic nursing in Ireland, academic leadership emerged as a major concern for respondents. The languages of legitimation of academic leaders were elicited in in-depth interviews and analysed as expressions of underlying legitimation principles. The concept of legitimation principles provides a way of thinking about how academic nursing is positioned in the health and higher education sectors, how its leaders construct its identity, practices and purposes, and clarifies the proper focus and goals of academic leadership in nursing. Academic leadership is concerned with legitimating the discipline of nursing as an autonomous, coherent and distinctive professional and academic endeavour. This legitimacy must be secured in academic, clinical and wider contexts in which academic nursing is viewed with ambivalence; leaders must take account of the impact of nursing history on the current status and future trajectory of the discipline. The analytic tools facilitate a better understanding of the internal and external conditions under which academic nursing will flourish, or wither, in contemporary higher education.

  9. Coercive and legitimate authority impact tax honesty: evidence from behavioral and ERP experiments

    PubMed Central

    Pfabigan, Daniela M.; Lamm, Claus; Kirchler, Erich; Hofmann, Eva

    2017-01-01

    Abstract Cooperation in social systems such as tax honesty is of central importance in our modern societies. However, we know little about cognitive and neural processes driving decisions to evade or pay taxes. This study focuses on the impact of perceived tax authority and examines the mental chronometry mirrored in ERP data allowing a deeper understanding about why humans cooperate in tax systems. We experimentally manipulated coercive and legitimate authority and studied its impact on cooperation and underlying cognitive (experiment 1, 2) and neuronal (experiment 2) processes. Experiment 1 showed that in a condition of coercive authority, tax payments are lower, decisions are faster and participants report more rational reasoning and enforced compliance, however, less voluntary cooperation than in a condition of legitimate authority. Experiment 2 confirmed most results, but did not find a difference in payments or self-reported rational reasoning. Moreover, legitimate authority led to heightened cognitive control (expressed by increased MFN amplitudes) and disrupted attention processing (expressed by decreased P300 amplitudes) compared to coercive authority. To conclude, the neuronal data surprisingly revealed that legitimate authority may led to higher decision conflict and thus to higher cognitive demands in tax decisions than coercive authority. PMID:28402477

  10. Legitimating Irrelevance: Management Education in Higher Education Institutions.

    ERIC Educational Resources Information Center

    Crowther, David; Carter, Chris

    2002-01-01

    Explores why the trend in management teaching and research toward increased specialization and self-referential legitimation is ultimately self-defeating because the needs of the customers involved are changing from specialization to generalization. (EV)

  11. The lack of foundation in the mechanism on which are based the physico-chemical theories for the origin of the genetic code is counterposed to the credible and natural mechanism suggested by the coevolution theory.

    PubMed

    Di Giulio, Massimo

    2016-06-21

    I analyze the mechanism on which are based the majority of theories that put to the center of the origin of the genetic code the physico-chemical properties of amino acids. As this mechanism is based on excessive mutational steps, I conclude that it could not have been operative or if operative it would not have allowed a full realization of predictions of these theories, because this mechanism contained, evidently, a high indeterminacy. I make that disapproving the four-column theory of the origin of the genetic code (Higgs, 2009) and reply to the criticism that was directed towards the coevolution theory of the origin of the genetic code. In this context, I suggest a new hypothesis that clarifies the mechanism by which the domains of codons of the precursor amino acids would have evolved, as predicted by the coevolution theory. This mechanism would have used particular elongation factors that would have constrained the evolution of all amino acids belonging to a given biosynthetic family to the progenitor pre-tRNA, that for first recognized, the first codons that evolved in a certain codon domain of a determined precursor amino acid. This happened because the elongation factors recognized two characteristics of the progenitor pre-tRNAs of precursor amino acids, which prevented the elongation factors from recognizing the pre-tRNAs belonging to biosynthetic families of different precursor amino acids. Finally, I analyze by means of Fisher's exact test, the distribution, within the genetic code, of the biosynthetic classes of amino acids and the ones of polarity values of amino acids. This analysis would seem to support the biosynthetic classes of amino acids over the ones of polarity values, as the main factor that led to the structuring of the genetic code, with the physico-chemical properties of amino acids playing only a subsidiary role in this evolution. As a whole, the full analysis brings to the conclusion that the coevolution theory of the origin of the genetic code would be a theory highly corroborated. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Applications of potential theory computations to transonic aeroelasticity

    NASA Technical Reports Server (NTRS)

    Edwards, J. W.

    1986-01-01

    Unsteady aerodynamic and aeroelastic stability calculations based upon transonic small disturbance (TSD) potential theory are presented. Results from the two-dimensional XTRAN2L code and the three-dimensional XTRAN3S code are compared with experiment to demonstrate the ability of TSD codes to treat transonic effects. The necessity of nonisentropic corrections to transonic potential theory is demonstrated. Dynamic computational effects resulting from the choice of grid and boundary conditions are illustrated. Unsteady airloads for a number of parameter variations including airfoil shape and thickness, Mach number, frequency, and amplitude are given. Finally, samples of transonic aeroelastic calculations are given. A key observation is the extent to which unsteady transonic airloads calculated by inviscid potential theory may be treated in a locally linear manner.

  13. The analysis of convolutional codes via the extended Smith algorithm

    NASA Technical Reports Server (NTRS)

    Mceliece, R. J.; Onyszchuk, I.

    1993-01-01

    Convolutional codes have been the central part of most error-control systems in deep-space communication for many years. Almost all such applications, however, have used the restricted class of (n,1), also known as 'rate 1/n,' convolutional codes. The more general class of (n,k) convolutional codes contains many potentially useful codes, but their algebraic theory is difficult and has proved to be a stumbling block in the evolution of convolutional coding systems. In this article, the situation is improved by describing a set of practical algorithms for computing certain basic things about a convolutional code (among them the degree, the Forney indices, a minimal generator matrix, and a parity-check matrix), which are usually needed before a system using the code can be built. The approach is based on the classic Forney theory for convolutional codes, together with the extended Smith algorithm for polynomial matrices, which is introduced in this article.

  14. From Theory to Practice: Measuring end-of-life communication quality using multiple goals theory.

    PubMed

    Van Scoy, L J; Scott, A M; Reading, J M; Chuang, C H; Chinchilli, V M; Levi, B H; Green, M J

    2017-05-01

    To describe how multiple goals theory can be used as a reliable and valid measure (i.e., coding scheme) of the quality of conversations about end-of-life issues. We analyzed conversations from 17 conversations in which 68 participants (mean age=51years) played a game that prompted discussion in response to open-ended questions about end-of-life issues. Conversations (mean duration=91min) were audio-recorded and transcribed. Communication quality was assessed by three coders who assigned numeric scores rating how well individuals accomplished task, relational, and identity goals in the conversation. The coding measure, which results in a quantifiable outcome, yielded strong reliability (intra-class correlation range=0.73-0.89 and Cronbach's alpha range=0.69-0.89 for each of the coded domains) and validity (using multilevel nonlinear modeling, we detected significant variability in scores between games for each of the coded domains, all p-values <0.02). Our coding scheme provides a theory-based measure of end-of-life conversation quality that is superior to other methods of measuring communication quality. Our description of the coding method enables researches to adapt and apply this measure to communication interventions in other clinical contexts. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  15. Regulation of advance directives in Italy: a bad law in the making.

    PubMed

    Gristina, Giuseppe Renato; Martin, Erica; Ranieri, Vito Marco

    2012-11-01

    The Advance Directives (ADs) have been adopted in many countries to defend patients' autonomy. In Italy, the role of ADs has recently been the subject of heated debate involving political parties and the Roman Catholic Church. In February 2009, the conservative government coalition presented a bill of law on this issue. It has been passed by the Low Chamber and is now being discussed in the Senate. The purpose of the article is to highlight any possible bill's contradiction with Italian Constitution, Italian Code of Medical Ethics (ICME), and Oviedo Convention contents, relevant for intensivists. Analysis of bill's content in the light of Italian Constitution, ICME, Oviedo Convention articles and in comparison with French legislation regarding end of life (Leonetti law). In the Authors' point of view the bill's articles -limit the moral and judicial importance of four main issues as informed consent, permanent incapacity, artificial nutrition/hydration, and withdraw/withhold treatments. In the Authors' opinion the ADs must represent informed preferences made freely by patients within the relationship with their physicians, as part of an advance care planning. When this relationship develops in accordance with the ICME rules, it contains all of the ethical/professional dimensions to legitimate right choices in each case. The law should draw inspiration from ICME principles, assigning them a juridical power, acknowledging their validity in legitimating end-of-life decisions, and defining a framework of juridical legitimacy for these decisions without infringing on patients' right to autonomy with prescriptions on the care.

  16. The "Ethics" Expertise in Clinical Ethics Consultation.

    PubMed

    Iltis, Ana S; Rasmussen, Lisa M

    2016-08-01

    The nature, possibility, and implications of ethics expertise (or moral expertise) in general and of bioethics expertise in particular has been the focus of extensive debate for over thirty years. What is ethics expertise and what does it enable experts to do? Knowing what ethics expertise is can help answer another important question: What, if anything, makes a claim of expertise legitimate? In other words, how does someone earn the appellation "ethics expert?" There remains deep disagreement on whether ethics expertise is possible, and if so, what constitutes such expertise and what it entails and legitimates. Discussion of bioethics expertise has become particularly important given the growing presence of bioethicists in the clinical setting as well as efforts to professionalize bioethics through codes of ethics and certification (or quasi-certification) efforts. Unlike in the law or in engineering, where there may be a body of knowledge that professional organizations or others have articulated as important for education and training of experts, ethics expertise admits of no such body of knowledge or required experience. Nor is there an entity seen as having the authority to articulate the necessary scope of knowledge. Questions about whether there is such a body of knowledge for particular areas within bioethics have emerged and played a central role in professionalization efforts in recent years, especially in the area of clinical ethics. © The Author 2016. Published by Oxford University Press, on behalf of the Journal of Medicine and Philosophy Inc. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  17. A STRUCTURAL THEORY FOR THE PERCEPTION OF MORSE CODE SIGNALS AND RELATED RHYTHMIC PATTERNS.

    ERIC Educational Resources Information Center

    WISH, MYRON

    THE PRIMARY PURPOSE OF THIS DISSERTATION IS TO DEVELOP A STRUCTURAL THEORY, ALONG FACET-THEORETIC LINES, FOR THE PERCEPTION OF MORSE CODE SIGNALS AND RELATED RHYTHMIC PATTERNS. AS STEPS IN THE DEVELOPMENT OF THIS THEORY, MODELS FOR TWO SETS OF SIGNALS ARE PROPOSED AND TESTED. THE FIRST MODEL IS FOR A SET COMPRISED OF ALL SIGNALS OF THE…

  18. Modeling transonic aerodynamic response using nonlinear systems theory for use with modern control theory

    NASA Technical Reports Server (NTRS)

    Silva, Walter A.

    1993-01-01

    The presentation begins with a brief description of the motivation and approach that has been taken for this research. This will be followed by a description of the Volterra Theory of Nonlinear Systems and the CAP-TSD code which is an aeroelastic, transonic CFD (Computational Fluid Dynamics) code. The application of the Volterra theory to a CFD model and, more specifically, to a CAP-TSD model of a rectangular wing with a NACA 0012 airfoil section will be presented.

  19. With or without you: predictive coding and Bayesian inference in the brain

    PubMed Central

    Aitchison, Laurence; Lengyel, Máté

    2018-01-01

    Two theoretical ideas have emerged recently with the ambition to provide a unifying functional explanation of neural population coding and dynamics: predictive coding and Bayesian inference. Here, we describe the two theories and their combination into a single framework: Bayesian predictive coding. We clarify how the two theories can be distinguished, despite sharing core computational concepts and addressing an overlapping set of empirical phenomena. We argue that predictive coding is an algorithmic / representational motif that can serve several different computational goals of which Bayesian inference is but one. Conversely, while Bayesian inference can utilize predictive coding, it can also be realized by a variety of other representations. We critically evaluate the experimental evidence supporting Bayesian predictive coding and discuss how to test it more directly. PMID:28942084

  20. Theory of Mind: A Neural Prediction Problem

    PubMed Central

    Koster-Hale, Jorie; Saxe, Rebecca

    2014-01-01

    Predictive coding posits that neural systems make forward-looking predictions about incoming information. Neural signals contain information not about the currently perceived stimulus, but about the difference between the observed and the predicted stimulus. We propose to extend the predictive coding framework from high-level sensory processing to the more abstract domain of theory of mind; that is, to inferences about others’ goals, thoughts, and personalities. We review evidence that, across brain regions, neural responses to depictions of human behavior, from biological motion to trait descriptions, exhibit a key signature of predictive coding: reduced activity to predictable stimuli. We discuss how future experiments could distinguish predictive coding from alternative explanations of this response profile. This framework may provide an important new window on the neural computations underlying theory of mind. PMID:24012000

  1. [Psychological Distress and Acceptance of Violence Legitimizing Masculinity Norms among Adolescents].

    PubMed

    Klein, Eva M; Wölfling, Klaus; Beutel, Manfred E; Dreier, Michael; Müller, Kai W

    2017-04-01

    The proportion of adolescent migrants in Germany aged 15-20 years has risen to about 29.5% in 2014 according to Federal census statistics. The purpose of the current study was to describe and to compare the psychological strains of adolescent 1 st and 2 nd generation migrants with non-migrants in a representative school survey. Acceptance of violence legitimizing masculinity norms was explored and its correlation with psychological strain was analyzed. Self-reported data of psychological strain (internalizing and externalizing problems) and acceptance of violence legitimizing masculinity were gathered among 8 518 pupils aged 12-19 years across different school types. Among the surveyed adolescents, 27.6% reported a migration background (5.8% 1 st generation migrants; 21.8% 2 nd generation migrants). Particularly 1 st generation migrants scored higher in internalizing and externalizing problems than 2 nd generation migrants or non-migrants. The differences, however, were small. Adolescents with migration background suffered from educational disadvantage, especially 1 st generation migrants. Male adolescents reported significantly higher acceptance of violence legitimizing masculinity norms than their female counterparts. Strong agreement with the measured concept of masculinity was found among pupils of lower secondary school and adolescents reported regularly tobacco and cannabis consumption. The acceptance of violence legitimizing masculinity norms was greater among migrants, particularly 1 st generation migrants, than non-migrants. Overall, high acceptance of violence legitimizing masculinity norms was related to externalizing problems, which can be understood as dysfunctional coping mechanisms of social disadvantage and a lack of prospects. © Georg Thieme Verlag KG Stuttgart · New York.

  2. A preliminary investigation of textile fibers in smothering scenarios and alternative legitimate activities.

    PubMed

    Schnegg, Michael; Turchany, Morgane; Deviterne, Marie; Gueissaz, Line; Hess, Sabine; Massonnet, Geneviève

    2017-10-01

    Was this group of target fibers transferred during a criminal action? Is it possible that it was transferred during another legitimate activity? Acquiring knowledge about the activity, whether legitimate or criminal, leading to the transfer of a group of fibers is a recurring challenge encountered throughout the evidence interpretation process. Trace evidence such as fibers may assist with generating a reasoning of the activity which produced the trace, but this assumes that one already has a thorough understanding of the transfer phenomenon. How to generate and then use such relevant knowledge? What are the influencing parameters and which ones should (or can) be controlled? The present work focuses on homicides by smothering using a pillow and the transfer of fibers on the face of the victim in such events. A legitimate activity - represented by a night's sleep on a pillow - was also investigated since such legitimate, alternative explanations concerning the presence of fibers could likely be formulated by the suspect. The number and distribution of fibers transferred onto the victim's face in either scenario were investigated and interpreted using a Bayesian approach. Results showed that the shedding capacity of the pillowcase strongly impact the number of fibers recovered. The nature of the action, modus operandi and amount of friction could not be excluded in their influence on the transfer of fibers. Finally, likelihood ratios indicating the number of fibers recovered from the victim's face can provide relevant information by supporting either criminal or legitimate proposition (i.e., smothering or night's sleep scenario). Copyright © 2017 Elsevier B.V. All rights reserved.

  3. 34 CFR 99.36 - What conditions apply to disclosure of information in health and safety emergencies?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... have legitimate educational interests in the behavior of the student; or (3) Disclosing appropriate... schools who have been determined to have legitimate educational interests in the behavior of the student...

  4. 34 CFR 99.36 - What conditions apply to disclosure of information in health and safety emergencies?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... have legitimate educational interests in the behavior of the student; or (3) Disclosing appropriate... schools who have been determined to have legitimate educational interests in the behavior of the student...

  5. Code Switching and Sexual Orientation: A Test of Bernstein's Sociolinguistic Theory

    ERIC Educational Resources Information Center

    Lumby, Malcolm E.

    1976-01-01

    Bernstein's theory was tested in the homosexual's "closed" community to determine code-switching ability and its relationship to jargon. Subjects told a story based on homoerotic photographs where knowledge of sexual orientation was varied. Results suggest that homosexual homophyly encouraged elaboration. (Author)

  6. Potential application of item-response theory to interpretation of medical codes in electronic patient records

    PubMed Central

    2011-01-01

    Background Electronic patient records are generally coded using extensive sets of codes but the significance of the utilisation of individual codes may be unclear. Item response theory (IRT) models are used to characterise the psychometric properties of items included in tests and questionnaires. This study asked whether the properties of medical codes in electronic patient records may be characterised through the application of item response theory models. Methods Data were provided by a cohort of 47,845 participants from 414 family practices in the UK General Practice Research Database (GPRD) with a first stroke between 1997 and 2006. Each eligible stroke code, out of a set of 202 OXMIS and Read codes, was coded as either recorded or not recorded for each participant. A two parameter IRT model was fitted using marginal maximum likelihood estimation. Estimated parameters from the model were considered to characterise each code with respect to the latent trait of stroke diagnosis. The location parameter is referred to as a calibration parameter, while the slope parameter is referred to as a discrimination parameter. Results There were 79,874 stroke code occurrences available for analysis. Utilisation of codes varied between family practices with intraclass correlation coefficients of up to 0.25 for the most frequently used codes. IRT analyses were restricted to 110 Read codes. Calibration and discrimination parameters were estimated for 77 (70%) codes that were endorsed for 1,942 stroke patients. Parameters were not estimated for the remaining more frequently used codes. Discrimination parameter values ranged from 0.67 to 2.78, while calibration parameters values ranged from 4.47 to 11.58. The two parameter model gave a better fit to the data than either the one- or three-parameter models. However, high chi-square values for about a fifth of the stroke codes were suggestive of poor item fit. Conclusion The application of item response theory models to coded electronic patient records might potentially contribute to identifying medical codes that offer poor discrimination or low calibration. This might indicate the need for improved coding sets or a requirement for improved clinical coding practice. However, in this study estimates were only obtained for a small proportion of participants and there was some evidence of poor model fit. There was also evidence of variation in the utilisation of codes between family practices raising the possibility that, in practice, properties of codes may vary for different coders. PMID:22176509

  7. Topics in the Sequential Design of Experiments

    DTIC Science & Technology

    1992-03-01

    decision , unless so designated by other documentation. 12a. DISTRIBUTION /AVAILABIIUTY STATEMENT 12b. DISTRIBUTION CODE Approved for public release...3 0 1992 D 14. SUBJECT TERMS 15. NUMBER OF PAGES12 Design of Experiments, Renewal Theory , Sequential Testing 1 2. PRICE CODE Limit Theory , Local...distributions for one parameter exponential families," by Michael Woodroofe. Stntca, 2 (1991), 91-112. [6] "A non linear renewal theory for a functional of

  8. CSTEM User Manual

    NASA Technical Reports Server (NTRS)

    Hartle, M.; McKnight, R. L.

    2000-01-01

    This manual is a combination of a user manual, theory manual, and programmer manual. The reader is assumed to have some previous exposure to the finite element method. This manual is written with the idea that the CSTEM (Coupled Structural Thermal Electromagnetic-Computer Code) user needs to have a basic understanding of what the code is actually doing in order to properly use the code. For that reason, the underlying theory and methods used in the code are described to a basic level of detail. The manual gives an overview of the CSTEM code: how the code came into existence, a basic description of what the code does, and the order in which it happens (a flowchart). Appendices provide a listing and very brief description of every file used by the CSTEM code, including the type of file it is, what routine regularly accesses the file, and what routine opens the file, as well as special features included in CSTEM.

  9. Method for the prediction of the installation aerodynamics of a propfan at subsonic speeds: User manual

    NASA Technical Reports Server (NTRS)

    Chandrasekaran, B.

    1986-01-01

    This document is the user's guide for the method developed earlier for predicting the slipstream wing interaction at subsonic speeds. The analysis involves a subsonic panel code (HESS code) modified to handle the propeller onset flow. The propfan slipstream effects are superimposed on the normal flow boundary condition and are applied over the surface washed by the slipstream. The effects of the propeller slipstream are to increase the axial induced velocity, tangential velocity, and a total pressure rise in the wake of the propeller. Principles based on blade performance theory, momentum theory, and vortex theory were used to evaluate the slipstream effects. The code can be applied to any arbitrary three dimensional geometry, expressed in the form of HESS input format. The code can handle a propeller alone configuration or a propeller/nacelle/airframe configuration, operating up to high subcritical Mach numbers over a range of angles of attack. Inclusion of a viscous modelling is briefly outlined. Wind tunnel results/theory comparisons are included as examples for the application of the code to a generic supercritical wing/overwing Nacelle with a powered propfan. A sample input/output listing is provided.

  10. Bernstein's "Codes" and the Linguistics of "Deficit"

    ERIC Educational Resources Information Center

    Jones, Peter E.

    2013-01-01

    This paper examines the key linguistic arguments underpinning Basil Bernstein's theory of "elaborated" and "restricted" "codes". Building on a review of selected highlights from the collective critical response to Bernstein, the paper attempts to clarify the relationship of the theory to "deficit" views…

  11. Coercive and legitimate authority impact tax honesty: evidence from behavioral and ERP experiments.

    PubMed

    Gangl, Katharina; Pfabigan, Daniela M; Lamm, Claus; Kirchler, Erich; Hofmann, Eva

    2017-07-01

    Cooperation in social systems such as tax honesty is of central importance in our modern societies. However, we know little about cognitive and neural processes driving decisions to evade or pay taxes. This study focuses on the impact of perceived tax authority and examines the mental chronometry mirrored in ERP data allowing a deeper understanding about why humans cooperate in tax systems. We experimentally manipulated coercive and legitimate authority and studied its impact on cooperation and underlying cognitive (experiment 1, 2) and neuronal (experiment 2) processes. Experiment 1 showed that in a condition of coercive authority, tax payments are lower, decisions are faster and participants report more rational reasoning and enforced compliance, however, less voluntary cooperation than in a condition of legitimate authority. Experiment 2 confirmed most results, but did not find a difference in payments or self-reported rational reasoning. Moreover, legitimate authority led to heightened cognitive control (expressed by increased MFN amplitudes) and disrupted attention processing (expressed by decreased P300 amplitudes) compared to coercive authority. To conclude, the neuronal data surprisingly revealed that legitimate authority may led to higher decision conflict and thus to higher cognitive demands in tax decisions than coercive authority. © The Author (2017). Published by Oxford University Press.

  12. Great Expectations: Is there Evidence for Predictive Coding in Auditory Cortex?

    PubMed

    Heilbron, Micha; Chait, Maria

    2017-08-04

    Predictive coding is possibly one of the most influential, comprehensive, and controversial theories of neural function. While proponents praise its explanatory potential, critics object that key tenets of the theory are untested or even untestable. The present article critically examines existing evidence for predictive coding in the auditory modality. Specifically, we identify five key assumptions of the theory and evaluate each in the light of animal, human and modeling studies of auditory pattern processing. For the first two assumptions - that neural responses are shaped by expectations and that these expectations are hierarchically organized - animal and human studies provide compelling evidence. The anticipatory, predictive nature of these expectations also enjoys empirical support, especially from studies on unexpected stimulus omission. However, for the existence of separate error and prediction neurons, a key assumption of the theory, evidence is lacking. More work exists on the proposed oscillatory signatures of predictive coding, and on the relation between attention and precision. However, results on these latter two assumptions are mixed or contradictory. Looking to the future, more collaboration between human and animal studies, aided by model-based analyses will be needed to test specific assumptions and implementations of predictive coding - and, as such, help determine whether this popular grand theory can fulfill its expectations. Copyright © 2017 The Author(s). Published by Elsevier Ltd.. All rights reserved.

  13. Self-complementary circular codes in coding theory.

    PubMed

    Fimmel, Elena; Michel, Christian J; Starman, Martin; Strüngmann, Lutz

    2018-04-01

    Self-complementary circular codes are involved in pairing genetic processes. A maximal [Formula: see text] self-complementary circular code X of trinucleotides was identified in genes of bacteria, archaea, eukaryotes, plasmids and viruses (Michel in Life 7(20):1-16 2017, J Theor Biol 380:156-177, 2015; Arquès and Michel in J Theor Biol 182:45-58 1996). In this paper, self-complementary circular codes are investigated using the graph theory approach recently formulated in Fimmel et al. (Philos Trans R Soc A 374:20150058, 2016). A directed graph [Formula: see text] associated with any code X mirrors the properties of the code. In the present paper, we demonstrate a necessary condition for the self-complementarity of an arbitrary code X in terms of the graph theory. The same condition has been proven to be sufficient for codes which are circular and of large size [Formula: see text] trinucleotides, in particular for maximal circular codes ([Formula: see text] trinucleotides). For codes of small-size [Formula: see text] trinucleotides, some very rare counterexamples have been constructed. Furthermore, the length and the structure of the longest paths in the graphs associated with the self-complementary circular codes are investigated. It has been proven that the longest paths in such graphs determine the reading frame for the self-complementary circular codes. By applying this result, the reading frame in any arbitrary sequence of trinucleotides is retrieved after at most 15 nucleotides, i.e., 5 consecutive trinucleotides, from the circular code X identified in genes. Thus, an X motif of a length of at least 15 nucleotides in an arbitrary sequence of trinucleotides (not necessarily all of them belonging to X) uniquely defines the reading (correct) frame, an important criterion for analyzing the X motifs in genes in the future.

  14. The trellis complexity of convolutional codes

    NASA Technical Reports Server (NTRS)

    Mceliece, R. J.; Lin, W.

    1995-01-01

    It has long been known that convolutional codes have a natural, regular trellis structure that facilitates the implementation of Viterbi's algorithm. It has gradually become apparent that linear block codes also have a natural, though not in general a regular, 'minimal' trellis structure, which allows them to be decoded with a Viterbi-like algorithm. In both cases, the complexity of the Viterbi decoding algorithm can be accurately estimated by the number of trellis edges per encoded bit. It would, therefore, appear that we are in a good position to make a fair comparison of the Viterbi decoding complexity of block and convolutional codes. Unfortunately, however, this comparison is somewhat muddled by the fact that some convolutional codes, the punctured convolutional codes, are known to have trellis representations that are significantly less complex than the conventional trellis. In other words, the conventional trellis representation for a convolutional code may not be the minimal trellis representation. Thus, ironically, at present we seem to know more about the minimal trellis representation for block than for convolutional codes. In this article, we provide a remedy, by developing a theory of minimal trellises for convolutional codes. (A similar theory has recently been given by Sidorenko and Zyablov). This allows us to make a direct performance-complexity comparison for block and convolutional codes. A by-product of our work is an algorithm for choosing, from among all generator matrices for a given convolutional code, what we call a trellis-minimal generator matrix, from which the minimal trellis for the code can be directly constructed. Another by-product is that, in the new theory, punctured convolutional codes no longer appear as a special class, but simply as high-rate convolutional codes whose trellis complexity is unexpectedly small.

  15. An object oriented code for simulating supersymmetric Yang-Mills theories

    NASA Astrophysics Data System (ADS)

    Catterall, Simon; Joseph, Anosh

    2012-06-01

    We present SUSY_LATTICE - a C++ program that can be used to simulate certain classes of supersymmetric Yang-Mills (SYM) theories, including the well known N=4 SYM in four dimensions, on a flat Euclidean space-time lattice. Discretization of SYM theories is an old problem in lattice field theory. It has resisted solution until recently when new ideas drawn from orbifold constructions and topological field theories have been brought to bear on the question. The result has been the creation of a new class of lattice gauge theories in which the lattice action is invariant under one or more supersymmetries. The resultant theories are local, free of doublers and also possess exact gauge-invariance. In principle they form the basis for a truly non-perturbative definition of the continuum SYM theories. In the continuum limit they reproduce versions of the SYM theories formulated in terms of twisted fields, which on a flat space-time is just a change of the field variables. In this paper, we briefly review these ideas and then go on to provide the details of the C++ code. We sketch the design of the code, with particular emphasis being placed on SYM theories with N=(2,2) in two dimensions and N=4 in three and four dimensions, making one-to-one comparisons between the essential components of the SYM theories and their corresponding counterparts appearing in the simulation code. The code may be used to compute several quantities associated with the SYM theories such as the Polyakov loop, mean energy, and the width of the scalar eigenvalue distributions. Program summaryProgram title: SUSY_LATTICE Catalogue identifier: AELS_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AELS_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC license, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 9315 No. of bytes in distributed program, including test data, etc.: 95 371 Distribution format: tar.gz Programming language: C++ Computer: PCs and Workstations Operating system: Any, tested on Linux machines Classification:: 11.6 Nature of problem: To compute some of the observables of supersymmetric Yang-Mills theories such as supersymmetric action, Polyakov/Wilson loops, scalar eigenvalues and Pfaffian phases. Solution method: We use the Rational Hybrid Monte Carlo algorithm followed by a Leapfrog evolution and a Metropolis test. The input parameters of the model are read in from a parameter file. Restrictions: This code applies only to supersymmetric gauge theories with extended supersymmetry, which undergo the process of maximal twisting. (See Section 2 of the manuscript for details.) Running time: From a few minutes to several hours depending on the amount of statistics needed.

  16. Revisiting Code-Switching Practice in TESOL: A Critical Perspective

    ERIC Educational Resources Information Center

    Wang, Hao; Mansouri, Behzad

    2017-01-01

    In academic circles, the "English Only" view and "Balanced view" have established their grounds after volumes of work on the topic of code-switching in TESOL. With recent development in Critical Applied Linguistics, poststructural theory, postmodern theory, and the emergence of multilingualism, scholars have begun to view ELT…

  17. Personalisation: The Emerging "Revised" Code of Education?

    ERIC Educational Resources Information Center

    Hartley, David

    2007-01-01

    In England, a "revised" educational code appears to be emerging. It centres upon the concept of "personalisation". Its basis is less in educational theory, more in contemporary marketing theory. Personalisation can be regarded in two ways. First, it provides the rationale for a new mode of public-service delivery, one which…

  18. Secondary School Students' Reasoning about Evolution

    ERIC Educational Resources Information Center

    To, Cheryl; Tenenbaum, Harriet R.; Hogh, Henriette

    2017-01-01

    This study examined age differences in young people's understanding of evolution theory in secondary school. A second aim of this study was to propose a new coding scheme that more accurately described students' conceptual understanding about evolutionary theory. We argue that coding schemes adopted in previous research may have overestimated…

  19. Professionalism, scientific freedom and dissent: individual and institutional roles and responsibilities in geoethics

    NASA Astrophysics Data System (ADS)

    Bilham, Nic

    2015-04-01

    Debate and dissent are at the heart of scientific endeavour. A diversity of perspectives, alternative interpretations of evidence and the robust defence of competing theories and models drive the advancement of scientific knowledge. Just as importantly, legitimate dissent and diversity of views should not be covered up when offering scientific advice to policy-makers and providing evidence to inform public debate - indeed, they should be valued. We should offer what Andy Stirling has termed 'plural and conditional' scientific advice, not just for the sake of democratic legitimacy, but because it supports better informed and more effective policy-making. 'Monocultures' of scientific advice may have a superficial appeal to policy-makers, but they devalue the contribution of scientists, undermine the resilience of regulatory structures, are often misleading, and can lead to catastrophic policy failure. Furthermore, many of the great societal challenges now facing us require interdisciplinary approaches, across the natural sciences and more widely still, which bring to the fore the need for humility, recognition that we do not have all the answers, and mutual respect for the views of others. In contentious areas such as climate change, extraction of shale gas and radioactive waste disposal, however, such open dialogue may make researchers and practitioners vulnerable to advocates and campaigners who cherry-pick the evidence, misinterpret it, or seek to present scientific uncertainty and debate as mere ignorance. Nor are scientists themselves always above such unethical tactics. The apparent authority conferred on unscrupulous 'campaigning scientists' by their academic and professional credentials may make it all but impossible to distinguish them from those who legitimately make the case for a minority scientific view (and may be marginalised by the mainstream of their discipline in doing so). There is a risk that real scientific debate may be thwarted. Individual geoscientists have a responsibility to behave ethically in such contested areas of science - both with regards to their own work and its dissemination, and in examining the claims of others. But learned and professional scientific bodies also have an important role to play. Increasingly, they are expected to establish and police the ethical 'rules of engagement' of scientific practice and discourse, whether through codes of conduct or developing non-mandatory guidelines and cultures of best practice. This presentation will examine how professional standards can be developed and promulgated, so as to foster a diversity of scientific views and permit dissenting voices to be heard, while also allowing scientifically and professionally illegitimate behaviours to be identified and addressed.

  20. Judging sex.

    PubMed

    Tuerkheimer, Deborah

    2012-09-01

    This Article explores the curious jurisprudence of sexual patterns and how it constructs female sexuality. In modern rape law, the "unchaste character inference" expressly prohibited by the rape shield endures. Though the boundaries that circumscribe appropriate sexual conduct have shifted over time, courts persist in making normative judgments about women's sexuality. Cloaked in the legitimizing rhetoric of sexual patterns, retrograde notions of deviancy are substituting for rational deliberation on the question of consent. As rape shield law enters its fourth decade, it continues to defy reason, both in application and in theory. The proposed evidentiary approach promises to improve judicial decision making in rape cases, while reorienting the law toward the female sexual subject and the contingency of her consent.

  1. A Dual Coding View of Vocabulary Learning

    ERIC Educational Resources Information Center

    Sadoski, Mark

    2005-01-01

    A theoretical perspective on acquiring sight vocabulary and developing meaningful vocabulary is presented. Dual Coding Theory assumes that cognition occurs in two independent but connected codes: a verbal code for language and a nonverbal code for mental imagery. The mixed research literature on using pictures in teaching sight vocabulary is…

  2. Authority and the Development of Political Orientations.

    ERIC Educational Resources Information Center

    Parks, Robert

    The legitimate use of authority in political and moral education is examined from a cognitive-developmental perspective. However, legitimate authoritative communications by a teacher must have the potential for reasoned elaboration. These communications then mark off the boundaries of rational and authoritative communication from non- and…

  3. 12 CFR 7.2023 - Reverse stock splits.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Corporate Practices § 7.2023 Reverse stock splits. (a) Authority to engage in reverse stock splits. A national bank may engage in a reverse stock split if the transaction serves a legitimate corporate purpose and provides adequate dissenting shareholders' rights. (b) Legitimate corporate purpose. Examples of...

  4. Religious Education Forum: Legitimizing Your Value List.

    ERIC Educational Resources Information Center

    McBride, Alfred

    1979-01-01

    Addressing the problem that educators have in compiling a legitimate list of values to teach, the author examines the Bible as a source of value legitimacy and details the values expressed in the Hebrew and Christian covenants, the Ten Commandments, and the six beatitudes. (SJL)

  5. The social disutility of software ownership.

    PubMed

    Douglas, David M

    2011-09-01

    Software ownership allows the owner to restrict the distribution of software and to prevent others from reading the software's source code and building upon it. However, free software is released to users under software licenses that give them the right to read the source code, modify it, reuse it, and distribute the software to others. Proponents of free software such as Richard M. Stallman and Eben Moglen argue that the social disutility of software ownership is a sufficient justification for prohibiting it. This social disutility includes the social instability of disregarding laws and agreements covering software use and distribution, inequality of software access, and the inability to help others by sharing software with them. Here I consider these and other social disutility claims against withholding specific software rights from users, in particular, the rights to read the source code, duplicate, distribute, modify, imitate, and reuse portions of the software within new programs. I find that generally while withholding these rights from software users does cause some degree of social disutility, only the rights to duplicate, modify and imitate cannot legitimately be denied to users on this basis. The social disutility of withholding the rights to distribute the software, read its source code and reuse portions of it in new programs is insufficient to prohibit software owners from denying them to users. A compromise between the software owner and user can minimise the social disutility of withholding these particular rights from users. However, the social disutility caused by software patents is sufficient for rejecting such patents as they restrict the methods of reducing social disutility possible with other forms of software ownership.

  6. The theory of polarization: From its origins to the modern day

    NASA Astrophysics Data System (ADS)

    Resta, Raffaele

    Textbooks define macroscopic polarization P as the dipole of a bounded sample, divided by its volume, in the large sample limit. When instead we address unbounded samples within periodic boundary conditions (PBCs) the above definition cannot be adopted. The breakthrough came 25 years ago, when the focus was shifted from P itself to adiabatic changes in P, and it was soon realized that such changes take the form of a Berry phase of the electronic wavefunction. Even P itself can be defined, but it is not a vector: it is a lattice. Such exotic feature has outstanding physical consequences. For instance for an insulating centrosymmetric polymer P is a Z2 invariant: either P=e/2 mod e, or P=0 mod e: the Z2 class depends on the bulk, while the ``mod'' value depends on actual termination of the bounded sample. Besides P, other quantum-mechanical observables are based on the ``bare'' position r, which is not a legitimate operator within PBCs: foremost among them is orbital magnetization M. Here I express such observables in terms of a ``projected'' position operator r , which is legitimate for both bounded and unbounded samples, and yields very compact expressions for the relevant PBCs formulae. Besides P and M, I will also express in terms of r the anomalous Hall conductivity (for insulators and metals), and the Marzari-Vanderbilt gauge-invariant quadratic spread.

  7. Colonial scientific-medical documentary films and the legitimization of an ideal state in post-war Spain.

    PubMed

    Tabernero, Carlos; Jiménez-Lucena, Isabel; Molero-Mesa, Jorge

    2017-01-01

    This paper explores the role of film and medical-health practices and discourses in the building and legitimating strategies of Franco's fascist regime in Spain. The analysis of five medical-colonial documentary films produced during the 1940s explores the relationship between mass media communication practices and techno-scientific knowledge production, circulation and management processes. These films portray a non-problematic colonial space where social order is articulated through scientific-medical practices and discourses that match the regime's need to consolidate and legitimize itself while asserting the inclusion-exclusion dynamics involved in the definition of social prototypes through processes of medicalization.

  8. Advanced Small Perturbation Potential Flow Theory for Unsteady Aerodynamic and Aeroelastic Analyses

    NASA Technical Reports Server (NTRS)

    Batina, John T.

    2005-01-01

    An advanced small perturbation (ASP) potential flow theory has been developed to improve upon the classical transonic small perturbation (TSP) theories that have been used in various computer codes. These computer codes are typically used for unsteady aerodynamic and aeroelastic analyses in the nonlinear transonic flight regime. The codes exploit the simplicity of stationary Cartesian meshes with the movement or deformation of the configuration under consideration incorporated into the solution algorithm through a planar surface boundary condition. The new ASP theory was developed methodically by first determining the essential elements required to produce full-potential-like solutions with a small perturbation approach on the requisite Cartesian grid. This level of accuracy required a higher-order streamwise mass flux and a mass conserving surface boundary condition. The ASP theory was further developed by determining the essential elements required to produce results that agreed well with Euler solutions. This level of accuracy required mass conserving entropy and vorticity effects, and second-order terms in the trailing wake boundary condition. Finally, an integral boundary layer procedure, applicable to both attached and shock-induced separated flows, was incorporated for viscous effects. The resulting ASP potential flow theory, including entropy, vorticity, and viscous effects, is shown to be mathematically more appropriate and computationally more accurate than the classical TSP theories. The formulaic details of the ASP theory are described fully and the improvements are demonstrated through careful comparisons with accepted alternative results and experimental data. The new theory has been used as the basis for a new computer code called ASP3D (Advanced Small Perturbation - 3D), which also is briefly described with representative results.

  9. For Whom Is a Picture Worth a Thousand Words? Extensions of a Dual-Coding Theory of Multimedia Learning.

    ERIC Educational Resources Information Center

    Mayer, Richard E.; Sims, Valerie K.

    1994-01-01

    In 2 experiments, 162 high- and low-spatial ability students viewed a computer-generated animation and heard a concurrent or successive explanation. The concurrent group generated more creative solutions to transfer problems and demonstrated a contiguity effect consistent with dual-coding theory. (SLD)

  10. English-Afrikaans Intrasentential Code Switching: Testing a Feature Checking Account

    ERIC Educational Resources Information Center

    van Dulm, Ondene

    2009-01-01

    The work presented here aims to account for the structure of intrasentential code switching between English and Afrikaans within the framework of feature checking theory, a theory associated with minimalist syntax. Six constructions in which verb position differs between English and Afrikaans were analysed in terms of differences in the strength…

  11. Socioeconomic Status and Unionization Attitudes in the United States.

    ERIC Educational Resources Information Center

    Cornfield, Daniel B.; Kim, Hyunhee

    1994-01-01

    Survey responses from a national sample of 1,195 nonunion, nonfarm workers suggest that corporations legitimize themselves by appealing to occupational identities of high-status workers, whereas unions legitimize themselves by appealing to social background identities (ethnic, racial, and gender identities) of low-status workers. Prounion…

  12. Legitimizing Community Engagement with K-12 Schools

    ERIC Educational Resources Information Center

    Furco, Andrew

    2013-01-01

    This article examines the issue of internal legitimization and its importance in securing high-quality community engagement in K-12 schools. Drawing on the literature from the fields of community engagement, school reform, school-university partnerships, and school-community partnerships, this article describes some of the prevailing challenges…

  13. Higher Education and State Legitimation in Cyprus.

    ERIC Educational Resources Information Center

    Persianis, Panayiotis

    1999-01-01

    Investigates Cyprus' utilization of higher education policy as compensatory legitimization. Argues that establishment of the University of Cyprus (following considerable political opposition and hesitation over the years) and the character of the state-based university, which is linked to the international community of scholarship, result from the…

  14. JDFTx: Software for joint density-functional theory

    DOE PAGES

    Sundararaman, Ravishankar; Letchworth-Weaver, Kendra; Schwarz, Kathleen A.; ...

    2017-11-14

    Density-functional theory (DFT) has revolutionized computational prediction of atomic-scale properties from first principles in physics, chemistry and materials science. Continuing development of new methods is necessary for accurate predictions of new classes of materials and properties, and for connecting to nano- and mesoscale properties using coarse-grained theories. JDFTx is a fully-featured open-source electronic DFT software designed specifically to facilitate rapid development of new theories, models and algorithms. Using an algebraic formulation as an abstraction layer, compact C++11 code automatically performs well on diverse hardware including GPUs (Graphics Processing Units). This code hosts the development of joint density-functional theory (JDFT) thatmore » combines electronic DFT with classical DFT and continuum models of liquids for first-principles calculations of solvated and electrochemical systems. In addition, the modular nature of the code makes it easy to extend and interface with, facilitating the development of multi-scale toolkits that connect to ab initio calculations, e.g. photo-excited carrier dynamics combining electron and phonon calculations with electromagnetic simulations.« less

  15. JDFTx: Software for joint density-functional theory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sundararaman, Ravishankar; Letchworth-Weaver, Kendra; Schwarz, Kathleen A.

    Density-functional theory (DFT) has revolutionized computational prediction of atomic-scale properties from first principles in physics, chemistry and materials science. Continuing development of new methods is necessary for accurate predictions of new classes of materials and properties, and for connecting to nano- and mesoscale properties using coarse-grained theories. JDFTx is a fully-featured open-source electronic DFT software designed specifically to facilitate rapid development of new theories, models and algorithms. Using an algebraic formulation as an abstraction layer, compact C++11 code automatically performs well on diverse hardware including GPUs (Graphics Processing Units). This code hosts the development of joint density-functional theory (JDFT) thatmore » combines electronic DFT with classical DFT and continuum models of liquids for first-principles calculations of solvated and electrochemical systems. In addition, the modular nature of the code makes it easy to extend and interface with, facilitating the development of multi-scale toolkits that connect to ab initio calculations, e.g. photo-excited carrier dynamics combining electron and phonon calculations with electromagnetic simulations.« less

  16. Surveying multidisciplinary aspects in real-time distributed coding for Wireless Sensor Networks.

    PubMed

    Braccini, Carlo; Davoli, Franco; Marchese, Mario; Mongelli, Maurizio

    2015-01-27

    Wireless Sensor Networks (WSNs), where a multiplicity of sensors observe a physical phenomenon and transmit their measurements to one or more sinks, pertain to the class of multi-terminal source and channel coding problems of Information Theory. In this category, "real-time" coding is often encountered for WSNs, referring to the problem of finding the minimum distortion (according to a given measure), under transmission power constraints, attainable by encoding and decoding functions, with stringent limits on delay and complexity. On the other hand, the Decision Theory approach seeks to determine the optimal coding/decoding strategies or some of their structural properties. Since encoder(s) and decoder(s) possess different information, though sharing a common goal, the setting here is that of Team Decision Theory. A more pragmatic vision rooted in Signal Processing consists of fixing the form of the coding strategies (e.g., to linear functions) and, consequently, finding the corresponding optimal decoding strategies and the achievable distortion, generally by applying parametric optimization techniques. All approaches have a long history of past investigations and recent results. The goal of the present paper is to provide the taxonomy of the various formulations, a survey of the vast related literature, examples from the authors' own research, and some highlights on the inter-play of the different theories.

  17. An improved control mode for the ping-pong protocol operation in imperfect quantum channels

    NASA Astrophysics Data System (ADS)

    Zawadzki, Piotr

    2015-07-01

    Quantum direct communication (QDC) can bring confidentiality of sensitive information without any encryption. A ping-pong protocol, a well-known example of entanglement-based QDC, offers asymptotic security in a perfect quantum channel. However, it has been shown (Wójcik in Phys Rev Lett 90(15):157901, 2003. doi:10.1103/PhysRevLett.90.157901) that it is not secure in the presence of losses. Moreover, legitimate parities cannot rely on dense information coding due to possible undetectable eavesdropping even in the perfect setting (Pavičić in Phys Rev A 87(4):042326, 2013. doi:10.1103/PhysRevA.87.042326). We have identified the source of the above-mentioned weaknesses in the incomplete check of the EPR pair coherence. We propose an improved version of the control mode, and we discuss its relation to the already-known attacks that undermine the QDC security. It follows that the new control mode detects these attacks with high probability and independently on a quantum channel type. As a result, an asymptotic security of the QDC communication can be maintained for imperfect quantum channels, also in the regime of dense information coding.

  18. [Scope of the cause of justification of the legitimate exercise of a right in the area of genetic criminality].

    PubMed

    Romeo Malanda, Sergio

    2009-01-01

    The Spanish penal Code of 1995 creates various crimes in relation to biotechnology, namely, the offence of genetic manipulation, the offence of cloning and the offence of fertilization of human eggs for purpose others than procreation. These new offences seek to protect new legal interests. But besides these interests, we must not forget that there also exist certain rights of the person that rely on reproductive and genetic technologies to be fully effective. That is why it is inevitable to bring to the discussion other interests of a different nature that may be in conflict with these new legal interests. This is the case in relation to the right to procreate and the right to scientific research. According to Article 20.7 of the Spanish penal Code, a person may justifiably engage in conduct that satisfies the elements of an offence if he has a right to do so. In this work the author analyses if certain conduct that could harm some legal interests, and therefore would be criminally punishable could be justified on the basis of the abovementioned rights to procreate and to undertake scientific research.

  19. Emergent spacetime according to effective field theory: From top-down and bottom-up

    NASA Astrophysics Data System (ADS)

    Crowther, Karen

    2013-08-01

    The framework of effective field theory (EFT) is a natural one in which to understand the claim that the spacetime of general relativity (GR) is an emergent low-energy phenomenon. I argue for a pragmatic understanding of EFT, given that the appropriate conception of emergence it suggests is necessarily epistemological in a sense. Analogue models of spacetime are examples of the top-down approach to EFT. They offer concrete illustrations of spacetime emergent within an EFT, and lure us toward a strong analogy between condensed matter physics and GR. I argue that we should be wary of this strong analogy, not least because the pragmatic view of EFT places limits on how much we can legitimately draw from it. On the other hand, programs that treat GR as an EFT and calculate quantum corrections are an example of the bottom-up approach and are explicitly pragmatic in character. I explore what we may learn about the nature of emergent spacetime by comparing these two approaches.

  20. Law's Dilemma: Validating Complementary and Alternative Medicine and the Clash of Evidential Paradigms

    PubMed Central

    Iyioha, Ireh

    2011-01-01

    This paper examines the (in)compatibility between the diagnostic and therapeutic theories of complementary and alternative medicine (CAM) and a science-based regulatory framework. Specifically, the paper investigates the nexus between statutory legitimacy and scientific validation of health systems, with an examination of its impact on the development of complementary and alternative therapies. The paper evaluates competing theories for validating CAM ranging from the RCT methodology to anthropological perspectives and contends that while the RCT method might be beneficial in the regulation of many CAM therapies, yet dogmatic adherence to this paradigm as the exclusive method for legitimizing CAM will be adverse to the independent development of many CAM therapies whose philosophies and mechanisms of action are not scientifically interpretable. Drawing on history and research evidence to support this argument, the paper sues for a regulatory model that is accommodative of different evidential paradigms in support of a pluralistic healthcare system that balances the imperative of quality assurance with the need to ensure access. PMID:20953428

  1. Detrimental effects of sanctions on human altruism.

    PubMed

    Fehr, Ernst; Rockenbach, Bettina

    2003-03-13

    The existence of cooperation and social order among genetically unrelated individuals is a fundamental problem in the behavioural sciences. The prevailing approaches in biology and economics view cooperation exclusively as self-interested behaviour--unrelated individuals cooperate only if they face economic rewards or sanctions rendering cooperation a self-interested choice. Whether economic incentives are perceived as just or legitimate does not matter in these theories. Fairness-based altruism is, however, a powerful source of human cooperation. Here we show experimentally that the prevailing self-interest approach has serious shortcomings because it overlooks negative effects of sanctions on human altruism. Sanctions revealing selfish or greedy intentions destroy altruistic cooperation almost completely, whereas sanctions perceived as fair leave altruism intact. These findings challenge proximate and ultimate theories of human cooperation that neglect the distinction between fair and unfair sanctions, and they are probably relevant in all domains in which voluntary compliance matters--in relations between spouses, in the education of children, in business relations and organizations as well as in markets.

  2. Androgens and Androgen Derivatives: Science, Myths, and Theories: Explored From a Special Operations Perspective.

    PubMed

    Givens, Melissa L; Deuster, Patricia

    2015-01-01

    Androgen use outside of legitimate medical therapy is a perceived concern that is drawing attention across military and specifically Special Operations Forces (SOF) communities. For leadership and the medical community to properly address the issue and relate to those individuals who are using or considering use, it will be crucial to understand the scope of the problem. Limited data suggest that the prevalence of androgen use may be increasing, and inferences made from the scientific literature suggest that SOF may be a population of concern. While risks of androgen use are well known, there are little data specific to military performance that can be applied to a rigorous risk:benefit analysis, allowing myths and poorly supported theories to perpetuate within the community. Further efforts to define the potential benefits balanced against the short- and long-term risks should be undertaken. Providers within the SOF community should arm themselves with information to engage androgen users and leadership in meaningful discussion regarding androgen use. 2015.

  3. Privacy by design in personal health monitoring.

    PubMed

    Nordgren, Anders

    2015-06-01

    The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by design and narrow privacy by design. The key feature of this approach is that it attempts to balance automated privacy protection and autonomously chosen privacy protection in a way that is context-sensitive. In personal health monitoring, this approach implies that in some contexts like medication assistance and monitoring of specific health parameters one single automatic option is legitimate, while in some other contexts, for example monitoring in which relatives are receivers of health-relevant information rather than health care professionals, a multi-choice approach stressing autonomy is warranted.

  4. Quantum error-correcting codes from algebraic geometry codes of Castle type

    NASA Astrophysics Data System (ADS)

    Munuera, Carlos; Tenório, Wanderson; Torres, Fernando

    2016-10-01

    We study algebraic geometry codes producing quantum error-correcting codes by the CSS construction. We pay particular attention to the family of Castle codes. We show that many of the examples known in the literature in fact belong to this family of codes. We systematize these constructions by showing the common theory that underlies all of them.

  5. Implementation of generalized quantum measurements: Superadditive quantum coding, accessible information extraction, and classical capacity limit

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Takeoka, Masahiro; Fujiwara, Mikio; Mizuno, Jun

    2004-05-01

    Quantum-information theory predicts that when the transmission resource is doubled in quantum channels, the amount of information transmitted can be increased more than twice by quantum-channel coding technique, whereas the increase is at most twice in classical information theory. This remarkable feature, the superadditive quantum-coding gain, can be implemented by appropriate choices of code words and corresponding quantum decoding which requires a collective quantum measurement. Recently, an experimental demonstration was reported [M. Fujiwara et al., Phys. Rev. Lett. 90, 167906 (2003)]. The purpose of this paper is to describe our experiment in detail. Particularly, a design strategy of quantum-collective decodingmore » in physical quantum circuits is emphasized. We also address the practical implication of the gain on communication performance by introducing the quantum-classical hybrid coding scheme. We show how the superadditive quantum-coding gain, even in a small code length, can boost the communication performance of conventional coding techniques.« less

  6. 47 CFR 22.936 - Dismissal of applications in cellular renewal proceedings.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CARRIER SERVICES PUBLIC MOBILE SERVICES Cellular Radiotelephone Service § 22.936 Dismissal of applications... its principals has received or will receive any money or other consideration in excess of legitimate... principals has paid or will pay money or other consideration in excess of the legitimate and prudent expenses...

  7. 47 CFR 22.936 - Dismissal of applications in cellular renewal proceedings.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... CARRIER SERVICES PUBLIC MOBILE SERVICES Cellular Radiotelephone Service § 22.936 Dismissal of applications... its principals has received or will receive any money or other consideration in excess of legitimate... principals has paid or will pay money or other consideration in excess of the legitimate and prudent expenses...

  8. 47 CFR 22.936 - Dismissal of applications in cellular renewal proceedings.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... CARRIER SERVICES PUBLIC MOBILE SERVICES Cellular Radiotelephone Service § 22.936 Dismissal of applications... its principals has received or will receive any money or other consideration in excess of legitimate... principals has paid or will pay money or other consideration in excess of the legitimate and prudent expenses...

  9. 47 CFR 22.936 - Dismissal of applications in cellular renewal proceedings.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... CARRIER SERVICES PUBLIC MOBILE SERVICES Cellular Radiotelephone Service § 22.936 Dismissal of applications... its principals has received or will receive any money or other consideration in excess of legitimate... principals has paid or will pay money or other consideration in excess of the legitimate and prudent expenses...

  10. 47 CFR 22.936 - Dismissal of applications in cellular renewal proceedings.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... CARRIER SERVICES PUBLIC MOBILE SERVICES Cellular Radiotelephone Service § 22.936 Dismissal of applications... its principals has received or will receive any money or other consideration in excess of legitimate... principals has paid or will pay money or other consideration in excess of the legitimate and prudent expenses...

  11. Patriotism, History and the Legitimate Aims of American Education

    ERIC Educational Resources Information Center

    Merry, Michael S.

    2009-01-01

    This article argues that while an attachment to one's country is both natural and even partially justifiable, cultivating loyal patriotism in schools is untenable insofar as it conflicts with the legitimate aims of education. These aims include the epistemological competence necessary for ascertaining important truths germane to the various…

  12. Legitimating Clinical Research in the Study of Organizational Culture.

    ERIC Educational Resources Information Center

    Schein, Edgar H.

    1993-01-01

    Argues that traditional research model used in industrial-organizational psychology is not useful in understanding deeper dynamics of organizations, especially those phenomena labeled as "cultural." Contends that use of data obtained during clinical and consulting work should be legitimated as valid research data. Spells out clinical model and…

  13. Parallel software for lattice N = 4 supersymmetric Yang-Mills theory

    NASA Astrophysics Data System (ADS)

    Schaich, David; DeGrand, Thomas

    2015-05-01

    We present new parallel software, SUSY LATTICE, for lattice studies of four-dimensional N = 4 supersymmetric Yang-Mills theory with gauge group SU(N). The lattice action is constructed to exactly preserve a single supersymmetry charge at non-zero lattice spacing, up to additional potential terms included to stabilize numerical simulations. The software evolved from the MILC code for lattice QCD, and retains a similar large-scale framework despite the different target theory. Many routines are adapted from an existing serial code (Catterall and Joseph, 2012), which SUSY LATTICE supersedes. This paper provides an overview of the new parallel software, summarizing the lattice system, describing the applications that are currently provided and explaining their basic workflow for non-experts in lattice gauge theory. We discuss the parallel performance of the code, and highlight some notable aspects of the documentation for those interested in contributing to its future development.

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bose, Benjamin; Koyama, Kazuya, E-mail: benjamin.bose@port.ac.uk, E-mail: kazuya.koyama@port.ac.uk

    We develop a code to produce the power spectrum in redshift space based on standard perturbation theory (SPT) at 1-loop order. The code can be applied to a wide range of modified gravity and dark energy models using a recently proposed numerical method by A.Taruya to find the SPT kernels. This includes Horndeski's theory with a general potential, which accommodates both chameleon and Vainshtein screening mechanisms and provides a non-linear extension of the effective theory of dark energy up to the third order. Focus is on a recent non-linear model of the redshift space power spectrum which has been shownmore » to model the anisotropy very well at relevant scales for the SPT framework, as well as capturing relevant non-linear effects typical of modified gravity theories. We provide consistency checks of the code against established results and elucidate its application within the light of upcoming high precision RSD data.« less

  15. Neural coding of basic reward terms of animal learning theory, game theory, microeconomics and behavioural ecology.

    PubMed

    Schultz, Wolfram

    2004-04-01

    Neurons in a small number of brain structures detect rewards and reward-predicting stimuli and are active during the expectation of predictable food and liquid rewards. These neurons code the reward information according to basic terms of various behavioural theories that seek to explain reward-directed learning, approach behaviour and decision-making. The involved brain structures include groups of dopamine neurons, the striatum including the nucleus accumbens, the orbitofrontal cortex and the amygdala. The reward information is fed to brain structures involved in decision-making and organisation of behaviour, such as the dorsolateral prefrontal cortex and possibly the parietal cortex. The neural coding of basic reward terms derived from formal theories puts the neurophysiological investigation of reward mechanisms on firm conceptual grounds and provides neural correlates for the function of rewards in learning, approach behaviour and decision-making.

  16. Childhood obesity in transition zones: an analysis using structuration theory.

    PubMed

    Chan, Christine; Deave, Toity; Greenhalgh, Trisha

    2010-07-01

    Childhood obesity is particularly prevalent in areas that have seen rapid economic growth, urbanisation, cultural transition, and commodification of food systems. Structuration theory may illuminate the interaction between population and individual-level causes of obesity. We conducted in-depth ethnographies of six overweight/obese and four non-overweight preschool children in Hong Kong, each followed for 12-18 months. Analysis was informed by Stones' strong structuration theory. Risk factors played out differently for different children as social structures were enacted at the level of family and preschool. The network of caregiving roles and relationships around the overweight/obese child was typically weak and disjointed, and the primary caregiver appeared confused by mixed messages about what is normal, expected and legitimate behaviour. In particular, external social structures created pressure to shift childcare routines from the logic of nurturing to the logic of consumption. Our findings suggest that threats to what Giddens called ontological security in the primary caregiver may underpin the poor parenting, family stress and weak mealtime routines that mediate the relationship between an obesogenic environment and the development of obesity in a particular child. This preliminary study offers a potentially transferable approach for studying emerging epidemics of diseases of modernity in transition societies.

  17. Mathematics Education and the Objectivist Programme in HPS

    NASA Astrophysics Data System (ADS)

    Glas, Eduard

    2013-06-01

    Using history of mathematics for studying concepts, methods, problems and other internal features of the discipline may give rise to a certain tension between descriptive adequacy and educational demands. Other than historians, educators are concerned with mathematics as a normatively defined discipline. Teaching cannot but be based on a pre-understanding of what mathematics `is' or, in other words, on a normative (methodological, philosophical) view of the identity or nature of the discipline. Educators are primarily concerned with developments at the level of objective mathematical knowledge, that is: with the relations between successive theories, problems and proposed solutions—relations which are independent of whatever has been the role of personal or collective beliefs, convictions, traditions and other historical circumstances. Though not exactly `historical' in the usual sense, I contend that this `objectivist' approach does represent one among other entirely legitimate and valuable approaches to the historical development of mathematics. Its retrospective importance to current practitioners and students is illustrated by a reconstruction of the development of Eudoxus's theory of proportionality in response to the problem of irrationality, and the way in which Dedekind some two millennia later almost literally used this ancient theory for the rigorous introduction of irrational numbers and hence of the real number continuum.

  18. Explorations in Policy Enactment: Feminist Thought Experiments with Basil Bernstein's Code Theory

    ERIC Educational Resources Information Center

    Singh, Parlo; Pini, Barbara; Glasswell, Kathryn

    2018-01-01

    This paper builds on feminist elaborations of Bernstein's code theory to engage in a series of thought experiments with interview data produced during a co-inquiry design-based research intervention project. It presents three accounts of thinking/writing with data. Our purpose in presenting three different accounts of interview data is to…

  19. The Impact of Causality on Information-Theoretic Source and Channel Coding Problems

    ERIC Educational Resources Information Center

    Palaiyanur, Harikrishna R.

    2011-01-01

    This thesis studies several problems in information theory where the notion of causality comes into play. Causality in information theory refers to the timing of when information is available to parties in a coding system. The first part of the thesis studies the error exponent (or reliability function) for several communication problems over…

  20. Dual Coding Theory, Word Abstractness, and Emotion: A Critical Review of Kousta et al. (2011)

    ERIC Educational Resources Information Center

    Paivio, Allan

    2013-01-01

    Kousta, Vigliocco, Del Campo, Vinson, and Andrews (2011) questioned the adequacy of dual coding theory and the context availability model as explanations of representational and processing differences between concrete and abstract words. They proposed an alternative approach that focuses on the role of emotional content in the processing of…

  1. One Speaker, Two Languages. Cross-Disciplinary Perspectives on Code-Switching.

    ERIC Educational Resources Information Center

    Milroy, Lesley, Ed.; Muysken, Pieter, Ed.

    Fifteen articles review code-switching in the four major areas: policy implications in specific institutional and community settings; perspectives of social theory of code-switching as a form of speech behavior in particular social contexts; the grammatical analysis of code-switching, including factors that constrain switching even within a…

  2. NP-hardness of decoding quantum error-correction codes

    NASA Astrophysics Data System (ADS)

    Hsieh, Min-Hsiu; Le Gall, François

    2011-05-01

    Although the theory of quantum error correction is intimately related to classical coding theory and, in particular, one can construct quantum error-correction codes (QECCs) from classical codes with the dual-containing property, this does not necessarily imply that the computational complexity of decoding QECCs is the same as their classical counterparts. Instead, decoding QECCs can be very much different from decoding classical codes due to the degeneracy property. Intuitively, one expects degeneracy would simplify the decoding since two different errors might not and need not be distinguished in order to correct them. However, we show that general quantum decoding problem is NP-hard regardless of the quantum codes being degenerate or nondegenerate. This finding implies that no considerably fast decoding algorithm exists for the general quantum decoding problems and suggests the existence of a quantum cryptosystem based on the hardness of decoding QECCs.

  3. Coevolution Theory of the Genetic Code at Age Forty: Pathway to Translation and Synthetic Life

    PubMed Central

    Wong, J. Tze-Fei; Ng, Siu-Kin; Mat, Wai-Kin; Hu, Taobo; Xue, Hong

    2016-01-01

    The origins of the components of genetic coding are examined in the present study. Genetic information arose from replicator induction by metabolite in accordance with the metabolic expansion law. Messenger RNA and transfer RNA stemmed from a template for binding the aminoacyl-RNA synthetase ribozymes employed to synthesize peptide prosthetic groups on RNAs in the Peptidated RNA World. Coevolution of the genetic code with amino acid biosynthesis generated tRNA paralogs that identify a last universal common ancestor (LUCA) of extant life close to Methanopyrus, which in turn points to archaeal tRNA introns as the most primitive introns and the anticodon usage of Methanopyrus as an ancient mode of wobble. The prediction of the coevolution theory of the genetic code that the code should be a mutable code has led to the isolation of optional and mandatory synthetic life forms with altered protein alphabets. PMID:26999216

  4. Using Intermodal Psychodrama to Personalize Drama Students' Experience: Two Case Illustrations

    ERIC Educational Resources Information Center

    Orkibi, Hod

    2011-01-01

    J. L. Moreno (1889-1974), the founder of psychodrama, argued against legitimate theater, asserting it is a "rigid drama conserve," a finished product of the preceding creative process. In particular, Moreno protested against the centripetal manner in which actors of legitimate theater assimilate a role from a written play: an external…

  5. 15 CFR 710.4 - Overview of scheduled chemicals and examples of affected industries.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... WEAPONS CONVENTION REGULATIONS GENERAL INFORMATION AND OVERVIEW OF THE CHEMICAL WEAPONS CONVENTION... Schedule 2 chemicals may be useful in the production of chemical weapons, they also have legitimate uses in... may be useful in the production of chemical weapons, they also have legitimate uses in areas such as...

  6. "We Don't Do Anything": Analysing the Construction of Legitimate Knowledge in Multilingual Schools

    ERIC Educational Resources Information Center

    Patiño-Santos, Adriana; Pérez-Milans, Miguel; Relaño-Pastor, Ana María

    2015-01-01

    This article explores the ways in which what counts as "legitimate" knowledge is produced and negotiated in two multilingual classrooms of two different programmes designed to "attend to diversity" at secondary schools in the Madrid region. Following a sociolinguistic approach, the article focuses on the ways in which local…

  7. Central Practitioners' Developing Legitimate Peripheral Participation in a Community of Practice for Changing Schools

    ERIC Educational Resources Information Center

    Woo, David James

    2015-01-01

    As new technologies continue to shape society, there has been a greater need for communities of practice to facilitate changing teaching and learning practices through technology in schools. Legitimate peripheral participation through these communities of practice has become an essential means to spread and support this technology integration…

  8. Speaking about Education Reform: Constructing Failure to Legitimate Entrepreneurial Reforms of Teacher Preparation

    ERIC Educational Resources Information Center

    Hollar, Jesslyn

    2017-01-01

    This paper investigates how this conception of failure came to prevail in the political discourse around the reform of teacher education. It explores how discursive structures and strategies in two speeches by former Secretary of Education Arne Duncan legitimate a particular construction of the failure of teacher education and encourage…

  9. The Three Faces of Power: The U.S. Supreme Court's Legitimization of School Authority's Parental, Police, and Pedagogic Roles.

    ERIC Educational Resources Information Center

    Ehrensal, Patricia A.

    2003-01-01

    Examines legal and ethical ramifications of three roles of school authorities (agents-of-state, custodial, tutelary) legitimated in two Supreme Court decisions: "New Jersey v. T.L.0." (search and seizure) and "Vernonia v. Action" (drug use testing). (Contains 34 references.)(PKP)

  10. The Legitimization of Dialectic: Socratic Strategy in the "Gorgias."

    ERIC Educational Resources Information Center

    Palmerton, Patricia

    In the "Gorgias," Plato focuses attention upon the value of dialectic as opposed to rhetoric, as well as the status of orators as opposed to philosophers. Through his agent, Socrates, Plato confirms dialectic as a legitimate endeavor while calling into question the place of rhetoric. Socrates is portrayed as a director who enacts a…

  11. "Roda Boa", "Roda Boa": Legitimate Peripheral Participation in Diasporic "Capoeira"

    ERIC Educational Resources Information Center

    Stephens, Neil; Delamont, Sara

    2010-01-01

    "Capoeira", the Brazilian dance and martial art, is taught across the world. Learners acquire vital knowledge and are socialised as "capoeiristas" through legitimate peripheral participation, in particular when watching games in the "roda". The "roda", the circle within which the "capoeira" game is played, is a classic place for learning by…

  12. Becoming Academics: Experiencing Legitimate Peripheral Participation in Part-Time Doctoral Studies

    ERIC Educational Resources Information Center

    Teeuwsen, Phil; Ratkovic, Snežana; Tilley, Susan A.

    2014-01-01

    An important element of doctoral studies is identification with the academic community. Such identification is often complicated by part-time student status. In this paper, two part-time doctoral students and their supervisor employ Lave and Wenger's concept of legitimate peripheral participation to explore, through a critical socio-cultural lens,…

  13. Autosophy information theory provides lossless data and video compression based on the data content

    NASA Astrophysics Data System (ADS)

    Holtz, Klaus E.; Holtz, Eric S.; Holtz, Diana

    1996-09-01

    A new autosophy information theory provides an alternative to the classical Shannon information theory. Using the new theory in communication networks provides both a high degree of lossless compression and virtually unbreakable encryption codes for network security. The bandwidth in a conventional Shannon communication is determined only by the data volume and the hardware parameters, such as image size; resolution; or frame rates in television. The data content, or what is shown on the screen, is irrelevant. In contrast, the bandwidth in autosophy communication is determined only by data content, such as novelty and movement in television images. It is the data volume and hardware parameters that become irrelevant. Basically, the new communication methods use prior 'knowledge' of the data, stored in a library, to encode subsequent transmissions. The more 'knowledge' stored in the libraries, the higher the potential compression ratio. 'Information' is redefined as that which is not already known by the receiver. Everything already known is redundant and need not be re-transmitted. In a perfect communication each transmission code, called a 'tip,' creates a new 'engram' of knowledge in the library in which each tip transmission can represent any amount of data. Autosophy theories provide six separate learning modes, or omni dimensional networks, all of which can be used for data compression. The new information theory reveals the theoretical flaws of other data compression methods, including: the Huffman; Ziv Lempel; LZW codes and commercial compression codes such as V.42bis and MPEG-2.

  14. Enhancing Tax Compliance through Coercive and Legitimate Power of Tax Authorities by Concurrently Diminishing or Facilitating Trust in Tax Authorities.

    PubMed

    Hofmann, Eva; Gangl, Katharina; Kirchler, Erich; Stark, Jennifer

    2014-07-01

    Both coercion, such as strict auditing and the use of fines, and legitimate procedures, such as assistance by tax authorities, are often discussed as means of enhancing tax compliance. However, the psychological mechanisms that determine the effectiveness of each strategy are not clear. Although highly relevant, there is rare empirical literature examining the effects of both strategies applied in combination. It is assumed that coercion decreases implicit trust in tax authorities, leading to the perception of a hostile antagonistic tax climate and enforced tax compliance. Conversely, it is suggested that legitimate power increases reason-based trust in the tax authorities, leading to the perception of a service climate and eventually to voluntary cooperation. The combination of both strategies is assumed to cause greater levels of intended compliance than each strategy alone. We conducted two experimental studies with convenience samples of 261 taxpayers overall. The studies describe tax authorities as having low or high coercive power (e.g., imposing lenient or severe sanctions) and/or low or high legitimate power (e.g., having nontransparent or transparent procedures). Data analyses provide supportive evidence for the assumptions regarding the impact on intended tax compliance. Coercive power did not reduce implicit trust in tax authorities; however, it had an effect on reason-based trust, interaction climate, and intended tax compliance if applied solely. When wielded in combination with legitimate power, it had no effect.

  15. Enhancing Tax Compliance through Coercive and Legitimate Power of Tax Authorities by Concurrently Diminishing or Facilitating Trust in Tax Authorities

    PubMed Central

    Hofmann, Eva; Gangl, Katharina; Kirchler, Erich; Stark, Jennifer

    2014-01-01

    Both coercion, such as strict auditing and the use of fines, and legitimate procedures, such as assistance by tax authorities, are often discussed as means of enhancing tax compliance. However, the psychological mechanisms that determine the effectiveness of each strategy are not clear. Although highly relevant, there is rare empirical literature examining the effects of both strategies applied in combination. It is assumed that coercion decreases implicit trust in tax authorities, leading to the perception of a hostile antagonistic tax climate and enforced tax compliance. Conversely, it is suggested that legitimate power increases reason-based trust in the tax authorities, leading to the perception of a service climate and eventually to voluntary cooperation. The combination of both strategies is assumed to cause greater levels of intended compliance than each strategy alone. We conducted two experimental studies with convenience samples of 261 taxpayers overall. The studies describe tax authorities as having low or high coercive power (e.g., imposing lenient or severe sanctions) and/or low or high legitimate power (e.g., having nontransparent or transparent procedures). Data analyses provide supportive evidence for the assumptions regarding the impact on intended tax compliance. Coercive power did not reduce implicit trust in tax authorities; however, it had an effect on reason-based trust, interaction climate, and intended tax compliance if applied solely. When wielded in combination with legitimate power, it had no effect. PMID:26074656

  16. Dynamic state estimation based on Poisson spike trains—towards a theory of optimal encoding

    NASA Astrophysics Data System (ADS)

    Susemihl, Alex; Meir, Ron; Opper, Manfred

    2013-03-01

    Neurons in the nervous system convey information to higher brain regions by the generation of spike trains. An important question in the field of computational neuroscience is how these sensory neurons encode environmental information in a way which may be simply analyzed by subsequent systems. Many aspects of the form and function of the nervous system have been understood using the concepts of optimal population coding. Most studies, however, have neglected the aspect of temporal coding. Here we address this shortcoming through a filtering theory of inhomogeneous Poisson processes. We derive exact relations for the minimal mean squared error of the optimal Bayesian filter and, by optimizing the encoder, obtain optimal codes for populations of neurons. We also show that a class of non-Markovian, smooth stimuli are amenable to the same treatment, and provide results for the filtering and prediction error which hold for a general class of stochastic processes. This sets a sound mathematical framework for a population coding theory that takes temporal aspects into account. It also formalizes a number of studies which discussed temporal aspects of coding using time-window paradigms, by stating them in terms of correlation times and firing rates. We propose that this kind of analysis allows for a systematic study of temporal coding and will bring further insights into the nature of the neural code.

  17. Psychosocial factors and theory in physical activity studies in minorities.

    PubMed

    Mama, Scherezade K; McNeill, Lorna H; McCurdy, Sheryl A; Evans, Alexandra E; Diamond, Pamela M; Adamus-Leach, Heather J; Lee, Rebecca E

    2015-01-01

    To summarize the effectiveness of interventions targeting psychosocial factors to increase physical activity (PA) among ethnic minority adults and explore theory use in PA interventions. Studies (N = 11) were identified through a systematic review and targeted African American/Hispanic adults, specific psychosocial factors, and PA. Data were extracted using a standard code sheet and the Theory Coding Scheme. Social support was the most common psychosocial factor reported, followed by motivational readiness, and self-efficacy, as being associated with increased PA. Only 7 studies explicitly reported using a theoretical framework. Future efforts should explore theory use in PA interventions and how integration of theoretical constructs, including psychosocial factors, increases PA.

  18. A social justice epistemology and pedagogy for Latina/o students: Transforming public education with participatory action research.

    PubMed

    Cammarota, Julio; Romero, Augustine F

    2009-01-01

    The article reports on Latina/o high school students who conducted participatory action research (PAR) on problems that circumscribe their possibilities for self-determination. The intention is to legitimize student knowledge to develop effective educational policies and practices for young Latinas/os. PAR is engaged through the Social Justice Education Project, which provides students with all social science requirements for their junior and senior years. The mandated curriculum is supplemented with advanced-level readings from Chicana/o studies, critical race theory, critical pedagogy, and, most important, PAR. The intention is for students to meet the requirements for graduation and to develop sophisticated critical analyses to address problems in their own social contexts.

  19. Clinical ethics and happiness.

    PubMed

    Devettere, R J

    1993-02-01

    Most contemporary accounts of clinical ethics do not explain why clinicians should be ethical. Those few that do attempt an explanation usually claim that clinicians should be ethical because ethical behavior provides an important good for the patient--better care. Both these approaches ignore the customary traditional reason for being ethical, namely, the good of the moral agent. This good was commonly called 'happiness'. The following article shows how the personal happiness of the moral agent provided a major reason for being ethical in the ancient philosophical and biblical traditions and how it continues to play a role in the more modern rights-based, Kantian and utilitarian theories. This history suggests that the personal happiness of the clinician, rightly understood, is a legitimate and important goal of clinical ethics.

  20. Quantum key distribution with untrusted detectors

    NASA Astrophysics Data System (ADS)

    González, P.; Rebón, L.; Ferreira da Silva, T.; Figueroa, M.; Saavedra, C.; Curty, M.; Lima, G.; Xavier, G. B.; Nogueira, W. A. T.

    2015-08-01

    Side-channel attacks currently constitute the main challenge for quantum key distribution (QKD) to bridge theory with practice. So far two main approaches have been introduced to address this problem, (full) device-independent QKD and measurement-device-independent QKD. Here we present a third solution that might exceed the performance and practicality of the previous two in circumventing detector side-channel attacks, which arguably is the most hazardous part of QKD implementations. Our proposal has, however, one main requirement: the legitimate users of the system need to ensure that their labs do not leak any unwanted information to the outside. The security in the low-loss regime is guaranteed, while in the high-loss regime we already prove its robustness against some eavesdropping strategies.

  1. Tight finite-key analysis for quantum cryptography

    PubMed Central

    Tomamichel, Marco; Lim, Charles Ci Wen; Gisin, Nicolas; Renner, Renato

    2012-01-01

    Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M. Another challenge is that most security proofs are very sensitive to small differences between the physical devices used by the protocol and the theoretical model used to describe them. Here we show that these gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies. PMID:22252558

  2. Tight finite-key analysis for quantum cryptography.

    PubMed

    Tomamichel, Marco; Lim, Charles Ci Wen; Gisin, Nicolas; Renner, Renato

    2012-01-17

    Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M. Another challenge is that most security proofs are very sensitive to small differences between the physical devices used by the protocol and the theoretical model used to describe them. Here we show that these gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies.

  3. Rawls and the refusal of medical treatment to children.

    PubMed

    Macdougall, D Robert

    2010-04-01

    That Jehovah's Witnesses cannot refuse life-saving blood transfusions on behalf of their children has acquired the status of virtual "consensus" among bioethicists. However strong the consensus may be on this matter, this article explores whether this view can be plausibly defended on liberal principles by examining it in light of one particularly well worked-out liberal political theory, that of Rawls. It concludes that because of the extremely high priority Rawls attributes to "freedom of conscience," and the implication from the original position that parents must act paternalistically toward their children as their protectors, Jehovah's Witnesses cannot legitimately be barred from making decisions on behalf of their children, even when the consequences of such decisions are serious and irremediable.

  4. A feminist response to Weitzer.

    PubMed

    Dines, Gail

    2012-04-01

    In his review of my book Pornland: How Porn has Hijacked our Sexuality, Ronald Weitzer claims that anti-porn feminists are incapable of objective, rigorous research because they operate within the "oppression paradigm," which he defines as "a perspective that depicts all types of sex work as exploitive, violent, and perpetuating gender inequality." (VAW, 2011, 666). This article argues that while anti-porn feminists do indeed see pornography as exploitive, such a position is rooted in the rigorous theories and methods of cultural studies developed by critical media scholars such as Stuart Hall and Antonio Gramsci. Pornland applies a cultural studies approach by exploring how porn images are part of a wider system of sexist representations that legitimize and normalize the economic, political and legal oppression of women.

  5. Positron Physics

    NASA Technical Reports Server (NTRS)

    Drachman, Richard J.

    2003-01-01

    I will give a review of the history of low-energy positron physics, experimental and theoretical, concentrating on the type of work pioneered by John Humberston and the positronics group at University College. This subject became a legitimate subfield of atomic physics under the enthusiastic direction of the late Sir Harrie Massey, and it attracted a diverse following throughout the world. At first purely theoretical, the subject has now expanded to include high brightness beams of low-energy positrons, positronium beams, and, lately, experiments involving anti-hydrogen atoms. The theory requires a certain type of persistence in its practitioners, as well as an eagerness to try new mathematical and numerical techniques. I will conclude with a short summary of some of the most interesting recent advances.

  6. Kant and the development of the human and cultural sciences.

    PubMed

    Makkreel, Rudolf A

    2008-12-01

    Starting with Kant's doubts about psychology as a natural science capable of explaining human behavior, several alternative attempts to conceive of human life, culture and history are examined. Kant proposes an anthropology that will be a commonly useful human science rather than a universally valid natural science. This anthropology relates to philosophy as a mode of world-cognition. Special attention is given to how Kant's theory of right can help define our appropriate place in a communal world. The different ways in which Wilhelm Dilthey and Hermann Cohen respond to Kant's idea of legitimate appropriation are also considered. The various tasks that descriptive elucidation, explanation, reflective understanding, characterization and interpretation can perform for the human and cultural sciences are examined throughout the essay.

  7. Dual Coding Theory and Computer Education: Some Media Experiments To Examine the Effects of Different Media on Learning.

    ERIC Educational Resources Information Center

    Alty, James L.

    Dual Coding Theory has quite specific predictions about how information in different media is stored, manipulated and recalled. Different combinations of media are expected to have significant effects upon the recall and retention of information. This obviously may have important consequences in the design of computer-based programs. The paper…

  8. L1 and L2 Picture Naming in Mandarin-English Bilinguals: A Test of Bilingual Dual Coding Theory

    ERIC Educational Resources Information Center

    Jared, Debra; Poh, Rebecca Pei Yun; Paivio, Allan

    2013-01-01

    This study examined the nature of bilinguals' conceptual representations and the links from these representations to words in L1 and L2. Specifically, we tested an assumption of the Bilingual Dual Coding Theory that conceptual representations include image representations, and that learning two languages in separate contexts can result in…

  9. Using Kintsch's Discourse Comprehension Theory To Model the User's Coding of an Informative Message from an Enabling Information Retrieval System.

    ERIC Educational Resources Information Center

    Cole, Charles; Mandelblatt, Bertie

    2000-01-01

    Uses Kintsch's proposition-based construction-integration theory of discourse comprehension to detail the user coding operations that occur in each of the three subsystems (Perception, Comprehension, Application) in which users process an information retrieval systems (IRS) message. Describes an IRS device made up of two separate parts that enable…

  10. Convolutional coding combined with continuous phase modulation

    NASA Technical Reports Server (NTRS)

    Pizzi, S. V.; Wilson, S. G.

    1985-01-01

    Background theory and specific coding designs for combined coding/modulation schemes utilizing convolutional codes and continuous-phase modulation (CPM) are presented. In this paper the case of r = 1/2 coding onto a 4-ary CPM is emphasized, with short-constraint length codes presented for continuous-phase FSK, double-raised-cosine, and triple-raised-cosine modulation. Coding buys several decibels of coding gain over the Gaussian channel, with an attendant increase of bandwidth. Performance comparisons in the power-bandwidth tradeoff with other approaches are made.

  11. Does accountability for reasonableness work? A protocol for a mixed methods study using an audit tool to evaluate the decision-making of clinical commissioning groups in England.

    PubMed

    Kieslich, Katharina; Littlejohns, Peter

    2015-07-10

    Clinical commissioning groups (CCGs) in England are tasked with making difficult decisions on which healthcare services to provide against the background of limited budgets. The question is how to ensure that these decisions are fair and legitimate. Accounts of what constitutes fair and legitimate priority setting in healthcare include Daniels' and Sabin's accountability for reasonableness (A4R) and Clark's and Weale's framework for the identification of social values. This study combines these accounts and asks whether the decisions of those CCGs that adhere to elements of such accounts are perceived as fairer and more legitimate by key stakeholders. The study addresses the empirical gap arising from a lack of research on whether frameworks such as A4R hold what they promise. It aims to understand the criteria that feature in CCG decision-making. Finally, it examines the usefulness of a decision-making audit tool (DMAT) in identifying the process and content criteria that CCGs apply when making decisions. The adherence of a sample of CCGs to criteria emerging from theories of fair priority setting will be examined using the DMAT developed by PL. The results will be triangulated with data from semistructured interviews with key stakeholders in the CCG sample to ascertain whether there is a correlation between those CCGs that performed well in the DMAT exercise and those whose decisions are perceived positively by interviewees. Descriptive statistical methods will be used to analyse the DMAT data. A combination of quantitative and qualitative content analysis methods will be used to analyse the interview transcripts. Full ethics approval was received by the King's College London Biomedical Sciences, Dentistry, Medicine and Natural and Mathematical Sciences Research Ethics Subcommittee. The results of the study will be disseminated through publications in peer review journals. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  12. Mathematical fundamentals for the noise immunity of the genetic code.

    PubMed

    Fimmel, Elena; Strüngmann, Lutz

    2018-02-01

    Symmetry is one of the essential and most visible patterns that can be seen in nature. Starting from the left-right symmetry of the human body, all types of symmetry can be found in crystals, plants, animals and nature as a whole. Similarly, principals of symmetry are also some of the fundamental and most useful tools in modern mathematical natural science that play a major role in theory and applications. As a consequence, it is not surprising that the desire to understand the origin of life, based on the genetic code, forces us to involve symmetry as a mathematical concept. The genetic code can be seen as a key to biological self-organisation. All living organisms have the same molecular bases - an alphabet consisting of four letters (nitrogenous bases): adenine, cytosine, guanine, and thymine. Linearly ordered sequences of these bases contain the genetic information for synthesis of proteins in all forms of life. Thus, one of the most fascinating riddles of nature is to explain why the genetic code is as it is. Genetic coding possesses noise immunity which is the fundamental feature that allows to pass on the genetic information from parents to their descendants. Hence, since the time of the discovery of the genetic code, scientists have tried to explain the noise immunity of the genetic information. In this chapter we will discuss recent results in mathematical modelling of the genetic code with respect to noise immunity, in particular error-detection and error-correction. We will focus on two central properties: Degeneracy and frameshift correction. Different amino acids are encoded by different quantities of codons and a connection between this degeneracy and the noise immunity of genetic information is a long standing hypothesis. Biological implications of the degeneracy have been intensively studied and whether the natural code is a frozen accident or a highly optimised product of evolution is still controversially discussed. Symmetries in the structure of degeneracy of the genetic code are essential and give evidence of substantial advantages of the natural code over other possible ones. In the present chapter we will present a recent approach to explain the degeneracy of the genetic code by algorithmic methods from bioinformatics, and discuss its biological consequences. The biologists recognised this problem immediately after the detection of the non-overlapping structure of the genetic code, i.e., coding sequences are to be read in a unique way determined by their reading frame. But how does the reading head of the ribosome recognises an error in the grouping of codons, caused by e.g. insertion or deletion of a base, that can be fatal during the translation process and may result in nonfunctional proteins? In this chapter we will discuss possible solutions to the frameshift problem with a focus on the theory of so-called circular codes that were discovered in large gene populations of prokaryotes and eukaryotes in the early 90s. Circular codes allow to detect a frameshift of one or two positions and recently a beautiful theory of such codes has been developed using statistics, group theory and graph theory. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. Aids to Computer-Based Multimedia Learning.

    ERIC Educational Resources Information Center

    Mayer, Richard E.; Moreno, Roxana

    2002-01-01

    Presents a cognitive theory of multimedia learning that draws on dual coding theory, cognitive load theory, and constructivist learning theory and derives some principles of instructional design for fostering multimedia learning. These include principles of multiple representation, contiguity, coherence, modality, and redundancy. (SLD)

  14. 45 CFR 2526.30 - How do convictions for the possession or sale of controlled substances affect an education award...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... trafficking of controlled substances; (F) Length of time between offenses; (G) Employment history; (H) Service... this section has successfully completed a legitimate drug rehabilitation program, or in the case of a first conviction that the individual has enrolled in a legitimate drug rehabilitation program, the...

  15. Institutional Tendencies of Legitimate Evaluation: A Comparison of Finnish and English Higher Education Evaluations

    ERIC Educational Resources Information Center

    Vartiainen, Pirkko

    2005-01-01

    This article analyses institutional evaluations of higher education in England and Finland through the concept of legitimacy. The focus of the article is on the institutional tendencies of legitimacy. This author's hypothesis is that evaluation is legitimate when the evaluation process is of a good quality and accepted both morally and in practice…

  16. 45 CFR 2526.30 - How do convictions for the possession or sale of controlled substances affect an education award...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... trafficking of controlled substances; (F) Length of time between offenses; (G) Employment history; (H) Service... this section has successfully completed a legitimate drug rehabilitation program, or in the case of a first conviction that the individual has enrolled in a legitimate drug rehabilitation program, the...

  17. Crisis of Youth or Youth in Crisis? Education, Employment and Legitimation Crisis

    ERIC Educational Resources Information Center

    Simmons, Robin; Smyth, John

    2016-01-01

    This paper uses the Habermasian concept of legitimation crisis to critique the relationship between post-compulsory education and training and the chronic levels of youth unemployment and under-employment which now characterise post-industrial Western economies, such as the UK. It draws on data from an ethnographic study of the lives of young…

  18. Politics as Education: The Foundations of the Morally Legitimate State.

    ERIC Educational Resources Information Center

    Crockenberg, Vincent

    The author argues that education should be the end and aim of politics. Further, he argues that in order for a state to be morally legitimate it must provide social and political conditions that promote and further human education and development and concludes with a practical intimation of this principle. Traditional liberal political theory…

  19. 40 CFR 261.5 - Special requirements for hazardous waste generated by conditionally exempt small quantity...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... batteries managed under the requirements of 40 CFR part 266, subpart G; or (6) Is universal waste managed... waste prior to beneficial use or reuse, or legitimate recycling or reclamation; or (vii) For universal... waste prior to beneficial use or reuse, or legitimate recycling or reclamation; or (vii) For universal...

  20. 40 CFR 261.5 - Special requirements for hazardous waste generated by conditionally exempt small quantity...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... batteries managed under the requirements of 40 CFR part 266, subpart G; or (6) Is universal waste managed... waste prior to beneficial use or reuse, or legitimate recycling or reclamation; or (vii) For universal... waste prior to beneficial use or reuse, or legitimate recycling or reclamation; or (vii) For universal...

  1. Legitimation Crisis, Transformative Teaching-Learning and Regrounding of Authority in the Roman Catholic Church

    ERIC Educational Resources Information Center

    Anweting, Livinus

    2017-01-01

    This study explores how religious education, and in particular transformative teaching and learning can provide an opportunity to re-ground authority in the Roman Catholic Church. The research presents an educational response to the legitimation crisis. It seeks to resolve the organization problem as typified in the pyramidic-hierarchical pattern…

  2. 45 CFR 2526.30 - How do convictions for the possession or sale of controlled substances affect an education award...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... trafficking of controlled substances; (F) Length of time between offenses; (G) Employment history; (H) Service... this section has successfully completed a legitimate drug rehabilitation program, or in the case of a first conviction that the individual has enrolled in a legitimate drug rehabilitation program, the...

  3. 40 CFR 261.5 - Special requirements for hazardous waste generated by conditionally exempt small quantity...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... academic entity pursuant to § 262.213. For purposes of this provision, the term eligible academic entity... waste prior to beneficial use or reuse, or legitimate recycling or reclamation; or (vii) For universal... waste prior to beneficial use or reuse, or legitimate recycling or reclamation; or (vii) For universal...

  4. 40 CFR 261.5 - Special requirements for hazardous waste generated by conditionally exempt small quantity...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... academic entity pursuant to § 262.213. For purposes of this provision, the term eligible academic entity... waste prior to beneficial use or reuse, or legitimate recycling or reclamation; or (vii) For universal... waste prior to beneficial use or reuse, or legitimate recycling or reclamation; or (vii) For universal...

  5. 40 CFR 261.5 - Special requirements for hazardous waste generated by conditionally exempt small quantity...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... academic entity pursuant to § 262.213. For purposes of this provision, the term eligible academic entity... waste prior to beneficial use or reuse, or legitimate recycling or reclamation; or (vii) For universal... waste prior to beneficial use or reuse, or legitimate recycling or reclamation; or (vii) For universal...

  6. Prevent Spam Filters from Blocking Legitimate E-Mail

    ERIC Educational Resources Information Center

    Goldsborough, Reid

    2004-01-01

    There's no question about it: Spam is a scourge. This ever-increasing torrent of unsolicited commercial mass e-mail saps productivity and, for some, threatens the very viability of e-mail. The battle against spam, unfortunately, is creating problems of its own, with people sometimes unable to send legitimate e-mail and other times unable to…

  7. "A New Life in the Countryside Awaits": Interactive Lessons in the Rural Utopia in "Farming" Simulation Games

    ERIC Educational Resources Information Center

    Cole, Matthew; Stewart, Kate

    2017-01-01

    This paper critically analyses the legitimation of exploitative human-nonhuman animal relations in online "farming" simulation games, especially the game Hay Day. The analysis contributes to a wider project of critical analyses of popular culture representations of nonhuman animals. The paper argues that legitimation is effected in Hay…

  8. Medicine as a Community of Practice: Implications for Medical Education.

    PubMed

    Cruess, Richard L; Cruess, Sylvia R; Steinert, Yvonne

    2018-02-01

    The presence of a variety of independent learning theories makes it difficult for medical educators to construct a comprehensive theoretical framework for medical education, resulting in numerous and often unrelated curricular, instructional, and assessment practices. Linked with an understanding of identity formation, the concept of communities of practice could provide such a framework, emphasizing the social nature of learning. Individuals wish to join the community, moving from legitimate peripheral to full participation, acquiring the identity of community members and accepting the community's norms.Having communities of practice as the theoretical basis of medical education does not diminish the value of other learning theories. Communities of practice can serve as the foundational theory, and other theories can provide a theoretical basis for the multiple educational activities that take place within the community, thus helping create an integrated theoretical approach.Communities of practice can guide the development of interventions to make medical education more effective and can help both learners and educators better cope with medical education's complexity. An initial step is to acknowledge the potential of communities of practice as the foundational theory. Educational initiatives that could result from this approach include adding communities of practice to the cognitive base; actively engaging students in joining the community; creating a welcoming community; expanding the emphasis on explicitly addressing role modeling, mentoring, experiential learning, and reflection; providing faculty development to support the program; and recognizing the necessity to chart progress toward membership in the community.

  9. Mobilizing collective identity to reduce HIV risk among sex workers in Sonagachi, India: The boundaries, consciousness, negotiation framework

    PubMed Central

    Ghose, Toorjo; Swendeman, Dallas; George, Sheba; Chowdhury, Debasish

    2010-01-01

    The significantly low rate of HIV infection and high rate of condom use among sex workers in Kolkata, India is partially attributable to a community-led structural intervention called the Sonagachi Project which mobilizes sex workers to engage in HIV education, formation of community-based organizations and advocacy around sex work issues. This research examines how Sonagachi Project participants mobilize collective identity and the manner in which collective identity influences condom use. Using purposive sampling methods, 46 Sonagachi Project participants were selected in 2005 for in-depth qualitative interviews. Taylor and Whittier’s (Taylor, V & Whittier, N (1992). Collective identities in social movement communities: lesbian feminist mobilization. In A. Morris & C. Mueller (Eds.) Frontiers in social movement theory. New Haven, CT: Yale University Press) model of identity-formation through boundaries, consciousness and negotiation was used to interpret results. Subjects mobilized collective identity by (1) building boundaries demarcating in-group sex workers from out-group members, (2) raising consciousness about sex work as legitimate labor and the transformative change that results from program participation, and (3) negotiating identity with out-group members. This research establishes a conceptual link between the boundaries, consciousness and negotiation framework of collective identity mobilization and condom use. Condom use among sex workers is motivated by each element of the boundaries, consciousness and negotiation model: condoms mark boundaries, enunciate the consciousness that sex with clients is legitimate labor, and help negotiate the identity of sex workers in interactions with clients. PMID:18455855

  10. Agents of the Father's law in a society of brothers: A philosophic and psychoanalytic perspective on legitimate use of violence.

    PubMed

    Even-Tzur, Efrat; Hadar, Uri

    This paper explores subjective processes of "Agents of Law" - individuals who the state grants the authority to use violence - and the dissonance stemming from the contradictory demands posed on them as legitimate users of violence despite the societal taboo against violence. A conceptual model will be offered based on two theoretical legs, Lacanian psychoanalysis and political theories of legitimacy. Specifically, psychoanalytic ideas would serve to examine unconscious processes, subject position and various identifications related to the question of "self-legitimacy" of Agents of Law. A central link between psychoanalysis and political thought is found in the image of the father and in the triad ruler-God-Father, which calls for an oedipal analysis. A psychoanalytic reading of two philosophical schools that elaborated on the question of legitimacy will be presented, and yield two analytic poles of a model for the understanding of possible subject positions of agents of Law: identification with a "Living Father" vs. identification with a "Dead Father". The psychoanalytic reading will shed light on the limitations of the philosophical perspectives in reflecting on the various (im)possible psychological positions of agents of Law. Finally, then, it will be shown how psychoanalysis helps finding words to characterize different nuances in the coping of agents of Law with the contradictory demands posed on them in an age in which God is dead, the father was murdered and the king was beheaded. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Mobilizing collective identity to reduce HIV risk among sex workers in Sonagachi, India: the boundaries, consciousness, negotiation framework.

    PubMed

    Ghose, Toorjo; Swendeman, Dallas; George, Sheba; Chowdhury, Debasish

    2008-07-01

    The significantly low rate of HIV infection and high rate of condom use among sex workers in Kolkata, India is partially attributable to a community-led structural intervention called the Sonagachi Project which mobilizes sex workers to engage in HIV education, formation of community-based organizations and advocacy around sex work issues. This research examines how Sonagachi Project participants mobilize collective identity and the manner in which collective identity influences condom use. Using purposive sampling methods, 46 Sonagachi Project participants were selected in 2005 for in-depth qualitative interviews. Taylor and Whittier's (Taylor, V & Whittier, N (1992). Collective identities in social movement communities: lesbian feminist mobilization. In A. Morris & C. Mueller (Eds.) Frontiers in social movement theory. New Haven, CT: Yale University Press) model of identity-formation through boundaries, consciousness and negotiation was used to interpret results. Subjects mobilized collective identity by (1) building boundaries demarcating in-group sex workers from out-group members, (2) raising consciousness about sex work as legitimate labor and the transformative change that results from program participation, and (3) negotiating identity with out-group members. This research establishes a conceptual link between the boundaries, consciousness and negotiation framework of collective identity mobilization and condom use. Condom use among sex workers is motivated by each element of the boundaries, consciousness and negotiation model: condoms mark boundaries, enunciate the consciousness that sex with clients is legitimate labor, and help negotiate the identity of sex workers in interactions with clients.

  12. Right-wing extremist violence among adolescents in Germany.

    PubMed

    Sitzer, Peter; Heitmeyer, Wilhelm

    2008-01-01

    What are the preconditions for right-wing extremist violence among German youths? For several years, the rate of this violence has been increasing in Germany, and the same can be observed for right-wing extremist orientations characterized by the coming together of ideologies of unequal worth and the acceptance of violence as a mode of action. And although it is emphasized that approval of and willingness to use violence do not automatically lead to actual acts of violence, this article suggests that the existence of these convictions in society helps to legitimize attitudes that become expressed in violence, in particular among youths.This article presents a five-stage process model that portrays the underlying preconditions for acts of right-wing extremist violence, the contexts in which such violence takes place, and the factors that cause it to escalate. This structural model is used to outline central empirical findings of recent German quantitative and especially qualitative studies about right-wing extremist violent offenders. For analytical reasons, the basic elements of the process model (socialization, organization, legitimation, interaction, and escalation) are treated separately. The authors also examine right-wing extremist violence from a disintegrative perspective. Given that intersubjective recognition is an existential human need, right-wing extremist violence is understood as a "productive" way of dealing with individual recognition deficits. On the basis of the integration dimensions of social disintegration theory, three fundamental recognition needs are distinguished. Right-wing extremist violence can best be explained as a consequence of recognition deficits in all three central integration dimensions.

  13. Managing Disagreement: A Defense of “Regime Bias”

    PubMed Central

    2010-01-01

    Stein Ringen’s theory of democratic purpose cannot do the work expected of it. Ringen’s own criteria oscillate between being too vague to be useful (i.e. “freedom”) or, when specified more fully, conflicting, so that almost all democracies will seem to be potentially at cross-purposes with themselves rather than their purposes or sub-purposes being mutually reinforcing. This reflects a bigger and more theoretical problem. Disagreement about the purpose of democracy is built into democracy itself. The whole point of many (perhaps all) of our democratic institutions is to arrive at conditionally legitimate decisions in spite of such disagreement. So-called regime bias, i.e. the tendency to assess democracies according to the form and stability of their institutions rather than their results or their ability to serve certain purposes, does not in fact arise from bias. It arises on the contrary from a determination to avoid the bias inherent in giving some—inevitably partisan—ideals of what democracies should do pride of place over others in a scheme of measurement or evaluation. And even a regime-based definition of democracy must itself make simplifying assumptions that elide possible normative controversies over how the democratic game is best played. Vindicating one’s preferred set of democratic ideals against alternatives is a completely legitimate enterprise and lends richness to debates within and across democracies. But it is an inherently ideological and political enterprise, not a neutral or scholarly one. PMID:21258438

  14. Practical applications of digital integrated circuits. Part 2: Minimization techniques, code conversion, flip-flops, and asynchronous circuits

    NASA Technical Reports Server (NTRS)

    1972-01-01

    Here, the 7400 line of transistor to transistor logic (TTL) devices is emphasized almost exclusively where hardware is concerned. However, it should be pointed out that the logic theory contained herein applies to all hardware. Binary numbers, simplification of logic circuits, code conversion circuits, basic flip-flop theory, details about series 54/7400, and asynchronous circuits are discussed.

  15. Quantum photonic network and physical layer security

    NASA Astrophysics Data System (ADS)

    Sasaki, Masahide; Endo, Hiroyuki; Fujiwara, Mikio; Kitamura, Mitsuo; Ito, Toshiyuki; Shimizu, Ryosuke; Toyoshima, Morio

    2017-06-01

    Quantum communication and quantum cryptography are expected to enhance the transmission rate and the security (confidentiality of data transmission), respectively. We study a new scheme which can potentially bridge an intermediate region covered by these two schemes, which is referred to as quantum photonic network. The basic framework is information theoretically secure communications in a free space optical (FSO) wiretap channel, in which an eavesdropper has physically limited access to the main channel between the legitimate sender and receiver. We first review a theoretical framework to quantify the optimal balance of the transmission efficiency and the security level under power constraint and at finite code length. We then present experimental results on channel characterization based on 10 MHz on-off keying transmission in a 7.8 km terrestrial FSO wiretap channel. This article is part of the themed issue 'Quantum technology for the 21st century'.

  16. Earthquakes in Virginia and vicinity 1774 - 2004

    USGS Publications Warehouse

    Tarr, Arthur C.; Wheeler, Russell L.

    2006-01-01

    This map summarizes two and a third centuries of earthquake activity. The seismic history consists of letters, journals, diaries, and newspaper and scholarly articles that supplement seismograph recordings (seismograms) dating from the early twentieth century to the present. All of the pre-instrumental (historical) earthquakes were large enough to be felt by people or to cause shaking damage to buildings and their contents. Later, widespread use of seismographs meant that tremors too small or distant to be felt could be detected and accurately located. Earthquakes are a legitimate concern in Virginia and parts of adjacent States. Moderate earthquakes cause slight local damage somewhere in the map area about twice a decade on the average. Additionally, many buildings in the map area were constructed before earthquake protection was added to local building codes. The large map shows all historical and instrumentally located earthquakes from 1774 through 2004.

  17. Quantum photonic network and physical layer security.

    PubMed

    Sasaki, Masahide; Endo, Hiroyuki; Fujiwara, Mikio; Kitamura, Mitsuo; Ito, Toshiyuki; Shimizu, Ryosuke; Toyoshima, Morio

    2017-08-06

    Quantum communication and quantum cryptography are expected to enhance the transmission rate and the security (confidentiality of data transmission), respectively. We study a new scheme which can potentially bridge an intermediate region covered by these two schemes, which is referred to as quantum photonic network. The basic framework is information theoretically secure communications in a free space optical (FSO) wiretap channel, in which an eavesdropper has physically limited access to the main channel between the legitimate sender and receiver. We first review a theoretical framework to quantify the optimal balance of the transmission efficiency and the security level under power constraint and at finite code length. We then present experimental results on channel characterization based on 10 MHz on-off keying transmission in a 7.8 km terrestrial FSO wiretap channel.This article is part of the themed issue 'Quantum technology for the 21st century'. © 2017 The Author(s).

  18. Substance Users’ Perspectives on Helpful and Unhelpful Confrontation: Implications for Recovery

    PubMed Central

    Polcin, Douglas; Mulia, Nina; Jones, Laura

    2011-01-01

    Substance users commonly face confrontations about their use from family, friends, peers, and professionals. Yet confrontation is controversial and not well understood. To better understand the effects of confrontation we conducted qualitative interviews with 38 substance users (82% male and 79% white) about their experiences of being confronted. Confrontation was defined as warnings about potential harm related to substance use. Results from coded transcripts indicated that helpful confrontations were those that were perceived as legitimate, offered hope and practical support, and were delivered by persons who were trusted and respected. Unhelpful confrontations were those that were perceived as hypocritical, overtly hostile, or occurring within embattled relationships. Experiences of directive, persistent confrontation varied. Limitations of the study include a small and relatively high functioning sample. We conclude that contextual factors are important in determining how confrontation is experienced. Larger studies with more diverse samples are warranted. PMID:22880542

  19. Degenerate quantum codes and the quantum Hamming bound

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sarvepalli, Pradeep; Klappenecker, Andreas

    2010-03-15

    The parameters of a nondegenerate quantum code must obey the Hamming bound. An important open problem in quantum coding theory is whether the parameters of a degenerate quantum code can violate this bound for nondegenerate quantum codes. In this article we show that Calderbank-Shor-Steane (CSS) codes, over a prime power alphabet q{>=}5, cannot beat the quantum Hamming bound. We prove a quantum version of the Griesmer bound for the CSS codes, which allows us to strengthen the Rains' bound that an [[n,k,d

  20. Processing Motion: Using Code to Teach Newtonian Physics

    NASA Astrophysics Data System (ADS)

    Massey, M. Ryan

    Prior to instruction, students often possess a common-sense view of motion, which is inconsistent with Newtonian physics. Effective physics lessons therefore involve conceptual change. To provide a theoretical explanation for concepts and how they change, the triangulation model brings together key attributes of prototypes, exemplars, theories, Bayesian learning, ontological categories, and the causal model theory. The triangulation model provides a theoretical rationale for why coding is a viable method for physics instruction. As an experiment, thirty-two adolescent students participated in summer coding academies to learn how to design Newtonian simulations. Conceptual and attitudinal data was collected using the Force Concept Inventory and the Colorado Learning Attitudes about Science Survey. Results suggest that coding is an effective means for teaching Newtonian physics.

  1. How "ought" exceeds but implies "can": Description and encouragement in moral judgment.

    PubMed

    Turri, John

    2017-11-01

    This paper tests a theory about the relationship between two important topics in moral philosophy and psychology. One topic is the function of normative language, specifically claims that one "ought" to do something. Do these claims function to describe moral responsibilities, encourage specific behavior, or both? The other topic is the relationship between saying that one "ought" to do something and one's ability to do it. In what respect, if any, does what one "ought" to do exceed what one "can" do? The theory tested here has two parts: (1) "ought" claims function to both describe responsibilities and encourage people to fulfill them (the dual-function hypothesis); (2) the two functions relate differently to ability, because the encouragement function is limited by the person's ability, but the descriptive function is not (the interaction hypothesis). If this theory is correct, then in one respect "ought implies can" is false because people have responsibilities that exceed their abilities. But in another respect "ought implies can" is legitimate because it is not worthwhile to encourage people to do things that exceed their ability. Results from two behavioral experiments support the theory that "ought" exceeds but implies "can." Results from a third experiment provide further evidence regarding an "ought" claim's primary function and how contextual features can affect the interpretation of its functions. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. Signal-processing theory for the TurboRogue receiver

    NASA Technical Reports Server (NTRS)

    Thomas, J. B.

    1995-01-01

    Signal-processing theory for the TurboRogue receiver is presented. The signal form is traced from its formation at the GPS satellite, to the receiver antenna, and then through the various stages of the receiver, including extraction of phase and delay. The analysis treats the effects of ionosphere, troposphere, signal quantization, receiver components, and system noise, covering processing in both the 'code mode' when the P code is not encrypted and in the 'P-codeless mode' when the P code is encrypted. As a possible future improvement to the current analog front end, an example of a highly digital front end is analyzed.

  3. Psychosocial Factors and Theory in Physical Activity Studies in Minorities

    PubMed Central

    Mama, Scherezade K.; McNeill, Lorna H.; McCurdy, Sheryl A.; Evans, Alexandra E.; Diamond, Pamela M.; Adamus-Leach, Heather J.; Lee, Rebecca E.

    2015-01-01

    Objectives To summarize the effectiveness of interventions targeting psychosocial factors to increase physical activity (PA) among ethnic minority adults and explore theory use in PA interventions. Methods Studies (N = 11) were identified through a systematic review and targeted African American/Hispanic adults, specific psychosocial factors, and PA. Data were extracted using a standard code sheet and the Theory Coding Scheme. Results Social support was the most common psychosocial factor reported, followed by motivational readiness, and self-efficacy, as being associated with increased PA. Only 7 studies explicitly reported using a theoretical framework. Conclusions Future efforts should explore theory use in PA interventions and how integration of theoretical constructs, including psychosocial factors, increases PA. PMID:25290599

  4. Legitimate Peripheral Participation in Communities of Practice: Participation Support Structures for Newcomers in Faculty Student Councils

    ERIC Educational Resources Information Center

    Eberle, Julia; Stegmann, Karsten; Fischer, Frank

    2014-01-01

    Participating in communities of practice (CoPs) is an important way of learning. For newcomers in such communities, the learning process can be described as legitimate peripheral participation (LPP). Although a body of knowledge on LPP has been accumulated from qualitative case studies, mostly focusing on the use of practices, the concrete…

  5. Awareness-Raising, Legitimation or Backlash? Effects of the UN Convention on the Rights of Persons with Disabilities on Education Systems in Germany

    ERIC Educational Resources Information Center

    Powell, Justin J. W.; Edelstein, Benjamin; Blanck, Jonna M.

    2016-01-01

    Global discourse about human rights, education for all, and inclusive education has altered social norms relating to dis/ability and schooling, especially through awareness-raising, by legitimating advocates' positions and by facilitating policy reforms. Affected by societal and educational change, special education systems and their participants…

  6. The Evolution of the Quality Agenda in Higher Education: The Politics of Legitimation

    ERIC Educational Resources Information Center

    Filippakou, Ourania

    2017-01-01

    Taking the evolution of the quality agenda in the UK as its centrepiece, this article analyses the politics of legitimation accompanying the emergence of quality assurance and the contribution of quality enhancement to the power play therein. This article argues that over the last 25 years the quality agenda has been used as a proxy--a state…

  7. Deconstruction and Reconstruction of Legal Education in China: Legitimacy and Diffusion of an Academic Discipline from 1949 to 2012

    ERIC Educational Resources Information Center

    Liu, Zixi; Ting, Kwok-Fai

    2017-01-01

    Using documentary data, we investigate the evolution of legal education in China from 1949 to 2012. During this period, legal education evolved from an illegitimate practice to a legitimate practice over three distinct periods of nullification, reconstruction, and rationalization. Textual data suggest that the legitimization of legal education has…

  8. The Legitimation of Black Subordination: The Impact of Color-Blind Ideology on African American Education

    ERIC Educational Resources Information Center

    Williams, Dawn G.; Land, Roderic R.

    2006-01-01

    The analysis of the critical race theorist's (CRT) perspective of the intersection of race, color-blind ideology and various African American education policies and practices show that most of the laws and policies leads to the legitimation of the African-American subordination. The author suggests that such legacy of color-blind ideologies and…

  9. A Bayesian approach to estimating variance components within a multivariate generalizability theory framework.

    PubMed

    Jiang, Zhehan; Skorupski, William

    2017-12-12

    In many behavioral research areas, multivariate generalizability theory (mG theory) has been typically used to investigate the reliability of certain multidimensional assessments. However, traditional mG-theory estimation-namely, using frequentist approaches-has limits, leading researchers to fail to take full advantage of the information that mG theory can offer regarding the reliability of measurements. Alternatively, Bayesian methods provide more information than frequentist approaches can offer. This article presents instructional guidelines on how to implement mG-theory analyses in a Bayesian framework; in particular, BUGS code is presented to fit commonly seen designs from mG theory, including single-facet designs, two-facet crossed designs, and two-facet nested designs. In addition to concrete examples that are closely related to the selected designs and the corresponding BUGS code, a simulated dataset is provided to demonstrate the utility and advantages of the Bayesian approach. This article is intended to serve as a tutorial reference for applied researchers and methodologists conducting mG-theory studies.

  10. Controlled Bidirectional Quantum Secure Direct Communication

    PubMed Central

    Chou, Yao-Hsin; Lin, Yu-Ting; Zeng, Guo-Jyun; Lin, Fang-Jhu; Chen, Chi-Yuan

    2014-01-01

    We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on the nonlocal swap gate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages. PMID:25006596

  11. What Does It Take to Produce Interpretation? Informational, Peircean, and Code-Semiotic Views on Biosemiotics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brier, Soren; Joslyn, Cliff A.

    2013-04-01

    This paper presents a critical analysis of code-semiotics, which we see as the latest attempt to create paradigmatic foundation for solving the question of the emergence of life and consciousness. We view code semiotics as a an attempt to revise the empirical scientific Darwinian paradigm, and to go beyond the complex systems, emergence, self-organization, and informational paradigms, and also the selfish gene theory of Dawkins and the Peircean pragmaticist semiotic theory built on the simultaneous types of evolution. As such it is a new and bold attempt to use semiotics to solve the problems created by the evolutionary paradigm’s commitmentmore » to produce a theory of how to connect the two sides of the Cartesian dualistic view of physical reality and consciousness in a consistent way.« less

  12. The evolution of the genetic code: Impasses and challenges.

    PubMed

    Kun, Ádám; Radványi, Ádám

    2018-02-01

    The origin of the genetic code and translation is a "notoriously difficult problem". In this survey we present a list of questions that a full theory of the genetic code needs to answer. We assess the leading hypotheses according to these criteria. The stereochemical, the coding coenzyme handle, the coevolution, the four-column theory, the error minimization and the frozen accident hypotheses are discussed. The integration of these hypotheses can account for the origin of the genetic code. But experiments are badly needed. Thus we suggest a host of experiments that could (in)validate some of the models. We focus especially on the coding coenzyme handle hypothesis (CCH). The CCH suggests that amino acids attached to RNA handles enhanced catalytic activities of ribozymes. Alternatively, amino acids without handles or with a handle consisting of a single adenine, like in contemporary coenzymes could have been employed. All three scenarios can be tested in in vitro compartmentalized systems. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. Transport and equilibrium in field-reversed mirrors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boyd, J.K.

    Two plasma models relevant to compact torus research have been developed to study transport and equilibrium in field reversed mirrors. In the first model for small Larmor radius and large collision frequency, the plasma is described as an adiabatic hydromagnetic fluid. In the second model for large Larmor radius and small collision frequency, a kinetic theory description has been developed. Various aspects of the two models have been studied in five computer codes ADB, AV, NEO, OHK, RES. The ADB code computes two dimensional equilibrium and one dimensional transport in a flux coordinate. The AV code calculates orbit average integralsmore » in a harmonic oscillator potential. The NEO code follows particle trajectories in a Hill's vortex magnetic field to study stochasticity, invariants of the motion, and orbit average formulas. The OHK code displays analytic psi(r), B/sub Z/(r), phi(r), E/sub r/(r) formulas developed for the kinetic theory description. The RES code calculates resonance curves to consider overlap regions relevant to stochastic orbit behavior.« less

  14. Toward a New Theory for Selecting Instructional Visuals.

    ERIC Educational Resources Information Center

    Croft, Richard S.; Burton, John K.

    This paper provides a rationale for the selection of illustrations and visual aids for the classroom. The theories that describe the processing of visuals are dual coding theory and cue summation theory. Concept attainment theory offers a basis for selecting which cues are relevant for any learning task which includes a component of identification…

  15. Using Program Theory-Driven Evaluation Science to Crack the Da Vinci Code

    ERIC Educational Resources Information Center

    Donaldson, Stewart I.

    2005-01-01

    Program theory-driven evaluation science uses substantive knowledge, as opposed to method proclivities, to guide program evaluations. It aspires to update, clarify, simplify, and make more accessible the evolving theory of evaluation practice commonly referred to as theory-driven or theory-based evaluation. The evaluator in this chapter provides a…

  16. Dissociation between awareness and spatial coding: evidence from unilateral neglect.

    PubMed

    Treccani, Barbara; Cubelli, Roberto; Sellaro, Roberta; Umiltà, Carlo; Della Sala, Sergio

    2012-04-01

    Prevalent theories about consciousness propose a causal relation between lack of spatial coding and absence of conscious experience: The failure to code the position of an object is assumed to prevent this object from entering consciousness. This is consistent with influential theories of unilateral neglect following brain damage, according to which spatial coding of neglected stimuli is defective, and this would keep their processing at the nonconscious level. Contrary to this view, we report evidence showing that spatial coding and consciousness can dissociate. A patient with left neglect, who was not aware of contralesional stimuli, was able to process their color and position. However, in contrast to (ipsilesional) consciously perceived stimuli, color and position of neglected stimuli were processed separately. We propose that individual object features, including position, can be processed without attention and consciousness and that conscious perception of an object depends on the binding of its features into an integrated percept.

  17. Micromechanics-Based Progressive Failure Analysis of Composite Laminates Using Different Constituent Failure Theories

    NASA Technical Reports Server (NTRS)

    Moncada, Albert M.; Chattopadhyay, Aditi; Bednarcyk, Brett A.; Arnold, Steven M.

    2008-01-01

    Predicting failure in a composite can be done with ply level mechanisms and/or micro level mechanisms. This paper uses the Generalized Method of Cells and High-Fidelity Generalized Method of Cells micromechanics theories, coupled with classical lamination theory, as implemented within NASA's Micromechanics Analysis Code with Generalized Method of Cells. The code is able to implement different failure theories on the level of both the fiber and the matrix constituents within a laminate. A comparison is made among maximum stress, maximum strain, Tsai-Hill, and Tsai-Wu failure theories. To verify the failure theories the Worldwide Failure Exercise (WWFE) experiments have been used. The WWFE is a comprehensive study that covers a wide range of polymer matrix composite laminates. The numerical results indicate good correlation with the experimental results for most of the composite layups, but also point to the need for more accurate resin damage progression models.

  18. Nonisentropic unsteady three dimensional small disturbance potential theory

    NASA Technical Reports Server (NTRS)

    Gibbons, M. D.; Whitlow, W., Jr.; Williams, M. H.

    1986-01-01

    Modifications that allow for more accurate modeling of flow fields when strong shocks are present were made into three dimensional transonic small disturbance (TSD) potential theory. The Engquist-Osher type-dependent differencing was incorporated into the solution algorithm. The modified theory was implemented in the XTRAN3S computer code. Steady flows over a rectangular wing with a constant NACA 0012 airfoil section and an aspect ratio of 12 were calculated for freestream Mach numbers (M) of 0.82, 0.84, and 0.86. The obtained results are compared using the modified and unmodified TSD theories and the results from a three dimensional Euler code are presented. Nonunique solutions in three dimensions are shown to appear for the rectangular wing as aspect ratio increases. Steady and unsteady results are shown for the RAE tailplane model at M = 0.90. Calculations using unmodified theory, modified theory and experimental data are compared.

  19. An Introduction to Quantum Theory

    NASA Astrophysics Data System (ADS)

    Greensite, Jeff

    2017-02-01

    Written in a lucid and engaging style, the author takes readers from an overview of classical mechanics and the historical development of quantum theory through to advanced topics. The mathematical aspects of quantum theory necessary for a firm grasp of the subject are developed in the early chapters, but an effort is made to motivate that formalism on physical grounds. Including animated figures and their respective Mathematica® codes, this book provides a complete and comprehensive text for students in physics, maths, chemistry and engineering needing an accessible introduction to quantum mechanics. Supplementary Mathematica codes available within Book Information

  20. Experimental validation of Mueller-Stokes theory and investigation of the influence of the Cotton-Mouton effect on polarimetry in a magnetized fusion plasma

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, J.; Peebles, W. A.; Crocker, N. A.

    Mueller-Stokes theory can be used to calculate the polarization evolution of an electromagnetic (EM) wave as it propagates through a magnetized plasma. Historically, the theory has been used to interpret polarimeter signals from systems operating on fusion plasmas. These interpretations have mostly employed approximations of Mueller-Stokes theory in regimes where either the Faraday rotation (FR) or the Cotton-Mouton (CM) effect is dominant. The current paper presents the first systematic comparison of polarimeter measurements with the predictions of full Mueller-Stokes theory where conditions transition smoothly from a FR-dominant (i.e., weak CM effect) plasma to one where the CM effect plays amore » significant role. A synthetic diagnostic code, based on Mueller-Stokes theory accurately reproduces the trends evident in the experimentally measured polarimeter phase over this entire operating range, thereby validating Mueller-Stokes theory. The synthetic diagnostic code is then used to investigate the influence of the CM effect on polarimetry measurements. As expected, the measurements are well approximated by the FR effect when the CM effect is predicted to be weak. However, the code shows that as the CM effect increases, it can compete with the FR effect in rotating the polarization of the EM-wave. This results in a reduced polarimeter response to the FR effect, just as observed in the experiment. The code also shows if sufficiently large, the CM effect can even reverse the handedness of a wave launched with circular polarization. This helps to understand the surprising experimental observations that the sensitivity to the FR effect can be nearly eliminated at high enough B{sub T} (2.0 T). The results also suggest that the CM effect on the plasma midplane can be exploited to potentially measure magnetic shear in tokamak plasmas. These results establish increased confidence in the use of such a synthetic diagnostic code to guide future polarimetry design and interpret the resultant experimental data.« less

  1. A language of health in action: Read Codes, classifications and groupings.

    PubMed Central

    Stuart-Buttle, C. D.; Read, J. D.; Sanderson, H. F.; Sutton, Y. M.

    1996-01-01

    A cornerstone of the Information Management and Technology Strategy of the National Health Service's (NHS) Executive is fully operational, person-based clinical information systems, from which flow all of the data needed for direct and indirect care of patients by healthcare providers, and local and national management of the NHS. The currency of these data flows are firstly Read-coded clinical terms, secondly the classifications, the International, Classification of Disease and Health Related Problems, 10th Revision (ICD-10) and The Office of Population Censuses and Surveys Classification of Surgical Operations and Procedures, 4th Revision (OPCS-4), and thirdly Healthcare Resource Groups and Health Benefit Groups, all of which together are called the "language of health", an essential element of the electronic clinical record. This paper briefly describes the three main constituents of the language, and how, together with person-based, fully operational clinical information systems, it enables more effective and efficient healthcare delivery. It also describes how the remaining projects of the IM&T Strategy complete the key components necessary to provide the systems that will enable the flow of person-based data, collected once at the point of care and shared amongst all legitimate users via the electronic patient record. PMID:8947631

  2. Error Correcting Codes and Related Designs

    DTIC Science & Technology

    1990-09-30

    Theory, IT-37 (1991), 1222-1224. 6. Codes and designs, existence and uniqueness, Discrete Math ., to appear. 7. (with R. Brualdi and N. Cai), Orphan...structure of the first order Reed-Muller codes, Discrete Math ., to appear. 8. (with J. H. Conway and N.J.A. Sloane), The binary self-dual codes of length up...18, 1988. 4. "Codes and Designs," Mathematics Colloquium, Technion, Haifa, Israel, March 6, 1989. 5. "On the Covering Radius of Codes," Discrete Math . Group

  3. Ambiguities and Tensions in English Language Teaching: Portraits of EFL Teachers as Legitimate Speakers. ESL & Applied Linguistics Professional Series

    ERIC Educational Resources Information Center

    Sayer, Peter

    2012-01-01

    The central theme of this book is the ambiguities and tensions teachers face as they attempt to position themselves in ways that legitimize them as language teachers, and as English speakers. Focusing on three EFL teachers and their schools in the southern Mexican state of Oaxaca, it documents how ordinary practices of language educators are…

  4. "Sitting Alone in the Staffroom Contemplating My Future": Communities of Practice, Legitimate Peripheral Participation and Student Teachers' Experiences of Problematic School Placements as Guests

    ERIC Educational Resources Information Center

    Johnston, David H.

    2016-01-01

    A recent Review of Teacher Education in Scotland reports that 23% of respondents (n = 2381) encountered variable or very poor school placement experiences. This paper uses Lave and Wenger's ideas concerning Communities of Practice (1998) and Legitimate Peripheral Participation (1991) as analytical tools with which to understand the nature and…

  5. Evaluating gambles using dynamics

    NASA Astrophysics Data System (ADS)

    Peters, O.; Gell-Mann, M.

    2016-02-01

    Gambles are random variables that model possible changes in wealth. Classic decision theory transforms money into utility through a utility function and defines the value of a gamble as the expectation value of utility changes. Utility functions aim to capture individual psychological characteristics, but their generality limits predictive power. Expectation value maximizers are defined as rational in economics, but expectation values are only meaningful in the presence of ensembles or in systems with ergodic properties, whereas decision-makers have no access to ensembles, and the variables representing wealth in the usual growth models do not have the relevant ergodic properties. Simultaneously addressing the shortcomings of utility and those of expectations, we propose to evaluate gambles by averaging wealth growth over time. No utility function is needed, but a dynamic must be specified to compute time averages. Linear and logarithmic "utility functions" appear as transformations that generate ergodic observables for purely additive and purely multiplicative dynamics, respectively. We highlight inconsistencies throughout the development of decision theory, whose correction clarifies that our perspective is legitimate. These invalidate a commonly cited argument for bounded utility functions.

  6. A further extension of the Extended Parallel Process Model (E-EPPM): implications of cognitive appraisal theory of emotion and dispositional coping style.

    PubMed

    So, Jiyeon

    2013-01-01

    For two decades, the extended parallel process model (EPPM; Witte, 1992 ) has been one of the most widely used theoretical frameworks in health risk communication. The model has gained much popularity because it recognizes that, ironically, preceding fear appeal models do not incorporate the concept of fear as a legitimate and central part of them. As a remedy to this situation, the EPPM aims at "putting the fear back into fear appeals" ( Witte, 1992 , p. 330). Despite this attempt, however, this article argues that the EPPM still does not fully capture the essence of fear as an emotion. Specifically, drawing upon Lazarus's (1991 ) cognitive appraisal theory of emotion and the concept of dispositional coping style ( Miller, 1995 ), this article seeks to further extend the EPPM. The revised EPPM incorporates a more comprehensive perspective on risk perceptions as a construct involving both cognitive and affective aspects (i.e., fear and anxiety) and integrates the concept of monitoring and blunting coping style as a moderator of further information seeking regarding a given risk topic.

  7. Kink dynamics in a topological φ4 lattice

    NASA Astrophysics Data System (ADS)

    Adib, A. B.; Almeida, C. A. S.

    2001-09-01

    Recently proposed was a discretization for nonlinear Klein-Gordon field theories in which the resulting lattice preserves the topological (Bogomol'nyi) lower bound on the kink energy and, as a consequence, has no Peierls-Nabarro barrier even for large spatial discretizations (h~1.0). It was then suggested that these ``topological discrete systems'' are a natural choice for the numerical study of continuum kink dynamics. Giving particular emphasis to the φ4 theory, we numerically investigate kink-antikink scattering and breather formation in these topological lattices. Our results indicate that, even though these systems are quite accurate for studying free kinks in coarse lattices, for legitimate dynamical kink problems the accuracy is rather restricted to fine lattices (h~0.1). We suggest that this fact is related to the breaking of the Bogomol'nyi bound during the kink-antikink interaction, where the field profile loses its static property as required by the Bogomol'nyi argument. We conclude, therefore, that these lattices are not suitable for the study of more general kink dynamics, since a standard discretization is simpler and has effectively the same accuracy for such resolutions.

  8. The design of dual-mode complex signal processors based on quadratic modular number codes

    NASA Astrophysics Data System (ADS)

    Jenkins, W. K.; Krogmeier, J. V.

    1987-04-01

    It has been known for a long time that quadratic modular number codes admit an unusual representation of complex numbers which leads to complete decoupling of the real and imaginary channels, thereby simplifying complex multiplication and providing error isolation between the real and imaginary channels. This paper first presents a tutorial review of the theory behind the different types of complex modular rings (fields) that result from particular parameter selections, and then presents a theory for a 'dual-mode' complex signal processor based on the choice of augmented power-of-2 moduli. It is shown how a diminished-1 binary code, used by previous designers for the realization of Fermat number transforms, also leads to efficient realizations for dual-mode complex arithmetic for certain augmented power-of-2 moduli. Then a design is presented for a recursive complex filter based on a ROM/ACCUMULATOR architecture and realized in an augmented power-of-2 quadratic code, and a computer-generated example of a complex recursive filter is shown to illustrate the principles of the theory.

  9. Puzzling the Picture Using Grounded Theory

    ERIC Educational Resources Information Center

    Bennett, Elisabeth E.

    2016-01-01

    Since the first publication by Glaser and Strauss in 1967, Grounded Theory has become a highly influential research approach in the social sciences. The approach provides techniques and coding strategies for building theory inductively from the "ground up" as concepts within the data earn relevance into an evolving substantive theory.…

  10. Hegemonic masculinity: combining theory and practice in gender interventions

    PubMed Central

    Jewkes, Rachel; Morrell, Robert; Hearn, Jeff; Lundqvist, Emma; Blackbeard, David; Lindegger, Graham; Quayle, Michael; Sikweyiya, Yandisa; Gottzén, Lucas

    2015-01-01

    The concept of hegemonic masculinity has been used in gender studies since the early-1980s to explain men’s power over women. Stressing the legitimating power of consent (rather than crude physical or political power to ensure submission), it has been used to explain men’s health behaviours and the use of violence. Gender activists and others seeking to change men’s relations with women have mobilised the concept of hegemonic masculinity in interventions, but the links between gender theory and activism have often not been explored. The translation of ‘hegemonic masculinity’ into interventions is little examined. We show how, in South Africa and Sweden, the concept has been used to inform theoretically-based gender interventions and to ensure that men are brought into broader social efforts to build gender equity. We discuss the practical translational challenges of using gender theory broadly, and hegemonic masculinity in particular, in a Swedish case study, of the intervention Machofabriken [The Macho Factory], and illustrate how the concept is brought to life in this activist work with men. The concept has considerable practical application in developing a sustainable praxis of theoretically grounded interventions that are more likely to have enduring effect, but evaluating broader societal change in hegemonic masculinity remains an enduring challenge. PMID:26680535

  11. Hegemonic masculinity: combining theory and practice in gender interventions.

    PubMed

    Jewkes, Rachel; Morrell, Robert; Hearn, Jeff; Lundqvist, Emma; Blackbeard, David; Lindegger, Graham; Quayle, Michael; Sikweyiya, Yandisa; Gottzén, Lucas

    2015-01-01

    The concept of hegemonic masculinity has been used in gender studies since the early-1980s to explain men's power over women. Stressing the legitimating power of consent (rather than crude physical or political power to ensure submission), it has been used to explain men's health behaviours and the use of violence. Gender activists and others seeking to change men's relations with women have mobilised the concept of hegemonic masculinity in interventions, but the links between gender theory and activism have often not been explored. The translation of 'hegemonic masculinity' into interventions is little examined. We show how, in South Africa and Sweden, the concept has been used to inform theoretically-based gender interventions and to ensure that men are brought into broader social efforts to build gender equity. We discuss the practical translational challenges of using gender theory broadly, and hegemonic masculinity in particular, in a Swedish case study, of the intervention Machofabriken [The Macho Factory], and illustrate how the concept is brought to life in this activist work with men. The concept has considerable practical application in developing a sustainable praxis of theoretically grounded interventions that are more likely to have enduring effect, but evaluating broader societal change in hegemonic masculinity remains an enduring challenge.

  12. Strengthening safety compliance in nuclear power operations: a role-based approach.

    PubMed

    Martínez-Córcoles, Mario; Gracia, Francisco J; Tomás, Inés; Peiró, José M

    2014-07-01

    Safety compliance is of paramount importance in guaranteeing the safe running of nuclear power plants. However, it depends mostly on procedures that do not always involve the safest outcomes. This article introduces an empirical model based on the organizational role theory to analyze the influence of legitimate sources of expectations (procedures formalization and leadership) on workers' compliance behaviors. The sample was composed of 495 employees from two Spanish nuclear power plants. Structural equation analysis showed that, in spite of some problematic effects of proceduralization (such as role conflict and role ambiguity), procedure formalization along with an empowering leadership style lead to safety compliance by clarifying a worker's role in safety. Implications of these findings for safety research are outlined, as well as their practical implications. © 2014 Society for Risk Analysis.

  13. Non-Scientific Criteria for Belief Sustain Counter-Scientific Beliefs.

    PubMed

    Metz, S Emlen; Weisberg, Deena S; Weisberg, Michael

    2018-02-01

    Why is evolutionary theory controversial among members of the American public? We propose a novel explanation: allegiance to different criteria for belief. In one interview study, two online surveys, and one nationally representative phone poll, we found that evolutionists and creationists take different justifications for belief as legitimate. Those who accept evolution emphasize empirical evidence and scientific consensus. Creationists emphasize not only the Bible and religious authority, but also knowledge of the heart. These criteria for belief remain predictive of views about evolution even when taking into account other related factors like religion, political affiliation, and education. Each view is supported by its own internally specified criteria for what constitutes a justified belief. Changing minds may thus require changing epistemic norms. Copyright © 2018 Cognitive Science Society, Inc.

  14. Alibis for Adult Play

    PubMed Central

    2017-01-01

    The social meanings of play sit at odds with norms of responsible and productive adult conduct. To be “caught” playing as an adult therefore risks embarrassment. Still, many designers want to create enjoyable, nonembarrassing play experiences for adults. To address this need, this article reads instances of spontaneous adult play through the lens of Erving Goffman’s theory of the interaction order to unpack conditions and strategies for nonembarrassing adult play. It identifies established frames, segregated audiences, scripts supporting smooth performance, managing audience awareness, role distancing, and, particularly, alibis for play: Adults routinely provide alternative, adult-appropriate motives to account for their play, such as child care, professional duties, creative expression, or health. Once legitimized, the norms and rules of play themselves then provide an alibi for behavior that would risk being embarrassing outside play. PMID:29706842

  15. Coupled 2-dimensional cascade theory for noise an d unsteady aerodynamics of blade row interaction in turbofans. Volume 2: Documentation for computer code CUP2D

    NASA Technical Reports Server (NTRS)

    Hanson, Donald B.

    1994-01-01

    A two dimensional linear aeroacoustic theory for rotor/stator interaction with unsteady coupling was derived and explored in Volume 1 of this report. Computer program CUP2D has been written in FORTRAN embodying the theoretical equations. This volume (Volume 2) describes the structure of the code, installation and running, preparation of the input file, and interpretation of the output. A sample case is provided with printouts of the input and output. The source code is included with comments linking it closely to the theoretical equations in Volume 1.

  16. Nectar replenishment maintains the neutral effects of nectar robbing on female reproductive success of Salvia przewalskii (Lamiaceae), a plant pollinated and robbed by bumble bees

    PubMed Central

    Ye, Zhong-Ming; Jin, Xiao-Fang; Inouye, David W.

    2017-01-01

    Background and Aims It has been suggested that the dynamics of nectar replenishment could differ for flowers after being nectar robbed or visited legitimately, but further experimental work is needed to investigate this hypothesis. This study aimed to assess the role of nectar replenishment in mediating the effects of nectar robbing on pollinator behaviour and plant reproduction. Methods Plant–robber–pollinator interactions in an alpine plant, Salvia przewalskii, were studied. It is pollinated by long-tongued Bombus religiosus and short-tongued B. friseanus, but robbed by B. friseanus. Nectar production rates for flowers after they were either robbed or legitimately visited were compared, and three levels of nectar robbing were created to detect the effects of nectar robbing on pollinator behaviour and plant reproduction. Key Results Nectar replenishment did not differ between flowers that had been robbed or legitimately visited. Neither fruit set nor seed set was significantly affected by nectar robbing. In addition, nectar robbing did not significantly affect visitation rate, flowers visited within a plant per foraging bout, or flower handling time of the legitimate pollinators. However, a tendency for a decrease in relative abundance of the pollinator B. religiosus with an increase of nectar robbing was found. Conclusions Nectar robbing did not affect female reproductive success because nectar replenishment ensures that pollinators maintain their visiting activity to nectar-robbed flowers. Nectar replenishment might be a defence mechanism against nectar robbing to enhance reproductive fitness by maintaining attractiveness to pollinators. Further studies are needed to reveal the potential for interference competition among bumble bees foraging as robbers and legitimate visitors, and to investigate variation of nectar robbing in communities with different bumble bee species composition. PMID:28158409

  17. Processing of visually presented clock times.

    PubMed

    Goolkasian, P; Park, D C

    1980-11-01

    The encoding and representation of visually presented clock times was investigated in three experiments utilizing a comparative judgment task. Experiment 1 explored the effects of comparing times presented in different formats (clock face, digit, or word), and Experiment 2 examined angular distance effects created by varying positions of the hands on clock faces. In Experiment 3, encoding and processing differences between clock faces and digitally presented times were directly measured. Same/different reactions to digitally presented times were faster than to times presented on a clock face, and this format effect was found to be a result of differences in processing that occurred after encoding. Angular separation also had a limited effect on processing. The findings are interpreted within the framework of theories that refer to the importance of representational codes. The applicability to the data of Bank's semantic-coding theory, Paivio's dual-coding theory, and the levels-of-processing view of memory are discussed.

  18. Life is physics and chemistry and communication.

    PubMed

    Witzany, Guenther

    2015-04-01

    Manfred Eigen extended Erwin Schroedinger's concept of "life is physics and chemistry" through the introduction of information theory and cybernetic systems theory into "life is physics and chemistry and information." Based on this assumption, Eigen developed the concepts of quasispecies and hypercycles, which have been dominant in molecular biology and virology ever since. He insisted that the genetic code is not just used metaphorically: it represents a real natural language. However, the basics of scientific knowledge changed dramatically within the second half of the 20th century. Unfortunately, Eigen ignored the results of the philosophy of science discourse on essential features of natural languages and codes: a natural language or code emerges from populations of living agents that communicate. This contribution will look at some of the highlights of this historical development and the results relevant for biological theories about life. © 2014 New York Academy of Sciences.

  19. (Why) should we require consent to participation in research?

    PubMed Central

    Wertheimer, Alan

    2014-01-01

    It is widely accepted that informed consent is a requirement of ethical biomedical research. It is less clear why this is so. As an argumentative strategy the article asks whether it would be legitimate for the state to require people to participate in research. This article argues that the consent requirement cannot be defended by appeal to any simple principle, such as not treating people merely as a means, bodily integrity, and autonomy. As an argumentative strategy the article asks whether it would be legitimate for the state to require people to participate in research. I argue that while it would be legitimate and potentially justifiable to coerce people to participate in research as a matter of first-order moral principles, there are good reasons to adopt a general prohibition on coercive participation as a matter of second-order morality. PMID:25937932

  20. Entropy-Based Bounds On Redundancies Of Huffman Codes

    NASA Technical Reports Server (NTRS)

    Smyth, Padhraic J.

    1992-01-01

    Report presents extension of theory of redundancy of binary prefix code of Huffman type which includes derivation of variety of bounds expressed in terms of entropy of source and size of alphabet. Recent developments yielded bounds on redundancy of Huffman code in terms of probabilities of various components in source alphabet. In practice, redundancies of optimal prefix codes often closer to 0 than to 1.

  1. Nursing as concrete philosophy, Part I: Risjord on nursing knowledge.

    PubMed

    Theodoridis, Kyriakos

    2018-04-01

    This essay addresses the problem of the essentiality of nursing knowledge and what kind of theory, if any, is essential to nursing practice. The overarching aim of the essay was to argue for the thesis that nursing may be described as a kind of philosophical activity, and, consequently, that philosophy is the kind of "theory" that is essential to nursing practice and to the nursing discipline at large. The essay consists of two papers. The present paper, Part I, is a critical examination of Mark Risjord's discussion of the problem of the theory-practice gap in his Nursing Knowledge: Practice, Science, Philosophy, from 2010. According to Risjord, the cause of the theory-practice gap originates in an erroneous conception of science (logical positivism) which had a decisive influence upon the way nursing scholars appropriated theoretical frameworks for the nursing discipline. This philosophical influence is considered in effect to have generated the theory-practice gap. In order to bridge the gap, Risjord suggests, the nursing discipline needs to adopt a standpoint epistemology conjoined with a postpositivist conception of scientific theory. In this way, a legitimate brand of nursing science may be developed and the theory-practice gap overcome. I will argue that neither Risjord's diagnosis of the problem, nor his recommended cure, may succeed in rescuing the nursing discipline from the theory-practice gap. Rather, the real cause of the theory-practice gap, I will claim, derives from an erroneous conception of nursing (not of science), namely the conception of nursing as a kind of science (roughly speaking). On my view, to overcome the gap, the nursing discipline needs to make salient the inherently philosophical character of nursing. In the second paper (Part II), I will continue the discussion of nursing knowledge and delineate the thesis of nursing as a kind of concrete philosophy. © 2017 John Wiley & Sons Ltd.

  2. Establishing the Legitimacy of a School's Claim to Be "International": The Provision of an International Curriculum as the Institutional Primary Task

    ERIC Educational Resources Information Center

    Bunnell, Tristan; Fertig, Michael; James, Chris

    2017-01-01

    The recent growth in the number and diversity of schools around the world classified as "International Schools" raises questions about what makes a school's claim to be an International School legitimate. From the analysis we report here, the provision of an international curriculum emerges as what a school must do to be legitimate as an…

  3. Diplomatic Counterterrorist Deterrence: Moving beyond Military Means

    DTIC Science & Technology

    2015-08-01

    diplo- macy, nation building , and local cultural/political partnerships, which would allow a legitimate vision and alternative to terrorist pathways...who “systemati- cally combed through both open and classified data on jihadists and would-be jihadists around the world,” concluding that “al-Qaeda...Strategies that legitimize the governments of afflicted nations and build societies that no longer allow freedom of movement to terrorist groups offer long

  4. Deterrence and WMD Terrorism: Calibrating Its Potential Contributions to Risk Reduction

    DTIC Science & Technology

    2007-06-01

    ideology and aspiration (so-called franchisees ) • operational enablers (financiers etc.) • moral legitimizers • state sponsors • passive state...of al Qaeda • groups affiliated by ideology and aspiration (so-called franchisees ) • operational enablers (financiers etc.) • moral legitimizers...of deterrence.14 One is “deterrence by the threat of punishment,” which compels the adversary to try to calculate whether the potential benefits of

  5. Institutionalizing Telemedicine Applications: The Challenge of Legitimizing Decision-Making

    PubMed Central

    Lettieri, Emanuele

    2011-01-01

    During the last decades a variety of telemedicine applications have been trialed worldwide. However, telemedicine is still an example of major potential benefits that have not been fully attained. Health care regulators are still debating why institutionalizing telemedicine applications on a large scale has been so difficult and why health care professionals are often averse or indifferent to telemedicine applications, thus preventing them from becoming part of everyday clinical routines. We believe that the lack of consolidated procedures for supporting decision making by health care regulators is a major weakness. We aim to further the current debate on how to legitimize decision making about the institutionalization of telemedicine applications on a large scale. We discuss (1) three main requirements— rationality, fairness, and efficiency—that should underpin decision making so that the relevant stakeholders perceive them as being legitimate, and (2) the domains and criteria for comparing and assessing telemedicine applications—benefits and sustainability. According to these requirements and criteria, we illustrate a possible reference process for legitimate decision making about which telemedicine applications to implement on a large scale. This process adopts the health care regulators’ perspective and is made up of 2 subsequent stages, in which a preliminary proposal and then a full proposal are reviewed. PMID:21955510

  6. Institutionalizing telemedicine applications: the challenge of legitimizing decision-making.

    PubMed

    Zanaboni, Paolo; Lettieri, Emanuele

    2011-09-28

    During the last decades a variety of telemedicine applications have been trialed worldwide. However, telemedicine is still an example of major potential benefits that have not been fully attained. Health care regulators are still debating why institutionalizing telemedicine applications on a large scale has been so difficult and why health care professionals are often averse or indifferent to telemedicine applications, thus preventing them from becoming part of everyday clinical routines. We believe that the lack of consolidated procedures for supporting decision making by health care regulators is a major weakness. We aim to further the current debate on how to legitimize decision making about the institutionalization of telemedicine applications on a large scale. We discuss (1) three main requirements--rationality, fairness, and efficiency--that should underpin decision making so that the relevant stakeholders perceive them as being legitimate, and (2) the domains and criteria for comparing and assessing telemedicine applications--benefits and sustainability. According to these requirements and criteria, we illustrate a possible reference process for legitimate decision making about which telemedicine applications to implement on a large scale. This process adopts the health care regulators' perspective and is made up of 2 subsequent stages, in which a preliminary proposal and then a full proposal are reviewed.

  7. Fleshing out vulnerability.

    PubMed

    Tavaglione, Nicolas; Martin, Angela K; Mezger, Nathalie; Durieux-Paillard, Sophie; François, Anne; Jackson, Yves; Hurst, Samia A

    2015-02-01

    In the literature on medical ethics, it is generally admitted that vulnerable persons or groups deserve special attention, care or protection. One can define vulnerable persons as those having a greater likelihood of being wronged - that is, of being denied adequate satisfaction of certain legitimate claims. The conjunction of these two points entails what we call the Special Protection Thesis. It asserts that persons with a greater likelihood of being denied adequate satisfaction of their legitimate claims deserve special attention, care or protection. Such a thesis remains vague, however, as long as we do not know what legitimate claims are. This article aims at dispelling this vagueness by exploring what claims we have in relation to health care - thus fleshing out a claim-based conception of vulnerability. We argue that the Special Protection Thesis must be enriched as follows: If individual or group X has a greater likelihood of being denied adequate satisfaction of some of their legitimate claims to (i) physical integrity, (ii) autonomy, (iii) freedom, (iv) social provision, (v) impartial quality of government, (vi) social bases of self-respect or (vii) communal belonging, then X deserves special attention, care or protection. With this improved understanding of vulnerability, vulnerability talk in healthcare ethics can escape vagueness and serve as an adequate basis for practice. © 2013 John Wiley & Sons Ltd.

  8. Inclusion of the fitness sharing technique in an evolutionary algorithm to analyze the fitness landscape of the genetic code adaptability.

    PubMed

    Santos, José; Monteagudo, Ángel

    2017-03-27

    The canonical code, although prevailing in complex genomes, is not universal. It was shown the canonical genetic code superior robustness compared to random codes, but it is not clearly determined how it evolved towards its current form. The error minimization theory considers the minimization of point mutation adverse effect as the main selection factor in the evolution of the code. We have used simulated evolution in a computer to search for optimized codes, which helps to obtain information about the optimization level of the canonical code in its evolution. A genetic algorithm searches for efficient codes in a fitness landscape that corresponds with the adaptability of possible hypothetical genetic codes. The lower the effects of errors or mutations in the codon bases of a hypothetical code, the more efficient or optimal is that code. The inclusion of the fitness sharing technique in the evolutionary algorithm allows the extent to which the canonical genetic code is in an area corresponding to a deep local minimum to be easily determined, even in the high dimensional spaces considered. The analyses show that the canonical code is not in a deep local minimum and that the fitness landscape is not a multimodal fitness landscape with deep and separated peaks. Moreover, the canonical code is clearly far away from the areas of higher fitness in the landscape. Given the non-presence of deep local minima in the landscape, although the code could evolve and different forces could shape its structure, the fitness landscape nature considered in the error minimization theory does not explain why the canonical code ended its evolution in a location which is not an area of a localized deep minimum of the huge fitness landscape.

  9. Implications of Information Theory for Computational Modeling of Schizophrenia.

    PubMed

    Silverstein, Steven M; Wibral, Michael; Phillips, William A

    2017-10-01

    Information theory provides a formal framework within which information processing and its disorders can be described. However, information theory has rarely been applied to modeling aspects of the cognitive neuroscience of schizophrenia. The goal of this article is to highlight the benefits of an approach based on information theory, including its recent extensions, for understanding several disrupted neural goal functions as well as related cognitive and symptomatic phenomena in schizophrenia. We begin by demonstrating that foundational concepts from information theory-such as Shannon information, entropy, data compression, block coding, and strategies to increase the signal-to-noise ratio-can be used to provide novel understandings of cognitive impairments in schizophrenia and metrics to evaluate their integrity. We then describe more recent developments in information theory, including the concepts of infomax, coherent infomax, and coding with synergy, to demonstrate how these can be used to develop computational models of schizophrenia-related failures in the tuning of sensory neurons, gain control, perceptual organization, thought organization, selective attention, context processing, predictive coding, and cognitive control. Throughout, we demonstrate how disordered mechanisms may explain both perceptual/cognitive changes and symptom emergence in schizophrenia. Finally, we demonstrate that there is consistency between some information-theoretic concepts and recent discoveries in neurobiology, especially involving the existence of distinct sites for the accumulation of driving input and contextual information prior to their interaction. This convergence can be used to guide future theory, experiment, and treatment development.

  10. Some partial-unit-memory convolutional codes

    NASA Technical Reports Server (NTRS)

    Abdel-Ghaffar, K.; Mceliece, R. J.; Solomon, G.

    1991-01-01

    The results of a study on a class of error correcting codes called partial unit memory (PUM) codes are presented. This class of codes, though not entirely new, has until now remained relatively unexplored. The possibility of using the well developed theory of block codes to construct a large family of promising PUM codes is shown. The performance of several specific PUM codes are compared with that of the Voyager standard (2, 1, 6) convolutional code. It was found that these codes can outperform the Voyager code with little or no increase in decoder complexity. This suggests that there may very well be PUM codes that can be used for deep space telemetry that offer both increased performance and decreased implementational complexity over current coding systems.

  11. hi-class: Horndeski in the Cosmic Linear Anisotropy Solving System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zumalacárregui, Miguel; Bellini, Emilio; Sawicki, Ignacy

    We present the public version of hi-class (www.hiclass-code.net), an extension of the Boltzmann code CLASS to a broad ensemble of modifications to general relativity. In particular, hi-class can calculate predictions for models based on Horndeski's theory, which is the most general scalar-tensor theory described by second-order equations of motion and encompasses any perfect-fluid dark energy, quintessence, Brans-Dicke, f ( R ) and covariant Galileon models. hi-class has been thoroughly tested and can be readily used to understand the impact of alternative theories of gravity on linear structure formation as well as for cosmological parameter extraction.

  12. Universe or Multiverse?

    NASA Astrophysics Data System (ADS)

    Carr, Bernard

    2009-08-01

    Part I. Overviews: 1. Introduction and overview Bernard Carr; 2. Living in the multiverse Steven Weinberg; 3. Enlightenment, knowledge, ignorance, temptation Frank Wilczek; Part II. Cosmology and Astrophysics: 4. Cosmology and the multiverse Martin J. Rees; 5. The anthropic principle revisited Bernard Carr; 6. Cosmology from the top down Stephen Hawking; 7. The multiverse hierarchy Max Tegmark; 8. The inflationary universe Andrei Linde; 9. A model of anthropic reasoning: the dark to ordinary matter ratio Frank Wilczek; 10. Anthropic predictions: the case of the cosmological constant Alexander Vilenkin; 11. The definition and classification of universes James D. Bjorken; 12. M/string theory and anthropic reasoning Renata Kallosh; 13. The anthropic principle, dark energy and the LHC Savas Dimopoulos and Scott Thomas; Part III. Particle Physics and Quantum Theory: 14. Quarks, electrons and atoms in closely related universes Craig J. Hogan; 15. The fine-tuning problems of particle physics and anthropic mechanisms John F. Donoghue; 16. The anthropic landscape of string theory Leonard Susskind; 17. Cosmology and the many worlds interpretation of quantum mechanics Viatcheslav Mukhanov; 18. Anthropic reasoning and quantum cosmology James B. Hartle; 19. Micro-anthropic principle for quantum theory Brandon Carter; Part IV. More General Philosophical Issues: 20. Scientific alternatives to the anthropic principle Lee Smolin; 21. Making predictions in a multiverse: conundrums, dangers, coincidences Anthony Aguirre; 22. Multiverses: description, uniqueness and testing George Ellis; 23. Predictions and tests of multiverse theories Don N. Page; 24. Observation selection theory and cosmological fine-tuning Nick Bostrom; 25. Are anthropic arguments, involving multiverses and beyond, legitimate? William R. Stoeger; 26. The multiverse hypothesis: a theistic perspective Robin Collins; 27. Living in a simulated universe John D. Barrow; 28. Universes galore: where will it all end? Paul Davies; Index.

  13. Momentary patterns of covariation between specific affects and interpersonal behavior: Linking relationship science and personality assessment.

    PubMed

    Ross, Jaclyn M; Girard, Jeffrey M; Wright, Aidan G C; Beeney, Joseph E; Scott, Lori N; Hallquist, Michael N; Lazarus, Sophie A; Stepp, Stephanie D; Pilkonis, Paul A

    2017-02-01

    Relationships are among the most salient factors affecting happiness and wellbeing for individuals and families. Relationship science has identified the study of dyadic behavioral patterns between couple members during conflict as an important window in to relational functioning with both short-term and long-term consequences. Several methods have been developed for the momentary assessment of behavior during interpersonal transactions. Among these, the most popular is the Specific Affect Coding System (SPAFF), which organizes social behavior into a set of discrete behavioral constructs. This study examines the interpersonal meaning of the SPAFF codes through the lens of interpersonal theory, which uses the fundamental dimensions of Dominance and Affiliation to organize interpersonal behavior. A sample of 67 couples completed a conflict task, which was video recorded and coded using SPAFF and a method for rating momentary interpersonal behavior, the Continuous Assessment of Interpersonal Dynamics (CAID). Actor partner interdependence models in a multilevel structural equation modeling framework were used to study the covariation of SPAFF codes and CAID ratings. Results showed that a number of SPAFF codes had clear interpersonal signatures, but many did not. Additionally, actor and partner effects for the same codes were strongly consistent with interpersonal theory's principle of complementarity. Thus, findings reveal points of convergence and divergence in the 2 systems and provide support for central tenets of interpersonal theory. Future directions based on these initial findings are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  14. Exploring the Lived Experiences of Participants in Simulation-Based Learning Activities

    ERIC Educational Resources Information Center

    Beard, Rachael

    2013-01-01

    There is currently a small body of research on the experiences of participants, both facilitators and learners, during simulated mock codes (cardiac arrest) in the healthcare setting. This study was based on a practitioner's concerns that mock codes are facilitated differently among educators, mock codes are not aligned with andragogy theory of…

  15. Tracking Holland Interest Codes: The Case of South African Field Guides

    ERIC Educational Resources Information Center

    Watson, Mark B.; Foxcroft, Cheryl D.; Allen, Lynda J.

    2007-01-01

    Holland believes that specific personality types seek out matching occupational environments and his theory codes personality and environment according to a six letter interest typology. Since 1985 there have been numerous American studies that have queried the validity of Holland's coding system. Research in South Africa is scarcer, despite…

  16. Monte Carol-based validation of neutronic methodology for EBR-II analyses

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liaw, J.R.; Finck, P.J.

    1993-01-01

    The continuous-energy Monte Carlo code VIM (Ref. 1) has been validated extensively over the years against fast critical experiments and other neutronic analysis codes. A high degree of confidence in VIM for predicting reactor physics parameters has been firmly established. This paper presents a numerical validation of two conventional multigroup neutronic analysis codes, DIF3D (Ref. 4) and VARIANT (Ref. 5), against VIM for two Experimental Breeder Reactor II (EBR-II) core loadings in detailed three-dimensional hexagonal-z geometry. The DIF3D code is based on nodal diffusion theory, and it is used in calculations for day-today reactor operations, whereas the VARIANT code ismore » based on nodal transport theory and is used with increasing frequency for specific applications. Both DIF3D and VARIANT rely on multigroup cross sections generated from ENDF/B-V by the ETOE-2/MC[sup 2]-II/SDX (Ref. 6) code package. Hence, this study also validates the multigroup cross-section processing methodology against the continuous-energy approach used in VIM.« less

  17. Numerical Methods for Analysis of Charged Vacancy Diffusion in Dielectric Solids

    DTIC Science & Technology

    2006-12-01

    theory for charged vacancy diffusion in elastic dielectric materials is formulated and implemented numerically in a finite difference code. The...one of the co-authors on neutral vacancy kinetics (Grinfeld and Hazzledine, 1997). The theory is implemented numerically in a finite difference code...accuracy of order ( )2x∆ , using a finite difference approximation (Hoffman, 1992) for the second spatial derivative of φ : ( )21 1 0ˆ2 /i i i i Rxφ

  18. The neuromodulator of exploration: A unifying theory of the role of dopamine in personality

    PubMed Central

    DeYoung, Colin G.

    2013-01-01

    The neuromodulator dopamine is centrally involved in reward, approach behavior, exploration, and various aspects of cognition. Variations in dopaminergic function appear to be associated with variations in personality, but exactly which traits are influenced by dopamine remains an open question. This paper proposes a theory of the role of dopamine in personality that organizes and explains the diversity of findings, utilizing the division of the dopaminergic system into value coding and salience coding neurons (Bromberg-Martin et al., 2010). The value coding system is proposed to be related primarily to Extraversion and the salience coding system to Openness/Intellect. Global levels of dopamine influence the higher order personality factor, Plasticity, which comprises the shared variance of Extraversion and Openness/Intellect. All other traits related to dopamine are linked to Plasticity or its subtraits. The general function of dopamine is to promote exploration, by facilitating engagement with cues of specific reward (value) and cues of the reward value of information (salience). This theory constitutes an extension of the entropy model of uncertainty (EMU; Hirsh et al., 2012), enabling EMU to account for the fact that uncertainty is an innate incentive reward as well as an innate threat. The theory accounts for the association of dopamine with traits ranging from sensation and novelty seeking, to impulsivity and aggression, to achievement striving, creativity, and cognitive abilities, to the overinclusive thinking characteristic of schizotypy. PMID:24294198

  19. Phonological coding during reading.

    PubMed

    Leinenger, Mallorie

    2014-11-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early [prelexical] or that phonological codes come online late [postlexical]) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eye-tracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model, Van Orden, 1987; dual-route model, e.g., M. Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001; parallel distributed processing model, Seidenberg & McClelland, 1989) are discussed. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  20. Phonological coding during reading

    PubMed Central

    Leinenger, Mallorie

    2014-01-01

    The exact role that phonological coding (the recoding of written, orthographic information into a sound based code) plays during silent reading has been extensively studied for more than a century. Despite the large body of research surrounding the topic, varying theories as to the time course and function of this recoding still exist. The present review synthesizes this body of research, addressing the topics of time course and function in tandem. The varying theories surrounding the function of phonological coding (e.g., that phonological codes aid lexical access, that phonological codes aid comprehension and bolster short-term memory, or that phonological codes are largely epiphenomenal in skilled readers) are first outlined, and the time courses that each maps onto (e.g., that phonological codes come online early (pre-lexical) or that phonological codes come online late (post-lexical)) are discussed. Next the research relevant to each of these proposed functions is reviewed, discussing the varying methodologies that have been used to investigate phonological coding (e.g., response time methods, reading while eyetracking or recording EEG and MEG, concurrent articulation) and highlighting the advantages and limitations of each with respect to the study of phonological coding. In response to the view that phonological coding is largely epiphenomenal in skilled readers, research on the use of phonological codes in prelingually, profoundly deaf readers is reviewed. Finally, implications for current models of word identification (activation-verification model (Van Order, 1987), dual-route model (e.g., Coltheart, Rastle, Perry, Langdon, & Ziegler, 2001), parallel distributed processing model (Seidenberg & McClelland, 1989)) are discussed. PMID:25150679

  1. Earth-moon system: Dynamics and parameter estimation; numerical considerations and program documentation

    NASA Technical Reports Server (NTRS)

    Breedlove, W. J., Jr.

    1976-01-01

    Major activities included coding and verifying equations of motion for the earth-moon system. Some attention was also given to numerical integration methods and parameter estimation methods. Existing analytical theories such as Brown's lunar theory, Eckhardt's theory for lunar rotation, and Newcomb's theory for the rotation of the earth were coded and verified. These theories serve as checks for the numerical integration. Laser ranging data for the period January 1969 - December 1975 was collected and stored on tape. The main goal of this research is the development of software to enable physical parameters of the earth-moon system to be estimated making use of data available from the Lunar Laser Ranging Experiment and the Very Long Base Interferometry experiment of project Apollo. A more specific goal is to develop software for the estimation of certain physical parameters of the moon such as inertia ratios, and the third and fourth harmonic gravity coefficients.

  2. Teaching Theory Construction With Initial Grounded Theory Tools: A Reflection on Lessons and Learning.

    PubMed

    Charmaz, Kathy

    2015-12-01

    This article addresses criticisms of qualitative research for spawning studies that lack analytic development and theoretical import. It focuses on teaching initial grounded theory tools while interviewing, coding, and writing memos for the purpose of scaling up the analytic level of students' research and advancing theory construction. Adopting these tools can improve teaching qualitative methods at all levels although doctoral education is emphasized here. What teachers cover in qualitative methods courses matters. The pedagogy presented here requires a supportive environment and relies on demonstration, collective participation, measured tasks, progressive analytic complexity, and accountability. Lessons learned from using initial grounded theory tools are exemplified in a doctoral student's coding and memo-writing excerpts that demonstrate progressive analytic development. The conclusion calls for increasing the number and depth of qualitative methods courses and for creating a cadre of expert qualitative methodologists. © The Author(s) 2015.

  3. An Alternative Approach to Early Literacy: The Effects of ASL in Educational Media on Literacy Skills Acquisition for Hearing Children

    ERIC Educational Resources Information Center

    Moses, Annie M.; Golos, Debbie B.; Bennett, Colleen M.

    2015-01-01

    Early childhood educators need access to research-based practices and materials to help all children learn to read. Some theorists have suggested that individuals learn to read through "dual coding" (i.e., a verbal code and a nonverbal code) and may benefit from more than one route to literacy (e.g., dual coding theory). Although deaf…

  4. Entanglement-assisted quantum convolutional coding

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilde, Mark M.; Brun, Todd A.

    2010-04-15

    We show how to protect a stream of quantum information from decoherence induced by a noisy quantum communication channel. We exploit preshared entanglement and a convolutional coding structure to develop a theory of entanglement-assisted quantum convolutional coding. Our construction produces a Calderbank-Shor-Steane (CSS) entanglement-assisted quantum convolutional code from two arbitrary classical binary convolutional codes. The rate and error-correcting properties of the classical convolutional codes directly determine the corresponding properties of the resulting entanglement-assisted quantum convolutional code. We explain how to encode our CSS entanglement-assisted quantum convolutional codes starting from a stream of information qubits, ancilla qubits, and shared entangled bits.

  5. Stripped of illusions? Exploring system justification processes in capitalist and post-Communist societies.

    PubMed

    Cichocka, Aleksandra; Jost, John T

    2014-02-01

    Sociologists and political scientists have often observed that citizens of Central and Eastern Europe express high levels of disillusionment with their social, economic and political systems, in comparison with citizens of Western capitalist societies. In this review, we analyze system legitimation and delegitimation in post-Communist societies from a social psychological perspective. We draw on system justification theory, which seeks to understand how, when and why people do (and do not) defend, bolster and justify existing social systems. We review some of the major tenets and findings of the theory and compare research on system-justifying beliefs and ideologies in traditionally Capitalist and post-Communist countries to determine: (1) whether there are robust differences in the degree of system justification in post-Communist and Capitalist societies, and (2) the extent to which hypotheses derived from system justification theory receive support in the post-Communist context. To this end, we summarize research findings from over 20 countries and cite previously unpublished data from a public opinion survey conducted in Poland. Our analysis confirms that there are lower levels of system justification in post-Communist countries. At the same time, we find that system justification possesses similar social and psychological antecedents, manifestations and consequences in the two types of societies. We offer potential explanations for these somewhat complicated patterns of results and conclude by addressing implications for theory and research on system justification and system change (or transition). © 2013 International Union of Psychological Science.

  6. Animal abolitionism meets moral abolitionism : cutting the Gordian knot of applied ethics.

    PubMed

    Marks, Joel

    2013-12-01

    The use of other animals for human purposes is as contentious an issue as one is likely to find in ethics. And this is so not only because there are both passionate defenders and opponents of such use, but also because even among the latter there are adamant and diametric differences about the bases of their opposition. In both disputes, the approach taken tends to be that of applied ethics, by which a position on the issue is derived from a fundamental moral commitment. This commitment in turn depends on normative ethics, which investigates the various moral theories for the best fit to our moral intuitions. Thus it is that the use of animals in biomedical research is typically defended by appeal to a utilitarian theory, which legitimates harm to some for the greater good of others; while the opposition condemns that use either by appeal to the same theory, but disagreeing about the actual efficacy of animal experimentation, or by appeal to an alternative theory, such as the right of all sentient beings not to be exploited. Unfortunately, the normative issue seems likely never to be resolved, hence leaving the applied issue in limbo. The present essay seeks to circumvent this impasse by dispensing altogether with any moral claim or argument, thereby cutting the Gordian knot of animal ethics with a meta-ethical sword. The alternative schema defended is simply to advance relevant considerations, whereupon "there is nothing left but to feel." In a word, motivation replaces justification.

  7. Control and System Theory, Optimization, Inverse and Ill-Posed Problems

    DTIC Science & Technology

    1988-09-14

    Justlfleatlen Distribut ion/ Availability Codes # AFOSR-87-0350 Avat’ and/or1987-1988 Dist Special *CONTROL AND SYSTEM THEORY , ~ * OPTIMIZATION, * INVERSE...considerable va- riety of research investigations within the grant areas (Control and system theory , Optimization, and Ill-posed problems]. The

  8. Theoretical research on color indirect effects

    NASA Astrophysics Data System (ADS)

    Liu, T. C.; Liao, Changjun; Liu, Songhao

    1995-05-01

    Color indirect effects (CIE) means the physiological and psychological effects of color resulting from color vision. In this paper, we study CIE from the viewpoints of the integrated western and Chinese traditional medicine and the time quantum theory established by C. Y. Liu et al., respectively, and then put forward the color-automatic-nervous-subsystem model that could color excites parasympathetic subsystem and hot color excites sympathetic subsystem. Our theory is in agreement with modern color vision theory, and moreover, it leads to the resolution of the conflict between the color code theory and the time code theory oncolor vision. For the latitude phenomena on athlete stars number and the average lifespan, we also discuss the possibility of UV vision. The applications of our theory lead to our succeeding in explaining a number of physiological and psychological effects of color, in explaining the effects of age on color vision, and in explaining the Chinese chromophototherapy. We also discuss its application to neuroimmunology. This research provides the foundation of the clinical applications of chromophototherapy.

  9. The complement of research and theory in practice: contact theory at work in nonfamilial intergenerational programs.

    PubMed

    Jarrott, Shannon E; Smith, Cynthia L

    2011-02-01

    We assessed whether a shared site intergenerational care program informed by contact theory contributed to more desirable social behaviors of elders and children during intergenerational programming than a center with a more traditional programming approach that lacks some or all of the contact theory tenets. We observed 59 elder and child participants from the two sites during intergenerational activities. Using the Intergenerational Observation Scale, we coded participants' predominant behavior in 15-s intervals through each activity's duration. We then calculated for each individual the percentage of time frames each behavior code was predominant. Participants at the theory-based program demonstrated higher rates of intergenerational interaction, higher rates of solitary behavior, and lower rates of watching than at the traditional program. Contact theory tenets were optimized when coupled with evidence-based practices. Intergenerational programs with stakeholder support that promotes equal group status, cooperation toward a common goal, and mechanisms of friendship among participants can achieve important objectives for elder and child participants in care settings.

  10. Project : semi-autonomous parking for enhanced safety and efficiency.

    DOT National Transportation Integrated Search

    2016-04-01

    Index coding, a coding formulation traditionally analyzed in the theoretical computer science and : information theory communities, has received considerable attention in recent years due to its value in : wireless communications and networking probl...

  11. A validity generalization procedure to test relations between intrinsic and extrinsic motivation and influence tactics.

    PubMed

    Barbuto, John E; Moss, Jennifer A

    2006-08-01

    The relations of intrinsic and extrinsic motivation with use of consultative, legitimating, and pressure influence tactics were examined using validity generalization procedures. 5 to 7 field studies with cumulative samples exceeding 800 were used to test each relationship. Significance was found for relation between agents' intrinsic motivation and their use of consultative influence tactics and agents' extrinsic motivation and their use of legitimating influence tactics.

  12. High-density digital recording

    NASA Technical Reports Server (NTRS)

    Kalil, F. (Editor); Buschman, A. (Editor)

    1985-01-01

    The problems associated with high-density digital recording (HDDR) are discussed. Five independent users of HDDR systems and their problems, solutions, and insights are provided as guidance for other users of HDDR systems. Various pulse code modulation coding techniques are reviewed. An introduction to error detection and correction head optimization theory and perpendicular recording are provided. Competitive tape recorder manufacturers apply all of the above theories and techniques and present their offerings. The methodology used by the HDDR Users Subcommittee of THIC to evaluate parallel HDDR systems is presented.

  13. IEEE International Symposium Information Theory, held at Santa Monica California, February 9-12, 1981.

    DTIC Science & Technology

    1981-01-01

    Channel and study permutation codes as a special case. ,uch a code is generated by an initial vector x, a group G of orthogonal n by n matrices, and a...random-access components, is introduced and studied . Under this scheme, the network stations are divided into groups , each of which is assigned a...IEEE INFORMATION THEORY GROUP CO-SPONSORED BY: UNION RADIO SCIENTIFIQUE INTERNATIONALE IEEE Catalog Number 81 CH 1609-7 IT 𔃻. 81 ~20 04Q SECURITY

  14. Message Into Medium: An Extension of the Dual Coding Hypothesis.

    ERIC Educational Resources Information Center

    Simpson, Timothy J.

    This paper examines the dual coding hypothesis, a model of the coding of visual and textual information, from the perspective of a mass media professional, such as a teacher, interested in accurately presenting both visual and textual material to a mass audience (i.e., students). It offers an extension to the theory, based upon the various skill…

  15. A Need for a Theory of Visual Literacy.

    ERIC Educational Resources Information Center

    Hortin, John A.

    1982-01-01

    Examines sources available for developing a theory of visual literacy and attempts to clarify the meaning of the term. Suggests that visual thinking, a concept supported by recent research on mental imagery, visualization, and dual coding, ought to be the emphasis for future theory development. (FL)

  16. Industrial Computer Codes

    NASA Technical Reports Server (NTRS)

    Shapiro, Wilbur

    1996-01-01

    This is an overview of new and updated industrial codes for seal design and testing. GCYLT (gas cylindrical seals -- turbulent), SPIRALI (spiral-groove seals -- incompressible), KTK (knife to knife) Labyrinth Seal Code, and DYSEAL (dynamic seal analysis) are covered. CGYLT uses G-factors for Poiseuille and Couette turbulence coefficients. SPIRALI is updated to include turbulence and inertia, but maintains the narrow groove theory. KTK labyrinth seal code handles straight or stepped seals. And DYSEAL provides dynamics for the seal geometry.

  17. Using Prospect Theory to Investigate Decision-Making Bias Within an Information Security Context

    DTIC Science & Technology

    2005-12-01

    risk was acceptable, 5 when to the CA the risk was so bad...Population Proportion Lower Tail: Risk Averse (A) Coded as 0. Risk Seeking (B) Coded as 1. Ho (indifferent in risk behavior): p = . 5 Ha ( risk averse...Averse (A) Coded as 0. Risk Seeking (B) Coded as 1. Ho (indifferent in risk behavior): p = . 5 Ha ( risk averse thus significantly below . 5 ): p < . 5

  18. Potential predatory and legitimate biomedical journals: can you tell the difference? A cross-sectional comparison.

    PubMed

    Shamseer, Larissa; Moher, David; Maduekwe, Onyi; Turner, Lucy; Barbour, Virginia; Burch, Rebecca; Clark, Jocalyn; Galipeau, James; Roberts, Jason; Shea, Beverley J

    2017-03-16

    The Internet has transformed scholarly publishing, most notably, by the introduction of open access publishing. Recently, there has been a rise of online journals characterized as 'predatory', which actively solicit manuscripts and charge publications fees without providing robust peer review and editorial services. We carried out a cross-sectional comparison of characteristics of potential predatory, legitimate open access, and legitimate subscription-based biomedical journals. On July 10, 2014, scholarly journals from each of the following groups were identified - potential predatory journals (source: Beall's List), presumed legitimate, fully open access journals (source: PubMed Central), and presumed legitimate subscription-based (including hybrid) journals (source: Abridged Index Medicus). MEDLINE journal inclusion criteria were used to screen and identify biomedical journals from within the potential predatory journals group. One hundred journals from each group were randomly selected. Journal characteristics (e.g., website integrity, look and feel, editors and staff, editorial/peer review process, instructions to authors, publication model, copyright and licensing, journal location, and contact) were collected by one assessor and verified by a second. Summary statistics were calculated. Ninety-three predatory journals, 99 open access, and 100 subscription-based journals were analyzed; exclusions were due to website unavailability. Many more predatory journals' homepages contained spelling errors (61/93, 66%) and distorted or potentially unauthorized images (59/93, 63%) compared to open access journals (6/99, 6% and 5/99, 5%, respectively) and subscription-based journals (3/100, 3% and 1/100, 1%, respectively). Thirty-one (33%) predatory journals promoted a bogus impact metric - the Index Copernicus Value - versus three (3%) open access journals and no subscription-based journals. Nearly three quarters (n = 66, 73%) of predatory journals had editors or editorial board members whose affiliation with the journal was unverified versus two (2%) open access journals and one (1%) subscription-based journal in which this was the case. Predatory journals charge a considerably smaller publication fee (median $100 USD, IQR $63-$150) than open access journals ($1865 USD, IQR $800-$2205) and subscription-based hybrid journals ($3000 USD, IQR $2500-$3000). We identified 13 evidence-based characteristics by which predatory journals may potentially be distinguished from presumed legitimate journals. These may be useful for authors who are assessing journals for possible submission or for others, such as universities evaluating candidates' publications as part of the hiring process.

  19. Does theory influence the effectiveness of health behavior interventions? Meta-analysis.

    PubMed

    Prestwich, Andrew; Sniehotta, Falko F; Whittington, Craig; Dombrowski, Stephan U; Rogers, Lizzie; Michie, Susan

    2014-05-01

    To systematically investigate the extent and type of theory use in physical activity and dietary interventions, as well as associations between extent and type of theory use with intervention effectiveness. An in-depth analysis of studies included in two systematic reviews of physical activity and healthy eating interventions (k = 190). Extent and type of theory use was assessed using the Theory Coding Scheme (TCS) and intervention effectiveness was calculated using Hedges's g. Metaregressions assessed the relationships between these measures. Fifty-six percent of interventions reported a theory base. Of these, 90% did not report links between all of their behavior change techniques (BCTs) with specific theoretical constructs and 91% did not report links between all the specified constructs with BCTs. The associations between a composite score or specific items on the TCS and intervention effectiveness were inconsistent. Interventions based on Social Cognitive Theory or the Transtheoretical Model were similarly effective and no more effective than interventions not reporting a theory base. The coding of theory in these studies suggested that theory was not often used extensively in the development of interventions. Moreover, the relationships between type of theory used and the extent of theory use with effectiveness were generally weak. The findings suggest that attempts to apply the two theories commonly used in this review more extensively are unlikely to increase intervention effectiveness. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  20. Error-correction coding for digital communications

    NASA Astrophysics Data System (ADS)

    Clark, G. C., Jr.; Cain, J. B.

    This book is written for the design engineer who must build the coding and decoding equipment and for the communication system engineer who must incorporate this equipment into a system. It is also suitable as a senior-level or first-year graduate text for an introductory one-semester course in coding theory. Fundamental concepts of coding are discussed along with group codes, taking into account basic principles, practical constraints, performance computations, coding bounds, generalized parity check codes, polynomial codes, and important classes of group codes. Other topics explored are related to simple nonalgebraic decoding techniques for group codes, soft decision decoding of block codes, algebraic techniques for multiple error correction, the convolutional code structure and Viterbi decoding, syndrome decoding techniques, and sequential decoding techniques. System applications are also considered, giving attention to concatenated codes, coding for the white Gaussian noise channel, interleaver structures for coded systems, and coding for burst noise channels.

  1. Color-blind racial ideology: theory, training, and measurement implications in psychology.

    PubMed

    Neville, Helen A; Awad, Germine H; Brooks, James E; Flores, Michelle P; Bluemel, Jamie

    2013-09-01

    Synthesizing the interdisciplinary literature, we characterize color-blind racial ideology (CBRI) as consisting of two interrelated domains: color-evasion (i.e., denial of racial differences by emphasizing sameness) and power-evasion (i.e., denial of racism by emphasizing equal opportunities). Mounting empirical data suggest that the color-evasion dimension is ineffective and in fact promotes interracial tension and potential inequality. CBRI may be conceived as an ultramodern or contemporary form of racism and a legitimizing ideology used to justify the racial status quo. Four types of CBRI are described: denial of (a) race, (b) blatant racial issues, (c) institutional racism, and (d) White privilege. We discuss empirical findings suggesting a relationship between CBRI and increased racial prejudice, racial anger, and racial fear. Implications for education, training, and research are provided. © 2013 APA, all rights reserved.

  2. Is time enough in order to know where you are?

    NASA Astrophysics Data System (ADS)

    Tartaglia, Angelo

    2013-09-01

    This talk discusses various aspects of the structure of space-time presenting mechanisms leading to the explanation of the "rigidity" of the manifold and to the emergence of time, i.e. of the Lorentzian signature. The proposed ingredient is the analog, in four dimensions, of the deformation energy associated with the common three-dimensional elasticity theory. The inclusion of this additional term in the Lagrangian of empty space-time accounts for gravity as an emergent feature from the microscopic structure of space-time. Once time has legitimately been introduced a global positioning method based on local measurements of proper times between the arrivals of electromagnetic pulses from independent distant sources is presented. The method considers both pulsars as well as artificial emitters located on celestial bodies of the solar system as pulsating beacons to be used for navigation and positioning.

  3. Voluntary euthanasia, physician-assisted suicide, and the goals of medicine.

    PubMed

    Varelius, Jukka

    2006-04-01

    It is plausible that what possible courses of action patients may legitimately expect their physicians to take is ultimately determined by what medicine as a profession is supposed to do and, consequently, that we can determine the moral acceptability of voluntary euthanasia and physician-assisted suicide on the basis of identifying the proper goals of medicine. This article examines the main ways of defining the proper goals of medicine found in the recent bioethics literature and argues that they cannot provide a clear answer to the question of whether or not voluntary euthanasia and physician-assisted suicide are morally acceptable. It is suggested that to find a plausible answer to this question and to complete the task of defining the proper goals of medicine, we must determine what is the best philosophical theory about the nature of prudential value.

  4. "Tangible as tissue": Arnold Gesell, infant behavior, and film analysis.

    PubMed

    Curtis, Scott

    2011-09-01

    From 1924 to 1948, developmental psychologist Arnold Gesell regularly used photographic and motion picture technologies to collect data on infant behavior. The film camera, he said, records behavior "in such coherent, authentic and measurable detail that ... the reaction patterns of infant and child become almost as tangible as tissue." This essay places his faith in the fidelity and tangibility of film, as well as his use of film as evidence, in the context of developmental psychology's professed need for legitimately scientific observational techniques. It also examines his use of these same films as educational material to promote his brand of scientific child rearing. But his analytic techniques - his methods of extracting data from the film frames - are the key to understanding the complex relationship between his theories of development and his chosen research technology.

  5. Allan Urho Paivio (1925-2016).

    PubMed

    Katz, Albert

    2017-01-01

    Presents an obituary for Allan Urho Paivio, who passed away on June 19, 2016. One of his many accomplishments was the development of a dual-coding theory. Dual-coding theory, while very influential, has, unfortunately, been discussed all too often as a theory of mental imagery, and not within its larger context wherein mental imagery and verbal processes are separable but interconnected representational systems, an academic battle in clarification that Paivio waged much of his life. He published prodigiously, even in the decades after retirement. Among his many honors, he served as president of the Canadian Psychological Association (1975) and was appointed a fellow of the Royal Society of Canada (1978). (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  6. Verification of a magnetic island in gyro-kinetics by comparison with analytic theory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zarzoso, D., E-mail: david.zarzoso-fernandez@polytechnique.org; Casson, F. J.; Poli, E.

    A rotating magnetic island is imposed in the gyrokinetic code GKW, when finite differences are used for the radial direction, in order to develop the predictions of analytic tearing mode theory and understand its limitations. The implementation is verified against analytics in sheared slab geometry with three numerical tests that are suggested as benchmark cases for every code that imposes a magnetic island. The convergence requirements to properly resolve physics around the island separatrix are investigated. In the slab geometry, at low magnetic shear, binormal flows inside the island can drive Kelvin-Helmholtz instabilities which prevent the formation of the steadymore » state for which the analytic theory is formulated.« less

  7. Austrian Security Strategy: Need For Reformulation Due To Security Developments

    DTIC Science & Technology

    2016-02-14

    migration from Africa and the Middle East, and reality has overtaken the security strategy. The terrorist attacks in Paris and the sexual assaults on women...legitimate use of physical force” i.e., a state is a system based on the legitimate “relation of domination of man over man.”6, 7 Strategy is...called peace dividend to stimulate the economy and invest in infrastructure projects. Modern security policy must be assessed in all areas, since

  8. An efficient coding theory for a dynamic trajectory predicts non-uniform allocation of entorhinal grid cells to modules.

    PubMed

    Mosheiff, Noga; Agmon, Haggai; Moriel, Avraham; Burak, Yoram

    2017-06-01

    Grid cells in the entorhinal cortex encode the position of an animal in its environment with spatially periodic tuning curves with different periodicities. Recent experiments established that these cells are functionally organized in discrete modules with uniform grid spacing. Here we develop a theory for efficient coding of position, which takes into account the temporal statistics of the animal's motion. The theory predicts a sharp decrease of module population sizes with grid spacing, in agreement with the trend seen in the experimental data. We identify a simple scheme for readout of the grid cell code by neural circuitry, that can match in accuracy the optimal Bayesian decoder. This readout scheme requires persistence over different timescales, depending on the grid cell module. Thus, we propose that the brain may employ an efficient representation of position which takes advantage of the spatiotemporal statistics of the encoded variable, in similarity to the principles that govern early sensory processing.

  9. An efficient coding theory for a dynamic trajectory predicts non-uniform allocation of entorhinal grid cells to modules

    PubMed Central

    Mosheiff, Noga; Agmon, Haggai; Moriel, Avraham

    2017-01-01

    Grid cells in the entorhinal cortex encode the position of an animal in its environment with spatially periodic tuning curves with different periodicities. Recent experiments established that these cells are functionally organized in discrete modules with uniform grid spacing. Here we develop a theory for efficient coding of position, which takes into account the temporal statistics of the animal’s motion. The theory predicts a sharp decrease of module population sizes with grid spacing, in agreement with the trend seen in the experimental data. We identify a simple scheme for readout of the grid cell code by neural circuitry, that can match in accuracy the optimal Bayesian decoder. This readout scheme requires persistence over different timescales, depending on the grid cell module. Thus, we propose that the brain may employ an efficient representation of position which takes advantage of the spatiotemporal statistics of the encoded variable, in similarity to the principles that govern early sensory processing. PMID:28628647

  10. Bruner's Three Forms of Representation Revisited: Action, Pictures and Words for Effective Computer Instruction.

    ERIC Educational Resources Information Center

    Presno, Caroline

    1997-01-01

    Discusses computer instruction in light of Bruner's theory of three forms of representation (action, icons, and symbols). Examines how studies regarding Paivio's dual-coding theory and studies focusing on procedural knowledge support Bruner's theory. Provides specific examples for instruction in three categories: demonstrations, pictures and…

  11. Effects of Visual/Verbal Associations.

    ERIC Educational Resources Information Center

    Martin, Anna C.

    Different effects of instructional strategies on recall and comprehension of terms frequently used in formal analysis of art were examined. The study looked at a synthesis of three theoretical positions: dual-coding theory, schema theory, and elaboration theory. Two-hundred and fifty sixth-grade students were randomly assigned to three groups:…

  12. Implications of Information Theory for Computational Modeling of Schizophrenia

    PubMed Central

    Wibral, Michael; Phillips, William A.

    2017-01-01

    Information theory provides a formal framework within which information processing and its disorders can be described. However, information theory has rarely been applied to modeling aspects of the cognitive neuroscience of schizophrenia. The goal of this article is to highlight the benefits of an approach based on information theory, including its recent extensions, for understanding several disrupted neural goal functions as well as related cognitive and symptomatic phenomena in schizophrenia. We begin by demonstrating that foundational concepts from information theory—such as Shannon information, entropy, data compression, block coding, and strategies to increase the signal-to-noise ratio—can be used to provide novel understandings of cognitive impairments in schizophrenia and metrics to evaluate their integrity. We then describe more recent developments in information theory, including the concepts of infomax, coherent infomax, and coding with synergy, to demonstrate how these can be used to develop computational models of schizophrenia-related failures in the tuning of sensory neurons, gain control, perceptual organization, thought organization, selective attention, context processing, predictive coding, and cognitive control. Throughout, we demonstrate how disordered mechanisms may explain both perceptual/cognitive changes and symptom emergence in schizophrenia. Finally, we demonstrate that there is consistency between some information-theoretic concepts and recent discoveries in neurobiology, especially involving the existence of distinct sites for the accumulation of driving input and contextual information prior to their interaction. This convergence can be used to guide future theory, experiment, and treatment development. PMID:29601053

  13. A Value-Based Hierarchy of Objectives for Military Decision-Making

    DTIC Science & Technology

    1991-09-01

    r"EHICS, ZECISION MAKING, DECISION THEORY ,ý LEADERSHIP , 101 LEAERSHIP TRAINIING) ` ~16. PRICI CODE 17. SfCURITY CLA SIPIATIOW 18. SECURITY...29, Just- War Theory ................ I..............30 Jus ad bellum............................ .32 Jus in bello.................33...professional competence, and elements of just war theory such as proportionality and discrimination. A review of the relevant literature on just war theory

  14. Adaptive neural coding: from biological to behavioral decision-making

    PubMed Central

    Louie, Kenway; Glimcher, Paul W.; Webb, Ryan

    2015-01-01

    Empirical decision-making in diverse species deviates from the predictions of normative choice theory, but why such suboptimal behavior occurs is unknown. Here, we propose that deviations from optimality arise from biological decision mechanisms that have evolved to maximize choice performance within intrinsic biophysical constraints. Sensory processing utilizes specific computations such as divisive normalization to maximize information coding in constrained neural circuits, and recent evidence suggests that analogous computations operate in decision-related brain areas. These adaptive computations implement a relative value code that may explain the characteristic context-dependent nature of behavioral violations of classical normative theory. Examining decision-making at the computational level thus provides a crucial link between the architecture of biological decision circuits and the form of empirical choice behavior. PMID:26722666

  15. Applications of Derandomization Theory in Coding

    NASA Astrophysics Data System (ADS)

    Cheraghchi, Mahdi

    2011-07-01

    Randomized techniques play a fundamental role in theoretical computer science and discrete mathematics, in particular for the design of efficient algorithms and construction of combinatorial objects. The basic goal in derandomization theory is to eliminate or reduce the need for randomness in such randomized constructions. In this thesis, we explore some applications of the fundamental notions in derandomization theory to problems outside the core of theoretical computer science, and in particular, certain problems related to coding theory. First, we consider the wiretap channel problem which involves a communication system in which an intruder can eavesdrop a limited portion of the transmissions, and construct efficient and information-theoretically optimal communication protocols for this model. Then we consider the combinatorial group testing problem. In this classical problem, one aims to determine a set of defective items within a large population by asking a number of queries, where each query reveals whether a defective item is present within a specified group of items. We use randomness condensers to explicitly construct optimal, or nearly optimal, group testing schemes for a setting where the query outcomes can be highly unreliable, as well as the threshold model where a query returns positive if the number of defectives pass a certain threshold. Finally, we design ensembles of error-correcting codes that achieve the information-theoretic capacity of a large class of communication channels, and then use the obtained ensembles for construction of explicit capacity achieving codes. [This is a shortened version of the actual abstract in the thesis.

  16. Robust Nonlinear Neural Codes

    NASA Astrophysics Data System (ADS)

    Yang, Qianli; Pitkow, Xaq

    2015-03-01

    Most interesting natural sensory stimuli are encoded in the brain in a form that can only be decoded nonlinearly. But despite being a core function of the brain, nonlinear population codes are rarely studied and poorly understood. Interestingly, the few existing models of nonlinear codes are inconsistent with known architectural features of the brain. In particular, these codes have information content that scales with the size of the cortical population, even if that violates the data processing inequality by exceeding the amount of information entering the sensory system. Here we provide a valid theory of nonlinear population codes by generalizing recent work on information-limiting correlations in linear population codes. Although these generalized, nonlinear information-limiting correlations bound the performance of any decoder, they also make decoding more robust to suboptimal computation, allowing many suboptimal decoders to achieve nearly the same efficiency as an optimal decoder. Although these correlations are extremely difficult to measure directly, particularly for nonlinear codes, we provide a simple, practical test by which one can use choice-related activity in small populations of neurons to determine whether decoding is suboptimal or optimal and limited by correlated noise. We conclude by describing an example computation in the vestibular system where this theory applies. QY and XP was supported by a grant from the McNair foundation.

  17. Simulations of linear and Hamming codes using SageMath

    NASA Astrophysics Data System (ADS)

    Timur, Tahta D.; Adzkiya, Dieky; Soleha

    2018-03-01

    Digital data transmission over a noisy channel could distort the message being transmitted. The goal of coding theory is to ensure data integrity, that is, to find out if and where this noise has distorted the message and what the original message was. Data transmission consists of three stages: encoding, transmission, and decoding. Linear and Hamming codes are codes that we discussed in this work, where encoding algorithms are parity check and generator matrix, and decoding algorithms are nearest neighbor and syndrome. We aim to show that we can simulate these processes using SageMath software, which has built-in class of coding theory in general and linear codes in particular. First we consider the message as a binary vector of size k. This message then will be encoded to a vector with size n using given algorithms. And then a noisy channel with particular value of error probability will be created where the transmission will took place. The last task would be decoding, which will correct and revert the received message back to the original message whenever possible, that is, if the number of error occurred is smaller or equal to the correcting radius of the code. In this paper we will use two types of data for simulations, namely vector and text data.

  18. UFO: A THREE-DIMENSIONAL NEUTRON DIFFUSION CODE FOR THE IBM 704

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Auerbach, E.H.; Jewett, J.P.; Ketchum, M.A.

    A description of UFO, a code for the solution of the fewgroup neutron diffusion equation in three-dimensional Cartesian coordinates on the IBM 704, is given. An accelerated Liebmann flux iteration scheme is used, and optimum parameters can be calculated by the code whenever they are required. The theory and operation of the program are discussed. (auth)

  19. Drugs, Guns, and Disadvantaged Youths: Co-Occurring Behavior and the Code of the Street

    ERIC Educational Resources Information Center

    Allen, Andrea N.; Lo, Celia C.

    2012-01-01

    Guided by Anderson's theory of the code of the street, this study explored social mechanisms linking individual-level disadvantage factors with the adoption of beliefs grounded in the code of the street and with drug trafficking and gun carrying--the co-occurring behavior shaping violence among young men in urban areas. Secondary data were…

  20. Nectar replenishment maintains the neutral effects of nectar robbing on female reproductive success of Salvia przewalskii (Lamiaceae), a plant pollinated and robbed by bumble bees.

    PubMed

    Ye, Zhong-Ming; Jin, Xiao-Fang; Wang, Qing-Feng; Yang, Chun-Feng; Inouye, David W

    2017-04-01

    It has been suggested that the dynamics of nectar replenishment could differ for flowers after being nectar robbed or visited legitimately, but further experimental work is needed to investigate this hypothesis. This study aimed to assess the role of nectar replenishment in mediating the effects of nectar robbing on pollinator behaviour and plant reproduction. Plant-robber-pollinator interactions in an alpine plant, Salvia przewalskii , were studied. It is pollinated by long-tongued Bombus religiosus and short-tongued B. friseanus , but robbed by B. friseanus . Nectar production rates for flowers after they were either robbed or legitimately visited were compared, and three levels of nectar robbing were created to detect the effects of nectar robbing on pollinator behaviour and plant reproduction. Nectar replenishment did not differ between flowers that had been robbed or legitimately visited. Neither fruit set nor seed set was significantly affected by nectar robbing. In addition, nectar robbing did not significantly affect visitation rate, flowers visited within a plant per foraging bout, or flower handling time of the legitimate pollinators. However, a tendency for a decrease in relative abundance of the pollinator B. religiosus with an increase of nectar robbing was found. Nectar robbing did not affect female reproductive success because nectar replenishment ensures that pollinators maintain their visiting activity to nectar-robbed flowers. Nectar replenishment might be a defence mechanism against nectar robbing to enhance reproductive fitness by maintaining attractiveness to pollinators. Further studies are needed to reveal the potential for interference competition among bumble bees foraging as robbers and legitimate visitors, and to investigate variation of nectar robbing in communities with different bumble bee species composition. © The Author 2017. Published by Oxford University Press on behalf of the Annals of Botany Company. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  1. Legislation, women, and breastfeeding.

    PubMed

    Gibbons, G

    1987-01-01

    Governmental policies and legislation aimed at validating the dual role of women as mothers and wage earners can significantly strengthen breastfeeding promotion efforts. Examples of such laws and policies are maternity leave, breastfeeding breaks at the workplace, allowances for pregnant women and new mothers, rooming-in at hospitals, child care at the worksite, flexible work schedules for new mothers, and a national marketing code for breastmilk substitutes. The International labor Organization (ILO) has played an important role in setting international standards to protect working mothers. The ILO defines minimal maternity protection as encompassing: a compulsory period of 6 weeks' leave after delivery; entitlement to a further 6 weeks of leave; the provision during maternity leave of benefits sufficient for the full and healthy maintenance of the child; medical care by a qualified midwife or physician; authorization to interrupt work for the purpose of breastfeeding; and protection from dismissal during maternity leave. In many countries there is a lack of public awareness of existing laws or policies; i.e., working women may not know they are entitled to maternity leave, or pediatricians may not know that the government has developed a marketing code for breastmilk substitutes. Overall, the enactment and enforcement of legislation can ensure the longterm effectiveness of breastfeeding promotion by raising the consciousness of individuals and institutions, putting breastfeeding activities in the wider context of support for women's rights, recognizing the dual roles of women, and institutionalizing and legitimating support for breastfeeding.

  2. On (scientific) integrity: conceptual clarification.

    PubMed

    Patrão Neves, Maria do Céu

    2018-06-01

    The notion of "integrity" is currently quite common and broadly recognized as complex, mostly due to its recurring and diverse application in various distinct domains such as the physical, psychic or moral, the personal or professional, that of the human being or of the totality of beings. Nevertheless, its adjectivation imprints a specific meaning, as happens in the case of "scientific integrity". This concept has been defined mostly by via negativa, by pointing out what goes against integrity, that is, through the identification of its infringements, which has also not facilitated the elaboration of an overarching and consensual code of scientific integrity. In this context, it is deemed necessary to clarify the notion of "integrity", first etymologically, recovering the original meaning of the term, and then in a specifically conceptual way, through the identification of the various meanings with which the term can be legitimately used, particularly in the domain of scientific research and innovation. These two steps are fundamental and indispensable for a forthcoming attempt at systematizing the requirements of "scientific integrity".

  3. Experimental Eavesdropping Based on Optimal Quantum Cloning

    NASA Astrophysics Data System (ADS)

    Bartkiewicz, Karol; Lemr, Karel; Černoch, Antonín; Soubusta, Jan; Miranowicz, Adam

    2013-04-01

    The security of quantum cryptography is guaranteed by the no-cloning theorem, which implies that an eavesdropper copying transmitted qubits in unknown states causes their disturbance. Nevertheless, in real cryptographic systems some level of disturbance has to be allowed to cover, e.g., transmission losses. An eavesdropper can attack such systems by replacing a noisy channel by a better one and by performing approximate cloning of transmitted qubits which disturb them but below the noise level assumed by legitimate users. We experimentally demonstrate such symmetric individual eavesdropping on the quantum key distribution protocols of Bennett and Brassard (BB84) and the trine-state spherical code of Renes (R04) with two-level probes prepared using a recently developed photonic multifunctional quantum cloner [Lemr et al., Phys. Rev. A 85, 050307(R) (2012)PLRAAN1050-2947]. We demonstrated that our optimal cloning device with high-success rate makes the eavesdropping possible by hiding it in usual transmission losses. We believe that this experiment can stimulate the quest for other operational applications of quantum cloning.

  4. Private governance, public purpose? Assessing transparency and accountability in self-regulation of food advertising to children.

    PubMed

    Reeve, Belinda

    2013-06-01

    Reducing non-core food advertising to children is an important priority in strategies to address childhood obesity. Public health researchers argue for government intervention on the basis that food industry self-regulation is ineffective; however, the industry contends that the existing voluntary scheme adequately addresses community concerns. This paper examines the operation of two self-regulatory initiatives governing food advertising to children in Australia, in order to determine whether these regulatory processes foster transparent and accountable self-regulation. The paper concludes that while both codes appear to establish transparency and accountability mechanisms, they do not provide for meaningful stakeholder participation in the self-regulatory scheme. Accordingly, food industry self-regulation is unlikely to reflect public health concerns or to be perceived as a legitimate form of governance by external stakeholders. If industry regulation is to remain a feasible alternative to statutory regulation, there is a strong argument for strengthening government oversight and implementing a co-regulatory scheme.

  5. Reform, change, and continuity in Finnish health care.

    PubMed

    Häkkinen, Unto; Lehto, Juhani

    2005-01-01

    This article describes some essential aspects of the Finnish political and governmental system and the evolution of the basic institutional elements of the health care system. We examine the developments that gave rise to a series of health care reforms and reform proposals in the late 1980s and early 1990s and relate them to changes in health care expenditure, structure, and performance. Finally, we discuss the relationship between policy changes, reforms, and health system changes and the strength of neo-institutional theory in explaining both continuity and change. Much of the change in Finnish health care can be explained by institutional path dependency. The tradition of strong but small local authorities and the lack of legitimate democratic regional authorities as well as the coexistence of a dominant Beveridge-style health system with a marginal Bismarckian element explain the specific path of Finnish health care reform. Public responsibility for health care has been decentralized to smaller local authorities (known as municipalities) more than in any other country. Even an exceptionally deep economic recession in the early 1990s did not lead to systems change; rather, the economic imperative was met by the traditional centralized policy pattern. Some of the developments of the 1990s are, however, difficult to explain by institutional theory. Thus, there is a need for testing alternative theories as well.

  6. Consistent resolution of some relativistic quantum paradoxes

    NASA Astrophysics Data System (ADS)

    Griffiths, Robert B.

    2002-12-01

    A relativistic version of the (consistent or decoherent) histories approach to quantum theory is developed on the basis of earlier work by Hartle, and used to discuss relativistic forms of the paradoxes of spherical wave packet collapse, Bohm's formulation of the Einstein-Podolsky-Rosen paradox, and Hardy's paradox. It is argued that wave function collapse is not needed for introducing probabilities into relativistic quantum mechanics, and in any case should never be thought of as a physical process. Alternative approaches to stochastic time dependence can be used to construct a physical picture of the measurement process that is less misleading than collapse models. In particular, one can employ a coarse-grained but fully quantum-mechanical description in which particles move along trajectories, with behavior under Lorentz transformations the same as in classical relativistic physics, and detectors are triggered by particles reaching them along such trajectories. States entangled between spacelike separate regions are also legitimate quantum descriptions, and can be consistently handled by the formalism presented here. The paradoxes in question arise because of using modes of reasoning which, while correct for classical physics, are inconsistent with the mathematical structure of quantum theory, and are resolved (or tamed) by using a proper quantum analysis. In particular, there is no need to invoke, nor any evidence for, mysterious long-range superluminal influences, and thus no incompatibility, at least from this source, between relativity theory and quantum mechanics.

  7. A combinatorial model for dentate gyrus sparse coding

    DOE PAGES

    Severa, William; Parekh, Ojas; James, Conrad D.; ...

    2016-12-29

    The dentate gyrus forms a critical link between the entorhinal cortex and CA3 by providing a sparse version of the signal. Concurrent with this increase in sparsity, a widely accepted theory suggests the dentate gyrus performs pattern separation—similar inputs yield decorrelated outputs. Although an active region of study and theory, few logically rigorous arguments detail the dentate gyrus’s (DG) coding. We suggest a theoretically tractable, combinatorial model for this action. The model provides formal methods for a highly redundant, arbitrarily sparse, and decorrelated output signal.To explore the value of this model framework, we assess how suitable it is for twomore » notable aspects of DG coding: how it can handle the highly structured grid cell representation in the input entorhinal cortex region and the presence of adult neurogenesis, which has been proposed to produce a heterogeneous code in the DG. We find tailoring the model to grid cell input yields expansion parameters consistent with the literature. In addition, the heterogeneous coding reflects activity gradation observed experimentally. Lastly, we connect this approach with more conventional binary threshold neural circuit models via a formal embedding.« less

  8. The dependence of frequency distributions on multiple meanings of words, codes and signs

    NASA Astrophysics Data System (ADS)

    Yan, Xiaoyong; Minnhagen, Petter

    2018-01-01

    The dependence of the frequency distributions due to multiple meanings of words in a text is investigated by deleting letters. By coding the words with fewer letters the number of meanings per coded word increases. This increase is measured and used as an input in a predictive theory. For a text written in English, the word-frequency distribution is broad and fat-tailed, whereas if the words are only represented by their first letter the distribution becomes exponential. Both distribution are well predicted by the theory, as is the whole sequence obtained by consecutively representing the words by the first L = 6 , 5 , 4 , 3 , 2 , 1 letters. Comparisons of texts written by Chinese characters and the same texts written by letter-codes are made and the similarity of the corresponding frequency-distributions are interpreted as a consequence of the multiple meanings of Chinese characters. This further implies that the difference of the shape for word-frequencies for an English text written by letters and a Chinese text written by Chinese characters is due to the coding and not to the language per se.

  9. Predicting Properties of Unidirectional-Nanofiber Composites

    NASA Technical Reports Server (NTRS)

    Chamis, Christos C.; Handler, Louis M.; Manderscheid, Jane

    2008-01-01

    A theory for predicting mechanical, thermal, electrical, and other properties of unidirectional-nanofiber/matrix composite materials is based on the prior theory of micromechanics of composite materials. In the development of the present theory, the prior theory of micromechanics was extended, through progressive substructuring, to the level of detail of a nanoscale slice of a nanofiber. All the governing equations were then formulated at this level. The substructuring and the equations have been programmed in the ICAN/JAVA computer code, which was reported in "ICAN/JAVA: Integrated Composite Analyzer Recoded in Java" (LEW-17247), NASA Tech Briefs, Vol. 26, No. 12 (December 2002), page 36. In a demonstration, the theory as embodied in the computer code was applied to a graphite-nanofiber/epoxy laminate and used to predict 25 properties. Most of the properties were found to be distributed along the through-the-thickness direction. Matrix-dependent properties were found to have bimodal through-the-thickness distributions with discontinuous changes from mode to mode.

  10. The "History" of Victorian Scientific Naturalism: Huxley, Spencer and the "End" of natural history.

    PubMed

    Lightman, Bernard

    2016-08-01

    As part of their defence of evolutionary theory, T. H. Huxley and Herbert Spencer argued that natural history was no longer a legitimate scientific discipline. They outlined a secularized concept of life from biology to argue for the validity of naturalism. Despite their support for naturalism, they offered two different responses to the decline of natural history. Whereas Huxley emphasized the creation of a biological discipline, and all that that entailed, Spencer was more concerned with constructing an entire intellectual system based on the idea of evolution. In effect, Spencer wanted to create a new scientific worldview based on evolutionary theory. This had consequences for their understanding of human history, especially of how science had evolved through the ages. It affected their conceptions of human agency, contingency, and directionality in history. Examining Huxley's and Spencer's responses to the "end" of natural history reveals some of the deep divisions within scientific naturalism and the inherent problems of naturalism in general. Whereas Huxley chose to separate the natural and the historical, Spencer opted to fuse them into a single system. Crown Copyright © 2016. Published by Elsevier Ltd. All rights reserved.

  11. The Tuskegee Syphilis Study, 1932 to 1972: implications for HIV education and AIDS risk education programs in the black community.

    PubMed

    Thomas, S B; Quinn, S C

    1991-11-01

    The Tuskegee study of untreated syphilis in the Negro male is the longest nontherapeutic experiment on human beings in medical history. The strategies used to recruit and retain participants were quite similar to those being advocated for HIV/AIDS prevention programs today. Almost 60 years after the study began, there remains a trail of distrust and suspicion that hampers HIV education efforts in Black communities. The AIDS epidemic has exposed the Tuskegee study as a historical marker for the legitimate discontent of Blacks with the public health system. The belief that AIDS is a form of genocide is rooted in a social context in which Black Americans, faced with persistent inequality, believe in conspiracy theories about Whites against Blacks. These theories range from the belief that the government promotes drug abuse in Black communities to the belief that HIV is a manmade weapon of racial warfare. An open and honest discussion of the Tuskegee Syphilis Study can facilitate the process of rebuilding trust between the Black community and public health authorities. This dialogue can contribute to the development of HIV education programs that are scientifically sound, culturally sensitive, and ethnically acceptable.

  12. Anisotropy of susceptibility in rocks which are magnetically nonlinear even in low fields

    NASA Astrophysics Data System (ADS)

    Hrouda, František; Chadima, Martin; Ježek, Josef

    2018-06-01

    Theory of the low-field anisotropy of magnetic susceptibility (AMS) assumes a linear relationship between magnetization and magnetizing field, resulting in field-independent susceptibility. This is valid for diamagnetic and paramagnetic minerals by definition and also for pure magnetite, while in titanomagnetite, pyrrhotite and hematite the susceptibility may be clearly field-dependent even in low fields used in common AMS meter. Consequently, the use of the linear AMS theory is fully legitimate in the former minerals, but in principle incorrect in the latter ones. Automated measurement of susceptibility in 320 directions in variable low-fields ranging from 5 to 700 A m-1 was applied to more than 100 specimens of various pyrrhotite-bearing and titanomagnetite-bearing rocks. Data analysis showed that the anisotropic susceptibility remains well represented by an ellipsoid in the entire low-field span even though the ellipsoid increases its volume and eccentricity. The principal directions do not change their orientations with low-field in most specimens. Expressions for susceptibility as a function of field were found in the form of diagonal tensor whose elements are polynomials of low order. In a large proportion of samples, the susceptibility expressions can be further simplified to have one common skeleton polynomial.

  13. Human rights and the right to abortion in Latin America.

    PubMed

    Zúñiga-Fajuri, Alejandra

    2014-03-01

    The scope of this study is to question the fact that in some countries in Latin America (Chile, El Salvador, Nicaragua, Honduras and the Dominican Republic) abortion is still forbidden in all situations. Even after all the debate on this thorny issue, the theory of human rights is not often used in the defense of abortion. This is clearly related to the pervasive, albeit unspoken belief that, due to their condition, pregnant women inherently lose their full human rights and should surrender and even give up their lives in favor of the unborn child. This article seeks to show that an adequate reading of the theory of human rights should include abortion rights through the first two trimesters of pregnancy, based on the fact that basic liberties can only be limited for the sake of liberty itself. It also seeks to respond to those who maintain that the abortion issue cannot be resolved since the exact point in the development of the embryo that distinguishes legitimate from illegitimate abortion cannot be determined. There are strong moral and scientific arguments for an approach capable of reducing uncertainty and establishing the basis for criminal law reforms that focus on the moral importance of trimester laws.

  14. Art and architecture as experience: an alternative approach to bridging art history and the neurosciences.

    PubMed

    Zschocke, Nina

    2012-08-01

    In 1972, Michael Baxandal characterizes the processes responsible for the cultural relativism of art experience as highly complex and unknown in their physiological detail. While art history still shows considerable interest in the brain sciences forty years later, most cross-disciplinary studies today are referring to the neurosciences in an attempt to seek scientific legitimization of variations of a generalized and largely deterministic model of perception, reducing interaction between a work of art and its observers to a set of biological automatisms. I will challenge such an approach and take up art theory's interest in the historico-cultural and situational dimensions of art experience. Looking at two examples of large-scale installation and sculptural post-war American art, I will explore instable perceptions of depth and changing experiences of space that indicate complex interactions between perceptual and higher cognitive processes. The argument will draw on recent theories describing neuronal processes underlying multistable phenomena, eye movement, visual attention and decision-making. As I will show a large number of neuroscientific studies provide theoretical models that help us analyse not the anthropological constants but the influence of cultural, individual and situational variables on aesthetic experience.

  15. Liberalism, authority, and bioethics commissions.

    PubMed

    MacDougall, D Robert

    2013-12-01

    Bioethicists working on national ethics commissions frequently think of themselves as advisors to the government, but distance themselves from any claims to actual authority. Governments however may find it beneficial to appear to defer to the authority of these commissions when designing laws and policies, and might appoint such commissions for exactly this reason. Where does the authority for setting laws and policies come from? This question is best answered from within a normative political philosophy. This paper explains the locus of moral authority as understood within one family of normative political theories--liberal political theories--and argues that most major "liberal" commentators have understood both the source and scope of ethics commissions' authority in a manner at odds with liberalism, rightly interpreted. The author argues that reexamining the implications of liberalism for bioethics commissions would mean changing what are considered valid criticisms of such commissions and also changing the content of national bioethics commission mandates. The author concludes that bioethicists who participate in such commissions ought to carefully examine their own views about the normative limits of governmental authority because such limits have important implications for the contribution that bioethicists can legitimately make to government commissions.

  16. A Formal Theory of Perception. Technical Report No. 161.

    ERIC Educational Resources Information Center

    Rottmayer, William Arthur

    An attempt to build a mathematical model of a device that could learn geometry is discussed. The report discusses the background and motivation of the study, the coding problem, the derivation of Suppes "Stimulus-Response Theory of Finite Automata" used in the work in learning theory, and a summary of the technical work. (DB)

  17. An arbitrary grid CFD algorithm for configuration aerodynamics analysis. Volume 1: Theory and validations

    NASA Technical Reports Server (NTRS)

    Baker, A. J.; Iannelli, G. S.; Manhardt, Paul D.; Orzechowski, J. A.

    1993-01-01

    This report documents the user input and output data requirements for the FEMNAS finite element Navier-Stokes code for real-gas simulations of external aerodynamics flowfields. This code was developed for the configuration aerodynamics branch of NASA ARC, under SBIR Phase 2 contract NAS2-124568 by Computational Mechanics Corporation (COMCO). This report is in two volumes. Volume 1 contains the theory for the derived finite element algorithm and describes the test cases used to validate the computer program described in the Volume 2 user guide.

  18. Nuclear Analysis

    NASA Technical Reports Server (NTRS)

    Clement, J. D.; Kirby, K. D.

    1973-01-01

    Exploratory calculations were performed for several gas core breeder reactor configurations. The computational method involved the use of the MACH-1 one dimensional diffusion theory code and the THERMOS integral transport theory code for thermal cross sections. Computations were performed to analyze thermal breeder concepts and nonbreeder concepts. Analysis of breeders was restricted to the (U-233)-Th breeding cycle, and computations were performed to examine a range of parameters. These parameters include U-233 to hydrogen atom ratio in the gaseous cavity, carbon to thorium atom ratio in the breeding blanket, cavity size, and blanket size.

  19. The role of a sexual health promotion leaflet for 15-18 year olds in catalysing conversations: A constructivist grounded theory.

    PubMed

    Hoare, Karen J; Decker, Eve

    2016-01-01

    Following the summer holidays of 2011, twelve girls returned to school pregnant in one high school in Auckland New Zealand (NZ). A health promotion leaflet that folded into.a small square containing a condom and was dubbed the 'teabag' was distributed to 15-18 year olds prior to the summer holiday of 2012, in order to increase their sexual health knowledge. This paper reports on the evaluation of the teabag from the students' perspective. During the first term of 2013, seventeen students from two high schools who had received the teabag were interviewed. Five were male and twelve female. Most (16) were of Pacific Island or Maori (indigenous New Zealanders) descent. Interviews were digitally recorded, transcribed, coded and categorised concurrently, in accordance with grounded theory methods. Theoretical sampling was employed and students who had perceptions of the teabag, that were consistent with evolving constructions from data, were invited by school nurses to be interviewed by the researchers. Interviews were coded line by line by two researchers and these codes collapsed into seven focussed codes. Further analysis resulted in the codes being subsumed into three main categories. These categories revealed that the teabag was, helpful, appropriate and became a talking point. The grounded theory and basic social process the researchers constructed from data were that the teabag catalysed conversations about sexual health. The teabag was an acceptable and appropriate sexual health promotion tool to disseminate information about sexual health.

  20. Joint Machine Learning and Game Theory for Rate Control in High Efficiency Video Coding.

    PubMed

    Gao, Wei; Kwong, Sam; Jia, Yuheng

    2017-08-25

    In this paper, a joint machine learning and game theory modeling (MLGT) framework is proposed for inter frame coding tree unit (CTU) level bit allocation and rate control (RC) optimization in High Efficiency Video Coding (HEVC). First, a support vector machine (SVM) based multi-classification scheme is proposed to improve the prediction accuracy of CTU-level Rate-Distortion (R-D) model. The legacy "chicken-and-egg" dilemma in video coding is proposed to be overcome by the learning-based R-D model. Second, a mixed R-D model based cooperative bargaining game theory is proposed for bit allocation optimization, where the convexity of the mixed R-D model based utility function is proved, and Nash bargaining solution (NBS) is achieved by the proposed iterative solution search method. The minimum utility is adjusted by the reference coding distortion and frame-level Quantization parameter (QP) change. Lastly, intra frame QP and inter frame adaptive bit ratios are adjusted to make inter frames have more bit resources to maintain smooth quality and bit consumption in the bargaining game optimization. Experimental results demonstrate that the proposed MLGT based RC method can achieve much better R-D performances, quality smoothness, bit rate accuracy, buffer control results and subjective visual quality than the other state-of-the-art one-pass RC methods, and the achieved R-D performances are very close to the performance limits from the FixedQP method.

  1. Trace-shortened Reed-Solomon codes

    NASA Technical Reports Server (NTRS)

    Mceliece, R. J.; Solomon, G.

    1994-01-01

    Reed-Solomon (RS) codes have been part of standard NASA telecommunications systems for many years. RS codes are character-oriented error-correcting codes, and their principal use in space applications has been as outer codes in concatenated coding systems. However, for a given character size, say m bits, RS codes are limited to a length of, at most, 2(exp m). It is known in theory that longer character-oriented codes would be superior to RS codes in concatenation applications, but until recently no practical class of 'long' character-oriented codes had been discovered. In 1992, however, Solomon discovered an extensive class of such codes, which are now called trace-shortened Reed-Solomon (TSRS) codes. In this article, we will continue the study of TSRS codes. Our main result is a formula for the dimension of any TSRS code, as a function of its error-correcting power. Using this formula, we will give several examples of TSRS codes, some of which look very promising as candidate outer codes in high-performance coded telecommunications systems.

  2. PubMed

    Trinker, Horst

    2011-10-28

    We study the distribution of triples of codewords of codes and ordered codes. Schrijver [A. Schrijver, New code upper bounds from the Terwilliger algebra and semidefinite programming, IEEE Trans. Inform. Theory 51 (8) (2005) 2859-2866] used the triple distribution of a code to establish a bound on the number of codewords based on semidefinite programming. In the first part of this work, we generalize this approach for ordered codes. In the second part, we consider linear codes and linear ordered codes and present a MacWilliams-type identity for the triple distribution of their dual code. Based on the non-negativity of this linear transform, we establish a linear programming bound and conclude with a table of parameters for which this bound yields better results than the standard linear programming bound.

  3. Importance of the nature of comparison conditions for testing theory-based interventions: comment on Michie and Prestwich (2010).

    PubMed

    Williams, David M

    2010-09-01

    Comments on the original article 'Are interventions theory-based? Development of a theory coding scheme' by Susan Michie and Andrew Prestwich (see record 2010-00152-001). In their admirable effort to develop a coding scheme for the theoretical contribution of intervention research, Michie and Prestwich rightly point out the importance of the presence of a comparison condition when examining the effect of an intervention on targeted theoretical variables and behavioral outcomes (Table 2, item 15). However, they fail to discuss the critical importance of the nature of the comparison condition. Weaker comparison conditions will yield stronger intervention effects; stronger comparison conditions will yield a stronger science of behavior change. (c) 2010 APA, all rights reserved).

  4. Representational geometry: integrating cognition, computation, and the brain

    PubMed Central

    Kriegeskorte, Nikolaus; Kievit, Rogier A.

    2013-01-01

    The cognitive concept of representation plays a key role in theories of brain information processing. However, linking neuronal activity to representational content and cognitive theory remains challenging. Recent studies have characterized the representational geometry of neural population codes by means of representational distance matrices, enabling researchers to compare representations across stages of processing and to test cognitive and computational theories. Representational geometry provides a useful intermediate level of description, capturing both the information represented in a neuronal population code and the format in which it is represented. We review recent insights gained with this approach in perception, memory, cognition, and action. Analyses of representational geometry can compare representations between models and the brain, and promise to explain brain computation as transformation of representational similarity structure. PMID:23876494

  5. Processing deficits in monitoring analog and digital displays: Implications for attentional theory and mental-state estimation research

    NASA Technical Reports Server (NTRS)

    Payne, David G.; Gunther, Virginia A. L.

    1988-01-01

    Subjects performed short term memory tasks, involving both spatial and verbal components, and a visual monitoring task involving either analog or digital display formats. These two tasks (memory vs. monitoring) were performed both singly and in conjunction. Contrary to expectations derived from multiple resource theories of attentional processes, there was no evidence that when the two tasks involved the same cognitive codes (i.e., either both spatial or both verbal/linguistics) there was more of a dual task performance decrement than when the two tasks employed different cognitive codes/processes. These results are discussed in terms of their implications for theories of attentional processes and also for research in mental state estimation.

  6. Development of a Coding Instrument to Assess the Quality and Content of Anti-Tobacco Video Games.

    PubMed

    Alber, Julia M; Watson, Anna M; Barnett, Tracey E; Mercado, Rebeccah; Bernhardt, Jay M

    2015-07-01

    Previous research has shown the use of electronic video games as an effective method for increasing content knowledge about the risks of drugs and alcohol use for adolescents. Although best practice suggests that theory, health communication strategies, and game appeal are important characteristics for developing games, no instruments are currently available to examine the quality and content of tobacco prevention and cessation electronic games. This study presents the systematic development of a coding instrument to measure the quality, use of theory, and health communication strategies of tobacco cessation and prevention electronic games. Using previous research and expert review, a content analysis coding instrument measuring 67 characteristics was developed with three overarching categories: type and quality of games, theory and approach, and type and format of messages. Two trained coders applied the instrument to 88 games on four platforms (personal computer, Nintendo DS, iPhone, and Android phone) to field test the instrument. Cohen's kappa for each item ranged from 0.66 to 1.00, with an average kappa value of 0.97. Future research can adapt this coding instrument to games addressing other health issues. In addition, the instrument questions can serve as a useful guide for evidence-based game development.

  7. Development of a Coding Instrument to Assess the Quality and Content of Anti-Tobacco Video Games

    PubMed Central

    Alber, Julia M.; Watson, Anna M.; Barnett, Tracey E.; Mercado, Rebeccah

    2015-01-01

    Abstract Previous research has shown the use of electronic video games as an effective method for increasing content knowledge about the risks of drugs and alcohol use for adolescents. Although best practice suggests that theory, health communication strategies, and game appeal are important characteristics for developing games, no instruments are currently available to examine the quality and content of tobacco prevention and cessation electronic games. This study presents the systematic development of a coding instrument to measure the quality, use of theory, and health communication strategies of tobacco cessation and prevention electronic games. Using previous research and expert review, a content analysis coding instrument measuring 67 characteristics was developed with three overarching categories: type and quality of games, theory and approach, and type and format of messages. Two trained coders applied the instrument to 88 games on four platforms (personal computer, Nintendo DS, iPhone, and Android phone) to field test the instrument. Cohen's kappa for each item ranged from 0.66 to 1.00, with an average kappa value of 0.97. Future research can adapt this coding instrument to games addressing other health issues. In addition, the instrument questions can serve as a useful guide for evidence-based game development. PMID:26167842

  8. Laminar fMRI and computational theories of brain function.

    PubMed

    Stephan, K E; Petzschner, F H; Kasper, L; Bayer, J; Wellstein, K V; Stefanics, G; Pruessmann, K P; Heinzle, J

    2017-11-02

    Recently developed methods for functional MRI at the resolution of cortical layers (laminar fMRI) offer a novel window into neurophysiological mechanisms of cortical activity. Beyond physiology, laminar fMRI also offers an unprecedented opportunity to test influential theories of brain function. Specifically, hierarchical Bayesian theories of brain function, such as predictive coding, assign specific computational roles to different cortical layers. Combined with computational models, laminar fMRI offers a unique opportunity to test these proposals noninvasively in humans. This review provides a brief overview of predictive coding and related hierarchical Bayesian theories, summarises their predictions with regard to layered cortical computations, examines how these predictions could be tested by laminar fMRI, and considers methodological challenges. We conclude by discussing the potential of laminar fMRI for clinically useful computational assays of layer-specific information processing. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. Psi4NumPy: An Interactive Quantum Chemistry Programming Environment for Reference Implementations and Rapid Development.

    PubMed

    Smith, Daniel G A; Burns, Lori A; Sirianni, Dominic A; Nascimento, Daniel R; Kumar, Ashutosh; James, Andrew M; Schriber, Jeffrey B; Zhang, Tianyuan; Zhang, Boyi; Abbott, Adam S; Berquist, Eric J; Lechner, Marvin H; Cunha, Leonardo A; Heide, Alexander G; Waldrop, Jonathan M; Takeshita, Tyler Y; Alenaizan, Asem; Neuhauser, Daniel; King, Rollin A; Simmonett, Andrew C; Turney, Justin M; Schaefer, Henry F; Evangelista, Francesco A; DePrince, A Eugene; Crawford, T Daniel; Patkowski, Konrad; Sherrill, C David

    2018-06-11

    Psi4NumPy demonstrates the use of efficient computational kernels from the open-source Psi4 program through the popular NumPy library for linear algebra in Python to facilitate the rapid development of clear, understandable Python computer code for new quantum chemical methods, while maintaining a relatively low execution time. Using these tools, reference implementations have been created for a number of methods, including self-consistent field (SCF), SCF response, many-body perturbation theory, coupled-cluster theory, configuration interaction, and symmetry-adapted perturbation theory. Furthermore, several reference codes have been integrated into Jupyter notebooks, allowing background, underlying theory, and formula information to be associated with the implementation. Psi4NumPy tools and associated reference implementations can lower the barrier for future development of quantum chemistry methods. These implementations also demonstrate the power of the hybrid C++/Python programming approach employed by the Psi4 program.

  10. Counterfeit Drug Penetration into Global Legitimate Medicine Supply Chains: A Global Assessment

    PubMed Central

    Mackey, Tim K.; Liang, Bryan A.; York, Peter; Kubic, Thomas

    2015-01-01

    Counterfeit medicines are a global public health risk. We assess counterfeit reports involving the legitimate supply chain using 2009–2011 data from the Pharmaceutical Security Institute Counterfeit Incident System (PSI CIS) database that uses both open and nonpublic data sources. Of the 1,510 identified CIS reports involving counterfeits, 27.6% reported China as the source country of the incident/detection. Further, 51.3% were reported as counterfeit but the specific counterfeit subcategory was not known or verifiable. The most prevalent therapeutic category was anti-infectives (21.1%) with most reports originating from health-related government agencies. Geographically, Asian and Latin American regions and, economically, middle-income markets were most represented. A total of 127 (64.8%) of a total of 196 countries had no legitimate supply chain CIS counterfeit reports. Improvements in surveillance, including detection of security breaches, data collection, analysis, and dissemination are urgently needed to address public health needs to combat the global counterfeit medicines trade. PMID:25897059

  11. Counterfeit drug penetration into global legitimate medicine supply chains: a global assessment.

    PubMed

    Mackey, Tim K; Liang, Bryan A; York, Peter; Kubic, Thomas

    2015-06-01

    Counterfeit medicines are a global public health risk. We assess counterfeit reports involving the legitimate supply chain using 2009-2011 data from the Pharmaceutical Security Institute Counterfeit Incident System (PSI CIS) database that uses both open and nonpublic data sources. Of the 1,510 identified CIS reports involving counterfeits, 27.6% reported China as the source country of the incident/detection. Further, 51.3% were reported as counterfeit but the specific counterfeit subcategory was not known or verifiable. The most prevalent therapeutic category was anti-infectives (21.1%) with most reports originating from health-related government agencies. Geographically, Asian and Latin American regions and, economically, middle-income markets were most represented. A total of 127 (64.8%) of a total of 196 countries had no legitimate supply chain CIS counterfeit reports. Improvements in surveillance, including detection of security breaches, data collection, analysis, and dissemination are urgently needed to address public health needs to combat the global counterfeit medicines trade. © The American Society of Tropical Medicine and Hygiene.

  12. Telemetry coding study for the international magnetosphere explorers, mother/daughter and heliocentric missions. Volume 2: Final report

    NASA Technical Reports Server (NTRS)

    Cartier, D. E.

    1973-01-01

    A convolutional coding theory is given for the IME and the Heliocentric spacecraft. The amount of coding gain needed by the mission is determined. Recommendations are given for an encoder/decoder system to provide the gain along with an evaluation of the impact of the system on the space network in terms of costs and complexity.

  13. Cognitive Architectures for Multimedia Learning

    ERIC Educational Resources Information Center

    Reed, Stephen K.

    2006-01-01

    This article provides a tutorial overview of cognitive architectures that can form a theoretical foundation for designing multimedia instruction. Cognitive architectures include a description of memory stores, memory codes, and cognitive operations. Architectures that are relevant to multimedia learning include Paivio's dual coding theory,…

  14. New quantum codes constructed from quaternary BCH codes

    NASA Astrophysics Data System (ADS)

    Xu, Gen; Li, Ruihu; Guo, Luobin; Ma, Yuena

    2016-10-01

    In this paper, we firstly study construction of new quantum error-correcting codes (QECCs) from three classes of quaternary imprimitive BCH codes. As a result, the improved maximal designed distance of these narrow-sense imprimitive Hermitian dual-containing quaternary BCH codes are determined to be much larger than the result given according to Aly et al. (IEEE Trans Inf Theory 53:1183-1188, 2007) for each different code length. Thus, families of new QECCs are newly obtained, and the constructed QECCs have larger distance than those in the previous literature. Secondly, we apply a combinatorial construction to the imprimitive BCH codes with their corresponding primitive counterpart and construct many new linear quantum codes with good parameters, some of which have parameters exceeding the finite Gilbert-Varshamov bound for linear quantum codes.

  15. New quantum codes derived from a family of antiprimitive BCH codes

    NASA Astrophysics Data System (ADS)

    Liu, Yang; Li, Ruihu; Lü, Liangdong; Guo, Luobin

    The Bose-Chaudhuri-Hocquenghem (BCH) codes have been studied for more than 57 years and have found wide application in classical communication system and quantum information theory. In this paper, we study the construction of quantum codes from a family of q2-ary BCH codes with length n=q2m+1 (also called antiprimitive BCH codes in the literature), where q≥4 is a power of 2 and m≥2. By a detailed analysis of some useful properties about q2-ary cyclotomic cosets modulo n, Hermitian dual-containing conditions for a family of non-narrow-sense antiprimitive BCH codes are presented, which are similar to those of q2-ary primitive BCH codes. Consequently, via Hermitian Construction, a family of new quantum codes can be derived from these dual-containing BCH codes. Some of these new antiprimitive quantum BCH codes are comparable with those derived from primitive BCH codes.

  16. Optimal Predator Risk Assessment by the Sonar-Jamming Arctiine Moth Bertholdia trigona

    PubMed Central

    Corcoran, Aaron J.; Wagner, Ryan D.; Conner, William E.

    2013-01-01

    Nearly all animals face a tradeoff between seeking food and mates and avoiding predation. Optimal escape theory holds that an animal confronted with a predator should only flee when benefits of flight (increased survival) outweigh the costs (energetic costs, lost foraging time, etc.). We propose a model for prey risk assessment based on the predator's stage of attack. Risk level should increase rapidly from when the predator detects the prey to when it commits to the attack. We tested this hypothesis using a predator – the echolocating bat – whose active biosonar reveals its stage of attack. We used a prey defense – clicking used for sonar jamming by the tiger moth Bertholdia trigona– that can be readily studied in the field and laboratory and is enacted simultaneously with evasive flight. We predicted that prey employ defenses soon after being detected and targeted, and that prey defensive thresholds discriminate between legitimate predatory threats and false threats where a nearby prey is attacked. Laboratory and field experiments using playbacks of ultrasound signals and naturally behaving bats, respectively, confirmed our predictions. Moths clicked soon after bats detected and targeted them. Also, B. trigona clicking thresholds closely matched predicted optimal thresholds for discriminating legitimate and false predator threats for bats using search and approach phase echolocation – the period when bats are searching for and assessing prey. To our knowledge, this is the first quantitative study to correlate the sensory stimuli that trigger defensive behaviors with measurements of signals provided by predators during natural attacks in the field. We propose theoretical models for explaining prey risk assessment depending on the availability of cues that reveal a predator's stage of attack. PMID:23671686

  17. TRIQS: A toolbox for research on interacting quantum systems

    NASA Astrophysics Data System (ADS)

    Parcollet, Olivier; Ferrero, Michel; Ayral, Thomas; Hafermann, Hartmut; Krivenko, Igor; Messio, Laura; Seth, Priyanka

    2015-11-01

    We present the TRIQS library, a Toolbox for Research on Interacting Quantum Systems. It is an open-source, computational physics library providing a framework for the quick development of applications in the field of many-body quantum physics, and in particular, strongly-correlated electronic systems. It supplies components to develop codes in a modern, concise and efficient way: e.g. Green's function containers, a generic Monte Carlo class, and simple interfaces to HDF5. TRIQS is a C++/Python library that can be used from either language. It is distributed under the GNU General Public License (GPLv3). State-of-the-art applications based on the library, such as modern quantum many-body solvers and interfaces between density-functional-theory codes and dynamical mean-field theory (DMFT) codes are distributed along with it.

  18. Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes

    NASA Astrophysics Data System (ADS)

    Tavallaei, Saeed Ebadi; Falahati, Abolfazl

    Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as "key escrow" in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.

  19. A survey of the effective factors in students' adherence to university dress code policy, using the theory of reasoned action

    PubMed Central

    KAVEH, MOHAMMAD HOSSEIN; MORADI, LEILA; HESAMPOUR, MARYAM; HASAN ZADEH, JAFAR

    2015-01-01

    Introduction Recognizing the determinants of behavior plays a major role in identification and application of effective strategies for encouraging individuals to follow the intended pattern of behavior. The present study aimed to analyze the university students’ behaviors regarding the amenability to dress code, using the theory of reasoned action (TRA). Methods In this cross sectional study, 472 students were selected through multi-stage random sampling. The data were collected using a researcher-made questionnaire whose validity was confirmed by specialists. Besides, its reliability was confirmed by conducting a pilot study revealing Cronbach’s alpha coefficients of 0.93 for attitude, 0.83 for subjective norms, 0.94 for behavioral intention and 0.77 for behavior. The data were entered into the SPSS statistical software and analyzed using descriptive and inferential statistics (Mann-Whitney, correlation and regression analysis). Results Based on the students’ self-reports, conformity of clothes to the university’s dress code was below the expected level in 28.87% of the female students and 28.55% of the male ones. The mean scores of attitude, subjective norms, and behavioral intention to comply with dress code policy were 28.78±10.08, 28.51±8.25 and 11.12±3.84, respectively. The students of different colleges were different from each other concerning TRA constructs. Yet, subjective norms played a more critical role in explaining the variance of dress code behavior among the students. Conclusion Theory of reasoned action explained the students’ dress code behaviors relatively well. The study results suggest paying attention to appropriate approaches in educational, cultural activities, including promotion of student-teacher communication. PMID:26269790

  20. A survey of the effective factors in students' adherence to university dress code policy, using the theory of reasoned action.

    PubMed

    Kaveh, Mohammad Hossein; Moradi, Leila; Hesampour, Maryam; Hasan Zadeh, Jafar

    2015-07-01

    Recognizing the determinants of behavior plays a major role in identification and application of effective strategies for encouraging individuals to follow the intended pattern of behavior. The present study aimed to analyze the university students' behaviors regarding the amenability to dress code, using the theory of reasoned action (TRA). In this cross sectional study, 472 students were selected through multi-stage random sampling. The data were collected using a researcher-made questionnaire whose validity was confirmed by specialists. Besides, its reliability was confirmed by conducting a pilot study revealing Cronbach's alpha coefficients of 0.93 for attitude, 0.83 for subjective norms, 0.94 for behavioral intention and 0.77 for behavior. The data were entered into the SPSS statistical software and analyzed using descriptive and inferential statistics (Mann-Whitney, correlation and regression analysis). Based on the students' self-reports, conformity of clothes to the university's dress code was below the expected level in 28.87% of the female students and 28.55% of the male ones. The mean scores of attitude, subjective norms, and behavioral intention to comply with dress code policy were 28.78±10.08, 28.51±8.25 and 11.12±3.84, respectively. The students of different colleges were different from each other concerning TRA constructs. Yet, subjective norms played a more critical role in explaining the variance of dress code behavior among the students. Theory of reasoned action explained the students' dress code behaviors relatively well. The study results suggest paying attention to appropriate approaches in educational, cultural activities, including promotion of student-teacher communication.

Top