Juang, Kevin; Greenstein, Joel
2018-04-01
We developed a new authentication system based on passphrases instead of passwords. Our new system incorporates a user-generated mnemonic picture displayed during login, definition tooltips, error correction to reduce typographical errors, a decoy-based input masking technique, and random passphrase generation using either a specialized wordlist or a sentence template. Passphrases exhibit a greater level of security than traditional passwords, but their wider adoption has been hindered by human factors issues. Our assertion is that the added features of our system work particularly well with passphrases and help address these shortcomings. We conducted a study to evaluate our new system with a customized 1,450-word list and our new system with a 6-word sentence structure against the control conditions of a user-created passphrase of at least 24 characters and a system-generated passphrase using a 10,326-word list. Fifty participants completed two sessions so that we could measure the usability and security of the authentication schemes. With the new system conditions, memorability was improved, and security was equivalent to or better than the control conditions. Usability and overall ratings also favored the new system conditions over the control conditions. Our research presents a new authentication system using innovative techniques that improve on the usability and security of existing password and passphrase authentication systems. In computer security, drastic changes should never happen overnight, but we recommend that our contributions be incorporated into current authentication systems to help facilitate a transition from passwords to usable passphrases.
ERIC Educational Resources Information Center
Gale, Doug
2006-01-01
Authentication is based on something one knows (e.g., a password), something one has (e.g., a driver's license), or something one is (e.g., a fingerprint). The last of these refers to the use of biometrics for authentication. With the blink of an eye, the touch of a finger, or the uttering of a pass-phrase, colleges and schools can now get deadly…
Advanced Restricted Area Entry Control System (Araecs)
2014-06-01
113 f. Vascular Recognition ............................................................115 g. Handwriting Recognition...independent (unconstrained mode). In a system using “text dependent” speech the individual will speak either a fixed password or prompted to say a...specific phrase (e.g. “Please say the following numbers 33, 45, 88”) (National Science and Technology Council 2006). A text independent system is more
ERIC Educational Resources Information Center
Carnegie, Jacqueline A.
2012-01-01
The study of anatomy is a content-dense discipline with a challenging vocabulary. A mnemonic is a series of letters, a word, a phrase, or a rhyme that students can use when studying to facilitate recall. This project was designed to promote active learning in undergraduate students studying anatomy and physiology by asking them to create limericks…
Security concept in 'MyAngelWeb' a website for the individual patient at risk of emergency.
Pinciroli, F; Nahaissi, D; Boschini, M; Ferrari, R; Meloni, G; Camnasio, M; Spaggiari, P; Carnerone, G
2000-11-01
We describe the Security Plan for the 'MyAngelWeb' service. The different actors involved in the service are subject to different security procedures. The core of the security system is implemented at the host site by means of a DBMS and standard Information Technology tools. Hardware requirements for sustainable security are needed at the web-site construction sites. They are not needed at the emergency physician's site. At the emergency physician's site, a two-way authentication system (password and test phrase method) is implemented.
Security concept in 'MyAngelWeb((R))' a website for the individual patient at risk of emergency.
Pinciroli; Nahaissi; Boschini; Ferrari; Meloni; Camnasio; Spaggiari; Carnerone
2000-11-01
We describe the Security Plan for the 'MyAngelWeb' service. The different actors involved in the service are subject to different security procedures. The core of the security system is implemented at the host site by means of a DBMS and standard Information Technology tools. Hardware requirements for sustainable security are needed at the web-site construction sites. They are not needed at the emergency physician's site. At the emergency physician's site, a two-way authentication system (password and test phrase method) is implemented.
Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information
Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin
2014-01-01
Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. PMID:24991649
NASA Technical Reports Server (NTRS)
1983-01-01
All information directly associated with problem solving using the NASTRAN program is presented. This structural analysis program uses the finite element approach to structural modeling wherein the distributed finite properties of a structure are represented by a finite element of structural elements which are interconnected at a finite number of grid points, to which loads are applied and for which displacements are calculated. Procedures are described for defining and loading a structural model. Functional references for every card used for structural modeling, the NASTRAN data deck and control cards, problem solution sequences (rigid formats), using the plotting capability, writing a direct matrix abstraction program, and diagnostic messages are explained. A dictionary of mnemonics, acronyms, phrases, and other commonly used NASTRAN terms is included.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601
Exploring the Use of Discrete Gestures for Authentication
NASA Astrophysics Data System (ADS)
Chong, Ming Ki; Marsden, Gary
Research in user authentication has been a growing field in HCI. Previous studies have shown that peoples’ graphical memory can be used to increase password memorability. On the other hand, with the increasing number of devices with built-in motion sensors, kinesthetic memory (or muscle memory) can also be exploited for authentication. This paper presents a novel knowledge-based authentication scheme, called gesture password, which uses discrete gestures as password elements. The research presents a study of multiple password retention using PINs and gesture passwords. The study reports that although participants could use kinesthetic memory to remember gesture passwords, retention of PINs is far superior to retention of gesture passwords.
NASA Astrophysics Data System (ADS)
Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao
2015-11-01
In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).
Provably Secure Password-based Authentication in TLS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier
2005-12-20
In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised tomore » the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.« less
MPI Enhancements in John the Ripper
NASA Astrophysics Data System (ADS)
Sykes, Edward R.; Lin, Michael; Skoczen, Wesley
2010-11-01
John the Ripper (JtR) is an open source software package commonly used by system administrators to enforce password policy. JtR is designed to attack (i.e., crack) passwords encrypted in a wide variety of commonly used formats. While parallel implementations of JtR exist, there are several limitations to them. This research reports on two distinct algorithms that enhance this password cracking tool using the Message Passing Interface. The first algorithm is a novel approach that uses numerous processors to crack one password by using an innovative approach to workload distribution. In this algorithm the candidate password is distributed to all participating processors and the word list is divided based on probability so that each processor has the same likelihood of cracking the password while eliminating overlapping operations. The second algorithm developed in this research involves dividing the passwords within a password file equally amongst available processors while ensuring load-balanced and fault-tolerant behavior. This paper describes John the Ripper, the design of these two algorithms and preliminary results. Given the same amount of time, the original JtR can crack 29 passwords, whereas our algorithms 1 and 2 can crack an additional 35 and 45 passwords respectively.
The Effect of Password Management Procedures on the Entropy of User Selected Passwords
ERIC Educational Resources Information Center
Enamait, John D.
2012-01-01
Maintaining the security of information contained within computer systems poses challenges for users and administrators. Attacks on information systems continue to rise. Specifically, attacks that target user authentication are increasingly popular. These attacks are based on the common perception that traditional alphanumeric passwords are weak…
Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chevassut, Olivier; Milner, Joseph; Pointcheval, David
2008-04-21
The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on anmore » analysis of relevant patents in the area.« less
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps.
Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han; Lin, Tsung-Hung
2017-01-01
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes.
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps
Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han
2017-01-01
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes. PMID:28759615
27 CFR 73.12 - What security controls must I use for identification codes and passwords?
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false What security controls... controls must I use for identification codes and passwords? If you use electronic signatures based upon use of identification codes in combination with passwords, you must employ controls to ensure their...
Implications of What Children Know about Computer Passwords
ERIC Educational Resources Information Center
Coggins, Porter E.
2013-01-01
The purpose of this article is to present several implications and recommendations regarding what elementary school children, aged 9-12 years, know about computer passwords and what they know about why computer passwords are important. Student knowledge can then be used to make relevant curriculum decisions based in conjunction with applicable…
Password-free network security through joint use of audio and video
NASA Astrophysics Data System (ADS)
Civanlar, Mehmet R.; Chen, Tsuhan
1997-01-01
REmote authentication is vital for many network based applications. As the number of such applications increases, user friendliness of the authentication process, particularly as it relates to password management, becomes as important as its reliability. The multimedia capabilities of the modern terminal equipment can provide the basis for a dependable and easy to use authentication system which does not require the user to memorize passwords. This paper outlines our implementation of an authentication system based on the joint use of the speech and facial video of a user. Our implementation shows that the voice and the video of the associated lip movements, when used together, can be very effective for password free authentication.
Password-only authenticated three-party key exchange with provable security in the standard model.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon; Won, Dongho
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.
Encryption Characteristics of Two USB-based Personal Health Record Devices
Wright, Adam; Sittig, Dean F.
2007-01-01
Personal health records (PHRs) hold great promise for empowering patients and increasing the accuracy and completeness of health information. We reviewed two small USB-based PHR devices that allow a patient to easily store and transport their personal health information. Both devices offer password protection and encryption features. Analysis of the devices shows that they store their data in a Microsoft Access database. Due to a flaw in the encryption of this database, recovering the user’s password can be accomplished with minimal effort. Our analysis also showed that, rather than encrypting health information with the password chosen by the user, the devices stored the user’s password as a string in the database and then encrypted that database with a common password set by the manufacturer. This is another serious vulnerability. This article describes the weaknesses we discovered, outlines three critical flaws with the security model used by the devices, and recommends four guidelines for improving the security of similar devices. PMID:17460132
The NASTRAN User's Manual Level 16.0 and Supplement
NASA Technical Reports Server (NTRS)
1976-01-01
The user's manual is restricted to those items related to the use of NASTRAN that are independent of the computing system being used. The features of NASTRAN described include: (1) procedures for defining and loading a structural model and a functional reference for every card that is used for structural modeling; (2) the NASTRAN data deck, including the details for each of the data cards; (3) the NASTRAN control cards that are associated with the use of the program; (4) rigid format procedures, along with specific instructions for the use of each rigid format: (5) procedures for using instructions for the use of each rigid format; (5) procedures for using the NASTRAN plotting capability; (6) procedures governing the creation of DMAP programs; and (7) the NASTRAN diagnostic messages. The NASTRAN dictionary of mnemonics, acronyms, phrases, and other commonly used NASTRAN terms is included along with a limited number of sample problems.
NASA Astrophysics Data System (ADS)
Komogortsev, Oleg V.; Karpov, Alexey; Holland, Corey D.
2012-06-01
The widespread use of computers throughout modern society introduces the necessity for usable and counterfeit-resistant authentication methods to ensure secure access to personal resources such as bank accounts, e-mail, and social media. Current authentication methods require tedious memorization of lengthy pass phrases, are often prone to shouldersurfing, and may be easily replicated (either by counterfeiting parts of the human body or by guessing an authentication token based on readily available information). This paper describes preliminary work toward a counterfeit-resistant usable eye movement-based (CUE) authentication method. CUE does not require any passwords (improving the memorability aspect of the authentication system), and aims to provide high resistance to spoofing and shoulder-surfing by employing the combined biometric capabilities of two behavioral biometric traits: 1) oculomotor plant characteristics (OPC) which represent the internal, non-visible, anatomical structure of the eye; 2) complex eye movement patterns (CEM) which represent the strategies employed by the brain to guide visual attention. Both OPC and CEM are extracted from the eye movement signal provided by an eye tracking system. Preliminary results indicate that the fusion of OPC and CEM traits is capable of providing a 30% reduction in authentication error when compared to the authentication accuracy of individual traits.
2009-12-01
other services for early UNIX systems at Bell labs. In many UNIX based systems, the field added to ‘etc/ passwd ’ file to carry GCOS ID information was...charset, and external. struct options_main { /* Option flags */ opt_flags flags; /* Password files */ struct list_main * passwd ; /* Password file...object PASSWD . It is part of several other data structures. struct PASSWD { int id; char *login; char *passwd_hash; int UID
Security analysis and improvements to the PsychoPass method.
Brumen, Bostjan; Heričko, Marjan; Rozman, Ivan; Hölbl, Marko
2013-08-13
In a recent paper, Pietro Cipresso et al proposed the PsychoPass method, a simple way to create strong passwords that are easy to remember. However, the method has some security issues that need to be addressed. To perform a security analysis on the PsychoPass method and outline the limitations of and possible improvements to the method. We used the brute force analysis and dictionary attack analysis of the PsychoPass method to outline its weaknesses. The first issue with the Psychopass method is that it requires the password reproduction on the same keyboard layout as was used to generate the password. The second issue is a security weakness: although the produced password is 24 characters long, the password is still weak. We elaborate on the weakness and propose a solution that produces strong passwords. The proposed version first requires the use of the SHIFT and ALT-GR keys in combination with other keys, and second, the keys need to be 1-2 distances apart. The proposed improved PsychoPass method yields passwords that can be broken only in hundreds of years based on current computing powers. The proposed PsychoPass method requires 10 keys, as opposed to 20 keys in the original method, for comparable password strength.
Security Analysis and Improvements to the PsychoPass Method
2013-01-01
Background In a recent paper, Pietro Cipresso et al proposed the PsychoPass method, a simple way to create strong passwords that are easy to remember. However, the method has some security issues that need to be addressed. Objective To perform a security analysis on the PsychoPass method and outline the limitations of and possible improvements to the method. Methods We used the brute force analysis and dictionary attack analysis of the PsychoPass method to outline its weaknesses. Results The first issue with the Psychopass method is that it requires the password reproduction on the same keyboard layout as was used to generate the password. The second issue is a security weakness: although the produced password is 24 characters long, the password is still weak. We elaborate on the weakness and propose a solution that produces strong passwords. The proposed version first requires the use of the SHIFT and ALT-GR keys in combination with other keys, and second, the keys need to be 1-2 distances apart. Conclusions The proposed improved PsychoPass method yields passwords that can be broken only in hundreds of years based on current computing powers. The proposed PsychoPass method requires 10 keys, as opposed to 20 keys in the original method, for comparable password strength. PMID:23942458
Decryption-decompression of AES protected ZIP files on GPUs
NASA Astrophysics Data System (ADS)
Duong, Tan Nhat; Pham, Phong Hong; Nguyen, Duc Huu; Nguyen, Thuy Thanh; Le, Hung Duc
2011-10-01
AES is a strong encryption system, so decryption-decompression of AES encrypted ZIP files requires very large computing power and techniques of reducing the password space. This makes implementations of techniques on common computing system not practical. In [1], we reduced the original very large password search space to a much smaller one which surely containing the correct password. Based on reduced set of passwords, in this paper, we parallel decryption, decompression and plain text recognition for encrypted ZIP files by using CUDA computing technology on graphics cards GeForce GTX295 of NVIDIA, to find out the correct password. The experimental results have shown that the speed of decrypting, decompressing, recognizing plain text and finding out the original password increases about from 45 to 180 times (depends on the number of GPUs) compared to sequential execution on the Intel Core 2 Quad Q8400 2.66 GHz. These results have demonstrated the potential applicability of GPUs in this cryptanalysis field.
Mishra, Raghavendra; Barnwal, Amit Kumar
2015-05-01
The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.
Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model
Nam, Junghyun; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks. PMID:24977229
Bryan, Craig J; Steiner-Pappalardo, Nicole; Rudd, M David
2009-04-01
The incremental impact of adding a mnemonic to remember suicide warning signs to the Air Force Suicide Prevention Program (AFSPP) community awareness briefing was investigated with a sample of young, junior-enlisted airmen. Participants in the standard briefing significantly increased their ability to list suicide warning signs and improved consistency with an expert consensus list, whereas participants in the standard briefing plus mnemonic demonstrated no learning. Both groups demonstrated positive changes in beliefs about suicide. Results suggest that inclusion of the mnemonic in the AFSPP briefing interfered with participants' ability to learn suicide warning signs, and that increased confidence in the perceived ability to recognize suicide risk is not related to actual ability to accurately recall warning signs.
Secure Biometric Multi-Logon System Based on Current Authentication Technologies
NASA Astrophysics Data System (ADS)
Tait, Bobby L.
The need for accurate authentication in the current IT world is of utmost importance. Users rely on current IT technologies to facilitate in day to day interactions with nearly all environments. Strong authentication technologies like the various biometric technologies have been in existence for many years. Many of these technologies, for instance fingerprint biometrics, have reached maturity. However, passwords and pins are still the most commonly used authentication mechanisms at this stage. An average user has to be authenticated in various situations during daily interaction with his or her environment, by means of a pin or a password. This results in many different passwords and pins that the user has to remember. The user will eventually either start documenting these passwords and pins, or often, simply use the same password and pin for all authentication situations.
NASA Technical Reports Server (NTRS)
Collins, Earl R., Jr.
1990-01-01
Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.
LAMPPOST: A Mnemonic Device for Teaching Climate Variables
ERIC Educational Resources Information Center
Fahrer, Chuck; Harris, Dan
2004-01-01
This article introduces the word "LAMPPOST" as a mnemonic device to aid in the instruction of climate variables. It provides instructors with a framework for discussing climate patterns that is based on eight variables: latitude, altitude, maritime influence and continentality, pressure systems, prevailing winds, ocean currents, storms, and…
Storage-based Intrusion Detection: Watching storage activity for suspicious behavior
2002-10-01
password management involves a pair of inter-related files (/etc/ passwd and /etc/shadow). The corresponding access pat- terns seen at the storage...example, consider a UNIX system password file (/etc/ passwd ), which con- sists of a set of well-defined records. Records are delimited by a line-break, and...etc/ passwd and verify that they conform to a set of basic integrity rules: 7-field records, non-empty password field, legal default shell, legal home
Smartphone-based secure authenticated session sharing in Internet of Personal Things
NASA Astrophysics Data System (ADS)
Krishnan, Ram; Ninglekhu, Jiwan
2015-03-01
In the context of password-based authentication, a user can only memorize limited number of usernames and passwords. They are generally referred to as user-credentials. Longer character length of passwords further adds complication in mastering them. The expansion of the Internet and our growing dependency on it, has made it almost impossible for us to handle the big pool of user-credentials. Using simple, same or similar passwords is considered a poor practice, as it can easily be compromised by password cracking tools and social engineering attacks. Therefore, a robust and painless technique to manage personal credentials for websites is desirable. In this paper, a novel technique for user-credentials management via a smart mobile device such as a smartphone in a local network is proposed. We present a secure user-credential management scheme in which user's account login (username) and password associated with websites domain name is saved into the mobile device's database using a mobile application. We develop a custom browser extension application for client and use it to import user's credentials linked with the corresponding website from the mobile device via the local Wi-Fi network connection. The browser extension imports and identifies the authentication credentials and pushes them into the target TextBox locations in the webpage, ready for the user to execute. This scheme is suitably demonstrated between two personal devices in a local network.
Olsen, Kirk N; Dean, Roger T; Leung, Yvonne
2016-01-01
Phrasing facilitates the organization of auditory information and is central to speech and music. Not surprisingly, aspects of changing intensity, rhythm, and pitch are key determinants of musical phrases and their boundaries in instrumental note-based music. Different kinds of speech (such as tone- vs. stress-languages) share these features in different proportions and form an instructive comparison. However, little is known about whether or how musical phrasing is perceived in sound-based music, where the basic musical unit from which a piece is created is commonly non-instrumental continuous sounds, rather than instrumental discontinuous notes. This issue forms the target of the present paper. Twenty participants (17 untrained in music) were presented with six stimuli derived from sound-based music, note-based music, and environmental sound. Their task was to indicate each occurrence of a perceived phrase and qualitatively describe key characteristics of the stimulus associated with each phrase response. It was hypothesized that sound-based music does elicit phrase perception, and that this is primarily associated with temporal changes in intensity and timbre, rather than rhythm and pitch. Results supported this hypothesis. Qualitative analysis of participant descriptions showed that for sound-based music, the majority of perceived phrases were associated with intensity or timbral change. For the note-based piano piece, rhythm was the main theme associated with perceived musical phrasing. We modeled the occurrence in time of perceived musical phrases with recurrent event 'hazard' analyses using time-series data representing acoustic predictors associated with intensity, spectral flatness, and rhythmic density. Acoustic intensity and timbre (represented here by spectral flatness) were strong predictors of perceived musical phrasing in sound-based music, and rhythm was only predictive for the piano piece. A further analysis including five additional spectral measures linked to timbre strengthened the models. Overall, results show that even when little of the pitch and rhythm information important for phrasing in note-based music is available, phrasing is still perceived, primarily in response to changes of intensity and timbre. Implications for electroacoustic music composition and music recommender systems are discussed.
Olsen, Kirk N.; Dean, Roger T.; Leung, Yvonne
2016-01-01
Phrasing facilitates the organization of auditory information and is central to speech and music. Not surprisingly, aspects of changing intensity, rhythm, and pitch are key determinants of musical phrases and their boundaries in instrumental note-based music. Different kinds of speech (such as tone- vs. stress-languages) share these features in different proportions and form an instructive comparison. However, little is known about whether or how musical phrasing is perceived in sound-based music, where the basic musical unit from which a piece is created is commonly non-instrumental continuous sounds, rather than instrumental discontinuous notes. This issue forms the target of the present paper. Twenty participants (17 untrained in music) were presented with six stimuli derived from sound-based music, note-based music, and environmental sound. Their task was to indicate each occurrence of a perceived phrase and qualitatively describe key characteristics of the stimulus associated with each phrase response. It was hypothesized that sound-based music does elicit phrase perception, and that this is primarily associated with temporal changes in intensity and timbre, rather than rhythm and pitch. Results supported this hypothesis. Qualitative analysis of participant descriptions showed that for sound-based music, the majority of perceived phrases were associated with intensity or timbral change. For the note-based piano piece, rhythm was the main theme associated with perceived musical phrasing. We modeled the occurrence in time of perceived musical phrases with recurrent event ‘hazard’ analyses using time-series data representing acoustic predictors associated with intensity, spectral flatness, and rhythmic density. Acoustic intensity and timbre (represented here by spectral flatness) were strong predictors of perceived musical phrasing in sound-based music, and rhythm was only predictive for the piano piece. A further analysis including five additional spectral measures linked to timbre strengthened the models. Overall, results show that even when little of the pitch and rhythm information important for phrasing in note-based music is available, phrasing is still perceived, primarily in response to changes of intensity and timbre. Implications for electroacoustic music composition and music recommender systems are discussed. PMID:27997625
User Account Passwords | High-Performance Computing | NREL
Account Passwords User Account Passwords For NREL's high-performance computing (HPC) systems, learn about user account password requirements and how to set up, log in, and change passwords. Password Logging In the First Time After you request an HPC user account, you'll receive a temporary password. Set
A Simple Mnemonic for Tautomerization Mechanisms in Organic Chemistry
ERIC Educational Resources Information Center
Stephens, Chad E.
2010-01-01
The familiar word OREO (as in the cookie) is presented as a simple mnemonic for remembering the basic steps of the classical tautomerization mechanisms in organic chemistry. For acid-catalyzed tautomerizations, OREO stands for proton on, resonance, proton off. For base-catalyzed tautomerizations, OREO stands for proton off, resonance, proton on.…
A Password System Based on Sketches
2016-07-12
than traditional passwords. Biometrics include biological properties such as fingerprints, voices, faces, and even handwriting . Fingerprints have been...perturbation of the sketch495 results in a corresponding change in the model, which is exactly what we imply when we say that model is (locally...Conf. on Frontiers in Handwriting Recognition (2010) 339–344.690 [29] M. Martinez-Diaz, J. Fierrez, J. Galbally, The DooDB Graphical Password Database: Data Analysis and Benchmark Results, IEEE Access 1 (2013) 596–605. 32 33
Prevalence of Sharing Access Credentials in Electronic Medical Records
Korach, Tzfania; Shreberk-Hassidim, Rony; Thomaidou, Elena; Uzefovsky, Florina; Ayal, Shahar; Ariely, Dan
2017-01-01
Objectives Confidentiality of health information is an important aspect of the physician patient relationship. The use of digital medical records has made data much more accessible. To prevent data leakage, many countries have created regulations regarding medical data accessibility. These regulations require a unique user ID for each medical staff member, and this must be protected by a password, which should be kept undisclosed by all means. Methods We performed a four-question Google Forms-based survey of medical staff. In the survey, each participant was asked if he/she ever obtained the password of another medical staff member. Then, we asked how many times such an episode occurred and the reason for it. Results A total of 299 surveys were gathered. The responses showed that 220 (73.6%) participants reported that they had obtained the password of another medical staff member. Only 171 (57.2%) estimated how many time it happened, with an average estimation of 4.75 episodes. All the residents that took part in the study (45, 15%) had obtained the password of another medical staff member, while only 57.5% (38/66) of the nurses reported this. Conclusions The use of unique user IDs and passwords to defend the privacy of medical data is a common requirement in medical organizations. Unfortunately, the use of passwords is doomed because medical staff members share their passwords with one another. Strict regulations requiring each staff member to have it's a unique user ID might lead to password sharing and to a decrease in data safety. PMID:28875052
Simple group password-based authenticated key agreements for the integrated EPR information system.
Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng
2013-04-01
The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.
2011-08-31
2011 4 . TITLE AND SUBTITLE Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms 5a. CONTRACT...large numbers of hashed passwords (Booz Allen Hamilton, HBGary, Gawker, Sony Playstation , etc.), coupled with the availability of botnets that offer...when evaluating the strength of different password-composition policies. 4 . We investigate the effectiveness of entropy as a measure of password
ERIC Educational Resources Information Center
Bryan, Craig J.; Steiner-Pappalardo, Nicole; Rudd, M. David
2009-01-01
The incremental impact of adding a mnemonic to remember suicide warning signs to the Air Force Suicide Prevention Program (AFSPP) community awareness briefing was investigated with a sample of young, junior-enlisted airmen. Participants in the standard briefing significantly increased their ability to list suicide warning signs and improved…
A resettable and reprogrammable DNA-based security system to identify multiple users with hierarchy.
Li, Hailong; Hong, Wei; Dong, Shaojun; Liu, Yaqing; Wang, Erkang
2014-03-25
Molecular-level security devices have raised ever-increasing interest in recent years to protect data and information from illegal invasion. Prior molecular keypad locks have an output signal dependent upon not only the appropriate combination but also the exact sequence of inputs, but it cannot be reset or reprogrammed. Here, a DNA-based security system with reset and never-reported reprogram function is successfully developed in proof-of-principle, with which one can change the password in case that the system is cracked. The previous password becomes invalid in the reprogrammed security system. Interestingly, more than one password is designed to permit multiple users to access. By harnessing the intrinsic merit of the different passwords, the system can distinguish different user who is endowed with prior authority. The intelligent device is addressed on solid support and facilitates electronic processes, avoiding chemical accumulation in the system by simple removal of the electrode from the input solution and indicating a main avenue for its further development.
Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho
2016-03-01
Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties.
Indexing Anatomical Phrases in Neuro-Radiology Reports to the UMLS 2005AA
Bashyam, Vijayaraghavan; Taira, Ricky K.
2005-01-01
This work describes a methodology to index anatomical phrases to the 2005AA release of the Unified Medical Language System (UMLS). A phrase chunking tool based on Natural Language Processing (NLP) was developed to identify semantically coherent phrases within medical reports. Using this phrase chunker, a set of 2,551 unique anatomical phrases was extracted from brain radiology reports. These phrases were mapped to the 2005AA release of the UMLS using a vector space model. Precision for the task of indexing unique phrases was 0.87. PMID:16778995
Are Password Management Applications Viable? An Analysis of User Training and Reactions
ERIC Educational Resources Information Center
Ciampa, Mark
2011-01-01
Passwords have the distinction of being the most widely-used form of authentication--and the most vulnerable. With the dramatic increase today in the number of accounts that require passwords, overwhelmed users usually resort to creating weak passwords or reusing the same password for multiple accounts, thus making passwords the weakest link in…
ERIC Educational Resources Information Center
Monroe, Scott M.; Mineka, Susan
2008-01-01
Our commentary was intended to stimulate discussion about what we perceive to be shortcomings of the mnemonic model and its research base, in the hope of shedding some light on key questions for understanding posttraumatic stress disorder (PTSD). In our view, Berntsen, Rubin, and Bohni have responded only to what they perceive to be shortcomings…
Psychology Students' Knowledge and Use of Mnemonics
ERIC Educational Resources Information Center
McCabe, Jennifer A.; Osha, Kelsey L.; Roche, Jennifer A.; Susser, Jonathan A.
2013-01-01
Mnemonics are strategies that can enhance learning and memory of course material. An online survey examined psychology students' metacognitive awareness and self-reported behaviors regarding mnemonics. Results showed that most participants could define mnemonics, but only a minority could describe the cognitive mechanisms involved.…
Finding Meaning in Mathematical Mnemonics
ERIC Educational Resources Information Center
Miller, Geoffrey; Obara, Samuel
2017-01-01
A mathematical mnemonic is a visual cue or verbal strategy that is used to aid initial memorisation and recall of a mathematical concept or procedure. Used wisely, mathematical mnemonics can benefit students' performance and understanding. Explorations into how mathematical mnemonics work can also offer students opportunities to engage in proof…
Using Self-Generated Cues to Facilitate Recall: A Narrative Review
Wheeler, Rebecca L.; Gabbert, Fiona
2017-01-01
We draw upon the Associative Network model of memory, as well as the principles of encoding-retrieval specificity, and cue distinctiveness, to argue that self-generated cue mnemonics offer an intuitive means of facilitating reliable recall of personally experienced events. The use of a self-generated cue mnemonic allows for the spreading activation nature of memory, whilst also presenting an opportunity to capitalize upon cue distinctiveness. Here, we present the theoretical rationale behind the use of this technique, and highlight the distinction between a self-generated cue and a self-referent cue in autobiographical memory research. We contrast this mnemonic with a similar retrieval technique, Mental Reinstatement of Context, which is recognized as the most effective mnemonic component of the Cognitive Interview. Mental Reinstatement of Context is based upon the principle of encoding-retrieval specificity, whereby the overlap between encoded information and retrieval cue predicts the likelihood of accurate recall. However, it does not incorporate the potential additional benefit of self-generated retrieval cues. PMID:29163254
Internet Address Space Management in Digital
1992-09-01
password: % passwd Changing password for wade Old password: New password: Retype new password: 3. Log out of the cluster center machine by typing...that on some machine, you can use the " passwd " command on the machine where the change is needed. 16
Keystroke Dynamics-Based Credential Hardening Systems
NASA Astrophysics Data System (ADS)
Bartlow, Nick; Cukic, Bojan
abstract Keystroke dynamics are becoming a well-known method for strengthening username- and password-based credential sets. The familiarity and ease of use of these traditional authentication schemes combined with the increased trustworthiness associated with biometrics makes them prime candidates for application in many web-based scenarios. Our keystroke dynamics system uses Breiman’s random forests algorithm to classify keystroke input sequences as genuine or imposter. The system is capable of operating at various points on a traditional ROC curve depending on application-specific security needs. As a username/password authentication scheme, our approach decreases the system penetration rate associated with compromised passwords up to 99.15%. Beyond presenting results demonstrating the credential hardening effect of our scheme, we look into the notion that a user’s familiarity to components of a credential set can non-trivially impact error rates.
Secure password-based authenticated key exchange for web services
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liang, Fang; Meder, Samuel; Chevassut, Olivier
This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options inmore » the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.« less
On the security of a simple three-party key exchange protocol without server's public keys.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho
2014-01-01
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.
On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys
Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho
2014-01-01
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723
Mishra, Dheerendra
2015-01-01
Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.
Strong Password-Based Authentication in TLS Using the Three-PartyGroup Diffie-Hellman Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abdalla, Michel; Bresson, Emmanuel; Chevassut, Olivier
2006-08-26
The Internet has evolved into a very hostile ecosystem where"phishing'' attacks are common practice. This paper shows that thethree-party group Diffie-Hellman key exchange can help protect againstthese attacks. We have developed a suite of password-based cipher suitesfor the Transport Layer Security (TLS) protocol that are not onlyprovably secure but also assumed to be free from patent and licensingrestrictions based on an analysis of relevant patents in thearea.
Biometrics based authentication scheme for session initiation protocol.
Xie, Qi; Tang, Zhixiong
2016-01-01
Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.
Alternative Fuels Data Center: Forgot Your Password?
AFDC Printable Version Share this resource Send a link to Alternative Fuels Data Center: Forgot Your Password? to someone by E-mail Share Alternative Fuels Data Center: Forgot Your Password? on to share Alternative Fuels Data Center: Forgot Your Password? on AddThis.com... Forgot Your Password
NASA Technical Reports Server (NTRS)
Bishop, Matt
1990-01-01
Password selection has long been a difficult issue; traditionally, passwords are either assigned by the computer or chosen by the user. When the computer does the assignment, the passwords are often hard to remember; when the user makes the selection, the passwords are often easy to guess. This paper describes a technique, and a mechanism, to allow users to select passwords which to them are easy to remember but to others would be very difficult to guess. The technique is site, user, and group compatible, and allows rapid changing of constraints imposed upon the password. Although experience with this technique is limited, it appears to have much promise.
Corpus-based Statistical Screening for Phrase Identification
Kim, Won; Wilbur, W. John
2000-01-01
Purpose: The authors study the extraction of useful phrases from a natural language database by statistical methods. The aim is to leverage human effort by providing preprocessed phrase lists with a high percentage of useful material. Method: The approach is to develop six different scoring methods that are based on different aspects of phrase occurrence. The emphasis here is not on lexical information or syntactic structure but rather on the statistical properties of word pairs and triples that can be obtained from a large database. Measurements: The Unified Medical Language System (UMLS) incorporates a large list of humanly acceptable phrases in the medical field as a part of its structure. The authors use this list of phrases as a gold standard for validating their methods. A good method is one that ranks the UMLS phrases high among all phrases studied. Measurements are 11-point average precision values and precision-recall curves based on the rankings. Result: The authors find of six different scoring methods that each proves effective in identifying UMLS quality phrases in a large subset of MEDLINE. These methods are applicable both to word pairs and word triples. All six methods are optimally combined to produce composite scoring methods that are more effective than any single method. The quality of the composite methods appears sufficient to support the automatic placement of hyperlinks in text at the site of highly ranked phrases. Conclusion: Statistical scoring methods provide a promising approach to the extraction of useful phrases from a natural language database for the purpose of indexing or providing hyperlinks in text. PMID:10984469
Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho
2017-01-01
Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.
Kang, Dongwoo; Lee, Donghoon; Won, Dongho
2017-01-01
Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075
NASA Astrophysics Data System (ADS)
Imamah; Djunaidy, A.; Rachmad, A.; Damayanti, F.
2018-01-01
Password is needed to access the computing services. Text password is a combination between characters, numbers and symbols. One of issues is users will often choose guessable passwords, e.g. date of birth, name of pet, or anniversary date. To address this issue, we proposed password generator using Coupled Congruential method (CLCG). CLCG is a method to solve the weakness of Linear Congruential generator (LCG). In this research, we want to prove that CLCG is really good to generate random password compared to LCG method. The result of this research proves that the highest password strength is obtained by CLCG with score 77.4%. Besides of those things, we had proved that term of LCG is also applicable to CLCG.
[Application of password manager software in health care].
Ködmön, József
2016-12-01
When using multiple IT systems, handling of passwords in a secure manner means a potential source of problem. The most frequent issues are choosing the appropriate length and complexity, and then remembering the strong passwords. Password manager software provides a good solution for this problem, while greatly increasing the security of sensitive medical data. This article introduces a password manager software and provides basic information of the application. It also discusses how to select a really secure password manager software and suggests a practical application to efficient, safe and comfortable use for health care. Orv. Hetil., 2016, 157(52), 2066-2073.
Cazier, Joseph A; Medlin, B Dawn
2006-09-27
For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed.
Cazier, Joseph A; Medlin, B. Dawn
2006-01-01
For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed. PMID:18066366
NASA Astrophysics Data System (ADS)
Coggins, Porter E.
2015-04-01
The purpose of this paper is (1) to present how general education elementary school age students constructed computer passwords using digital root sums and second-order arithmetic sequences, (2) argue that computer password construction can be used as an engaging introduction to generate interest in elementary school students to study mathematics related to computer science, and (3) share additional mathematical ideas accessible to elementary school students that can be used to create computer passwords. This paper serves to fill a current gap in the literature regarding the integration of mathematical content accessible to upper elementary school students and aspects of computer science in general, and computer password construction in particular. In addition, the protocols presented here can serve as a hook to generate further interest in mathematics and computer science. Students learned to create a random-looking computer password by using biometric measurements of their shoe size, height, and age in months and to create a second-order arithmetic sequence, then converted the resulting numbers into characters that become their computer passwords. This password protocol can be used to introduce students to good computer password habits that can serve a foundation for a life-long awareness of data security. A refinement of the password protocol is also presented.
Proctor, Robert W; Lien, Mei-Ching; Vu, Kim-Phuong L; Schultz, E Eugene; Salvendy, Gavriel
2002-05-01
Entering a username-password combination is a widely used procedure for identification and authentication in computer systems. However, it is a notoriously weak method, in that the passwords adopted by many users are easy to crack. In an attempt to improve security, proactive password checking may be used, in which passwords must meet several criteria to be more resistant to cracking. In two experiments, we examined the influence of proactive password restrictions on the time that it took to generate an acceptable password and to use it subsequently to long in. The required length was a minimum of five characters in Experiment 1 and eight characters in Experiment 2. In both experiments, one condition had only the length restriction, and the other had additional restrictions. The additional restrictions greatly increased the time it took to generate the password but had only a small effect on the time it took to use it subsequently to long in. For the five-character passwords, 75% were cracked when no other restrictions were imposed, and this was reduced to 33% with the additional restrictions. For the eight-character passwords, 17% were cracked with no other restrictions, and 12.5% with restrictions. The results indicate that increasing the minimum character length reduces crackability and increases security, regardless of whether additional restrictions are imposed.
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers
2014-07-07
POST re- quest, LastPass will store h’ as authenticating Alice. Mallory can then use otp’ to log-in to LastPass us- ing otp’. Of course , decrypting the...everywhere. [36] M. Rochkind. Security, forms, and error handling. In Expert PHP and MySQL , pages 191–247. Springer, 2013. [37] D. Silver, S. Jana, E
[Efficacy of the keyword mnemonic method in adults].
Campos, Alfredo; Pérez-Fabello, María José; Camino, Estefanía
2010-11-01
Two experiments were used to assess the efficacy of the keyword mnemonic method in adults. In Experiment 1, immediate and delayed recall (at a one-day interval) were assessed by comparing the results obtained by a group of adults using the keyword mnemonic method in contrast to a group using the repetition method. The mean age of the sample under study was 59.35 years. Subjects were required to learn a list of 16 words translated from Latin into Spanish. Participants who used keyword mnemonics that had been devised by other experimental participants of the same characteristics, obtained significantly higher immediate and delayed recall scores than participants in the repetition method. In Experiment 2, other participants had to learn a list of 24 Latin words translated into Spanish by using the keyword mnemonic method reinforced with pictures. Immediate and delayed recall were significantly greater in the keyword mnemonic method group than in the repetition method group.
Privacy Enhancements for Inexact Biometric Templates
NASA Astrophysics Data System (ADS)
Ratha, Nalini; Chikkerur, Sharat; Connell, Jonathan; Bolle, Ruud
Traditional authentication schemes utilize tokens or depend on some secret knowledge possessed by the user for verifying his or her identity. Although these techniques are widely used, they have several limitations. Both tokenand knowledge-based approaches cannot differentiate between an authorized user and an impersonator having access to the tokens or passwords. Biometrics-based authentication schemes overcome these limitations while offering usability advantages in the area of password management. However, despite its obvious advantages, the use of biometrics raises several security and privacy concerns.
Multi-agent integrated password management (MIPM) application secured with encryption
NASA Astrophysics Data System (ADS)
Awang, Norkhushaini; Zukri, Nurul Hidayah Ahmad; Rashid, Nor Aimuni Md; Zulkifli, Zuhri Arafah; Nazri, Nor Afifah Mohd
2017-10-01
Users use weak passwords and reuse them on different websites and applications. Password managers are a solution to store login information for websites and help users log in automatically. This project developed a system that acts as an agent managing passwords. Multi-Agent Integrated Password Management (MIPM) is an application using encryption that provides users with secure storage of their login account information such as their username, emails and passwords. This project was developed on an Android platform with an encryption agent using Java Agent Development Environment (JADE). The purpose of the embedded agents is to act as a third-party software to ease the encryption process, and in the future, the developed encryption agents can form part of the security system. This application can be used by the computer and mobile users. Currently, users log into many applications causing them to use unique passwords to prevent password leaking. The crypto agent handles the encryption process using an Advanced Encryption Standard (AES) 128-bit encryption algorithm. As a whole, MIPM is developed on the Android application to provide a secure platform to store passwords and has high potential to be commercialised for public use.
On search guide phrase compilation for recommending home medical products.
Luo, Gang
2010-01-01
To help people find desired home medical products (HMPs), we developed an intelligent personal health record (iPHR) system that can automatically recommend HMPs based on users' health issues. Using nursing knowledge, we pre-compile a set of "search guide" phrases that provides semantic translation from words describing health issues to their underlying medical meanings. Then iPHR automatically generates queries from those phrases and uses them and a search engine to retrieve HMPs. To avoid missing relevant HMPs during retrieval, the compiled search guide phrases need to be comprehensive. Such compilation is a challenging task because nursing knowledge updates frequently and contains numerous details scattered in many sources. This paper presents a semi-automatic tool facilitating such compilation. Our idea is to formulate the phrase compilation task as a multi-label classification problem. For each newly obtained search guide phrase, we first use nursing knowledge and information retrieval techniques to identify a small set of potentially relevant classes with corresponding hints. Then a nurse makes the final decision on assigning this phrase to proper classes based on those hints. We demonstrate the effectiveness of our techniques by compiling search guide phrases from an occupational therapy textbook.
Mishra, Dheerendra; Mukhopadhyay, Sourav; Chaturvedi, Ankita; Kumari, Saru; Khan, Muhammad Khurram
2014-06-01
Remote user authentication is desirable for a Telecare Medicine Information System (TMIS) for the safety, security and integrity of transmitted data over the public channel. In 2013, Tan presented a biometric based remote user authentication scheme and claimed that his scheme is secure. Recently, Yan et al. demonstrated some drawbacks in Tan's scheme and proposed an improved scheme to erase the drawbacks of Tan's scheme. We analyze Yan et al.'s scheme and identify that their scheme is vulnerable to off-line password guessing attack, and does not protect anonymity. Moreover, in their scheme, login and password change phases are inefficient to identify the correctness of input where inefficiency in password change phase can cause denial of service attack. Further, we design an improved scheme for TMIS with the aim to eliminate the drawbacks of Yan et al.'s scheme.
Syntax-Prosody Interface: Evidence from wh-Movement in Jordanian Arabic and Egyptian Arabic
ERIC Educational Resources Information Center
Yasin, Ayman
2012-01-01
Richards (2006, 2010) suggests that wh-movement is prosodically driven. Based on the position of the Comp(lementizer) and the marking of prosodic phrase edges, he claims that if Comp is on one side and the language marks the opposite side of prosodic phrases, then the wh-phrase does not move since Comp and wh-phrase can create a prosodic wh-domain…
Voice Biometrics as a Way to Self-service Password Reset
NASA Astrophysics Data System (ADS)
Hohgräfe, Bernd; Jacobi, Sebastian
Password resets are time consuming. Especially when urgent jobs need to be done, it is cumbersome to inform the user helpdesk, to identify oneself and then to wait for response. It is easy to enter a wrong password multiple times, which leads to the blocking of the application. Voice biometrics is an easy and secure way for individuals to reset their own password. Read more about how you can ease the burden of your user helpdesk and how voice biometric password resets benefit your expense situation without harming your security.
BACTrack: A Surveillance Technique for Detecting and Locating Bioagent Attacks
2003-06-10
Implementation • Location History – Location tracking/storage using cell - phone network (geo-location mandated by 2006) • Subscription Services...Reporting – User reports symptoms through automated cell - phone interface using password Individual reports only releasable with password Summary...Earlier detection and location relative to medical surveillance • The cell - phone location based service market can offer a means to implement BACTrack and to distribute its costs
When Do First Letters Mnemonics Aid Recall?
ERIC Educational Resources Information Center
Morris, P. E.; Cook, N.
1978-01-01
The evidence for the effectiveness of the first letter mnemonic technique is confused. There are at least three studies showing no effect, and one where an improvement in recall occurred. Reports two experiments which attempted to locate the conditions under which the first letter mnemonic is effective. (Author/RK)
Embedded Picture Mnemonics to Learn Letters
ERIC Educational Resources Information Center
Shmidman, Adina; Ehri, Linnea
2010-01-01
Can embedded mnemonics ease the task of learning a foreign alphabet? English-speaking preschoolers (N = 36, M = 5;2 years) were taught 10 Hebrew letter-sound relations. Experimental letters were learned with mnemonics that embedded letter shapes in drawings of objects whose shapes resembled the letters and whose English names began with the…
Mnemonics and the Learning Disabled Child.
ERIC Educational Resources Information Center
Mahan, Virginia
1993-01-01
This paper examines the various types and functions of mnemonic strategies that may be used to expedite recall in students with learning disabilities (LD), reviews research in this area, and outlines avenues for research. The paper concludes that mnemonic strategies have an untapped potential for improving LD students' learning, retention, and…
Questioning the Order of Operations
ERIC Educational Resources Information Center
Dupree, Kami M.
2016-01-01
For decades, students have been encouraged to use "Please Excuse My Dear Aunt Sally" as a means of learning the order of operations. Teachers unfamiliar with the Aunt Sally mnemonic are perhaps more familiar with a mnemonic such as PEMDAS. Each mnemonic is intended to convey "parentheses, exponents, multiplication, division,…
ERIC Educational Resources Information Center
Scruggs, Thomas E.; And Others
1993-01-01
Fifty-three adolescents with learning disabilities or mild mental retardation were taught reasons for dinosaur extinction. Those taught in a mnemonic elaborative interrogation condition recalled more reasons than did students who received direct teaching. Students in elaborative interrogation and mnemonic elaborative interrogation groups recalled…
A Causal Theory of Mnemonic Confabulation
Bernecker, Sven
2017-01-01
This paper attempts to answer the question of what defines mnemonic confabulation vis-à-vis genuine memory. The two extant accounts of mnemonic confabulation as “false memory” and as ill-grounded memory are shown to be problematic, for they cannot account for the possibility of veridical confabulation, ill-grounded memory, and well-grounded confabulation. This paper argues that the defining characteristic of mnemonic confabulation is that it lacks the appropriate causal history. In the confabulation case, there is no proper counterfactual dependence of the state of seeming to remember on the corresponding past representation. PMID:28769847
Bennett, Ilana J; Stark, Craig E L
2016-03-01
Pattern separation describes the orthogonalization of similar inputs into unique, non-overlapping representations. This computational process is thought to serve memory by reducing interference and to be mediated by the dentate gyrus of the hippocampus. Using ultra-high in-plane resolution diffusion tensor imaging (hrDTI) in older adults, we previously demonstrated that integrity of the perforant path, which provides input to the dentate gyrus from entorhinal cortex, was associated with mnemonic discrimination, a behavioral outcome designed to load on pattern separation. The current hrDTI study assessed the specificity of this perforant path integrity-mnemonic discrimination relationship relative to other cognitive constructs (identified using a factor analysis) and white matter tracts (hippocampal cingulum, fornix, corpus callosum) in 112 healthy adults (20-87 years). Results revealed age-related declines in integrity of the perforant path and other medial temporal lobe (MTL) tracts (hippocampal cingulum, fornix). Controlling for global effects of brain aging, perforant path integrity related only to the factor that captured mnemonic discrimination performance. Comparable integrity-mnemonic discrimination relationships were also observed for the hippocampal cingulum and fornix. Thus, whereas perforant path integrity specifically relates to mnemonic discrimination, mnemonic discrimination may be mediated by a broader MTL network. Copyright © 2015 Elsevier Inc. All rights reserved.
A Secure Mobile-Based Authentication System for e-Banking
NASA Astrophysics Data System (ADS)
Rifà-Pous, Helena
Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable. We propose a challenge-response based one-time password (OTP) scheme that uses symmetric cryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks. Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their own trusted computers.
How strong are passwords used to protect personal health information in clinical trials?
El Emam, Khaled; Moreau, Katherine; Jonker, Elizabeth
2011-02-11
Findings and statements about how securely personal health information is managed in clinical research are mixed. The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices.
How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?
Moreau, Katherine; Jonker, Elizabeth
2011-01-01
Background Findings and statements about how securely personal health information is managed in clinical research are mixed. Objective The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Methods Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. Results We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. Conclusion If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices. PMID:21317106
Code of Federal Regulations, 2010 CFR
2010-07-01
... that my password or other form of authentication has become compromised? 363.19 Section 363.19 Money... that my password or other form of authentication has become compromised? If you become aware that your password has become compromised, that any other form of authentication has been compromised, lost, stolen...
One-Time Password Tokens | High-Performance Computing | NREL
One-Time Password Tokens One-Time Password Tokens For connecting to NREL's high-performance computing (HPC) systems, learn how to set up a one-time password (OTP) token for remote and privileged a one-time pass code from the HPC Operations team. At the sign-in screen Enter your HPC Username in
Simpler and Safer: One Password Opens Many Online Doors
ERIC Educational Resources Information Center
Carnevale, Dan
2007-01-01
Going online nowadays often requires more log-ins and passwords than most people can remember. Faculty and staff members will sometimes write their various passwords on yellow sticky notes and post them on their computer monitors--leaving confidential data wide open to any passer-by. What if there were just one password? A single log-on for e-mail…
Mnemonics and the Very Young Children: A Position Taken.
ERIC Educational Resources Information Center
Partridge, Susan
Mnemonic devices can help or hinder young children's efforts to learn. An example of the facilitative use of mnemonics is Lyn Wendon's Pictogram System, an approach to reading and spelling that pairs intrinsically interesting images with letters of the alphabet and their combinations. The sentence "Arthur Ar has a get-away car"…
Mnemonic Instruction in Science and Social Studies for Students with Learning Problems: A Review
ERIC Educational Resources Information Center
Lubin, Jacqueline; Polloway, Edward A.
2016-01-01
Over the years, mnemonic instruction has been promoted as an effective strategy to teach students with learning problems including learning disabilities (LD) or mild intellectual disability (MID). This paper discusses mnemonic instruction, including types, versatility in use, and effectiveness with struggling learners. Specific emphasis then is…
Design and implementation of face recognition system based on Windows
NASA Astrophysics Data System (ADS)
Zhang, Min; Liu, Ting; Li, Ailan
2015-07-01
In view of the basic Windows login password input way lacking of safety and convenient operation, we will introduce the biometrics technology, face recognition, into the computer to login system. Not only can it encrypt the computer system, also according to the level to identify administrators at all levels. With the enhancement of the system security, user input can neither be a cumbersome nor worry about being stolen password confidential.
Li, Xiong; Niu, Jianwei; Karuppiah, Marimuthu; Kumari, Saru; Wu, Fan
2016-12-01
Benefited from the development of network and communication technologies, E-health care systems and telemedicine have got the fast development. By using the E-health care systems, patient can enjoy the remote medical service provided by the medical server. Medical data are important privacy information for patient, so it is an important issue to ensure the secure of transmitted medical data through public network. Authentication scheme can thwart unauthorized users from accessing services via insecure network environments, so user authentication with privacy protection is an important mechanism for the security of E-health care systems. Recently, based on three factors (password, biometric and smart card), an user authentication scheme for E-health care systems was been proposed by Amin et al., and they claimed that their scheme can withstand most of common attacks. Unfortunate, we find that their scheme cannot achieve the untraceability feature of the patient. Besides, their scheme lacks a password check mechanism such that it is inefficient to find the unauthorized login by the mistake of input a wrong password. Due to the same reason, their scheme is vulnerable to Denial of Service (DoS) attack if the patient updates the password mistakenly by using a wrong password. In order improve the security level of authentication scheme for E-health care application, a robust user authentication scheme with privacy protection is proposed for E-health care systems. Then, security prove of our scheme are analysed. Security and performance analyses show that our scheme is more powerful and secure for E-health care systems when compared with other related schemes.
One-Time Password Registration Key Code Request | High-Performance
Computing | NREL One-Time Password Registration Key Code Request One-Time Password Registration Key Code Request Use this form to request a one-time password (OTP) registration key code for using . Alternate Email In case there is a second email where we might contact you Phone In case we need to contact
Code of Federal Regulations, 2010 CFR
2010-07-01
..., password, and any other form(s) of authentication we may require. We will treat any transactions conducted using your password as having been authorized by you. We are not liable for any loss, liability, cost, or expense that you may incur as a result of transactions made using your password. [72 FR 30978...
CONSTRAINTS ON VARIABLES IN SYNTAX.
ERIC Educational Resources Information Center
ROSS, JOHN ROBERT
IN ATTEMPTING TO DEFINE "SYNTACTIC VARIABLE," THE AUTHOR BASES HIS DISCUSSION ON THE ASSUMPTION THAT SYNTACTIC FACTS ARE A COLLECTION OF TWO TYPES OF RULES--CONTEXT-FREE PHRASE STRUCTURE RULES (GENERATING UNDERLYING OR DEEP PHRASE MARKERS) AND GRAMMATICAL TRANSFORMATIONS, WHICH MAP UNDERLYING PHRASE MARKERS ONTO SUPERFICIAL (OR SURFACE) PHRASE…
ERIC Educational Resources Information Center
Shriberg, Linda K.
As an extension of an earlier investigation that examined the effects of mnemonic strategy application on children's memory for abstract prose passages, a study compared the benefits accrued by students taught two different variations of the mnemonic keyword method for learning abstract prose information, via tasks of associative recognition and…
Teaching through Mnemonics in Elementary School Classrooms
ERIC Educational Resources Information Center
Waite-McGough, Arianne
2012-01-01
Mnemonics and songs are used to help students excel and build are their knowledge in all content areas. This method of teaching and reinforcement of information helps students to commit new information to memory and continue to use this material throughout their lives. Using mnemonics is a lessons way to teach and make the classroom a unique…
ERIC Educational Resources Information Center
Mocko, Megan; Lesser, Lawrence M.; Wagler, Amy E.; Francis, Wendy S.
2017-01-01
Mnemonics (memory aids) are often viewed as useful in helping students recall information, and thereby possibly reducing stress and freeing up more cognitive resources for higher-order thinking. However, there has been little research on statistics mnemonics, especially for large classes. This article reports on the results of a study conducted…
Multiple Serial List Learning with Two Mnemonic Techniques.
ERIC Educational Resources Information Center
Marston, Paul T.; Young, Robert K.
The classic mnemonic for learning serial lists, the method of loci, and its modern counterpart, the peg system, were compared by having subjects learn three 20-item serial lists. In addition to the type of mnemonic training, list imagery was either high (rated 6-7) or medium (rated 4-5), and instructions were either progressive elaboration (e.g.,…
Carnegie, Jacqueline A
2012-01-01
The study of anatomy is a content-dense discipline with a challenging vocabulary. A mnemonic is a series of letters, a word, a phrase, or a rhyme that students can use when studying to facilitate recall. This project was designed to promote active learning in undergraduate students studying anatomy and physiology by asking them to create limericks based on course content and then to evaluate the limericks written by their peers for learning value, accuracy, style, and adherence to limerick characteristics. Students (278 and 288, respectively, in the 2009 and 2010 sections of ANP1107) worked in groups of three to create a total of 242 limericks. Peer evaluation was accomplished in two stages using a 20-point marking rubric. In Stage 1, students were randomly divided into 10 groups (n = 23 ± 2 students) with each group member evaluating the same 12 ± 1 limericks. In Stage 2, the top 19% of limericks were reevaluated by all students so that the best three could be chosen. In each of the two years, 60% of students completed all parts of the assignment. Higher percentages (75-80%) participated in limerick writing and one of the two assessment stages. A positive association was noted between level of student participation in the limerick assignment and final course marks. Limerick creation and evaluation can be used to promote active learning by encouraging students to review functional-anatomy-based content to create limericks with good learning value and to provide valid assessments of limericks written by their peers. Copyright © 2012 American Association of Anatomists.
The difficult mountain: enriched composition in adjective–noun phrases
Pickering, Martin J.; McElree, Brian
2012-01-01
When readers need to go beyond the straightforward compositional meaning of a sentence (i.e., when enriched composition is required), costly additional processing is the norm. However, this conclusion is based entirely on research that has looked at enriched composition between two phrases or within the verb phrase (e.g., the verb and its complement in … started the book …) where there is a discrepancy between the semantic expectations of the verb and the semantics of the noun. We carried out an eye-tracking experiment investigating enriched composition within a single noun phrase, as in the difficult mountain. As compared with adjective–noun phrases that allow a straightforward compositional interpretation (the difficult exercise), the coerced phrases were more difficult to process. These results indicate that coercion effects can be found in the absence of a typing violation and within a single noun phrase. PMID:21826403
Meter, Diana J; Bauman, Sheri
2015-08-01
Every day, children and adolescents communicate online via social networking sites (SNSs). They also report sharing passwords with peers and friends, a potentially risky behavior in regard to cyber safety. This longitudinal study tested the hypotheses that social network engagement in multiple settings would predict more cyberbullying involvement over time, and that youth who reported sharing passwords would also experience an increase in cyberbullying involvement. Data were collected at two time points one year apart from 1,272 third through eighth grade students. In line with the first study hypothesis, participating in more online SNSs was associated with increased cyberbullying involvement over time, as well as sharing passwords over time. Cyberbullying involvement at T1 predicted decreases in sharing passwords over time, suggesting that youth become aware of the dangers of sharing passwords as a result of their experience. Sharing passwords at T1 was unrelated to cyberbullying involvement at T2. Although it seems that youth may be learning from their previous mistakes, due to the widespread use of social media and normality of sharing passwords among young people, it is important to continue to educate youth about cyber safety and risky online behavior.
Entity Resolution Workflow Installation Process and User Guide
2013-07-01
Program Files\\PostgreSQL\\9.1\\data superuser ( postgres ), service account ( postgres ) password : "password" Port #: 5432 Add an environment variable...in this report. • Run the script found in <GG_HOME>\\ globalgraph-dist-1.4.6-final\\schema- ddl\\postgresSetup.bat. This script will set up Postgres ...Username: postgres DB Admin PWD: password GlobalGraph App User: gguser GlobalGraph App PWD: password • Restart the Postgres service using the Windows
Individual differences in cyber security behaviors: an examination of who is sharing passwords.
Whitty, Monica; Doodson, James; Creese, Sadie; Hodges, Duncan
2015-01-01
In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found younger [corrected] people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns.
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords
Doodson, James; Creese, Sadie; Hodges, Duncan
2015-01-01
Abstract In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found older people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns. PMID:25517697
1989-09-27
a run is always the @RUN statement, which can specify user-id, account number, and project-id. The @ PASSWD statement specifies password and security...Every-Page-Label Options PASSWD password for batch; F36 User-id validation chang for demand; comp, nent set for batch LEV change Clearance Level F33...clearance level @@PASS Change password F36 Current valid password must @@ PASSWD be specified @@SEND Display a print file F16 Sym to user-id or site-id that is
Technical structure of the global nanoscience and nanotechnology literature
NASA Astrophysics Data System (ADS)
Kostoff, Ronald N.; Koytcheff, Raymond G.; Lau, Clifford G. Y.
2007-10-01
Text mining was used to extract technical intelligence from the open source global nanotechnology and nanoscience research literature. An extensive nanotechnology/nanoscience-focused query was applied to the Science Citation Index/Social Science Citation Index (SCI/SSCI) databases. The nanotechnology/nanoscience research literature technical structure (taxonomy) was obtained using computational linguistics/document clustering and factor analysis. The infrastructure (prolific authors, key journals/institutions/countries, most cited authors/journals/documents) for each of the clusters generated by the document clustering algorithm was obtained using bibliometrics. Another novel addition was the use of phrase auto-correlation maps to show technical thrust areas based on phrase co-occurrence in Abstracts, and the use of phrase-phrase cross-correlation maps to show technical thrust areas based on phrase relations due to the sharing of common co-occurring phrases. The ˜400 most cited nanotechnology papers since 1991 were grouped, and their characteristics generated. Whereas the main analysis provided technical thrusts of all nanotechnology papers retrieved, analysis of the most cited papers allowed their characteristics to be displayed. Finally, most cited papers from selected time periods were extracted, along with all publications from those time periods, and the institutions and countries were compared based on their representation in the most cited documents list relative to their representation in the most publications list.
NASA Technical Reports Server (NTRS)
Bishop, Matt
1988-01-01
The organization of some tools to help improve passwork security at a UNIX-based site is described along with how to install and use them. These tools and their associated library enable a site to force users to pick reasonably safe passwords (safe being site configurable) and to enable site management to try to crack existing passworks. The library contains various versions of a very fast implementation of the Data Encryption Standard and of the one-way encryption functions used to encryp the password.
Software For Computer-Security Audits
NASA Technical Reports Server (NTRS)
Arndt, Kate; Lonsford, Emily
1994-01-01
Information relevant to potential breaches of security gathered efficiently. Automated Auditing Tools for VAX/VMS program includes following automated software tools performing noted tasks: Privileged ID Identification, program identifies users and their privileges to circumvent existing computer security measures; Critical File Protection, critical files not properly protected identified; Inactive ID Identification, identifications of users no longer in use found; Password Lifetime Review, maximum lifetimes of passwords of all identifications determined; and Password Length Review, minimum allowed length of passwords of all identifications determined. Written in DEC VAX DCL language.
Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
NASA Astrophysics Data System (ADS)
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.
I PREPARE: development and clinical utility of an environmental exposure history mnemonic.
Paranzino, Grace K; Butterfield, Patricia; Nastoff, Teresa; Ranger, Cherryll
2005-01-01
The I PREPARE environmental exposure history mnemonic is a quick reference tool created for primary care providers. Health care providers (N = 159) were asked to evaluate a prototype mnemonic, to suggest new health history questions, and to propose the deletion of less relevant questions. The goal of this evaluation was to create a practical and clinically relevant mnemonic, rather than to obtain quantitative estimates of validity. The final I PREPARE mnemonic cues the provider to "Investigate potential exposures;" ask questions related to "Present work," "Residence," "Environmental concerns," "Past work," and "Activities;" provide "Referrals and resources;" and "Educate" the patient by reviewing a checklist of strategies to prevent or minimize exposures. The sequence of I PREPARE makes intuitive sense by cueing the provider to ask specific questions and provide educational materials to the patient. National improvements in the quality of environmental exposure history data are predicated in part on the creation of simple and convenient tools for use in clinical practice.
Runs [ Open Access : Password Protected ] CESM Development CESM Runs [ Open Access : Password Protected ] WRF Development WRF Runs [ Open Access : Password Protected ] Climate Modeling Home Projects Links Literature Manuscripts Publications Polar Group Meeting (2012) ASGC Home ASGC Jobs Web Calendar Wiki Internal
The Characteristics of User-Generated Passwords
1990-03-01
electronic keys), user interface tokens (pocket devices that can generate one-time passwords) and fixed password devices ( plastic cards that contain...APPENDIX B-7 DIFFREM DIFFICULTY REMfEIBERING by PASSCHAR PASSORD CARACTERISTICS PASSCHAR Pate I of 1 Count 1 Row Pet IALPHAVET NUMERIC ALPHANUM ASCII Cal Pet
ERIC Educational Resources Information Center
Hayes, Orla C.
2009-01-01
Mnemonic strategies that use imagery and visual cues to facilitate memory recall are commonly used in the classroom. A familiar tune, song or jingle, used as a mnemonic device is another popular memory aid. Studies of the brain and memory reveal that exposure to music not only alters but increases brain function in students. The purpose of this…
Majumdar, Tapas; Haldar, Basudeb; Mallick, Arabinda
2017-02-20
A simple strategy is proposed to design and develop an intelligent device based on dual channel ion responsive spectral properties of a commercially available molecule, harmine (HM). The system can process different sets of opto-chemical inputs generating different patterns as fluorescence outputs at specific wavelengths which can provide an additional level of protection exploiting both password and pattern recognitions. The proposed system could have the potential to come up with highly secured combinatorial locks at the molecular level that could pose valuable real time and on-site applications for user authentication.
NASA Astrophysics Data System (ADS)
Majumdar, Tapas; Haldar, Basudeb; Mallick, Arabinda
2017-02-01
A simple strategy is proposed to design and develop an intelligent device based on dual channel ion responsive spectral properties of a commercially available molecule, harmine (HM). The system can process different sets of opto-chemical inputs generating different patterns as fluorescence outputs at specific wavelengths which can provide an additional level of protection exploiting both password and pattern recognitions. The proposed system could have the potential to come up with highly secured combinatorial locks at the molecular level that could pose valuable real time and on-site applications for user authentication.
Nelson, Peter M; Burns, Matthew K; Kanive, Rebecca; Ysseldyke, James E
2013-12-01
The current study used a randomized controlled trial to compare the effects of a practice-based intervention and a mnemonic strategy intervention on the retention and application of single-digit multiplication facts with 90 third- and fourth-grade students with math difficulties. Changes in retention and application were assessed separately using one-way ANCOVAs in which students' pretest scores were included as the covariate. Students in the practice-based intervention group had higher retention scores (expressed as the total number of digits correct per minute) relative to the control group. No statistically significant between-group differences were observed for application scores. Practical and theoretical implications for interventions targeting basic multiplication facts are discussed. © 2013.
Case Markers in Mongolian: A Means for Encoding Null Constituents in Noun Phrase and Relative Clause
ERIC Educational Resources Information Center
Otgonsuren, Tseden
2017-01-01
This paper focuses on the capacity of the case markers in the Mongolian language, as a relative element, to generate any finite noun phrase or relative clause based on their syntactic function or relationship. In Mongolian, there are two different approaches to generate noun phrases: parataxis and hypotaxis. According to my early observation, if…
Zhang, Ruisheng; Liu, Qidong
2017-01-01
Wireless sensor networks (WSNs), which consist of a large number of sensor nodes, have become among the most important technologies in numerous fields, such as environmental monitoring, military surveillance, control systems in nuclear reactors, vehicle safety systems, and medical monitoring. The most serious drawback for the widespread application of WSNs is the lack of security. Given the resource limitation of WSNs, traditional security schemes are unsuitable. Approaches toward withstanding related attacks with small overhead have thus recently been studied by many researchers. Numerous studies have focused on the authentication scheme for WSNs, but most of these works cannot achieve the security performance and overhead perfectly. Nam et al. proposed a two-factor authentication scheme with lightweight sensor computation for WSNs. In this paper, we review this scheme, emphasize its drawbacks, and propose a temporal credential-based mutual authentication with a multiple-password scheme for WSNs. Our scheme uses multiple passwords to achieve three-factor security performance and generate a session key between user and sensor nodes. The security analysis phase shows that our scheme can withstand related attacks, including a lost password threat, and the comparison phase shows that our scheme involves a relatively small overhead. In the comparison of the overhead phase, the result indicates that more than 95% of the overhead is composed of communication and not computation overhead. Therefore, the result motivates us to pay further attention to communication overhead than computation overhead in future research. PMID:28135288
Liu, Xin; Zhang, Ruisheng; Liu, Qidong
2017-01-01
Wireless sensor networks (WSNs), which consist of a large number of sensor nodes, have become among the most important technologies in numerous fields, such as environmental monitoring, military surveillance, control systems in nuclear reactors, vehicle safety systems, and medical monitoring. The most serious drawback for the widespread application of WSNs is the lack of security. Given the resource limitation of WSNs, traditional security schemes are unsuitable. Approaches toward withstanding related attacks with small overhead have thus recently been studied by many researchers. Numerous studies have focused on the authentication scheme for WSNs, but most of these works cannot achieve the security performance and overhead perfectly. Nam et al. proposed a two-factor authentication scheme with lightweight sensor computation for WSNs. In this paper, we review this scheme, emphasize its drawbacks, and propose a temporal credential-based mutual authentication with a multiple-password scheme for WSNs. Our scheme uses multiple passwords to achieve three-factor security performance and generate a session key between user and sensor nodes. The security analysis phase shows that our scheme can withstand related attacks, including a lost password threat, and the comparison phase shows that our scheme involves a relatively small overhead. In the comparison of the overhead phase, the result indicates that more than 95% of the overhead is composed of communication and not computation overhead. Therefore, the result motivates us to pay further attention to communication overhead than computation overhead in future research.
Das, Ashok Kumar; Bruhadeshwar, Bezawada
2013-10-01
Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Walkup, Elizabeth
Passwords are an ubiquitous, established part of the Internet today, but they are also a huge security headache. Single sign-on, OAuth, and password managers are some of the solutions to this problem. OAuth is a new, popular method that allows people to use large, common authentication providers for many web applications. However, it comes at the expense of some privacy: OAuth makes users easy to track across websites, applications, and devices. Password managers put the power in the hands of the users, but this vulnerability survey reveals that you have to be extremely careful which program you choose. All inmore » all, password managers are the solution of choice for home users and small organizations, but large companies will probably want to invest in their own SSO solutions.« less
Chinese lexical networks: The structure, function and formation
NASA Astrophysics Data System (ADS)
Li, Jianyu; Zhou, Jie; Luo, Xiaoyue; Yang, Zhanxin
2012-11-01
In this paper Chinese phrases are modeled using complex networks theory. We analyze statistical properties of the networks and find that phrase networks display some important features: not only small world and the power-law distribution, but also hierarchical structure and disassortative mixing. These statistical traits display the global organization of Chinese phrases. The origin and formation of such traits are analyzed from a macroscopic Chinese culture and philosophy perspective. It is interesting to find that Chinese culture and philosophy may shape the formation and structure of Chinese phrases. To uncover the structural design principles of networks, network motif patterns are studied. It is shown that they serve as basic building blocks to form the whole phrase networks, especially triad 38 (feed forward loop) plays a more important role in forming most of the phrases and other motifs. The distinct structure may not only keep the networks stable and robust, but also be helpful for information processing. The results of the paper can give some insight into Chinese language learning and language acquisition. It strengthens the idea that learning the phrases helps to understand Chinese culture. On the other side, understanding Chinese culture and philosophy does help to learn Chinese phrases. The hub nodes in the networks show the close relationship with Chinese culture and philosophy. Learning or teaching the hub characters, hub-linking phrases and phrases which are meaning related based on motif feature should be very useful and important for Chinese learning and acquisition.
A Phrase-Based Matching Function.
ERIC Educational Resources Information Center
Galbiati, Giulia
1991-01-01
Describes the development of an information retrieval system designed for nonspecialist users that is based on the binary vector model. The syntactic structure of phrases used for indexing is examined, queries using an experimental collection of documents are described, and precision values are examined. (19 references) (LRW)
ERIC Educational Resources Information Center
Stengel, Barbara Senkowski
This book takes an interpretative look at a common phrase in American educational equity lexicon, "the right to education." It addresses the educational disputes and issues of policy, procedure, and popular will that are associated with this phrase. Interpretation of the phrase is based on a focus on the everyday situations in which a right to…
Hampstead, Benjamin M.; Sathian, K.; Phillips, Pamela A.; Amaraneni, Akshay; Delaune, William R.; Stringer, Anthony Y.
2012-01-01
Objectives To evaluate the efficacy of mnemonic strategy training versus a matched-exposure control condition and also to examine the relationship between training-related gains, neuropsychological abilities, and medial temporal lobe volumetrics in patients with amnestic mild cognitive impairment (aMCI) and age-matched healthy controls. Methods Twenty-three of 45 screened healthy controls and 29 of 42 screened aMCI were randomized to mnemonic strategy or matched-exposure groups. Groups were run in parallel, with participants blind to the other intervention. All participants completed five sessions within two weeks. Memory testing for object-location associations was performed during sessions one and five and at a one-month follow-up. During sessions 2–4, participants received either mnemonic strategy training or a matched number of exposures with corrective feedback for a total of 45 object-location associations. Structural MRI was performed in most participants and medial temporal lobe volumetrics were acquired. Results Twenty-one healthy controls and 28 aMCI patients were included in data analysis. Mnemonic strategy training was significantly more beneficial than matched-exposure immediately after training, p =.006, pη2 = .16, and at one month, p<.001, pη2 = .35, regardless of diagnostic group (healthy controls or aMCI). Although aMCI patients demonstrated gains comparable to the healthy control groups, their overall performance generally remained reduced. Mnemonic strategy-related improvement was positively correlated with baseline memory and executive functioning and negatively with inferior lateral ventricle volume in aMCI patients; no significant relationships were evident in matched-exposure patients. Conclusions Mnemonic strategies effectively improve memory for specific content for at least one month in aMCI. PMID:22409311
Volberg, Gregor; Goldhacker, Markus; Hanslmayr, Simon
2016-01-01
Abstract The method of loci is one, if not the most, efficient mnemonic encoding strategy. This spatial mnemonic combines the core cognitive processes commonly linked to medial temporal lobe (MTL) activity: spatial and associative memory processes. During such processes, fMRI studies consistently demonstrate MTL activity, while electrophysiological studies have emphasized the important role of theta oscillations (3–8 Hz) in the MTL. However, it is still unknown whether increases or decreases in theta power co-occur with increased BOLD signal in the MTL during memory encoding. To investigate this question, we recorded EEG and fMRI separately, while human participants used the spatial method of loci or the pegword method, a similarly associative but nonspatial mnemonic. The more effective spatial mnemonic induced a pronounced theta power decrease source localized to the left MTL compared with the nonspatial associative mnemonic strategy. This effect was mirrored by BOLD signal increases in the MTL. Successful encoding, irrespective of the strategy used, elicited decreases in left temporal theta power and increases in MTL BOLD activity. This pattern of results suggests a negative relationship between theta power and BOLD signal changes in the MTL during memory encoding and spatial processing. The findings extend the well known negative relation of alpha/beta oscillations and BOLD signals in the cortex to theta oscillations in the MTL. PMID:28101523
DDN Trusted Guard Gateway. Trusted Guard Gateway (TGG) Technology Assessment. Phase 2
1989-02-02
strengthened via removal of the encrypted passwords from the password/group files, and imposition of limits on root, login, passwd , and super users. For...amongst these are the removal of the list of encoded passwords from the etc/ passwd file, and the removal of any special privileges from the root ID
Secure Server Login by Using Third Party and Chaotic System
NASA Astrophysics Data System (ADS)
Abdulatif, Firas A.; zuhiar, Maan
2018-05-01
Server is popular among all companies and it used by most of them but due to the security threat on the server make this companies are concerned when using it so that in this paper we will design a secure system based on one time password and third parity authentication (smart phone). The proposed system make security to the login process of server by using one time password to authenticate person how have permission to login and third parity device (smart phone) as other level of security.
Imagery mnemonics and memory remediation.
Richardson, J T
1992-02-01
This paper evaluates the claim that imagery mnemonic techniques are useful in remediation of memory disorders in brain-damaged patients. Clinical research has confirmed that such techniques can lead to improved performance on formal testing in a number of neurologic disease populations and following lesions of either the left or right hemisphere. However, those patients with more severe forms of amnesia and those with medial or bilateral damage do not improve unless the learning task is highly structured. Even among patients who show improvement on formal testing, there is little evidence that they maintain the use of these techniques in similar learning tasks or generalize the use to new learning situations. Imagery mnemonics also appear to be of little practical value in the daily activities that are of most concern to brain-damaged patients themselves. The effectiveness of imagery mnemonics appears to depend upon the patients' motivation and insight rather than upon their intelligence or educational level. Instead of training patients in specific mnemonic techniques, clinicians should promote the development of "meta-cognitive" skills and the acquisition of knowledge about domains of practical significance.
NASA Astrophysics Data System (ADS)
Zhu, Xiaoyong; Quan, Li; Chen, Yunyun; Liu, Guohai; Shen, Yue; Liu, Hui
2012-04-01
The concept of the memory motor is based on the fact that the magnetization level of the AlNiCo permanent magnet in the motor can be regulated by a temporary current pulse and memorized automatically. In this paper, a new type of memory motor is proposed, namely a flux mnemonic double salient motor drive, which is particularly attractive for electric vehicles. To accurately analyze the motor, an improved hysteresis model is employed in the time-stepping finite element method. Both simulation and experimental results are given to verify the validity of the new method.
Identifying synonymy between relational phrases using word embeddings.
Nguyen, Nhung T H; Miwa, Makoto; Tsuruoka, Yoshimasa; Tojo, Satoshi
2015-08-01
Many text mining applications in the biomedical domain benefit from automatic clustering of relational phrases into synonymous groups, since it alleviates the problem of spurious mismatches caused by the diversity of natural language expressions. Most of the previous work that has addressed this task of synonymy resolution uses similarity metrics between relational phrases based on textual strings or dependency paths, which, for the most part, ignore the context around the relations. To overcome this shortcoming, we employ a word embedding technique to encode relational phrases. We then apply the k-means algorithm on top of the distributional representations to cluster the phrases. Our experimental results show that this approach outperforms state-of-the-art statistical models including latent Dirichlet allocation and Markov logic networks. Copyright © 2015 Elsevier Inc. All rights reserved.
Frick, Karyn M.
2009-01-01
The question of whether ovarian hormone therapy can prevent or reduce age-related memory decline in menopausal women has been the subject of much recent debate. Although numerous studies have demonstrated a beneficial effect of estrogen and/or progestin therapy for certain types of memory in menopausal women, recent clinical trials suggest that such therapy actually increases the risk of cognitive decline and dementia. Because rodent models have been frequently used to examine the effects of age and/or ovarian hormone deficiency on mnemonic function, rodent models of age-related hormone and memory decline may be useful in helping to resolve this issue. This review will focus on evidence suggesting that estradiol modulates memory, particularly hippocampal-dependent memory, in young and aging female rats and mice. Various factors affecting the mnemonic response to estradiol in aging females will be highlighted to illustrate the complications inherent to studies of estrogen therapy in aging females. Avenues for future development of estradiol-based therapies will also be discussed, and it is argued that an approach to drug development based on identifying the molecular mechanisms underlying estrogenic modulation of memory may lead to promising future treatments for reducing age-related mnemonic decline. PMID:18835561
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-03
... Contracts and Non-Vessel-Operating Service Arrangements; Transmission of Approved Log-In ID and Passwords... advise applicants for log-in IDs and passwords. DATES: The Final Rule is effective March 3, 2011. FOR... the U.S. Mail to transmit approved log-on IDs and password to registrants in the Commission's...
Password Complexity Recommendations: xezandpAxat8Um or P4$$w0rd!!!!
2014-10-01
have we seen the computer screen with fast- scrolling characters, with good answers being indicated one by one? This is not a MasterMind game ! Password...security/2013/ 05/how-crackers-make-minced- meat -out-of-your-passwords (Access Date: 2014-04-02). 18 DRDC-RDDC-2014-R27 DOCUMENT CONTROL DATA (Security
To What Extent Do Native and Non-Native Writers Make Use of Collocations?
ERIC Educational Resources Information Center
Durrant, Philip; Schmitt, Norbert
2009-01-01
Usage-based models claim that first language learning is based on the frequency-based analysis of memorised phrases. It is not clear though, whether adult second language learning works in the same way. It has been claimed that non-native language lacks idiomatic formulas, suggesting that learners neglect phrases, focusing instead on orthographic…
Implicit Prosody and Cue-based Retrieval: L1 and L2 Agreement and Comprehension during Reading
Pratt, Elizabeth; Fernández, Eva M.
2016-01-01
This project focuses on structural and prosodic effects during reading, examining their influence on agreement processing and comprehension in native English (L1) and Spanish–English bilingual (L2) speakers. We consolidate research from several distinct areas of inquiry—cognitive processing, reading fluency, and L1/L2 processing—in order to support the integration of prosody with a cue-based retrieval mechanism for subject-verb agreement. To explore this proposal, the experimental design manipulated text presentation to influence implicit prosody, using sentences designed to induce subject-verb agreement attraction errors. Materials included simple and complex relative clauses with head nouns and verbs that were either matched or mismatched for number. Participants read items in one of three presentation formats (whole sentence, word-by-word, or phrase-by-phrase), rated each item for grammaticality, and responded to a comprehension probe. Results indicated that while overall, message comprehension was prioritized over subject-verb agreement computation, presentation format differentially affected both measures in the L1 and L2 groups. For the L1 participants, facilitating the projection of phrasal prosody onto text (phrase-by-phrase presentation) enhanced performance in agreement processing, while disrupting prosodic projection via word-by-word presentation decreased comprehension accuracy. For the L2 participants, however, phrase-by-phrase presentation was not significantly beneficial for agreement processing, and additionally resulted in lower comprehension accuracy. These differences point to a significant role of prosodic phrasing during agreement processing in both L1 and L2 speakers, additionally suggesting that it may contribute to a cue-based retrieval agreement model, either acting as a cue directly, or otherwise scaffolding the retrieval process. The discussion and results presented provide support both for a cue-based retrieval mechanism in agreement, and the function of prosody within such a mechanism, adding further insight into the interaction of retrieval processes, cognitive task load, and the role of implicit prosody. PMID:28018264
Implicit Prosody and Cue-based Retrieval: L1 and L2 Agreement and Comprehension during Reading.
Pratt, Elizabeth; Fernández, Eva M
2016-01-01
This project focuses on structural and prosodic effects during reading, examining their influence on agreement processing and comprehension in native English (L1) and Spanish-English bilingual (L2) speakers. We consolidate research from several distinct areas of inquiry-cognitive processing, reading fluency, and L1/L2 processing-in order to support the integration of prosody with a cue-based retrieval mechanism for subject-verb agreement. To explore this proposal, the experimental design manipulated text presentation to influence implicit prosody, using sentences designed to induce subject-verb agreement attraction errors. Materials included simple and complex relative clauses with head nouns and verbs that were either matched or mismatched for number. Participants read items in one of three presentation formats (whole sentence, word-by-word, or phrase-by-phrase), rated each item for grammaticality, and responded to a comprehension probe. Results indicated that while overall, message comprehension was prioritized over subject-verb agreement computation, presentation format differentially affected both measures in the L1 and L2 groups. For the L1 participants, facilitating the projection of phrasal prosody onto text (phrase-by-phrase presentation) enhanced performance in agreement processing, while disrupting prosodic projection via word-by-word presentation decreased comprehension accuracy. For the L2 participants, however, phrase-by-phrase presentation was not significantly beneficial for agreement processing, and additionally resulted in lower comprehension accuracy. These differences point to a significant role of prosodic phrasing during agreement processing in both L1 and L2 speakers, additionally suggesting that it may contribute to a cue-based retrieval agreement model, either acting as a cue directly, or otherwise scaffolding the retrieval process. The discussion and results presented provide support both for a cue-based retrieval mechanism in agreement, and the function of prosody within such a mechanism, adding further insight into the interaction of retrieval processes, cognitive task load, and the role of implicit prosody.
Giguere, Rebecca; Brown, William; Balán, Ivan C; Dolezal, Curtis; Ho, Titcha; Sheinfil, Alan; Ibitoye, Mobolaji; Lama, Javier R; McGowan, Ian; Cranston, Ross D; Carballo-Diéguez, Alex
2018-04-01
During a Phase 2 rectal microbicide trial, men who have sex with men and transgender women (n = 187) in 4 countries (Peru, South Africa, Thailand, United States) reported product use daily via short message service (SMS). To prevent disclosure of study participation, the SMS system program included privacy and security features. We evaluated participants' perceptions of privacy while using the system and acceptability of privacy/security features. To protect privacy, the SMS system: (1) confirmed participant availability before sending the study questions, (2) required a password, and (3) did not reveal product name or study participation. To ensure security, the system reminded participants to lock phone/delete messages. A computer-assisted self-interview (CASI), administered at the final visit, measured burden of privacy and security features and SMS privacy concerns. A subsample of 33 participants underwent an in-depth interview (IDI). Based on CASI, 85% had no privacy concerns; only 5% were very concerned. Most were not bothered by the need for a password (73%) or instructions to delete messages (82%). Based on IDI, reasons for low privacy concerns included sending SMS in private or feeling that texting would not draw attention. A few IDI participants found the password unnecessary and more than half did not delete messages. Most participants were not concerned that the SMS system would compromise their confidentiality. SMS privacy and security features were effective and not burdensome. Short ID-related passwords, ambiguous language, and reminders to implement privacy and security-enhancing behaviors are recommended for SMS systems.
The old English rune poem: elements of mnemonics and psychoneurologic beliefs.
Bradley, D J
1989-08-01
Some rune verses are, apparently, thematically derived from Chinese Radical sequences. The 33 runes are, like the Sanskrit letters, mnemonically valenced and formally associated with the nervous system.
Asymmetric effects of emotion on mnemonic interference
Leal, Stephanie L.; Tighe, Sarah K.; Yassa, Michael A.
2014-01-01
Emotional experiences can strengthen memories so that they can be used to guide future behavior. Emotional arousal, mediated by the amygdala, is thought to modulate storage by the hippocampus, which may encode unique episodic memories via pattern separation – the process by which similar memories are stored using non-overlapping representations. While prior work has examined mnemonic interference due to similarity and emotional modulation of memory independently, examining the mechanisms by which emotion influences mnemonic interference has not been previously accomplished in humans. To this end, we developed an emotional memory task where emotional content and stimulus similarity were varied to examine the effect of emotion on fine mnemonic discrimination (a putative behavioral correlate of hippocampal pattern separation). When tested immediately after encoding, discrimination was reduced for similar emotional items compared to similar neutral items, consistent with a reduced bias towards pattern separation. After 24 h, recognition of emotional target items was preserved compared to neutral items, whereas similar emotional item discrimination was further diminished. This suggests a potential mechanism for the emotional modulation of memory with a selective remembering of gist, as well as a selective forgetting of detail, indicating an emotion-induced reduction in pattern separation. This can potentially increase the effective signal-to-noise ratio in any given situation to promote survival. Furthermore, we found that individuals with depressive symptoms hyper-discriminate negative items, which correlated with their symptom severity. This suggests that utilizing mnemonic discrimination paradigms allows us to tease apart the nuances of disorders with aberrant emotional mnemonic processing. PMID:24607286
Group Management Method of RFID Passwords for Privacy Protection
NASA Astrophysics Data System (ADS)
Kobayashi, Yuichi; Kuwana, Toshiyuki; Taniguchi, Yoji; Komoda, Norihisa
When RFID tag is used in the whole item lifecycle including a consumer scene or a recycle scene, we have to protect consumer privacy in the state that RFID tag is stuck on an item. We use the low cost RFID tag that has the access control function using a password, and we propose a method which manages RFID tags by passwords identical to each group of RFID tags. This proposal improves safety of RFID system because the proposal method is able to reduce the traceability for a RFID tag, and hold down the influence for disclosure of RFID passwords in the both scenes.
GhostWriter-2.0: Product Reviews with Case-Based Support
NASA Astrophysics Data System (ADS)
Bridge, Derek; Healy, Paul
A lot of user-generated content on the Web takes the form of records of personal experiences. Case-Based Reasoning offers a way of helping one user to reuse another's experiences from the Web. In this paper, we present GhostWriter-2.0, a Case-Based Reasoning system that supports a user who is writing a product review. GhostWriter-2.0 makes suggestions to the user, in the form of short phrases that are mined from other reviews. The purpose of the suggestions is to prompt the user to write a more comprehensive and helpful review than she might otherwise have done. We explain how GhostWriter-2.0's case base is populated with relevant and helpful reviews from Amazon. We show how it extracts and scores phrases in these reviews to decide which to suggest to the user.We report a trial with real users, in which users made greater use of GhostWriter-2.0's suggested phrases than they did of phrases suggested by a system that used a more random form of selection.
Fish, Jessica; Evans, Jonathan J; Nimmo, Morag; Martin, Emma; Kersel, Denyse; Bateman, Andrew; Wilson, Barbara A; Manly, Tom
2007-03-25
Prospective memory (PM) is often claimed to rely upon executive as well as mnemonic resources. Here, we examined the contribution of executive functions towards PM by providing intermittent support for monitoring processes using "content-free" cues, which carried no direct information regarding the PM task itself. Twenty participants with non-progressive brain injury and PM difficulties received brief training in linking a cue phrase "STOP!" with pausing current activity and reviewing stored goals. The efficacy of this strategy was examined with a PM task requiring participants to make telephone calls to a voicemail service at four set times each day for 10 days. Task content was encoded using errorless learning to minimise retrospective memory-based failures. On five randomly selected days, eight text messages reading simply "STOP!" were sent to participants' mobile telephones, but crucially not within an hour of a target time. Striking improvements in performance were observed on cued days, thus demonstrating a within-subjects experimental modulation of PM performance using cues that carry no information other than by association with participants' stored memory of their intentions. In addition to the theoretical insights, the time course over which the effect was observed constitutes encouraging evidence that such strategies are useful in helping to remediate some negative consequences of executive dysfunction. It is proposed that this benefit results from enhanced efficiency of goal management via increased monitoring of current and future goals, and the steps necessary to achieve them, perhaps compensating for under-functioning fronto-parietal attention systems.
Advanced Terrain Representation for the Microticcit Workstation: System Maintenance Manual
1986-02-01
enter the */ /* password. */ /* Inputs: passwd - password to compare userfs entry to */ /* Outputs: TRUE - if password entered correctly...include "atrdefs.h" #include "ctype.h" extern char window[]; /* useable portion of screen */ 1 i getpw( passwd ) char passwd []; { int c...blank input window */ pcvgcp(&row,*col); curs_off(); nchars - ntries - 0; len « strlen( passwd ); pcvwca(len,• *,REVIDEO); /* process keys till user
An Improved Mnemonic Diagram for Thermodynamic Relationships.
ERIC Educational Resources Information Center
Rodriguez, Joaquin; Brainard, Alan J.
1989-01-01
Considers pressure, volume, entropy, temperature, Helmholtz free energy, Gibbs free energy, enthalpy, and internal energy. Suggests the mnemonic diagram is for use with simple systems that are defined as macroscopically homogeneous, isotropic, uncharged, and chemically inert. (MVL)
Latent mnemonic strengths are latent: a comment on Mickes, Wixted, and Wais (2007).
Rouder, Jeffrey N; Pratte, Michael S; Morey, Richard D
2010-06-01
Mickes, Wixted, and Wais (2007) proposed a simple test of latent strength variability in recognition memory. They asked participants to rate their confidence using either a 20-point or a 99-point strength scale and plotted distributions of the resulting ratings. They found 25% more variability in ratings for studied than for new items, which they interpreted as providing evidence that latent mnemonic strength distributions are 25% more variable for studied than for new items. We show here that this conclusion is critically dependent on assumptions--so much so that these assumptions determine the conclusions. In fact, opposite conclusions, such that study does not affect the variability of latent strength, may be reached by making different but equally plausible assumptions. Because all measurements of mnemonic strength variability are critically dependent on untestable assumptions, all are arbitrary. Hence, there is no principled method for assessing the relative variability of latent mnemonic strength distributions.
Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials
NASA Astrophysics Data System (ADS)
Park, Jun-Cheol
User privacy preservation is critical to prevent many sophisticated attacks that are based on the user's server access patterns and ID-related information. We propose a password-based user authentication scheme that provides strong privacy protection using one-time credentials. It eliminates the possibility of tracing a user's authentication history and hides the user's ID and password even from servers. In addition, it is resistant against user impersonation even if both a server's verification database and a user's smart card storage are disclosed. We also provide a revocation scheme for a user to promptly invalidate the user's credentials on a server when the user's smart card is compromised. The schemes use lightweight operations only such as computing hashes and bitwise XORs.
Artistic drawing as a mnemonic device
NASA Astrophysics Data System (ADS)
Baker Christensen, Leslie
Despite art-based learning being widely used, existing data are primarily qualitative, and most research has not isolated particular variables such as memory for empirical study. The few experiments that have been conducted demonstrated that drawing improves free recall of unpaired words, and retention improves after lessons integrated with drawing, drama, and narrative exercises. To help fill the gap in the current literature, the present study compared the effectiveness of encoding and the rate of memory decay between a drawing mnemonic and note taking on a paired associates task. Using a within-subjects experimental design, participants were presented with word pairs and asked to complete either a drawing mnemonic (DM) or note taking (NT) to assist memorization. Participants were tested immediately after the word pair presentation and after a 20-minute delay. Results supported the hypothesis that the DM condition would produce superior encoding, as evidenced by greater retention on the immediate test. However, no memory decay was observed in the experiment, and therefore results on the delayed test were inconclusive. In fact, scores for the NT condition improved over time whereas the scores for the DM condition did not, which might imply that note taking results in a different consolidation process than drawing. Findings from this study suggested that arts integration can be an effective method to support memory for learned information. Future studies that examine the effect of rehearsal and the long-term effectiveness of a drawing mnemonic are warranted. This dissertation is available in open access at AURA, http://aura.antioch.edu/ and Ohio Link ETD Center, https://etd.ohiolink.edu/etd.
Chang, Allen; Murray, Elizabeth; Yassa, Michael A.
2016-01-01
Face recognition is an important component of successful social interactions in humans. A large literature in social psychology has focused on the phenomenon termed “the other race” (ORE) effect, the tendency to be more proficient with face recognition within one’s own ethnic group, as compared to other ethnic groups. Several potential hypotheses have been proposed for this effect including perceptual expertise, social grouping, and holistic face processing. Recent work on mnemonic discrimination (i.e. the ability to resolve mnemonic interference among similar experiences) may provide a mechanistic account for the ORE. In the current study, we examined how discrimination and generalization in the presence of mnemonic interference may contribute to the ORE. We developed a database of computerized faces divided evenly among ethnic origins (Black, Caucasian, East Asian, South Asian), as well as morphed face stimuli that varied in the amount of similarity to the original stimuli (30%, 40%, 50%, and 60% morphs). Participants first examined the original unmorphed stimuli during study, then during test were asked to judge the prior occurrence of repetitions (targets), morphed stimuli (lures), and new stimuli (foils). We examined participants’ ability to correctly reject similar morphed lures and found that it increased linearly as a function of face dissimilarity. We additionally found that Caucasian participants’ mnemonic discrimination/generalization functions were sharply tuned for Caucasian faces but considerably less tuned for East Asian and Black faces. These results suggest that expertise plays an important role in resolving mnemonic interference, which may offer a mechanistic account for the ORE. PMID:26413724
ERIC Educational Resources Information Center
Shantz, Kailen
2017-01-01
This study reports on a self-paced reading experiment in which native and non-native speakers of English read sentences designed to evaluate the predictions of usage-based and rule-based approaches to second language acquisition (SLA). Critical stimuli were four-word sequences embedded into sentences in which phrase frequency and grammaticality…
Menus and mnemonics in airway facilities.
DOT National Transportation Integrated Search
2003-04-01
This study examines the use of menus and mnemonics in current Airway Facilities (AF) systems and compares them to human factors : guidelines and best practices. Researchers from the William J. Hughes Technical Center traveled to AF field sites and co...
NASA Technical Reports Server (NTRS)
McGreevy, Michael W.; Connors, Mary M. (Technical Monitor)
2001-01-01
To support Search Requests and Quick Responses at the Aviation Safety Reporting System (ASRS), four new QUORUM methods have been developed: keyword search, phrase search, phrase generation, and phrase discovery. These methods build upon the core QUORUM methods of text analysis, modeling, and relevance-ranking. QUORUM keyword search retrieves ASRS incident narratives that contain one or more user-specified keywords in typical or selected contexts, and ranks the narratives on their relevance to the keywords in context. QUORUM phrase search retrieves narratives that contain one or more user-specified phrases, and ranks the narratives on their relevance to the phrases. QUORUM phrase generation produces a list of phrases from the ASRS database that contain a user-specified word or phrase. QUORUM phrase discovery finds phrases that are related to topics of interest. Phrase generation and phrase discovery are particularly useful for finding query phrases for input to QUORUM phrase search. The presentation of the new QUORUM methods includes: a brief review of the underlying core QUORUM methods; an overview of the new methods; numerous, concrete examples of ASRS database searches using the new methods; discussion of related methods; and, in the appendices, detailed descriptions of the new methods.
Research principles and the construction of mnemonic diagrams
NASA Technical Reports Server (NTRS)
Venda, V. F.; Mitkin, A. A.
1973-01-01
Mnemonic diagrams are defined as a variety of information display devices, the essential element of which is conventional graphical presentation of technological or functional-operational links in a controlled system or object. Graphically displaying the operational structure of an object, the interd dependence between different parameters, and the interdependence between indicators and control organs, the mneomonic diagram reduces the load on the operator's memory and facilitates perception and reprocessing of information and decision making, while at the same time playing the role of visual support to the information activity of the operator. The types of mnemonic diagrams are listed.
Extending Phrase-Based Decoding with a Dependency-Based Reordering Model
2009-11-01
strictly within the confines of phrase-based translation. The hope was to introduce an approach that could take advantage of monolingual syntactic...tuple represents one element of the XML markup, where element is the name of this element, attributes is a dictionary (mapping strings to strings...representing the range of possible compressions, in the form of a dictionary mapping the latter to the former. To represent multiple dependency
An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity
Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian
2016-01-01
User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.’s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.’s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance. PMID:27101305
Das, Ashok Kumar
2015-03-01
An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.
On the Application of Syntactic Methodologies in Automatic Text Analysis.
ERIC Educational Resources Information Center
Salton, Gerard; And Others
1990-01-01
Summarizes various linguistic approaches proposed for document analysis in information retrieval environments. Topics discussed include syntactic analysis; use of machine-readable dictionary information; knowledge base construction; the PLNLP English Grammar (PEG) system; phrase normalization; and statistical and syntactic phrase evaluation used…
ChemicalTagger: A tool for semantic text-mining in chemistry.
Hawizy, Lezan; Jessop, David M; Adams, Nico; Murray-Rust, Peter
2011-05-16
The primary method for scientific communication is in the form of published scientific articles and theses which use natural language combined with domain-specific terminology. As such, they contain free owing unstructured text. Given the usefulness of data extraction from unstructured literature, we aim to show how this can be achieved for the discipline of chemistry. The highly formulaic style of writing most chemists adopt make their contributions well suited to high-throughput Natural Language Processing (NLP) approaches. We have developed the ChemicalTagger parser as a medium-depth, phrase-based semantic NLP tool for the language of chemical experiments. Tagging is based on a modular architecture and uses a combination of OSCAR, domain-specific regex and English taggers to identify parts-of-speech. The ANTLR grammar is used to structure this into tree-based phrases. Using a metric that allows for overlapping annotations, we achieved machine-annotator agreements of 88.9% for phrase recognition and 91.9% for phrase-type identification (Action names). It is possible parse to chemical experimental text using rule-based techniques in conjunction with a formal grammar parser. ChemicalTagger has been deployed for over 10,000 patents and has identified solvents from their linguistic context with >99.5% precision.
TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
NASA Astrophysics Data System (ADS)
Nauman, Mohammad; Ali, Tamleek
Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to mitigate the risks associated with naïve username/password based authentication. However, these approaches have two major limitations: they are not applicable to services where authentication occurs outside the domain of the mobile device - such as web-based services; and they often overly tax the limited computational capabilities of mobile devices. In this paper, we propose a protocol for keystroke dynamics analysis which allows web-based applications to make use of remote attestation and delegated keystroke analysis. The end result is an efficient keystroke-based user identification mechanism that strengthens traditional password protected services while mitigating the risks of user profiling by collaborating malicious web services.
IDEA. VOCES: A Mnemonic Device to Cue Mood Selection after Impersonal Expressions.
ERIC Educational Resources Information Center
Chandler, Paul Michael
1996-01-01
Providing language learners with mnemonic devices assists retention and recall of vocabulary and structural items. This idea provides one such memory device to assist beginning and intermediate students who struggle with mood selection after impersonal expressions. (five references) (Author)
ERIC Educational Resources Information Center
Jackson, Michael C.; Anderson, Norman D.
1988-01-01
Discusses the value of memorized factual material in science. Describes the use of mnemonic devices to facilitate memorization. Provides a list of 14 mnemonic devices commonly used in science other than ROY G. BIV, which is used to remember the colors of the visible spectrum. (CW)
A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
Odelu, Vanga; Goswami, Adrijit
2014-01-01
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078
A robust and effective smart-card-based remote user authentication mechanism using hash function.
Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit
2014-01-01
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Murray, Anita; Dunlop, Rebecca A; Noad, Michael J; Goldizen, Anne W
2018-02-01
Male humpback whales produce a mating display called "song." Behavioral studies indicate song has inter- and/or intra-sexual functionality, suggesting song may be a multi-message display. Multi-message displays often include stereotypic components that convey group membership for mate attraction and/or male-male interactions, and complex components that convey individual quality for courtship. Humpback whale song contains sounds ("units") arranged into sequences ("phrases"). Repetitions of a specific phrase create a "theme." Within a theme, imperfect phrase repetitions ("phrase variants") create variability among phrases of the same type ("phrase type"). The hypothesis that song contains stereotypic and complex phrase types, structural characteristics consistent with a multi-message display, is investigated using recordings of 17 east Australian males (8:2004, 9:2011). Phrase types are categorized as stereotypic or complex using number of unit types, number of phrase variants, and the proportion of phrases that is unique to an individual versus shared amongst males. Unit types are determined using self-organizing maps. Phrase variants are determined by Levenshtein distances between phrases. Stereotypic phrase types have smaller numbers of unit types and shared phrase variants. Complex phrase types have larger numbers of unit types and unique phrase variants. This study supports the hypothesis that song could be a multi-message display.
Implications of Mnemonics Research for Cognitive Theory.
ERIC Educational Resources Information Center
Reese, Hayne W.
A skilled cognitive theorist might help behaviorists resolve inconsistencies found from their experimentation with imaginal mnemonics in paired-associate and serial learning tasks. Iconic cognition which relegates verbal processes to short-term storage and output systems is inadequate to explain the verbal coding and elaboration processes…
Verbal Rehearsal and Visual Imagery: Mnemonic Aids for Learning-Disabled Children.
ERIC Educational Resources Information Center
Rose, Michael C.; And Others
1983-01-01
Studies involving 30 learning-disabled elementary students support the contention that reading comprehension difficulties among learning-disabled children are partly due to inefficient memorization strategies, and demonstrate the efficacy of practical, cost-effective mnemonic training procedures which significantly increase reading comprehension…
ERIC Educational Resources Information Center
Ruekberg, Ben
2011-01-01
Many students find product prediction in ozonolysis reactions of alkenes and alkynes difficult, and they often have greater difficulty discerning the starting compounds when presented with ozonolysis products. The mnemonic device suggested here can help students figure out what the ozonolysis product (or products) will be. Once mastered, this…
Moore, Kimberly Sena; Peterson, David A; O'Shea, Geoffrey; McIntosh, Gerald C; Thaut, Michael H
2008-01-01
Research shows that people with multiple sclerosis exhibit learning and memory difficulties and that music can be used successfully as a mnemonic device to aid in learning and memory. However, there is currently no research investigating the effectiveness of music mnemonics as a compensatory learning strategy for people with multiple sclerosis. Participants with clinically definitive multiple sclerosis (N = 38) were given a verbal learning and memory test. Results from a recognition memory task were analyzed that compared learning through music (n = 20) versus learning through speech (n = 18). Preliminary baseline neuropsychological data were collected that measured executive functioning skills, learning and memory abilities, sustained attention, and level of disability. An independent samples t test showed no significant difference between groups on baseline neuropsychological functioning or on recognition task measures. Correlation analyses suggest that music mnemonics may facilitate learning for people who are less impaired by the disease. Implications for future research are discussed.
Formula recollection through a WORLDLY recognized mnemonic technique
NASA Astrophysics Data System (ADS)
Schunicht, Shannon
2009-10-01
Physics may be made fun, and encourage further learning through ease of recollection of complicated formulas; allthewhile increasing a student's confortability with their algebraic skills. Examples will be shown how ANY complicated formula will be made into a memorable acronym using this author's mnemonic technique, i.e. allowing each vowel to represent a mathematical operation: ``a'' multiplication implying ``@''; ``o''-division implying ``over''; ``i''-subtraction to imply ``minus''; ``u''-addition to imply ``plus''; and ``e'' implying ``equals''. Most constants and variables are indeed consonants; ``c'' = ``speed of light'' & ``z'' = ``altitude''. With this mnemonic technique ANY formula may be algebraically manipulated into a word, or series of words for ease of recollection. Additional letters may be added to enhance the intelligibility of such a letter combination, but these additional letters need be consonants ONLY. This mnemonic technique was developed as a compensatory memory method when taking physics at Texas A&M University following a severe head injury (19 days unconsciousness!) suffered by this author.
Phrasing in the speech and reading of the hearing impaired.
Gregory, J F
1986-08-01
The study reported here explored a partial explanation for the fourth-grade "bottleneck" in literacy advancement by hearing-impaired students. Speech samples from 21 deaf subjects were rated for degree of evident phrasal quality. Likewise, reading comprehension scores for each student were obtained under four reading conditions: reading in whole sentences, in phrases, in fragmented word groups, and in single words. Degree of rated speech phrasality was found to relate significantly and positively to correct recall answers to questions based upon silent reading of passages typed in meaningful word groups (but not when the passages were typed in whole sentences, fragmented word groups, or in single words). The results were taken to suggest that--whereas staccato-speaking deaf students may lack a sense of the phrase altogether--phrasal-speaking deaf youngsters fail to independently apply their phrase sense in the normal reading situation. Thus, both types of deaf youngsters have difficulty affecting the transition to phrase reading that is common for hearing students at or about the fourth-grade level. Finally, I argue that this phrase sense can be instilled in hearing-impaired students and that they can be trained to use it in reading.
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Islam, S K Hafizul; Khan, Muhammad Khurram; Li, Xiong
2015-01-01
Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.'s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen's scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature.
Islam, SK Hafizul; Khan, Muhammad Khurram; Li, Xiong
2015-01-01
Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.’s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen’s scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature. PMID:26263401
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, T.
SPI/U3.1 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Inspector Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, Tony
SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
SPI/U3.2. Security Profile Inspector for UNIX Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, A.
1994-08-01
SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
Mnemonic Strategies: Creating Schemata for Learning Enhancement
ERIC Educational Resources Information Center
Goll, Paulette S.
2004-01-01
This article investigates the process of remembering and presents techniques to improve memory retention. Examples of association, clustering, imagery, location, mnemonic devices and visualization illustrate strategies that can be used to encode and recall information from the long-term memory. Several memory games offer the opportunity to test…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Adamson, Ryan M.
Password management solutions exist, but few are designed for enterprise systems administrators sharing oncall rotations. Due to the Multi-Factor Level of Assurance 4 effort, DOE is now distributing PIV cards with cryptographically signed certificate and private key pairs to administrators and other security-significant users. We utilize this public key infrastructure (PKI) to encrypt passwords for other recipients in a secure way. This is cross platform (works on OSX and Linux systems), and has already been adopted internally by the NCCS systems administration staff to replace their old password book system.
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Genetics and Rheumatic Disease
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Pregnancy and Rheumatic Disease
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
American College of Rheumatology
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Granulomatosis with Polyangiitis (Wegener's)
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Calcium Pyrophosphate Deposition (CPPD)
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
NSAIDs (Nonsteroidal Anti-inflammatory Drugs)
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Osteonecrosis of the Jaw (ONJ)
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Female Autism Phenotypes Investigated at Different Levels of Language and Developmental Abilities.
Howe, Yamini J; O'Rourke, Julia A; Yatchmink, Yvette; Viscidi, Emma W; Jones, Richard N; Morrow, Eric M
2015-11-01
This study investigated the differences in clinical symptoms between females and males with autism spectrum disorder (ASD) across three verbal ability groups (nonverbal, phrase and fluent speech), based on which Autism Diagnostic Observation Schedule module was administered to 5723 individuals in four research datasets. In the Simons Simplex Collection and Autism Treatment Network, females with ASD and phrase or fluent speech had lower cognitive, adaptive, and social abilities than males. In the Autism Genetics Resource Exchange and the Autism Consortium, females with phrase or fluent speech had similar or better adaptive and social abilities than males. Females who were nonverbal had similar cognitive, adaptive, and social abilities as males. Population-based longitudinal studies of verbally fluent females with ASD are needed.
Use of Mnemonic Imagery for Content Learning.
ERIC Educational Resources Information Center
Konopak, Bonnie C.; And Others
1991-01-01
The effectiveness of a mnemonic study strategy, the keyword method, was applied with 10 learning-disabled middle school students studying a science chapter on rocks and minerals. Posttests after the four-day implementation indicated mixed results with some content acquisition but a need for further instruction in strategy utilization. (DB)
Virginia's New Hamster: A Thirteen States Mnemonic.
ERIC Educational Resources Information Center
Gallenstein, Nancy L.
2000-01-01
Provides an activity that enables students to learn and remember the names of the original thirteen states in the United States. Uses a humorous story that incorporates a mnemonic (a memory aid) strategy. Includes a copy of the story and a map of the original thirteen states in 1776. (CMK)
Teenage Mutant Ninja Turtles Counting Pizza Toppings: A Creative Writing Learning Strategy.
ERIC Educational Resources Information Center
Buchan, Laura; And Others
1996-01-01
This article describes the application of a proofreading mnemonic learning strategy for proofreading creative writing assignments. The mnemonic--Ninja Turtles Counting Pizza Toppings--reminds students to check their work for name, title, capitalization, punctuation, and transition words. Application of the strategy, possible pitfalls, and…
The Periodic Table as a Mnemonic Device for Writing Electronic Configurations.
ERIC Educational Resources Information Center
Mabrouk, Suzanne T.
2003-01-01
Presents an interactive method for using the periodic table as an effective mnemonic for writing electronic configurations. Discusses the intrinsic relevance of configurations to chemistry by building upon past analogies. Addresses pertinent background information, describes the hands-on method, and demonstrates its use. Transforms the traditional…
Old Lamps for New: Mnemonic Techniques and the Thesis
ERIC Educational Resources Information Center
Carter, Susan
2009-01-01
The mnemonic techniques of the past, like mind maps, metaphors, and narrative theory, offer research students, especially doctoral candidates, another cognitive support. These techniques pre-date computers (and possibly literacy), so shift cognitive organization from the page or the computer screen to the mind. This article compares early memory…
Extended Mnemonic Instruction with Learning Disabled Students.
ERIC Educational Resources Information Center
Tolfa, Debra; And Others
Sixty-four learning disabled sixth, seventh, and eighth grade students were assigned to 24 small instructional groups which were in turn assigned at random to mnemonic and control conditions. Instructional groups were then given three daily lessons on dinosaurs in counterbalanced order. The lessons involved dinosaur vocabulary, attributes of…
Mnemonics Are an Effective Tool for Adult Beginners Learning Plant Identification
ERIC Educational Resources Information Center
Stagg, Bethan C.; Donkin, Maria E.
2016-01-01
Most beginners are introduced to plant diversity through identification keys, which develop differentiation skills but not species memorisation. We propose that mnemonics, memorable "name clues" linking a species name with morphological characters, are a complementary learning tool for promoting species memorisation. In the first of two…
Cryopyrin-Associated Autoinflammatory Syndromes (CAPS) - Juvenile
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
ChemicalTagger: A tool for semantic text-mining in chemistry
2011-01-01
Background The primary method for scientific communication is in the form of published scientific articles and theses which use natural language combined with domain-specific terminology. As such, they contain free owing unstructured text. Given the usefulness of data extraction from unstructured literature, we aim to show how this can be achieved for the discipline of chemistry. The highly formulaic style of writing most chemists adopt make their contributions well suited to high-throughput Natural Language Processing (NLP) approaches. Results We have developed the ChemicalTagger parser as a medium-depth, phrase-based semantic NLP tool for the language of chemical experiments. Tagging is based on a modular architecture and uses a combination of OSCAR, domain-specific regex and English taggers to identify parts-of-speech. The ANTLR grammar is used to structure this into tree-based phrases. Using a metric that allows for overlapping annotations, we achieved machine-annotator agreements of 88.9% for phrase recognition and 91.9% for phrase-type identification (Action names). Conclusions It is possible parse to chemical experimental text using rule-based techniques in conjunction with a formal grammar parser. ChemicalTagger has been deployed for over 10,000 patents and has identified solvents from their linguistic context with >99.5% precision. PMID:21575201
Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schaffner, Christian
2010-09-15
We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters.more » Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.« less
Kawano, Tomonori
2013-03-01
There have been a wide variety of approaches for handling the pieces of DNA as the "unplugged" tools for digital information storage and processing, including a series of studies applied to the security-related area, such as DNA-based digital barcodes, water marks and cryptography. In the present article, novel designs of artificial genes as the media for storing the digitally compressed data for images are proposed for bio-computing purpose while natural genes principally encode for proteins. Furthermore, the proposed system allows cryptographical application of DNA through biochemically editable designs with capacity for steganographical numeric data embedment. As a model case of image-coding DNA technique application, numerically and biochemically combined protocols are employed for ciphering the given "passwords" and/or secret numbers using DNA sequences. The "passwords" of interest were decomposed into single letters and translated into the font image coded on the separate DNA chains with both the coding regions in which the images are encoded based on the novel run-length encoding rule, and the non-coding regions designed for biochemical editing and the remodeling processes revealing the hidden orientation of letters composing the original "passwords." The latter processes require the molecular biological tools for digestion and ligation of the fragmented DNA molecules targeting at the polymerase chain reaction-engineered termini of the chains. Lastly, additional protocols for steganographical overwriting of the numeric data of interests over the image-coding DNA are also discussed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hagans, K.G.; Clough, R.E.
2000-04-25
An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam ofmore » light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.« less
Hagans, Karla G.; Clough, Robert E.
2000-01-01
An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.
The role of prominence in determining the scope of boundary-related lengthening in Greek.
Katsika, Argyro
2016-03-01
This study aims at examining and accounting for the scope of the temporal effect of phrase boundaries. Previous research has indicated that there is an interaction between boundary-related lengthening and prominence such that the former extends towards the nearby prominent syllable. However, it is unclear whether this interaction is due to lexical stress and/or phrasal prominence (marked by pitch accent) and how far towards the prominent syllable the effect extends. Here, we use an electromagnetic articulography (EMA) study of Greek to examine the scope of boundary-related lengthening as a function of lexical stress and pitch accent separately. Boundaries are elicited by the means of a variety of syntactic constructions.. The results show an effect of lexical stress. Phrase-final lengthening affects the articulatory gestures of the phrase-final syllable that are immediately adjacent to the boundary in words with final stress, but is initiated earlier within phrase-final words with non-final stress. Similarly, the articulatory configurations during inter-phrasal pauses reach their point of achievement later in words with final stress than in words with non-final stress. These effects of stress hold regardless of whether the phrase-final word is accented or de-accented. Phrase-initial lengthening, on the other hand, is consistently detected on the phrase-initial constriction, independently of where the stress is within the preceding, phrase-final, word. These results indicate that the lexical aspect of prominence plays a role in determining the scope of boundary-related lengthening in Greek. Based on these results, a gestural account of prosodic boundaries in Greek is proposed in which lexical and phrasal prosody interact in a systematic and coordinated fashion. The cross-linguistic dimensions of this account and its implications for prosodic structure are discussed.
Immune System and Its Link to Rheumatic Diseases
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Periodic Fever, Aphthous Stomatitis, Pharyngitis, Adenitis Syndrome (PFAPA)
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Acute moderate exercise improves mnemonic discrimination in young adults.
Suwabe, Kazuya; Hyodo, Kazuki; Byun, Kyeongho; Ochi, Genta; Yassa, Michael A; Soya, Hideaki
2017-03-01
Increasing evidence suggests that regular moderate exercise increases neurogenesis in the dentate gyrus (DG) of the hippocampus and improves memory functions in both humans and animals. The DG is known to play a role in pattern separation, which is the ability to discriminate among similar experiences, a fundamental component of episodic memory. While long-term voluntary exercise improves pattern separation, there is little evidence of alterations in DG function after an acute exercise session. Our previous studies showing acute moderate exercise-enhanced DG activation in rats, and acute moderate exercise-enhanced prefrontal activation and executive function in humans, led us to postulate that acute moderate exercise may also activate the hippocampus, including more specifically the DG, thus improving pattern separation. We thus investigated the effects of a 10-min moderate exercise (50% V̇O 2peak ) session, the recommended intensity for health promotion, on mnemonic discrimination (a behavioral index of pattern separation) in young adults. An acute bout of moderate exercise improved mnemonic discrimination performance in high similarity lures. These results support our hypothesis that acute moderate exercise improves DG-mediated pattern separation in humans, proposing a useful human acute-exercise model for analyzing the neuronal substrate underlying acute and regular exercise-enhanced episodic memory based on the hippocampus. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.
Acute Moderate Exercise Improves Mnemonic Discrimination in Young Adults
Suwabe, Kazuya; Hyodo, Kazuki; Byun, Kyeongho; Ochi, Genta; Yassa, Michael A.; Soya, Hideaki
2018-01-01
Increasing evidence suggests that regular moderate exercise increases neurogenesis in the dentate gyrus (DG) of the hippocampus and improves memory functions in both humans and animals. The DG is known to play a role in pattern separation, which is the ability to discriminate among similar experiences, a fundamental component of episodic memory. While long-term voluntary exercise improves pattern separation, there is little evidence of alterations in DG function after an acute exercise session. Our previous studies showing acute moderate exercise-enhanced DG activation in rats, and acute moderate exercise-enhanced prefrontal activation and executive function in humans, led us to postulate that acute moderate exercise may also activate the hippocampus, including more specifically the DG, thus improving pattern separation. We thus investigated the effects of a 10-min moderate exercise (50% V̇O2peak) session, the recommended intensity for health promotion, on mnemonic discrimination (a behavioral index of pattern separation) in young adults. An acute bout of moderate exercise improved mnemonic discrimination performance in high similarity lures. These results support our hypothesis that acute moderate exercise improves DG-mediated pattern separation in humans, proposing a useful human acute-exercise model for analyzing the neuronal substrate underlying acute and regular exercise-enhanced episodic memory based on the hippocampus. PMID:27997992
Mechanisms for widespread hippocampal involvement in cognition
Shohamy, Daphna; Turk-Browne, Nicholas B.
2014-01-01
The quintessential memory system in the human brain — the hippocampus and surrounding medial temporal lobe (MTL) — is often treated as a module for the formation of conscious, or declarative memories. However, growing evidence suggests that the hippocampus plays a broader role in memory and cognition and that theories organizing memory into strictly dedicated systems may need to be updated. We first consider the historical evidence for the specialized role of the hippocampus in declarative memory. Then, we describe the serendipitous encounter that motivated this special section, based on parallel research from our labs that suggested a more pervasive contribution of the hippocampus to cognition beyond declarative memory. Finally, we develop a theoretical framework that describes two general mechanisms for how the hippocampus interacts with other brain systems and cognitive processes: the Memory Modulation Hypothesis, in which mnemonic representations in the hippocampus modulate the operation of other systems, and the Adaptive Function Hypothesis, in which specialized computations in the hippocampus are recruited as a component of both mnemonic and non-mnemonic functions. This framework is consistent with an emerging view that the most fertile ground for discovery in cognitive psychology and neuroscience lies at the interface between parts of the mind and brain that have traditionally been studied in isolation. PMID:24246058
Silva, Ana Rita; Pinho, Maria Salomé; Macedo, Luís; Souchay, Céline; Moulin, Christopher
2017-06-01
There is a debate about the ability of patients with Alzheimer's disease to build an up-to-date representation of their memory function, which has been termed mnemonic anosognosia. This form of anosognosia is typified by accurate online evaluations of performance, but dysfunctional or outmoded representations of function more generally. We tested whether people with Alzheimer's disease could adapt or change their representations of memory performance across three different six-week memory training programs using global judgements of learning. We showed that whereas online assessments of performance were accurate, patients continued to make inaccurate overestimations of their memory performance. This was despite the fact that the magnitude of predictions shifted according to the memory training. That is, on some level patients showed an ability to change and retain a representation of performance over time, but it was a dysfunctional one. For the first time in the literature we were able to use an analysis using correlations to support this claim, based on a large heterogeneous sample of 51 patients with Alzheimer's disease. The results point not to a failure to retain online metamemory information, but rather that this information is never used or incorporated into longer term representations, supporting but refining the mnemonic anosognosia hypothesis.
The Mnemonic Keyword Method: Effects on the Vocabulary Acquisition and Retention
ERIC Educational Resources Information Center
Siriganjanavong, Vanlee
2013-01-01
The objectives of the study were to introduce the technique called "Mnemonic Keyword Method" ("MKM") to low proficiency English learners, and to explore the effectiveness of the method in terms of short-term and long-term retention. The sample was purposefully drawn from one intact class consisting of 44 students. They were…
ERIC Educational Resources Information Center
Wolgemuth, Jennifer R.; Cobb, R. Brian; Alwell, Morgen
2008-01-01
The relationship between mnemonic instruction and academic performance for secondary-school-age youth with disabilities was explored in this systematic review. A total of 20 studies intervening with 669 youth with learning disabilities, emotional and behavioral disorders, and mild developmental disabilities were reviewed. The findings of this…
The Effects of Mnemonic Training on Five- and Ten-Year-Old Children.
ERIC Educational Resources Information Center
Miyakawa, Hiroko; Restaino, Lillian C. R.
Two experiments evaluated the effects of mnemonic training upon 5- and 10-year-old children's learning and retention of patterns at varying intervals. Subjects were 172 middle class children evenly distributed across the two age groups. Experiment I investigated the effects of individual strategies (perceptual exploration, organization of…
Distributed Learning Enhances Relational Memory Consolidation
ERIC Educational Resources Information Center
Litman, Leib; Davachi, Lila
2008-01-01
It has long been known that distributed learning (DL) provides a mnemonic advantage over massed learning (ML). However, the underlying mechanisms that drive this robust mnemonic effect remain largely unknown. In two experiments, we show that DL across a 24 hr interval does not enhance immediate memory performance but instead slows the rate of…
An Empirical Test of Mnemonic Devices to Improve Learning in Elementary Accounting
ERIC Educational Resources Information Center
Laing, Gregory Kenneth
2010-01-01
The author empirically examined the use of mnemonic devices to enhance learning in first-year accounting at university. The experiment was conducted on three groups using learning strategy application as between participant's factors. The means of the scores from pre- and posttests were analyzed using the student "t" test. No significant…
Pitch Systems and Curwen Hand Signs: A Review of Literature
ERIC Educational Resources Information Center
Frey-Clark, Marta
2017-01-01
Learning to sing from notation is a complex task, and accurately performing pitches without an external reference can be particularly challenging. As such, the use of mnemonic devices to reinforce tonal relationships is a long-standing practice among musicians. Chief among these mnemonic devices are pitch syllable systems and Curwen hand signs.…
SAT Vocabulary Instruction for High School Students with Learning Disabilities
ERIC Educational Resources Information Center
Terrill, M.C.; Scruggs, T.E.; Mastropieri, M.A.
2004-01-01
A teacher wanted to know whether mnemonic strategies would be useful for high school students with learning disabilities. Over a 6-week period, this teacher taught the students SAT vocabulary words using either a traditional instructional approach or pictorial mnemonic keyword strategies she had developed. At the end of the instructional period,…
ERIC Educational Resources Information Center
Brahler, C. Jayne; Walker, Diane
2008-01-01
For students pursuing careers in medical fields, knowledge of technical and medical terminology is prerequisite to being able to solve problems in their respective disciplines and professions. The Dean Vaughn Medical Terminology 350 Total Retention System, also known as Medical Terminology 350 (25), is a mnemonic instructional and learning…
76 FR 30408 - Agency Forms Submitted for OMB Review, Request for Comments
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
... conduct business with the agency electronically. As part of the system, the RRB collects information..., the requestor can apply for a PIN/ Password online. Once the PIN/Password has been established, the...
Cryptanalysis of Password Protection of Oracle Database Management System (DBMS)
NASA Astrophysics Data System (ADS)
Koishibayev, Timur; Umarova, Zhanat
2016-04-01
This article discusses the currently available encryption algorithms in the Oracle database, also the proposed upgraded encryption algorithm, which consists of 4 steps. In conclusion we make an analysis of password encryption of Oracle Database.
Rethinking Defensive Information Warfare
2004-06-01
Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion
Huang, Yang; Lowe, Henry J; Klein, Dan; Cucina, Russell J
2005-01-01
The aim of this study was to develop and evaluate a method of extracting noun phrases with full phrase structures from a set of clinical radiology reports using natural language processing (NLP) and to investigate the effects of using the UMLS(R) Specialist Lexicon to improve noun phrase identification within clinical radiology documents. The noun phrase identification (NPI) module is composed of a sentence boundary detector, a statistical natural language parser trained on a nonmedical domain, and a noun phrase (NP) tagger. The NPI module processed a set of 100 XML-represented clinical radiology reports in Health Level 7 (HL7)(R) Clinical Document Architecture (CDA)-compatible format. Computed output was compared with manual markups made by four physicians and one author for maximal (longest) NP and those made by one author for base (simple) NP, respectively. An extended lexicon of biomedical terms was created from the UMLS Specialist Lexicon and used to improve NPI performance. The test set was 50 randomly selected reports. The sentence boundary detector achieved 99.0% precision and 98.6% recall. The overall maximal NPI precision and recall were 78.9% and 81.5% before using the UMLS Specialist Lexicon and 82.1% and 84.6% after. The overall base NPI precision and recall were 88.2% and 86.8% before using the UMLS Specialist Lexicon and 93.1% and 92.6% after, reducing false-positives by 31.1% and false-negatives by 34.3%. The sentence boundary detector performs excellently. After the adaptation using the UMLS Specialist Lexicon, the statistical parser's NPI performance on radiology reports increased to levels comparable to the parser's native performance in its newswire training domain and to that reported by other researchers in the general nonmedical domain.
Extracting noun phrases for all of MEDLINE.
Bennett, N. A.; He, Q.; Powell, K.; Schatz, B. R.
1999-01-01
A natural language parser that could extract noun phrases for all medical texts would be of great utility in analyzing content for information retrieval. We discuss the extraction of noun phrases from MEDLINE, using a general parser not tuned specifically for any medical domain. The noun phrase extractor is made up of three modules: tokenization; part-of-speech tagging; noun phrase identification. Using our program, we extracted noun phrases from the entire MEDLINE collection, encompassing 9.3 million abstracts. Over 270 million noun phrases were generated, of which 45 million were unique. The quality of these phrases was evaluated by examining all phrases from a sample collection of abstracts. The precision and recall of the phrases from our general parser compared favorably with those from three other parsers we had previously evaluated. We are continuing to improve our parser and evaluate our claim that a generic parser can effectively extract all the different phrases across the entire medical literature. PMID:10566444
What Is the PE Password? Incorporating Vocabulary in Your Elementary PE Program
ERIC Educational Resources Information Center
Robelee, Margaret E.
2016-01-01
This article describes a novel program for third through fifth grade called "What is the PE Password?" that teaches vocabulary words and concepts without sacrificing activity time in order to support Common Core learning.
Chang, I-Pin; Lee, Tian-Fu; Lin, Tsung-Hung; Liu, Chuan-Ming
2015-11-30
Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost.
ERIC Educational Resources Information Center
Dakhiel, Maysoon A.; Al Rub, Mohammed O. Abu
2017-01-01
The present study aims to investigate the effectiveness of pictured letters mnemonics strategy in learning similar English language letters among students with learning disabilities in Saudi Arabia according to experimental group (1) and (2), control group, gender, and interaction between them. The study sample comprised (90) students with…
Mobile Assisted Language Learning and Mnemonic Mapping -- The Loci Method Revisited
ERIC Educational Resources Information Center
Waragai, Ikumi; Raindl, Marco; Ohta, Tatsuya; Miyasaka, Kosuke
2016-01-01
This paper presents the prototype of a Mobile Language Learning Environment (MLLE) allowing learners of German at a Japanese university to map classroom learning content onto the pathways of their everyday lives, turning places they come by into mnemonic "loci", and thus changing their daily commute into a learning trail. Even though the…
Mnemonic Device for Relating the Eight Thermodynamic State Variables: The Energy Pie
ERIC Educational Resources Information Center
Fieberg, Jeffrey E.; Girard, Charles A.
2011-01-01
A mnemonic device, the energy pie, is presented that provides relationships between thermodynamic potentials ("U," "H," "G," and "A") and other sets of variables that carry energy units, "TS" and "PV." Methods are also presented in which the differential expressions for the potentials and the corresponding Maxwell relations follow from the energy…
ERIC Educational Resources Information Center
Santaniello, Shelly W.
2005-01-01
The mnemonic device can be a terrific tool to help students memorize those things that are so easy to forget. A mnemonic device is a trick or strategy to help remember something. Adults use them every day. Frequiently, they may use a rhyme to help them remember how many days are in each month and they often use associations or alliterations to…
Illustrating Story Plans: Does a Mnemonic Strategy Including Art Media Render More Elaborate Text?
ERIC Educational Resources Information Center
Dunn, Michael W.
2012-01-01
Students who have difficulty with academics often benefit from learning mnemonic strategies which provide a step-by-step process to accomplish a task. Three fourth-grade students who struggled with writing learned the Ask, Reflect, Text (ART) strategy to help them produce more elaborate narrative story text. After initially asking the questions…
ACT UP 25: HIV/AIDS, Archival Queers, and Mnemonic World Making
ERIC Educational Resources Information Center
Morris, Charles E., III
2012-01-01
AIDS, from the beginning, has been a mnemonic pandemic. Remembering and forgetting have reflected and constituted the vicissitudes of HIV/AIDS, its inventions, significations, and transformations in and across time, then and now and into the welter, promise and pitfall, of future and futurity. The 25th anniversary of AIDS Coalition to Unleash…
The Effectiveness of Teaching Mnemonics in the Study of the Solar System.
ERIC Educational Resources Information Center
Pickens, Teresa Lynn
This study evaluates the effectiveness of a mnemonic approach to teaching about the solar system to non-leveled Grade 9 students versus a traditional outline format. A mixture of 54 regular and special education students participated in the control group receiving facts about the solar system through lecture and transparencies and recorded the…
ERIC Educational Resources Information Center
McCabe, Jennifer A.
2015-01-01
The goal of this research was to determine whether there is a generation effect for learner-created keyword mnemonics and real-life examples, compared to instructor-provided materials, when learning neurophysiological terms and definitions in introductory psychology. Students participated in an individual (Study 1) or small-group (Study 2)…
The Influence of the Knowledge Base on the Development of Mnemonic Strategies.
ERIC Educational Resources Information Center
Ornstein, Peter A.; Naus, Mary J.
A dominant theme in cognitive psychology is that prior knowledge in long-term memory has a strong influence on an individual's cognitive processing. Citing numerous memory studies with children, knowledge base effects are presented as part of a broader picture of memory development. Using the sort/recall procedure (asking subjects to group sets of…
Dictogloss or Dicto-Phrase: Which Works Better for Listening Comprehension?
ERIC Educational Resources Information Center
Marashi, Hamid; Khaksar, Mojgan
2013-01-01
This research compared the effect of using dictogloss and dicto-phrase tasks on EFL learners' listening comprehension. To fulfill the purpose of the study, a piloted sample Key English Test (KET) was administered to a total number of 90 Iranian female teenage EFL learners at Kish Language School, Tehran, and then 60 were selected based on their…
ERIC Educational Resources Information Center
Sadler, Troy D.
2004-01-01
Science educators have appropriated many meanings for the phrase "scientific literacy" (Champagne & Lovitts, 1989). This paper advances an argument that in order to maintain the usefulness of such a malleable phrase, its users must explicitly address the context of its use. Based on the vision of science education articulated in standards…
Connecting to HPC VPN | High-Performance Computing | NREL
and password will match your NREL network account login/password. From OS X or Linux, open a terminal finalized. Open a Remote Desktop connection using server name WINHPC02 (this is the login node). Mac Mac
Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng
2013-06-01
The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.
Password Cracking Using Sony Playstations
NASA Astrophysics Data System (ADS)
Kleinhans, Hugo; Butts, Jonathan; Shenoi, Sujeet
Law enforcement agencies frequently encounter encrypted digital evidence for which the cryptographic keys are unknown or unavailable. Password cracking - whether it employs brute force or sophisticated cryptanalytic techniques - requires massive computational resources. This paper evaluates the benefits of using the Sony PlayStation 3 (PS3) to crack passwords. The PS3 offers massive computational power at relatively low cost. Moreover, multiple PS3 systems can be introduced easily to expand parallel processing when additional power is needed. This paper also describes a distributed framework designed to enable law enforcement agents to crack encrypted archives and applications in an efficient and cost-effective manner.
Backup key generation model for one-time password security protocol
NASA Astrophysics Data System (ADS)
Jeyanthi, N.; Kundu, Sourav
2017-11-01
The use of one-time password (OTP) has ushered new life into the existing authentication protocols used by the software industry. It introduced a second layer of security to the traditional username-password authentication, thus coining the term, two-factor authentication. One of the drawbacks of this protocol is the unreliability of the hardware token at the time of authentication. This paper proposes a simple backup key model that can be associated with the real world applications’user database, which would allow a user to circumvent the second authentication stage, in the event of unavailability of the hardware token.
Vecchi, Eva M; Marelli, Marco; Zamparelli, Roberto; Baroni, Marco
2017-01-01
Sophisticated senator and legislative onion. Whether or not you have ever heard of these things, we all have some intuition that one of them makes much less sense than the other. In this paper, we introduce a large dataset of human judgments about novel adjective-noun phrases. We use these data to test an approach to semantic deviance based on phrase representations derived with compositional distributional semantic methods, that is, methods that derive word meanings from contextual information, and approximate phrase meanings by combining word meanings. We present several simple measures extracted from distributional representations of words and phrases, and we show that they have a significant impact on predicting the acceptability of novel adjective-noun phrases even when a number of alternative measures classically employed in studies of compound processing and bigram plausibility are taken into account. Our results show that the extent to which an attributive adjective alters the distributional representation of the noun is the most significant factor in modeling the distinction between acceptable and deviant phrases. Our study extends current applications of compositional distributional semantic methods to linguistically and cognitively interesting problems, and it offers a new, quantitatively precise approach to the challenge of predicting when humans will find novel linguistic expressions acceptable and when they will not. Copyright © 2016 Cognitive Science Society, Inc.
Alternative Fuels Data Center: Petroleum and Emission Reduction Planning
Add Goal à Log In You need an account to save your plans. If you already have an account, log in below. Otherwise, create an account. Email address: Password: Confirm password: LOG IN Cancel Forgot
Shapira-Lichter, Irit; Oren, Noga; Jacob, Yael; Gruberger, Michal; Hendler, Talma
2013-01-01
Numerous neuroimaging studies have implicated default mode network (DMN) involvement in both internally driven processes and memory. Nevertheless, it is unclear whether memory operations reflect a particular case of internally driven processing or alternatively involve the DMN in a distinct manner, possibly depending on memory type. This question is critical for refining neurocognitive memory theorem in the context of other endogenic processes and elucidating the functional significance of this key network. We used functional MRI to examine DMN activity and connectivity patterns while participants overtly generated words according to nonmnemonic (phonemic) or mnemonic (semantic or episodic) cues. Overall, mnemonic word fluency was found to elicit greater DMN activity and stronger within-network functional connectivity compared with nonmnemonic fluency. Furthermore, two levels of functional organization of memory retrieval were shown. First, across both mnemonic tasks, activity was greater mainly in the posterior cingulate cortex, implying selective contribution to generic aspects of memory beyond its general involvement in endogenous processes. Second, parts of the DMN showed distinct selectivity for each of the mnemonic conditions; greater recruitment of the anterior prefrontal cortex, retroesplenial cortex, and hippocampi and elevated connectivity between anterior and posterior medial DMN nodes characterized the semantic condition, whereas increased recruitment of posterior DMN components and elevated connectivity between them characterized the episodic condition. This finding emphasizes the involvement of DMN elements in discrete aspects of memory retrieval. Altogether, our results show a specific contribution of the DMN to memory processes, corresponding to the specific type of memory retrieval. PMID:23479650
Material specific lateralization of medial temporal lobe function: An fMRI investigation.
Dalton, Marshall A; Hornberger, Michael; Piguet, Olivier
2016-03-01
The theory of material specific lateralization of memory function posits that left and right MTL regions are asymmetrically involved in mnemonic processing of verbal and nonverbal material respectively. Lesion and functional imaging (fMRI) studies provide robust evidence for a left MTL asymmetry in the verbal memory domain. Evidence for a right MTL/nonverbal asymmetry is not as robust. A handful of fMRI studies have investigated this issue but have generally utilised nonverbal stimuli which are amenable to semantic elaboration. This fMRI study aimed to investigate the neural correlates of recognition memory processing in 20 healthy young adults (mean age = 26 years) for verbal stimuli and nonverbal stimuli that were specifically designed to minimize verbalisation. Analyses revealed that the neural correlates of recognition memory processing for verbal and nonverbal stimuli were differentiable and asymmetrically recruited the left and right MTL respectively. The right perirhinal cortex and hippocampus were preferentially involved in successful recognition memory of items devoid of semantic information. In contrast, the left anterior hippocampus was preferentially involved in successful recognition memory of stimuli which contained semantic meaning. These results suggest that the left MTL is preferentially involved in mnemonic processing of verbal/semantic information. In contrast, the right MTL is preferentially involved in visual/non-semantic mnemonic processing. We propose that during development, the left MTL becomes specialised for verbal mnemonic processing due to its proximity with left lateralised cortical language processing areas while visual/non-semantic mnemonic processing gets 'crowded out' to become predominantly, but not completely, the domain of the right MTL. © 2015 Wiley Periodicals, Inc.
Causal evidence for mnemonic metacognition in human precuneus.
Ye 叶群, Qun; Zou 邹富渟, Futing; Lau 劉克頑, Hakwan; Hu 胡谊, Yi; Kwok 郭思齊, Sze Chai
2018-06-19
Metacognition is the capacity to introspectively monitor and control one's own cognitive processes. Previous anatomical and functional neuroimaging findings implicated the important role of the precuneus in metacognition processing, especially during mnemonic tasks. However, the issue of whether this medial parietal cortex is a domain-specific region that supports mnemonic metacognition remains controversial. Here, we focally disrupted this parietal area with repetitive transcranial magnetic stimulation in healthy human participants of both sexes, seeking to ascertain its functional necessity for metacognition in memory versus perceptual decisions. Perturbing precuneal activity selectively impaired metacognitive efficiency of temporal-order memory judgement, but not perceptual discrimination. Moreover, the correlation in individuals' metacognitive efficiency between domains disappeared when the precuneus was perturbed. Taken together, these findings provide evidence reinforcing the notion that the precuneal region plays an important role in mediating metacognition of episodic memory retrieval. SIGNIFICANCE STATEMENT Theories on the neural basis of metacognition have thus far been largely centered on the role of the prefrontal cortex. Here we refined the theoretical framework through characterizing a unique precuneal involvement in mnemonic metacognition with a noninvasive but inferentially powerful method: transcranial magnetic stimulation. By quantifying meta-cognitive efficiency across two distinct domains (memory vs. perception) that are matched for stimulus characteristics, we reveal an instrumental role of the precuneus in mnemonic metacognition. This causal evidence corroborates ample clinical reports that parietal lobe lesions often produce inaccurate self-reports of confidence in memory recollection and establish the precuneus as a nexus for the introspective ability to evaluate the success of memory judgment in humans. Copyright © 2018 the authors.
ERIC Educational Resources Information Center
Cossairt, Travis J.; Grubbs, W. Tandy
2011-01-01
An open-access, Web-based mnemonic game is described whereby introductory chemistry knowledge is tested using mahjong solitaire game play. Several tile sets and board layouts are included that are themed upon different chemical topics. Introductory tile sets can be selected that prompt the player to match element names to symbols and metric…
A Comparative Study on the Effectiveness of Two Song-Teaching Methods: Holistic vs. Phrase-by-Phrase
ERIC Educational Resources Information Center
Persellin, Diane; Bateman, Laura
2009-01-01
The purpose of our study was to compare the effectiveness of two song-teaching methods: holistic and phrase-by-phrase. Thirty-two first-grade children (n = 32) from two music classes in an urban elementary school were taught two folksongs. The first class (n = 16) was taught one song through the phrase-by-phrase method and another song through the…
The Use of an Imagery Mnemonic to Teach the Krebs Cycle
ERIC Educational Resources Information Center
Morisaki, Ryoma; Bon, Charles; Levitt, Jacob O.
2016-01-01
The Krebs Cycle is a highly taught biochemical pathway that is traditionally difficult to learn. Twenty-seven undergraduate students were randomized to a rote memorization arm or to a mnemonic arm. They were given a pre-test, then shown a lecture corresponding to their assigned method, and then given an immediate Week 0 post-test and a Week 4…
ERIC Educational Resources Information Center
So, Wing Chee; Chen-Hui, Colin Sim; Wei-Shan, Julie Low
2012-01-01
Abundant research has shown that encoding meaningful gesture, such as an iconic gesture, enhances memory. This paper asked whether gesture needs to carry meaning to improve memory recall by comparing the mnemonic effect of meaningful (i.e., iconic gestures) and nonmeaningful gestures (i.e., beat gestures). Beat gestures involve simple motoric…
Using the Keyword Mnemonics Method among Adult Learners
ERIC Educational Resources Information Center
Campos, Alfredo; Camino, Estefania; Perez-Fabello, Maria Jose
2011-01-01
The aim of the present study was to assess the influence of word image vividness on the immediate and long-term recall (one-day interval) of words using either the rote repetition learning method or the keyword mnemonics method in a sample of adults aged 55 to 70 years. Subjects learned a list of concrete and abstract words using either rote…
Placing the Mnemonic Model in Context: Diagnostic, Theoretical, and Clinical Considerations
ERIC Educational Resources Information Center
Monroe, Scott M.; Mineka, Susan
2008-01-01
The mnemonic model of posttraumatic stress disorder (PTSD) proposed by D. C. Rubin, D. Berntsen, and M. K. Bohni presents some provocative and potentially insightful ideas about this mental disorder. D. C. Rubin et al. suggested that PTSD is caused and maintained through a "pathogenic memory" (D. C. Rubin et al., 2008, p. 985) of a negative event…
ERIC Educational Resources Information Center
Brigham, Frederick J.
This study examined the memory-enhancing effects of elaborative and mnemonic encoding of information presented with maps, compared to more traditional, non-mnemonic maps, on recall of locations of events and information associated with those events by 72 middle school students with learning disabilities. Subjects were presented with map-like…
ERIC Educational Resources Information Center
Howard, Sue; DaDeppo, Lisa M. W.; De La Paz, Susan
2008-01-01
Difficulties with spelling can impact students' reading acquisition and writing, having a critical impact on overall literacy development. Students with learning disabilities (LD) often struggle with spelling. We describe a case study with three elementary-aged students with LD using a mnemonic approach to spelling sight words. Our approach,…
Mnemonic Context Effect in Two Cultures: Attention to Memory Representations?
ERIC Educational Resources Information Center
Duffy, Sean; Kitayama, Shinobu
2007-01-01
In two experiments we demonstrate a substantial cross-cultural difference in a mnemonic context effect, whereby a magnitude estimate of a simple stimulus such as a line or circle is biased toward the center of the distribution of previously seen instances of the same class. In support of the hypothesis that Asians are more likely than Americans to…
ERIC Educational Resources Information Center
Lv, Wenpeng; Young, Barbara Newman
2015-01-01
Sound, form, meaning, and usage are four essentials of a word. English is alphabetic in its writing system. A word's pronunciation is usually connected with its form; however, the relationship between sound and meaning has been controversial throughout the ages. Vocabulary mnemonics differ from each other in their primary focus of attention.…
O.P.E.R.A.: A First Letter Mnemonic and Rubric for Conceptualising and Implementing Service Learning
ERIC Educational Resources Information Center
Welch, Marshall
2010-01-01
This article presents a rubric to help instructors conceptualize, implement, and assess service-learning courses. Using a first-letter mnemonic of O.P.E.R.A., the rubric incorporates principles of best practice to provide a framework for enumerating objectives (O), exploring community partnerships (P), identifying the type of service learning…
Children with Autism Spectrum Disorders Who Do Not Develop Phrase Speech in the Preschool Years
ERIC Educational Resources Information Center
Norrelgen, Fritjof; Fernell, Elisabeth; Eriksson, Mats; Hedvall, Asa; Persson, Clara; Sjölin, Maria; Gillberg, Christopher; Kjellmer, Liselotte
2015-01-01
There is uncertainty about the proportion of children with autism spectrum disorders who do not develop phrase speech during the preschool years. The main purpose of this study was to examine this ratio in a population-based community sample of children. The cohort consisted of 165 children (141 boys, 24 girls) with autism spectrum disorders aged…
75 FR 5579 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-03
... with re-entry controlled by passwords. The DLA Enterprise Hotline Program Database is also password...: * * * * * System location: Delete entry and replace with ``Director, DLA Accountability Office (DA), Headquarters....'' * * * * * Retention and disposal: Delete entry and replace with ``Records are destroyed/deleted 10 years after...
NASA Astrophysics Data System (ADS)
Al-Mishwat, Ali T.
2016-05-01
PHASS99 is a FORTRAN program designed to retrieve and decode radiometric and other physical age information of igneous rocks contained in the international database IGBADAT (Igneous Base Data File). In the database, ages are stored in a proprietary format using mnemonic representations. The program can handle up to 99 ages in an igneous rock specimen and caters to forty radiometric age systems. The radiometric age alphanumeric strings assigned to each specimen description in the database consist of four components: the numeric age and its exponential modifier, a four-character mnemonic method identification, a two-character mnemonic name of analysed material, and the reference number in the rock group bibliography vector. For each specimen, the program searches for radiometric age strings, extracts them, parses them, decodes the different age components, and converts them to high-level English equivalents. IGBADAT and similarly-structured files are used for input. The output includes three files: a flat raw ASCII text file containing retrieved radiometric age information, a generic spreadsheet-compatible file for data import to spreadsheets, and an error file. PHASS99 builds on the old program TSTPHA (Test Physical Age) decoder program and expands greatly its capabilities. PHASS99 is simple, user friendly, fast, efficient, and does not require users to have knowledge of programing.
Yang, Adeel; Goel, Hersh; Bryan, Matthew; Robertson, Ron; Lim, Jane; Islam, Shehran; Speicher, Mark R
2014-01-01
Medical students are required to retain vast amounts of medical knowledge on the path to becoming physicians. To address this challenge, multimedia Web-based learning resources have been developed to supplement traditional text-based materials. The Picmonic(®) Learning System (PLS; Picmonic, Phoenix, AZ, USA) is a novel multimedia Web-based learning platform that delivers audiovisual mnemonics designed to improve memory retention of medical sciences. A single-center, randomized, subject-blinded, controlled study was conducted to compare the PLS with traditional text-based material for retention of medical science topics. Subjects were randomly assigned to use two different types of study materials covering several diseases. Subjects randomly assigned to the PLS group were given audiovisual mnemonics along with text-based materials, whereas subjects in the control group were given the same text-based materials with key terms highlighted. The primary endpoints were the differences in performance on immediate, 1 week, and 1 month delayed free-recall and paired-matching tests. The secondary endpoints were the difference in performance on a 1 week delayed multiple-choice test and self-reported satisfaction with the study materials. Differences were calculated using unpaired two-tailed t-tests. PLS group subjects demonstrated improvements of 65%, 161%, and 208% compared with control group subjects on free-recall tests conducted immediately, 1 week, and 1 month after study of materials, respectively. The results of performance on paired-matching tests showed an improvement of up to 331% for PLS group subjects. PLS group subjects also performed 55% greater than control group subjects on a 1 week delayed multiple choice test requiring higher-order thinking. The differences in test performance between the PLS group subjects and the control group subjects were statistically significant (P<0.001), and the PLS group subjects reported higher overall satisfaction with the material. The data of this pilot site demonstrate marked improvements in the retention of disease topics when using the PLS compared with traditional text-based materials. The use of the PLS in medical education is supported.
ERIC Educational Resources Information Center
Mattord, Herbert J.
2012-01-01
Organizations continue to rely on password-based authentication methods to control access to many Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS). It developed an Authentication Method System Index (AMSI) to analyze collected data from…
2015-03-01
In the January 2015 issue of Cyberpsychology, Behavior, and Social Networking (vol. 18, no. 1, pp. 3–7), the article "Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords." by Prof. Monica Whitty et al., has an error in wording in the abstract. The sentence in question was originally printed as: Contrary to our hypotheses, we found older people and individuals who score high on self-monitoring were more likely to share passwords. It should read: Contrary to our hypotheses, we found younger people and individuals who score high on self-monitoring were more likely to share passwords. The authors wish to apologize for the error.
Adaptive Memory: Ancestral Priorities and the Mnemonic Value of Survival Processing
ERIC Educational Resources Information Center
Nairne, James S.; Pandeirada, Josefa N. S.
2010-01-01
Evolutionary psychologists often propose that humans carry around "stone-age" brains, along with a toolkit of cognitive adaptations designed originally to solve hunter-gatherer problems. This perspective predicts that optimal cognitive performance might sometimes be induced by ancestrally-based problems, those present in ancestral environments,…
Identifying well-formed biomedical phrases in MEDLINE® text.
Kim, Won; Yeganova, Lana; Comeau, Donald C; Wilbur, W John
2012-12-01
In the modern world people frequently interact with retrieval systems to satisfy their information needs. Humanly understandable well-formed phrases represent a crucial interface between humans and the web, and the ability to index and search with such phrases is beneficial for human-web interactions. In this paper we consider the problem of identifying humanly understandable, well formed, and high quality biomedical phrases in MEDLINE documents. The main approaches used previously for detecting such phrases are syntactic, statistical, and a hybrid approach combining these two. In this paper we propose a supervised learning approach for identifying high quality phrases. First we obtain a set of known well-formed useful phrases from an existing source and label these phrases as positive. We then extract from MEDLINE a large set of multiword strings that do not contain stop words or punctuation. We believe this unlabeled set contains many well-formed phrases. Our goal is to identify these additional high quality phrases. We examine various feature combinations and several machine learning strategies designed to solve this problem. A proper choice of machine learning methods and features identifies in the large collection strings that are likely to be high quality phrases. We evaluate our approach by making human judgments on multiword strings extracted from MEDLINE using our methods. We find that over 85% of such extracted phrase candidates are humanly judged to be of high quality. Published by Elsevier Inc.
A Cross-Linguistic Comparison of Generic Noun Phrases in English and Mandarin.
ERIC Educational Resources Information Center
Gelman, Susan A.; Tardif, Twila
1998-01-01
Three studies examined adults' generic noun phrases in English and Mandarin Chinese from child-directed speech of caregivers interacting with their toddlers. Found that generic noun phrases were reliably identified in both languages. Generic noun phrases most frequently referred to animals. Non-generic noun phrases were used most frequently for…
Memory, Multiplication and Mnemonics: A Study into the Recall of Basic Multiplication Facts
ERIC Educational Resources Information Center
Brewer, Robert A.
2004-01-01
The purpose of this study is to examine what effects the mnemonic devices of pictures and stories have on the memorization and recall of multiplication facts. This study was conducted on a fourth grade classroom in which the students were divided into three groups. The first group was given standard flashcards, the second group was given a set of…
Cognitive Task Analysis of the Battalion Level Visualization Process
2007-10-01
of the visualization space are identified using commonly understood doctrinal language and mnemonic devices. a Degree to which the commander and staff...the elements of the visualization space are identified using commonly understood doctrinal language and mnemonic devices. Visualization elements are...11 skill areas were identified as potential focal points for future training development. The findings were used to design and develop exemplar
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-12
... Order Entry Port from $250 to $500 and only charge per mnemonic instead of per mnemonic per port; (xii) amend the SQF Port Fee to assess a $500 per month per SQF port in lieu of the existing structure of $250 for the first five ports and $1000 for additional port thereafter and also rename the SQF Port Fee as...
75 FR 2905 - Self-Regulatory Organizations; NASDAQ OMX PHLX, Inc.; Notice of Filing and Immediate...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-19
... Registration Fee from $50 to $100; (xi) increase the current Order Entry Port from $250 to $500 and only charge per mnemonic instead of per mnemonic per port; (xii) amend the SQF Port Fee to assess a $500 per month per SQF port in lieu of the current structure of $250 for the first five ports and $1000 for...
A Risk-based, Practice-centered Approach to Project Management for HPCMP CREATE
2015-10-05
form of videoconferencing. These impediments have been mitigated to some extent by using browser-based Software as a Service ( SaaS ) access to CREATE...one-time password (OTP), and OpenID. Security is managed within the DREN, as opposed to every desktop. As a “Software as a Service” ( SaaS
Tanaka, Hiroyoshi
Under the basic tenet that syntactic derivation offers an optimal solution to both phonological realization and semantic interpretation of linguistic expression, the recent minimalist framework of syntactic theory claims that the basic unit for the derivation is equivalent to a syntactic propositional element, which is called a phase. In this analysis, syntactic derivation is assumed to proceed at phasal projections that include Complementizer Phrases (CP). However, there have been pointed out some empirical problems with respect to the failure of multiple occurrences of discourse-related elements in the CP domain. This problem can be easily overcome if the alternative approach in the recent minimalist perspective, which is called Cartographic CP analysis, is adopted, but this may raise a theoretical issue about the tension between phasality and four kinds of functional projections assumed in this analysis (Force Phrase (ForceP), Finite Phrase (FinP), Topic Phrase (TopP) and Focus Phrase (FocP)). This paper argues that a hybrid analysis with these two influential approaches can be proposed by claiming a reasonable assumption that syntactically requisite projections (i.e., ForceP and FinP) are phases and independently constitute a phasehood with relevant heads in the derivation. This then enables us to capture various syntactic properties of the Topicalization construction in English. Our proposed analysis, coupled with some additional assumptions and observations in recent minimalist studies, can be extended to incorporate peculiar properties in temporal/conditional adverbials and imperatives.
JPRS Report, Soviet Union, Political Affairs, Republic Language Legislation.
1989-12-05
reference materials ( dictionaries , termi- nology glossaries, phrase books, self-taught books, and so on), and qualified specialists in the field of...textbooks; d) to publish self-taught manuals, phrase books, and explanatory and bilingual dictionaries for the aid of persons desiring to study...Armenian. To create the nec- essary printing facility base to publish high-quality illus- trated dictionaries ; to provide uninterrupted delivery of
50 CFR 679.91 - Amendment 80 Program annual harvester privileges.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) Hand delivery or carrier: NMFS, Room 713, 709 West 9th Street, Juneau, AK 99801. (iv) Electronic: http... using the transferor's NMFS ID, password, and Transfer Key and submitting the transfer request, the... on the computer screen. By using the transferee's NMFS ID, password and Transfer Key, the designated...
50 CFR 679.91 - Amendment 80 Program annual harvester privileges.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., Room 713, 709 West 9th Street, Juneau, AK 99801. (iv) Electronic: http://alaskafisheries.noaa.gov. (2... using the transferor's NMFS ID, password, and Transfer Key and submitting the transfer request, the... on the computer screen. By using the transferee's NMFS ID, password and Transfer Key, the designated...
50 CFR 679.91 - Amendment 80 Program annual harvester privileges.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) Hand delivery or carrier: NMFS, Room 713, 709 West 9th Street, Juneau, AK 99801. (iv) Electronic: http... using the transferor's NMFS ID, password, and Transfer Key and submitting the transfer request, the... on the computer screen. By using the transferee's NMFS ID, password and Transfer Key, the designated...
50 CFR 679.91 - Amendment 80 Program annual harvester privileges.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) Hand delivery or carrier: NMFS, Room 713, 709 West 9th Street, Juneau, AK 99801. (iv) Electronic: http... using the transferor's NMFS ID, password, and Transfer Key and submitting the transfer request, the... on the computer screen. By using the transferee's NMFS ID, password and Transfer Key, the designated...
50 CFR 679.91 - Amendment 80 Program annual harvester privileges.
Code of Federal Regulations, 2013 CFR
2013-10-01
...) Hand delivery or carrier: NMFS, Room 713, 709 West 9th Street, Juneau, AK 99801. (iv) Electronic: http... using the transferor's NMFS ID, password, and Transfer Key and submitting the transfer request, the... on the computer screen. By using the transferee's NMFS ID, password and Transfer Key, the designated...
21 CFR 11.300 - Controls for identification codes/passwords.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 1 2011-04-01 2011-04-01 false Controls for identification codes/passwords. 11.300 Section 11.300 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... attempts at their unauthorized use to the system security unit, and, as appropriate, to organizational...
21 CFR 11.300 - Controls for identification codes/passwords.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Controls for identification codes/passwords. 11.300 Section 11.300 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... attempts at their unauthorized use to the system security unit, and, as appropriate, to organizational...
Beyond Passwords: Usage and Policy Transformation
2007-03-01
case scenario for lost productivity due to users leaving their CAC at work, in their computer, is costing 261 work years per year with an estimated ...one for your CAC) are you currently using? ..................................................................................................... 43...PASSWORDS: USAGE AND POLICY TRANSFORMATION I. Introduction Background Currently , the primary method for network authentication on the
21 CFR 11.300 - Controls for identification codes/passwords.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 1 2012-04-01 2012-04-01 false Controls for identification codes/passwords. 11.300 Section 11.300 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Signatures § 11.300 Controls for...
Xie, Qi; Liu, Wenhao; Wang, Shengbao; Han, Lidong; Hu, Bin; Wu, Ting
2014-09-01
Patient's privacy-preserving, security and mutual authentication between patient and the medical server are the important mechanism in connected health care applications, such as telecare medical information systems and personally controlled health records systems. In 2013, Wen showed that Das et al.'s scheme is vulnerable to the replay attack, user impersonation attacks and off-line guessing attacks, and then proposed an improved scheme using biometrics, password and smart card to overcome these weaknesses. However, we show that Wen's scheme is still vulnerable to off-line password guessing attacks, does not provide user's anonymity and perfect forward secrecy. Further, we propose an improved scheme to fix these weaknesses, and use the applied pi calculus based formal verification tool ProVerif to prove the security and authentication.
RSA-Based Password-Authenticated Key Exchange, Revisited
NASA Astrophysics Data System (ADS)
Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki
The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.
Chang, I-Pin; Lee, Tian-Fu; Lin, Tsung-Hung; Liu, Chuan-Ming
2015-01-01
Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost. PMID:26633396
Distributed learning enhances relational memory consolidation.
Litman, Leib; Davachi, Lila
2008-09-01
It has long been known that distributed learning (DL) provides a mnemonic advantage over massed learning (ML). However, the underlying mechanisms that drive this robust mnemonic effect remain largely unknown. In two experiments, we show that DL across a 24 hr interval does not enhance immediate memory performance but instead slows the rate of forgetting relative to ML. Furthermore, we demonstrate that this savings in forgetting is specific to relational, but not item, memory. In the context of extant theories and knowledge of memory consolidation, these results suggest that an important mechanism underlying the mnemonic benefit of DL is enhanced memory consolidation. We speculate that synaptic strengthening mechanisms supporting long-term memory consolidation may be differentially mediated by the spacing of memory reactivation. These findings have broad implications for the scientific study of episodic memory consolidation and, more generally, for educational curriculum development and policy.
Huang, Yang; Lowe, Henry J.; Klein, Dan; Cucina, Russell J.
2005-01-01
Objective: The aim of this study was to develop and evaluate a method of extracting noun phrases with full phrase structures from a set of clinical radiology reports using natural language processing (NLP) and to investigate the effects of using the UMLS® Specialist Lexicon to improve noun phrase identification within clinical radiology documents. Design: The noun phrase identification (NPI) module is composed of a sentence boundary detector, a statistical natural language parser trained on a nonmedical domain, and a noun phrase (NP) tagger. The NPI module processed a set of 100 XML-represented clinical radiology reports in Health Level 7 (HL7)® Clinical Document Architecture (CDA)–compatible format. Computed output was compared with manual markups made by four physicians and one author for maximal (longest) NP and those made by one author for base (simple) NP, respectively. An extended lexicon of biomedical terms was created from the UMLS Specialist Lexicon and used to improve NPI performance. Results: The test set was 50 randomly selected reports. The sentence boundary detector achieved 99.0% precision and 98.6% recall. The overall maximal NPI precision and recall were 78.9% and 81.5% before using the UMLS Specialist Lexicon and 82.1% and 84.6% after. The overall base NPI precision and recall were 88.2% and 86.8% before using the UMLS Specialist Lexicon and 93.1% and 92.6% after, reducing false-positives by 31.1% and false-negatives by 34.3%. Conclusion: The sentence boundary detector performs excellently. After the adaptation using the UMLS Specialist Lexicon, the statistical parser's NPI performance on radiology reports increased to levels comparable to the parser's native performance in its newswire training domain and to that reported by other researchers in the general nonmedical domain. PMID:15684131
Neural Correlates of Phrase Rhythm: An EEG Study of Bipartite vs. Rondo Sonata Form.
Martínez-Rodrigo, Arturo; Fernández-Sotos, Alicia; Latorre, José Miguel; Moncho-Bogani, José; Fernández-Caballero, Antonio
2017-01-01
This paper introduces the neural correlates of phrase rhythm. In short, phrase rhythm is the rhythmic aspect of phrase construction and the relationships between phrases. For the sake of establishing the neural correlates, a musical experiment has been designed to induce music-evoked stimuli related to phrase rhythm. Brain activity is monitored through electroencephalography (EEG) by using a brain-computer interface. The power spectral value of each EEG channel is estimated to obtain how power variance distributes as a function of frequency. Our experiment shows statistical differences in theta and alpha bands in the phrase rhythm variations of two classical sonatas, one in bipartite form and the other in rondo form.
Neural Correlates of Phrase Rhythm: An EEG Study of Bipartite vs. Rondo Sonata Form
Martínez-Rodrigo, Arturo; Fernández-Sotos, Alicia; Latorre, José Miguel; Moncho-Bogani, José; Fernández-Caballero, Antonio
2017-01-01
This paper introduces the neural correlates of phrase rhythm. In short, phrase rhythm is the rhythmic aspect of phrase construction and the relationships between phrases. For the sake of establishing the neural correlates, a musical experiment has been designed to induce music-evoked stimuli related to phrase rhythm. Brain activity is monitored through electroencephalography (EEG) by using a brain–computer interface. The power spectral value of each EEG channel is estimated to obtain how power variance distributes as a function of frequency. Our experiment shows statistical differences in theta and alpha bands in the phrase rhythm variations of two classical sonatas, one in bipartite form and the other in rondo form. PMID:28496406
Can Intonational Phrase Structure be Primed (like Syntactic Structure)?
Tooley, Kristen M.; Konopka, Agnieszka E.; Watson, Duane G.
2013-01-01
In three experiments, we investigated whether intonational phrase structure can be primed. In all experiments, participants listened to sentences in which the presence and location of intonational phrase boundaries was manipulated such that the recording either included no intonational phrase boundaries, a boundary in a structurally dispreferred location, in a preferred location, or in both locations. In Experiment 1, participants repeated the sentences to test whether they would reproduce the prosodic structure they had just heard. Experiments 2 and 3 used a prime-target paradigm to evaluate whether the intonational phrase structure heard in the prime sentence might influence that of a novel target sentence. Experiment 1 showed that participants did repeat back sentences that they just heard with the original intonational phrase structure, yet Experiments 2 and 3 found that exposure to intonational phrase boundaries on prime trials did not influence how a novel target sentence was prosodically phrased. These results suggest that speakers may retain the intonational phrasing of a sentence, but this effect is not long-lived and does not generalize across unrelated sentences. Furthermore, these findings provide no evidence that intonational phrase structure is formulated during a planning stage that is separate from other sources of linguistic information. PMID:24188467
ERIC Educational Resources Information Center
Qureshi, Ayisha; Rizvi, Farwa; Syed, Anjum; Shahid, Aqueel; Manzoor, Hana
2014-01-01
Cognitive psychology has demonstrated that the way knowledge is structured in memory determines the ability to retain, recall, and use it to solve problems. The method of loci (MOL) is a mnemonic device that relies on spatial relationships between "loci" (e.g., locations on a familiar route or rooms in a familiar building) to arrange and…
Mizuhara, Hiroaki; Sato, Naoyuki; Yamaguchi, Yoko
2015-05-01
Neural oscillations are crucial for revealing dynamic cortical networks and for serving as a possible mechanism of inter-cortical communication, especially in association with mnemonic function. The interplay of the slow and fast oscillations might dynamically coordinate the mnemonic cortical circuits to rehearse stored items during working memory retention. We recorded simultaneous EEG-fMRI during a working memory task involving a natural scene to verify whether the cortical networks emerge with the neural oscillations for memory of the natural scene. The slow EEG power was enhanced in association with the better accuracy of working memory retention, and accompanied cortical activities in the mnemonic circuits for the natural scene. Fast oscillation showed a phase-amplitude coupling to the slow oscillation, and its power was tightly coupled with the cortical activities for representing the visual images of natural scenes. The mnemonic cortical circuit with the slow neural oscillations would rehearse the distributed natural scene representations with the fast oscillation for working memory retention. The coincidence of the natural scene representations could be obtained by the slow oscillation phase to create a coherent whole of the natural scene in the working memory. Copyright © 2015 Elsevier Inc. All rights reserved.
ABCs of SLEEPING: A review of the evidence behind pediatric sleep practice recommendations.
Allen, Stephanie L; Howlett, Melissa D; Coulombe, J Aimée; Corkum, Penny V
2016-10-01
The ABCs of SLEEPING mnemonic was developed to serve as an organizing framework for common pediatric sleep recommendations. The mnemonic stands for 1) age appropriate bedtimes and wake-times with consistency, 2) schedules and routines, 3) location, 4) exercise and diet, 5) no electronics in the bedroom or before bed, 6) positivity 7) independence when falling asleep and 8) needs of child met during the day, 9) equal great sleep. This review examines the empirical evidence behind the practices and recommendations captured by the ABCs of SLEEPING mnemonic for children aged 1 to 12. A search was conducted of key electronic databases (PubMed, PsycINFO, CINAHL, & EMBASE) to identify English articles that included the concepts of sleep, insomnia, and/or bedtime. 77 articles were eligible for inclusion and were coded to extract key details and findings regarding the relations between sleep practices identified in the ABCs of SLEEPING mnemonic and sleep outcomes. Findings provided preliminary support for many of the recommendations that are commonly made to families regarding healthy sleep practices. However, more robust investigations are needed to better understand the causal contributions of healthy sleep practices to the onset and maintenance of children's sleep problems. Copyright © 2015 Elsevier Ltd. All rights reserved.
Alternative Fuels Data Center: Plug-In Electric Vehicle Readiness Scorecard
track progress toward PEV readiness. Get started evaluating your community. Create Account Log in to your account. Email Password Forgot your password? LOG IN Public reporting burden for this collection of information is estimated to average (20.5 hours) per response, including the time for reviewing
A Comparison of Password Techniques for Multilevel Authentication Mechanisms
1990-06-01
an individual user’s perceptions, personal interests and personal history . This information is unique to the individual and is neither commonly...a user may associative passwords profile around the Beatles . In this case, cues may include "abbey", "john", "yellow" and "george" and have responses
General Framework for Evaluating Password Complexity and Strength
2015-11-15
stronger password requirements: User attitudes and behaviors,” in Pro- ceedings of the Sixth Symposium on Usable Privacy and Security, ser. SOUPS ’10. New...Proceedings of the Eighth Symposium on Usable Privacy and Security, ser. SOUPS ’12. New York, NY, USA: ACM, 2012, pp. 1–20. [22] P. Kelley, S. Komanduri
Faculty Forum: HOMER as an Acronym for the Scientific Method
ERIC Educational Resources Information Center
Lakin, Jessica L.; Giesler, R. Brian; Morris, Kathryn A.; Vosmik, Jordan R.
2007-01-01
Mnemonic strategies, such as acronyms, effectively increase student retention of course material. We present an acronym based on a popular television character to help students remember the basic steps in the scientific method. Our empirical evaluation of the acronym revealed that students found it to be enjoyable, useful, and worthy of use in…
Design and Implementation of a Community Program to Promote Cognitive Vitality among Seniors
ERIC Educational Resources Information Center
Parisien, Manon; Lorthios-Guilledroit, Agathe; Bier, Nathalie; Gilbert, Norma; Nour, Kareen; Guay, Danielle; Langlois, Francis; Fournier, Baptiste; Laforest, Sophie
2016-01-01
Background: Jog Your Mind is a community-based program aiming to enable seniors to maintain their cognitive abilities. It includes stimulating activities, information on aging, mnemonic strategies, and promotion of a healthy lifestyle and is offered over 10 weekly sessions to seniors with no known cognitive impairment. Purpose: This article…
Composing Songs for Teaching Science to College Students
ERIC Educational Resources Information Center
Yee Pinn Tsin, Isabel
2015-01-01
Recent studies have shown that songs may enhance learning as they function as mnemonic devices to increase memorability. In this research, songs based on the more difficult subtopics in Chemistry were composed, encompassing many formulas, equations and facts to be remembered. This technique of song composition can be used in any subject, any point…
Chunking Strategy as a Tool for Teaching Electron Configuration
ERIC Educational Resources Information Center
Adhikary, Chandan; Sana, Sibananda; Chattopadhyay, K. N.
2015-01-01
Chunk-based strategy and mnemonics have been developed to write ground state electron configurations of elements, which is a routine exercise for the higher secondary (pre-university) level general chemistry students. To assimilate a better understanding of the nature of chemical reactions, an adequate knowledge of the periodic table of elements…
Order of Operations: On Convention and Met-Before Acronyms
ERIC Educational Resources Information Center
Zazkis, Rina; Rouleau, Annette
2018-01-01
In our exploration of the order of operations we focus on the following claim: "In the conventional order of operations, division should be performed before multiplication." This initially surprising claim is based on the acronym BEDMAS, a popular mnemonic used in Canada to assist students in remembering the order of operations. The…
Mental Imagery and Visual Working Memory
Keogh, Rebecca; Pearson, Joel
2011-01-01
Visual working memory provides an essential link between past and future events. Despite recent efforts, capacity limits, their genesis and the underlying neural structures of visual working memory remain unclear. Here we show that performance in visual working memory - but not iconic visual memory - can be predicted by the strength of mental imagery as assessed with binocular rivalry in a given individual. In addition, for individuals with strong imagery, modulating the background luminance diminished performance on visual working memory and imagery tasks, but not working memory for number strings. This suggests that luminance signals were disrupting sensory-based imagery mechanisms and not a general working memory system. Individuals with poor imagery still performed above chance in the visual working memory task, but their performance was not affected by the background luminance, suggesting a dichotomy in strategies for visual working memory: individuals with strong mental imagery rely on sensory-based imagery to support mnemonic performance, while those with poor imagery rely on different strategies. These findings could help reconcile current controversy regarding the mechanism and location of visual mnemonic storage. PMID:22195024
Mental imagery and visual working memory.
Keogh, Rebecca; Pearson, Joel
2011-01-01
Visual working memory provides an essential link between past and future events. Despite recent efforts, capacity limits, their genesis and the underlying neural structures of visual working memory remain unclear. Here we show that performance in visual working memory--but not iconic visual memory--can be predicted by the strength of mental imagery as assessed with binocular rivalry in a given individual. In addition, for individuals with strong imagery, modulating the background luminance diminished performance on visual working memory and imagery tasks, but not working memory for number strings. This suggests that luminance signals were disrupting sensory-based imagery mechanisms and not a general working memory system. Individuals with poor imagery still performed above chance in the visual working memory task, but their performance was not affected by the background luminance, suggesting a dichotomy in strategies for visual working memory: individuals with strong mental imagery rely on sensory-based imagery to support mnemonic performance, while those with poor imagery rely on different strategies. These findings could help reconcile current controversy regarding the mechanism and location of visual mnemonic storage.
Sub-Audible Speech Recognition Based upon Electromyographic Signals
NASA Technical Reports Server (NTRS)
Jorgensen, Charles C. (Inventor); Agabon, Shane T. (Inventor); Lee, Diana D. (Inventor)
2012-01-01
Method and system for processing and identifying a sub-audible signal formed by a source of sub-audible sounds. Sequences of samples of sub-audible sound patterns ("SASPs") for known words/phrases in a selected database are received for overlapping time intervals, and Signal Processing Transforms ("SPTs") are formed for each sample, as part of a matrix of entry values. The matrix is decomposed into contiguous, non-overlapping two-dimensional cells of entries, and neural net analysis is applied to estimate reference sets of weight coefficients that provide sums with optimal matches to reference sets of values. The reference sets of weight coefficients are used to determine a correspondence between a new (unknown) word/phrase and a word/phrase in the database.
75 FR 6339 - California Public Utilities Commission Petition for Rulemaking
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-09
... (NORS). The CPUC also requests password-protected access to California- specific disruption and outage... ``limited to California-specific disruption and outage data.'' NORS is the Web-based filing system through which certain communications providers submit reports to the Commission of disruptions to communications...
Steffens, Melanie C; Buchner, Axel; Wender, Karl F; Decker, Claudia
2007-12-01
Verb-object phrases (open the umbrella, knock on the table) are usually remembered better if they have been enacted during study (also called subject-performed tasks) than if they have merely been learned verbally (verbal tasks). This enactment effect is particularly pronounced for phrases for which the objects (table) are present as cues in the study and test contexts. In previous studies with retrieval cues for some phrases, the enactment effect in free recall for the other phrases has been surprisingly small or even nonexistent. The present study tested whether the often replicated enactment effect in free recall can be found if none of the phrases contains context cues. In Experiment 1, we tested, and corroborated, the suppression hypothesis: The enactment effect for a given type of phrase (marker phrases) is modified by the presence or absence of cues for the other phrases in the list (experimental phrases). Experiments 2 and 3 replicated the enactment effect for phrases without cues. Experiment 2 also showed that the presence of cues either at study or at test is sufficient for obtaining a suppression effect, and Experiment 3 showed that the enactment effect may disappear altogether if retrieval cues are very salient.
Effects on Text Simplification: Evaluation of Splitting up Noun Phrases
Leroy, Gondy; Kauchak, David; Hogue, Alan
2016-01-01
To help increase health literacy, we are developing a text simplification tool that creates more accessible patient education materials. Tool development is guided by data-driven feature analysis comparing simple and difficult text. In the present study, we focus on the common advice to split long noun phrases. Our previous corpus analysis showed that easier texts contained shorter noun phrases. Subsequently, we conduct a user study to measure the difficulty of sentences containing noun phrases of different lengths (2-gram, 3-gram and 4-gram), conditions (split or not) and, to simulate unknown terms, use of pseudowords (present or not). We gathered 35 evaluations for 30 sentences in each condition (3×2×2 conditions) on Amazon’s Mechanical Turk (N=12,600). We conducted a three-way ANOVA for perceived and actual difficulty. Splitting noun phrases had a positive effect on perceived difficulty but a negative effect on actual difficulty. The presence of pseudowords increased perceived and actual difficulty. Without pseudowords, longer noun phrase led to increased perceived and actual difficulty. A follow-up study using the phrases (N = 1,350) showed that measuring awkwardness may indicate when to split noun phrases. We conclude that splitting noun phrases benefits perceived difficulty, but hurts actual difficulty when the phrasing becomes less natural. PMID:27043754
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian
2015-06-01
The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.
Self-imagining enhances recognition memory in memory-impaired individuals with neurological damage.
Grilli, Matthew D; Glisky, Elizabeth L
2010-11-01
The ability to imagine an elaborative event from a personal perspective relies on several cognitive processes that may potentially enhance subsequent memory for the event, including visual imagery, semantic elaboration, emotional processing, and self-referential processing. In an effort to find a novel strategy for enhancing memory in memory-impaired individuals with neurological damage, we investigated the mnemonic benefit of a method we refer to as self-imagining-the imagining of an event from a realistic, personal perspective. Fourteen individuals with neurologically based memory deficits and 14 healthy control participants intentionally encoded neutral and emotional sentences under three instructions: structural-baseline processing, semantic processing, and self-imagining. Findings revealed a robust "self-imagination effect (SIE)," as self-imagination enhanced recognition memory relative to deep semantic elaboration in both memory-impaired individuals, F(1, 13) = 32.11, p < .001, η2 = .71; and healthy controls, F(1, 13) = 5.57, p < .05, η2 = .30. In addition, results indicated that mnemonic benefits of self-imagination were not limited by severity of the memory disorder nor were they related to self-reported vividness of visual imagery, semantic processing, or emotional content of the materials. The findings suggest that the SIE may depend on unique mnemonic mechanisms possibly related to self-referential processing and that imagining an event from a personal perspective makes that event particularly memorable even for those individuals with severe memory deficits. Self-imagining may thus provide an effective rehabilitation strategy for individuals with memory impairment.
Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.
Kramer, Megan E.; Chiu, C.-Y. Peter; Shear, Paula K.; Wade, Shari L.
2010-01-01
Children with traumatic brain injury (TBI) often experience memory deficits, although the nature, functional implication, and recovery trajectory of such difficulties are poorly understood. The present fMRI study examined the neural activation patterns in a group of young children who sustained moderate TBI in early childhood (n = 7), and a group of healthy control children (n = 13) during a verbal paired associate learning (PAL) task that promoted the use of two mnemonic strategies differing in efficacy. The children with TBI demonstrated intact memory performance and were able to successfully utilize the mnemonic strategies. However, the TBI group also demonstrated altered brain activation patterns during the task compared to the control children. These findings suggest early childhood TBI may alter activation within the network of brain regions supporting associative memory even in children who show good behavioral performance. PMID:21188286
Kline, Kristopher P; Conti, C Richard; Winchester, David E
2015-01-01
Acute coronary syndrome (ACS) remains a major burden on morbidity and mortality in the United States. Medical professionals and students often use the mnemonic 'MONA' (morphine, oxygen, nitroglycerin and aspirin) to recall treatments for ACS; however, this list of therapies is outdated. We provide a historical perspective on 'MONA,' attempt to uncover its origin in the medical literature, and demonstrate the myriad changes that have occurred over the last 50 years of ACS management. We have developed a novel mnemonic, 'THROMBINS2' (thienopyridines, heparin/enoxaparin, renin-angiotensin system blockers, oxygen, morphine, beta blocker, intervention, nitroglycerin, statin/salicylate) to help bedside clinicians recall all the elements of contemporary ACS management. We demonstrate the mortality benefit for each component of contemporary ACS management, correlating the continued improvement with historical data on mortality after myocardial infarction. We encourage providers to utilize this mnemonic to explore options and guide treatments in ACS patients.
User Authentication: A State-of-the-Art Review
1991-09-01
etc/ passwd , is publicly readable. Although the passwords in the file are encrypted, the encryption routine is read:.ly accessible. Encrypting a guess...version 4.0, and AT&T’s System V release 3.2 and System V/MLS, have addressed the problem by moving the passwords from /etc/ passwd into a shadow file that
17 CFR 269.7 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2010 CFR
2010-04-01
... on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification Authorization Code (PMAC)—allows a filer, filing agent or training agent to change its Password. [69 FR 22710, Apr... Sections Affected, which appears in the Finding Aids section of the printed volume and on GPO Access. ...
17 CFR 249.446 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2010 CFR
2010-04-01
... log on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification Authorization Code (PMAC)—allows a filer, filing agent or training agent to change its Password. [69 FR 22710... Sections Affected, which appears in the Finding Aids section of the printed volume and on GPO Access. ...
Capturing the complexity of uncertainty language to maximise its use.
NASA Astrophysics Data System (ADS)
Juanchich, Marie; Sirota, Miroslav
2016-04-01
Uncertainty is often communicated verbally, using uncertainty phrases such as 'there is a small risk of earthquake', 'flooding is possible' or 'it is very likely the sea level will rise'. Prior research has only examined a limited number of properties of uncertainty phrases: mainly the probability conveyed (e.g., 'a small chance' convey a small probability whereas 'it is likely' convey a high probability). We propose a new analytical framework that captures more of the complexity of uncertainty phrases by studying their semantic, pragmatic and syntactic properties. Further, we argue that the complexity of uncertainty phrases is functional and can be leveraged to best describe uncertain outcomes and achieve the goals of speakers. We will present findings from a corpus study and an experiment where we assessed the following properties of uncertainty phrases: probability conveyed, subjectivity, valence, nature of the subject, grammatical category of the uncertainty quantifier and whether the quantifier elicits a positive or a negative framing. Natural language processing techniques applied to corpus data showed that people use a very large variety of uncertainty phrases representing different configurations of the properties of uncertainty phrases (e.g., phrases that convey different levels of subjectivity, phrases with different grammatical construction). In addition, the corpus analysis uncovered that uncertainty phrases commonly studied in psychology are not the most commonly used in real life. In the experiment we manipulated the amount of evidence indicating that a fact was true and whether the participant was required to prove the fact was true or that it was false. Participants produced a phrase to communicate the likelihood that the fact was true (e.g., 'it is not sure…', 'I am convinced that…'). The analyses of the uncertainty phrases produced showed that participants leveraged the properties of uncertainty phrases to reflect the strength of evidence but also to achieve their personal goals. For example, participants aiming to prove that the fact was true chose words that conveyed a more positive polarity and a higher probability than participants aiming to prove that the fact was false. We discuss the utility of the framework for harnessing the properties of uncertainty phrases in geosciences.
Implementation of the common phrase index method on the phrase query for information retrieval
NASA Astrophysics Data System (ADS)
Fatmawati, Triyah; Zaman, Badrus; Werdiningsih, Indah
2017-08-01
As the development of technology, the process of finding information on the news text is easy, because the text of the news is not only distributed in print media, such as newspapers, but also in electronic media that can be accessed using the search engine. In the process of finding relevant documents on the search engine, a phrase often used as a query. The number of words that make up the phrase query and their position obviously affect the relevance of the document produced. As a result, the accuracy of the information obtained will be affected. Based on the outlined problem, the purpose of this research was to analyze the implementation of the common phrase index method on information retrieval. This research will be conducted in English news text and implemented on a prototype to determine the relevance level of the documents produced. The system is built with the stages of pre-processing, indexing, term weighting calculation, and cosine similarity calculation. Then the system will display the document search results in a sequence, based on the cosine similarity. Furthermore, system testing will be conducted using 100 documents and 20 queries. That result is then used for the evaluation stage. First, determine the relevant documents using kappa statistic calculation. Second, determine the system success rate using precision, recall, and F-measure calculation. In this research, the result of kappa statistic calculation was 0.71, so that the relevant documents are eligible for the system evaluation. Then the calculation of precision, recall, and F-measure produces precision of 0.37, recall of 0.50, and F-measure of 0.43. From this result can be said that the success rate of the system to produce relevant documents is low.
Key-phrase based classification of public health web pages.
Dolamic, Ljiljana; Boyer, Célia
2013-01-01
This paper describes and evaluates the public health web pages classification model based on key phrase extraction and matching. Easily extendible both in terms of new classes as well as the new language this method proves to be a good solution for text classification faced with the total lack of training data. To evaluate the proposed solution we have used a small collection of public health related web pages created by a double blind manual classification. Our experiments have shown that by choosing the adequate threshold value the desired value for either precision or recall can be achieved.
ERIC Educational Resources Information Center
Saddler, Bruce; Asaro-Saddler, Kristie; Moeyaert, Mariola; Ellis-Robinson, Tammy
2017-01-01
In this single-subject study, we examined the effects of a summarizing strategy on the written summaries of children with emotional and behavioral disorders (EBDs). Six students with EBDs in fifth and sixth grades learned a mnemonic-based strategy for summarizing taught through the self-regulated strategy development (SRSD) approach. Visual…
Persuasive Writing and Self-Regulation Training for Writers with Autism Spectrum Disorders
ERIC Educational Resources Information Center
Asaro-Saddler, Kristie; Bak, Nicole
2014-01-01
In this single-subject study, we examined the effects of a persuasive writing and self-regulation strategy on the writing of children with autism spectrum disorders (ASD). Six children with ASD worked in pairs to learn a mnemonic-based strategy for planning and writing a persuasive essay using the self-regulated strategy development (SRSD)…
Teaching Children with High-Functioning Autism Spectrum Disorders to Write Persuasive Essays
ERIC Educational Resources Information Center
Asaro-Saddler, Kristie; Bak, Nicole
2012-01-01
In this single-subject design study, we examined the effects of an intervention targeting planning and self-regulation strategy use on the persuasive writing of children with high-functioning autism spectrum disorders (ASD). Three 8- to 9-year-old children with ASD in third and fourth grades learned a mnemonic-based strategy for planning and…
The Keyword Method of Vocabulary Acquisition: An Experimental Evaluation.
ERIC Educational Resources Information Center
Griffith, Douglas
The keyword method of vocabulary acquisition is a two-step mnemonic technique for learning vocabulary terms. The first step, the acoustic link, generates a keyword based on the sound of the foreign word. The second step, the imagery link, ties the keyword to the meaning of the item to be learned, via an interactive visual image or other…
An Investigation of Differential Encoding and Retrieval in Older Adult College Students.
ERIC Educational Resources Information Center
Shaughnessy, Michael F.; Reif, Laurie
Three experiments were conducted in order to clarify the encoding/retrieval dilemma in older adult students; and the recognition/recall test issue was also explored. First, a mnemonic technique based on the "key word" method of Funk and Tarshis was used; secondly, a semantic processing task was tried; and lastly, a repetition task, based…
Using Pictorial Mnemonics in the Learning of Tax: A Cognitive Load Perspective
ERIC Educational Resources Information Center
Smith, Bernadette; Shimeld, Sonia
2014-01-01
The scope and complexity of the Australian taxation system (as with other tax regimes) is daunting for many accounting students. This paper documents the implementation of new practices that were initiated in an effort to address some of the challenges faced by undergraduate students studying taxation. Based on the principles of cognitive load…
Practical security and privacy attacks against biometric hashing using sparse recovery
NASA Astrophysics Data System (ADS)
Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan
2016-12-01
Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.
46 CFR Appendix A to Part 530 - Instructions for the Filing of Service Contracts
Code of Federal Regulations, 2011 CFR
2011-10-01
... file service contracts. BTCL will direct OIRM to provide approved filers with a log-on ID and password. Filers who wish a third party (publisher) to file their service contracts must so indicate on Form FMC-83... home page, http://www.fmc.gov. A. Registration, Log-on ID and Password To register for filing, a...
46 CFR Appendix A to Part 530 - Instructions for the Filing of Service Contracts
Code of Federal Regulations, 2010 CFR
2010-10-01
... file service contracts. BTCL will direct OIRM to provide approved filers with a log-on ID and password. Filers who wish a third party (publisher) to file their service contracts must so indicate on Form FMC-83... home page, http://www.fmc.gov. A. Registration, Log-on ID and Password To register for filing, a...
17 CFR 249.446 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2011 CFR
2011-04-01
... log on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification Authorization Code (PMAC)—allows a filer, filing agent or training agent to change its Password. [69 FR 22710... Sections Affected, which appears in the Finding Aids section of the printed volume and at at www.fdsys.gov. ...
17 CFR 269.7 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2011 CFR
2011-04-01
... on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification Authorization Code (PMAC)—allows a filer, filing agent or training agent to change its Password. [69 FR 22710, Apr... Sections Affected, which appears in the Finding Aids section of the printed volume and at at www.fdsys.gov. ...
Apple OS X VPN Set Up | High-Performance Computing | NREL
software using that conf file and your UserID Start the connection using your password plus the 6-digit OTP . Configure the Client Software Start the Endian Connect App (It should have installed into Applications in an password" link, and add your UserID. Start the app, and begin configuring the connection by clicking
Pre-Employment Testing on the Internet: Put Candidates a Click Away and Hire at Modem Speed.
ERIC Educational Resources Information Center
Mooney, John
2002-01-01
The experience of a county government illustrates factors to consider in implementing online employment testing for job candidates: (1) selection of the appropriate Internet-based test; (2) passwords, timing, security, and technical difficulties; and (3) provisions for applicants who lack Internet access. (SK)
Comparing Noun Phrasing Techniques for Use with Medical Digital Library Tools.
ERIC Educational Resources Information Center
Tolle, Kristin M.; Chen, Hsinchun
2000-01-01
Describes a study that investigated the use of a natural language processing technique called noun phrasing to determine whether it is a viable technique for medical information retrieval. Evaluates four noun phrase generation tools for their ability to isolate noun phrases from medical journal abstracts, focusing on precision and recall.…
PubMed Phrases, an open set of coherent phrases for searching biomedical literature
Kim, Sun; Yeganova, Lana; Comeau, Donald C.; Wilbur, W. John; Lu, Zhiyong
2018-01-01
In biomedicine, key concepts are often expressed by multiple words (e.g., ‘zinc finger protein’). Previous work has shown treating a sequence of words as a meaningful unit, where applicable, is not only important for human understanding but also beneficial for automatic information seeking. Here we present a collection of PubMed® Phrases that are beneficial for information retrieval and human comprehension. We define these phrases as coherent chunks that are logically connected. To collect the phrase set, we apply the hypergeometric test to detect segments of consecutive terms that are likely to appear together in PubMed. These text segments are then filtered using the BM25 ranking function to ensure that they are beneficial from an information retrieval perspective. Thus, we obtain a set of 705,915 PubMed Phrases. We evaluate the quality of the set by investigating PubMed user click data and manually annotating a sample of 500 randomly selected noun phrases. We also analyze and discuss the usage of these PubMed Phrases in literature search. PMID:29893755
Young children pause on phrase boundaries in self-paced music listening: The role of harmonic cues.
Kragness, Haley E; Trainor, Laurel J
2018-05-01
Proper segmentation of auditory streams is essential for understanding music. Many cues, including meter, melodic contour, and harmony, influence adults' perception of musical phrase boundaries. To date, no studies have examined young children's musical grouping in a production task. We used a musical self-pacing method to investigate (1) whether dwell times index young children's musical phrase grouping and, if so, (2) whether children dwell longer on phrase boundaries defined by harmonic cues specifically. In Experiment 1, we asked 3-year-old children to self-pace through chord progressions from Bach chorales (sequences in which metrical, harmonic, and melodic contour grouping cues aligned) by pressing a computer key to present each chord in the sequence. Participants dwelled longer on chords in the 8th position, which corresponded to phrase endings. In Experiment 2, we tested 3-, 4-, and 7-year-old children's sensitivity to harmonic cues to phrase grouping when metrical regularity cues and melodic contour cues were misaligned with the harmonic phrase boundaries. In this case, 7 and 4 year olds but not 3 year olds dwelled longer on harmonic phrase boundaries, suggesting that the influence of harmonic cues on phrase boundary perception develops substantially between 3 and 4 years of age in Western children. Overall, we show that the musical dwell time method is child-friendly and can be used to investigate various aspects of young children's musical understanding, including phrase grouping and harmonic knowledge. (PsycINFO Database Record (c) 2018 APA, all rights reserved).
Xie, Weizhen; Zhang, Weiwei
2017-09-01
Negative emotion sometimes enhances memory (higher accuracy and/or vividness, e.g., flashbulb memories). The present study investigates whether it is the qualitative (precision) or quantitative (the probability of successful retrieval) aspect of memory that drives these effects. In a visual long-term memory task, observers memorized colors (Experiment 1a) or orientations (Experiment 1b) of sequentially presented everyday objects under negative, neutral, or positive emotions induced with International Affective Picture System images. In a subsequent test phase, observers reconstructed objects' colors or orientations using the method of adjustment. We found that mnemonic precision was enhanced under the negative condition relative to the neutral and positive conditions. In contrast, the probability of successful retrieval was comparable across the emotion conditions. Furthermore, the boost in memory precision was associated with elevated subjective feelings of remembering (vividness and confidence) and metacognitive sensitivity in Experiment 2. Altogether, these findings suggest a novel precision-based account for emotional memories. Copyright © 2017 Elsevier B.V. All rights reserved.
Association and Phrase Structure in Sentence Recall.
ERIC Educational Resources Information Center
Rosenberg, Sheldon
The effect of within- and between-phrase normative controlled association and phrase structure upon word integration in sentence recall was studied in two experiments. The two experiments differed only with respect to the type of two-phrase sentence used. In both experiments, one group of subjects was given four study-test trials on a list of four…
ERIC Educational Resources Information Center
Johnson, Marcus L.; Lowder, Matthew W.; Gordon, Peter C.
2011-01-01
In 2 experiments, the authors used an eye tracking while reading methodology to examine how different configurations of common noun phrases versus unusual noun phrases (NPs) influenced the difference in processing difficulty between sentences containing object- and subject-extracted relative clauses. Results showed that processing difficulty was…
System of end-to-end symmetric database encryption
NASA Astrophysics Data System (ADS)
Galushka, V. V.; Aydinyan, A. R.; Tsvetkova, O. L.; Fathi, V. A.; Fathi, D. V.
2018-05-01
The article is devoted to the actual problem of protecting databases from information leakage, which is performed while bypassing access control mechanisms. To solve this problem, it is proposed to use end-to-end data encryption, implemented at the end nodes of an interaction of the information system components using one of the symmetric cryptographic algorithms. For this purpose, a key management method designed for use in a multi-user system based on the distributed key representation model, part of which is stored in the database, and the other part is obtained by converting the user's password, has been developed and described. In this case, the key is calculated immediately before the cryptographic transformations and is not stored in the memory after the completion of these transformations. Algorithms for registering and authorizing a user, as well as changing his password, have been described, and the methods for calculating parts of a key when performing these operations have been provided.
Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad
2015-01-01
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.
Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad
2015-01-01
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963
Self-Imagining Enhances Recognition Memory in Memory-Impaired Individuals with Neurological Damage
Grilli, Matthew D.; Glisky, Elizabeth L.
2010-01-01
Objective The ability to imagine an elaborative event from a personal perspective relies on a number of cognitive processes that may potentially enhance subsequent memory for the event, including visual imagery, semantic elaboration, emotional processing, and self-referential processing. In an effort to find a novel strategy for enhancing memory in memory-impaired individuals with neurological damage, the present study investigated the mnemonic benefit of a method we refer to as “self-imagining” – or the imagining of an event from a realistic, personal perspective. Method Fourteen individuals with neurologically-based memory deficits and fourteen healthy control participants intentionally encoded neutral and emotional sentences under three instructions: structural-baseline processing, semantic processing, and self-imagining. Results Findings revealed a robust “self-imagination effect” as self-imagination enhanced recognition memory relative to deep semantic elaboration in both memory-impaired individuals, F (1, 13) = 32.11, p < .001, η2 = .71, and healthy controls, F (1, 13) = 5.57, p < .05, η2 = .30. In addition, results indicated that mnemonic benefits of self-imagination were not limited by severity of the memory disorder nor were they related to self-reported vividness of visual imagery, semantic processing, or emotional content of the materials. Conclusions The findings suggest that the self-imagination effect may depend on unique mnemonic mechanisms possibly related to self-referential processing, and that imagining an event from a personal perspective makes that event particularly memorable even for those individuals with severe memory deficits. Self-imagining may thus provide an effective rehabilitation strategy for individuals with memory impairment. PMID:20873930
Steinhauer, Karsten; DePriest, John; Koelsch, Stefan
2016-01-01
The processing of prosodic phrase boundaries in language is immediately reflected by a specific event-related potential component called the Closure Positive Shift (CPS). A component somewhat reminiscent of the CPS in language has also been reported for musical phrases (i.e., the so-called ‘music CPS’). However, in previous studies the quantification of the music-CPS as well as its morphology and timing differed substantially from the characteristics of the language-CPS. Therefore, the degree of correspondence between cognitive mechanisms of phrasing in music and in language has remained questionable. Here, we probed the shared nature of mechanisms underlying musical and prosodic phrasing by (1) investigating whether the music-CPS is present at phrase boundary positions where the language-CPS has been originally reported (i.e., at the onset of the pause between phrases), and (2) comparing the CPS in music and in language in non-musicians and professional musicians. For the first time, we report a positive shift at the onset of musical phrase boundaries that strongly resembles the language-CPS and argue that the post-boundary ‘music-CPS’ of previous studies may be an entirely distinct ERP component. Moreover, the language-CPS in musicians was found to be less prominent than in non-musicians, suggesting more efficient processing of prosodic phrases in language as a result of higher musical expertise. PMID:27192560
Glushko, Anastasia; Steinhauer, Karsten; DePriest, John; Koelsch, Stefan
2016-01-01
The processing of prosodic phrase boundaries in language is immediately reflected by a specific event-related potential component called the Closure Positive Shift (CPS). A component somewhat reminiscent of the CPS in language has also been reported for musical phrases (i.e., the so-called 'music CPS'). However, in previous studies the quantification of the music-CPS as well as its morphology and timing differed substantially from the characteristics of the language-CPS. Therefore, the degree of correspondence between cognitive mechanisms of phrasing in music and in language has remained questionable. Here, we probed the shared nature of mechanisms underlying musical and prosodic phrasing by (1) investigating whether the music-CPS is present at phrase boundary positions where the language-CPS has been originally reported (i.e., at the onset of the pause between phrases), and (2) comparing the CPS in music and in language in non-musicians and professional musicians. For the first time, we report a positive shift at the onset of musical phrase boundaries that strongly resembles the language-CPS and argue that the post-boundary 'music-CPS' of previous studies may be an entirely distinct ERP component. Moreover, the language-CPS in musicians was found to be less prominent than in non-musicians, suggesting more efficient processing of prosodic phrases in language as a result of higher musical expertise.
Kline, Jeffrey A; Johnson, Charles L; Webb, William B; Runyon, Michael S
2004-01-01
Background Design and test the reliability of a web-based system for multicenter, real-time collection of data in the emergency department (ED), under waiver of authorization, in compliance with HIPAA. Methods This was a phase I, two-hospital study of patients undergoing evaluation for possible pulmonary embolism. Data were collected by on-duty clinicians on an HTML data collection form (prospective e-form), populated using either a personal digital assistant (PDA) or personal computer (PC). Data forms were uploaded to a central, offsite server using secure socket protocol transfer. Each form was assigned a unique identifier, and all PHI data were encrypted, but were password-accessible by authorized research personnel to complete a follow-up e-form. Results From April 15, 2003-April 15 2004, 1022 prospective e-forms and 605 follow-up e-forms were uploaded. Complexities of PDA use compelled clinicians to use PCs in the ED for data entry for most forms. No data were lost and server log query revealed no unauthorized entry. Prospectively obtained PHI data, encrypted upon server upload, were successfully decrypted using password-protected access to allow follow-up without difficulty in 605 cases. Non-PHI data from prospective and follow-up forms were available to the study investigators via standard file transfer protocol. Conclusions Data can be accurately collected from on-duty clinicians in the ED using real-time, PC-Internet data entry in compliance with the Privacy Rule. Deidentification-reidentification of PHI was successfully accomplished by a password-protected encryption-deencryption mechanism to permit follow-up by approved research personnel. PMID:15479471
Prototype Equipment Student Guide for ACE (Air Intercept Controller Prototype Training System).
1981-09-01
as your " home base", directing you to where you should be (at the Student Station CRT or the Console) and stating what you could (or should) do once...review the transmissions made in your last Practice with- out Freezes (see Subsection IV A) a take a break * re-start the instruction * answer a...the instructor select the phrase from the menu. The new collections will replace the previous collections made for the phrase. instructor Two keys on
Mnemonic convergence in social networks: The emergent properties of cognition at a collective level.
Coman, Alin; Momennejad, Ida; Drach, Rae D; Geana, Andra
2016-07-19
The development of shared memories, beliefs, and norms is a fundamental characteristic of human communities. These emergent outcomes are thought to occur owing to a dynamic system of information sharing and memory updating, which fundamentally depends on communication. Here we report results on the formation of collective memories in laboratory-created communities. We manipulated conversational network structure in a series of real-time, computer-mediated interactions in fourteen 10-member communities. The results show that mnemonic convergence, measured as the degree of overlap among community members' memories, is influenced by both individual-level information-processing phenomena and by the conversational social network structure created during conversational recall. By studying laboratory-created social networks, we show how large-scale social phenomena (i.e., collective memory) can emerge out of microlevel local dynamics (i.e., mnemonic reinforcement and suppression effects). The social-interactionist approach proposed herein points to optimal strategies for spreading information in social networks and provides a framework for measuring and forging collective memories in communities of individuals.
Mnemonic training reshapes brain networks to support superior memory
Dresler, Martin; Shirer, William R.; Konrad, Boris N.; Müller, Nils C.J.; Wagner, Isabella C.; Fernández, Guillén; Czisch, Michael; Greicius, Michael D.
2017-01-01
Summary Memory skills strongly differ across the general population, however little is known about the brain characteristics supporting superior memory performance. Here, we assess functional brain network organization of 23 of the world’s most successful memory athletes and matched controls by fMRI during both task-free resting state baseline and active memory encoding. We demonstrate that in a group of naïve controls, functional connectivity changes induced by six weeks of mnemonic training were correlated with the network organization that distinguishes athletes from controls. During rest, this effect was mainly driven by connections between rather than within the visual, medial temporal lobe and default mode networks, whereas during task it was driven by connectivity within these networks. Similarity with memory athlete connectivity patterns predicted memory improvements up to 4 months after training. In conclusion, mnemonic training drives distributed rather than regional changes, reorganizing the brain’s functional network organization to enable superior memory performance. PMID:28279356
The Missing Link: The Use of Link Words and Phrases as a Link to Manuscript Quality
ERIC Educational Resources Information Center
Onwuegbuzie, Anthony J.
2016-01-01
In this article, I provide a typology of transition words/phrases. This typology comprises 12 dimensions of link words/phrases that capture 277 link words/phrases. Using QDA Miner, WordStat, and SPSS--a computer-assisted mixed methods data analysis software, content analysis software, and statistical software, respectively--I analyzed 74…
Improving Students' Formal Writing: The IDOL Writing Device
ERIC Educational Resources Information Center
Dillon, Patrick J.; Jenkins, J. Jacob
2013-01-01
In this article, the authors describe an acrostic-based mnemonic device they created to aid students in constructing and supporting arguments in a manner consistent with the claim-data-warrant model. They call it the "IDOL writing device": I-"I"dentify a specific claim, D-"D"evelop an argument to support your claim, O-"O"ffer an example(s) that…
LLOGO: An Implementation of LOGO in LISP. Artificial Intelligence Memo Number 307.
ERIC Educational Resources Information Center
Goldstein, Ira; And Others
LISP LOGO is a computer language invented for the beginning student of man-machine interaction. The language has the advantages of simplicity and naturalness as well as that of emphasizing the difference between programs and data. The language is based on the LOGO language and uses mnemonic syllables as commands. It can be used in conjunction with…
ERIC Educational Resources Information Center
Shen, Siu-Tsen
2016-01-01
This paper presents an ongoing study of the development of a customizable web browser information organization and management system, which the author has named Lexicon Sextant (LS). LS is a user friendly, graphical web based add-on to the latest generation of web browsers, such as Google Chrome, making it easier and more intuitive to store and…
ERIC Educational Resources Information Center
Freeman-Green, Shaqwana M.; O'Brien, Chris; Wood, Charles L.; Hitt, Sara Beth
2015-01-01
This study examined the effects of explicit instruction in the SOLVE Strategy on the mathematical problem solving skills of six Grade 8 students with specific learning disabilities. The SOLVE Strategy is an explicit instruction, mnemonic-based learning strategy designed to help students in solving mathematical word problems. Using a multiple probe…
Xie, Weizhen; Zhang, Weiwei
2017-11-01
The present study dissociated the number (i.e., quantity) and precision (i.e., quality) of visual short-term memory (STM) representations in change detection using receiver operating characteristic (ROC) and experimental manipulations. Across three experiments, participants performed both recognition and recall tests of visual STM using the change-detection task and the continuous color-wheel recall task, respectively. Experiment 1 demonstrated that the estimates of the number and precision of visual STM representations based on the ROC model of change-detection performance were robustly correlated with the corresponding estimates based on the mixture model of continuous-recall performance. Experiments 2 and 3 showed that the experimental manipulation of mnemonic precision using white-noise masking and the experimental manipulation of the number of encoded STM representations using consolidation masking produced selective effects on the corresponding measures of mnemonic precision and the number of encoded STM representations, respectively, in both change-detection and continuous-recall tasks. Altogether, using the individual-differences (Experiment 1) and experimental dissociation (Experiment 2 and 3) approaches, the present study demonstrated the some-or-none nature of visual STM representations across recall and recognition.
Complexity Matters: On Gender Agreement in Heritage Scandinavian
Johannessen, Janne Bondi; Larsson, Ida
2015-01-01
This paper investigates aspects of the noun phrase from a Scandinavian heritage language perspective, with an emphasis on noun phrase-internal gender agreement and noun declension. Our results are somewhat surprising compared with earlier research: We find that noun phrase-internal agreement for the most part is rather stable. To the extent that we find attrition, it affects agreement in the noun phrase, but not the declension of the noun. We discuss whether this means that gender is lost and has been reduced to a pure declension class, or whether gender is retained. We argue that gender is actually retained in these heritage speakers. One argument for this is that the speakers who lack agreement in complex noun phrases, have agreement intact in simpler phrases. We have thus found that the complexity of the noun phrase is crucial for some speakers. However, among the heritage speakers we also find considerable inter-individual variation, and different speakers can have partly different systems. PMID:26733114
Kanoski, Scott E; Grill, Harvey J
2017-05-01
Food intake is a complex behavior that can occur or cease to occur for a multitude of reasons. Decisions about where, when, what, and how much to eat are not merely reflexive responses to food-relevant stimuli or to changes in energy status. Rather, feeding behavior is modulated by various contextual factors and by previous experiences. The data reviewed here support the perspective that neurons in multiple hippocampal subregions constitute an important neural substrate linking the external context, the internal context, and mnemonic and cognitive information to control both appetitive and ingestive behavior. Feeding behavior is heavily influenced by hippocampal-dependent mnemonic functions, including episodic meal-related memories and conditional learned associations between food-related stimuli and postingestive consequences. These mnemonic processes are undoubtedly influenced by both external and internal factors relating to food availability, location, and physiological energy status. The afferent and efferent neuroanatomical connectivity of the subregions of the hippocampus is reviewed with regard to the integration of visuospatial and olfactory sensory information (the external context) with endocrine and gastrointestinal interoceptive stimuli (the internal context). Also discussed are recent findings demonstrating that peripherally derived endocrine signals act on receptors in hippocampal neurons to reduce (leptin, glucagon-like peptide-1) or increase (ghrelin) food intake and learned food reward-driven responding, thereby highlighting endocrine and neuropeptidergic signaling in hippocampal neurons as a novel substrate of importance in the higher-order regulation of feeding behavior. Copyright © 2015 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.
Kent, Alexander Dale [Los Alamos, NM
2008-09-02
Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.
NASA Astrophysics Data System (ADS)
Juels, Ari
The purpose of this chapter is to introduce fuzzy commitment, one of the earliest and simplest constructions geared toward cryptography over noisy data. The chapter also explores applications of fuzzy commitment to two problems in data security: (1) secure management of biometrics, with a focus on iriscodes, and (2) use of knowledge-based authentication (i.e., personal questions) for password recovery.
Verifying Secrets and Relative Secrecy
2000-01-01
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given...value. For example, an ATM machine allows one to ask whether a string is the secret PIN of a (lost or stolen) ATM card. Yet such queries are prohibited
Yau, Wei-Chuen; Phan, Raphael C-W
2013-12-01
Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.
A more secure anonymous user authentication scheme for the integrated EPR information system.
Wen, Fengtong
2014-05-01
Secure and efficient user mutual authentication is an essential task for integrated electronic patient record (EPR) information system. Recently, several authentication schemes have been proposed to meet this requirement. In a recent paper, Lee et al. proposed an efficient and secure password-based authentication scheme used smart cards for the integrated EPR information system. This scheme is believed to have many abilities to resist a range of network attacks. Especially, they claimed that their scheme could resist lost smart card attack. However, we reanalyze the security of Lee et al.'s scheme, and show that it fails to protect off-line password guessing attack if the secret information stored in the smart card is compromised. This also renders that their scheme is insecure against user impersonation attacks. Then, we propose a new user authentication scheme for integrated EPR information systems based on the quadratic residues. The new scheme not only resists a range of network attacks but also provides user anonymity. We show that our proposed scheme can provide stronger security.
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619
Machine aided indexing from natural language text
NASA Technical Reports Server (NTRS)
Silvester, June P.; Genuardi, Michael T.; Klingbiel, Paul H.
1993-01-01
The NASA Lexical Dictionary (NLD) Machine Aided Indexing (MAI) system was designed to (1) reuse the indexing of the Defense Technical Information Center (DTIC); (2) reuse the indexing of the Department of Energy (DOE); and (3) reduce the time required for original indexing. This was done by automatically generating appropriate NASA thesaurus terms from either the other agency's index terms, or, for original indexing, from document titles and abstracts. The NASA STI Program staff devised two different ways to generate thesaurus terms from text. The first group of programs identified noun phrases by a parsing method that allowed for conjunctions and certain prepositions, on the assumption that indexable concepts are found in such phrases. Results were not always satisfactory, and it was noted that indexable concepts often occurred outside of noun phrases. The first method also proved to be too slow for the ultimate goal of interactive (online) MAI. The second group of programs used the knowledge base (KB), word proximity, and frequency of word and phrase occurrence to identify indexable concepts. Both methods are described and illustrated. Online MAI has been achieved, as well as several spinoff benefits, which are also described.
From Legion to Avaki: The Persistence of Vision
2006-01-01
person, but what component, is requesting an action. 5.3.1 Authentication Users authenticate themselves to a Legion grid with the login paradigm...password supplied during login is compared to the password in the state of the authentication object in order to permit or deny subsequent access to...In either case, the credential is protected by the security of the underlying operating system. Although login is the most commonly used method
Cybersecurity Education for Military Officers
2017-12-01
lecture showed the math behind the possible combinations of passwords of different lengths, and made the recommendation to increase your password to...2. Math the system to the real world: Use of effective metaphors and real world language wherever possible. 3. User Control: Try to give the user...given any training on this topic outside of annual NKO courses. I was a math major for my undergraduate degree, so I have no computer science
ERIC Educational Resources Information Center
Svetcov, Eric
2004-01-01
When it comes to security, many people do not know what they do not know. Consider for example, an administrator who leaves her password taped under her keyboard, or a teacher who doesn't change his password (ever!) or can't be bothered to log out or lock the computer, all the firewalls and antivirus programs in the world will not protect a…
Temporal coordination and adaptation to rate change in music performance.
Loehr, Janeen D; Large, Edward W; Palmer, Caroline
2011-08-01
People often coordinate their actions with sequences that exhibit temporal variability and unfold at multiple periodicities. We compared oscillator- and timekeeper-based accounts of temporal coordination by examining musicians' coordination of rhythmic musical sequences with a metronome that gradually changed rate at the end of a musical phrase (Experiment 1) or at the beginning of a phrase (Experiment 2). The rhythms contained events that occurred at the same periodic rate as the metronome and at half the period. Rate change consisted of a linear increase or decrease in intervals between metronome onsets. Musicians coordinated their performances better with a metronome that decreased than increased in tempo (as predicted by an oscillator model), at both beginnings and ends of musical phrases. Model performance was tested with an oscillator period or timekeeper interval set to the same period as the metronome (1:1 coordination) or half the metronome period (2:1 coordination). Only the oscillator model was able to predict musicians' coordination at both periods. These findings suggest that coordination is based on internal neural oscillations that entrain to external sequences.
It's Not Just the "Heavy NP": Relative Phrase Length Modulates the Production of Heavy-NP Shift
ERIC Educational Resources Information Center
Stallings, Lynne M.; MacDonald, Maryellen C.
2011-01-01
Heavy-NP shift is the tendency for speakers to place long direct object phrases at the end of a clause rather than next to the verb. Though some analyses have focused on length of the direct object phrase alone, results from two experiments demonstrate that the length of the direct object relative to that of other phrases, and not the length of…
US Astronomers Access to SIMBAD in Strasbourg
NASA Technical Reports Server (NTRS)
Oliversen, Ronald (Technical Monitor); Eichhorn, Guenther
2004-01-01
During the last year the US SIMBAD Gateway Project continued to provide services like user registration to the US users of the SIMBAD database in France. Currently there are over 4500 US users registered. We also provided user support by answering questions from users and handling requests for lost passwords when still necessary. Even though almost all users now access SIMBAD without a password, based on hostnames/IP addresses, there are still some users that need individual passwords. We continued to maintain the mirror copy of the SIMBAD database on a server at SAO. This allows much faster access for the US users. During the past year we again moved this mirror to a faster server to improve access for the US users. We again supported a demonstration of the SIMBAD database at the meeting of the American Astronomical Society in January. We provided support for the demonstration activities at the SIMBAD booth. We paid part of the fee for the SIMBAD demonstration. We continued to improve the cross-linking between the SIMBAD project and the Astrophysics Data System. This cross-linking between these systems is very much appreciated by the users of both the SIMBAD database and the ADS Abstract Service. The mirror of the SIMBAD database at SA0 makes this connection faster for the US astronomers. We exchange information between the ADS and SIMBAD on a daily basis. During the last year we also installed a mirror copy of the Vizier system from the CDS, in addition to the SIMBAD mirror.
Building Fluency through the Phrased Text Lesson
ERIC Educational Resources Information Center
Rasinski, Timothy; Yildirim, Kasim; Nageldinger, James
2012-01-01
This Teaching Tip article explores the importance of phrasing while reading. It also presents an instructional intervention strategy for helping students develop greater proficiency in reading with phrases that reflect the meaning of the text.
Generics license 30-month-olds’ inferences about the atypical properties of novel kinds
Graham, Susan A.; Gelman, Susan A.; Clarke, Jessica
2016-01-01
We examined whether the distinction between generic and nongeneric language provides toddlers with a rapid and efficient means to learn about kinds. In Experiment 1, we examined 30-month-olds’ willingness to extend atypical properties to members of an unfamiliar category when the properties were introduced in one of three ways: a) using a generic noun phrase (“Blicks drink ketchup”); b) using a nongeneric noun phrase (“These blicks drink ketchup”); and c) using an attentional phrase (“Look at this”). Hearing a generic noun phrase boosted toddlers’ extension of properties to both the model exemplars and to novel members of the same category, relative to when a property had been introduced with a nongeneric noun phrase or an attentional phrase. In Experiment 2, properties were introduced with a generic noun phrase and toddlers extended novel properties to members of the same-category, but not to an out-of-category object. Taken together, these findings demonstrate that generics highlight the stability of a feature and foster generalization of the property to novel within-category exemplars. PMID:27505699
Processing Elided Verb Phrases with Flawed Antecedents: the Recycling Hypothesis
Arregui, Ana; Clifton, Charles; Frazier, Lyn; Moulton, Keir
2006-01-01
Traditional syntactic accounts of verb phrase ellipsis (e.g. “Jason laughed. Sam did [ ] too.”) categorize as ungrammatical many sentences that language users find acceptable (they “undergenerate”); semantic accounts overgenerate. We propose that a processing theory, together with a syntactic account, does a better job of describing and explaining the data on verb phrase-ellipsis. Five acceptability judgment experiments supported a “VP recycling hypothesis,” which claims that when a syntactically-matching antecedent is not available, the listener/reader creates one using the materials at hand. Experiments 1 and 2 used verb phrase ellipsis sentences with antecedents ranging from perfect (a verb phrase in matrix verb phrase position) to impossible (a verb phrase containing only a deverbal word). Experiments 3 and 4 contrasted antecedents in verbal versus nominal gerund subjects. Experiment 5 explored the possibility that speakers are particularly likely to go beyond the grammar and produce elided constituents without perfect matching antecedents when the antecedent needed is less marked than the antecedent actually produced. This experiment contrasted active (unmarked) and passive antecedents to show that readers seem to honor such a tendency. PMID:17710192
Developing cultural competence and social responsibility in preclinical dental students.
Rubin, Richard W
2004-04-01
Dental student development of cultural competence and social responsibility is recognized by educators as an important element in the overall shaping of minds and attitudes of modem dental practitioners. Yet training modalities to achieve these competencies are not clearly defined, and outcome measurements are elusive. This article shows an effective method to meet these desired outcomes. Sixty-one freshmen (class of 2005) participated in forty hours of nondental community service, and reflective journals were completed by the end of second year. Competency outcomes were measured by selecting key words and phrases found in the individual journals. Key phrases were related to compassion, righteousness, propriety, and wisdom. Also, phrases had to be accompanied by written indications of direct program causation. The combination of active-learning (based upon service learning models) in public health settings outside of the dental realm, accompanied by reflective journaling, enhanced cultural understanding and community spirit in the majority of students.
Installing the ARL Phrase Book Android Application and Configuring its Dependencies
2015-02-01
device and configuring several additional applications required by the Phrase Book. 15. SUBJECT TERMS Android, Phrase Book, Domain Translator, Festival ...CMU] Festival Light Dari Text-to-Speech [TTS] Engine, the Dari/Pashto soft keyboard2) were integrated into the Phrase Book for additional capability...apps (as APK files): • Dari and Pashto AnySoftKeyboards. Delivered as a 94-KB AnySoftKeyboardLanguagePackPashto.apk. • Festival Lite (Flite) TTS
Proverb and idiom comprehension in Alzheimer disease.
Kempler, D; Van Lancker, D; Read, S
1988-01-01
Twenty-nine patients diagnosed with Probable Alzheimer Disease were administered tests of word, familiar phrases (idioms and proverbs), and novel phrase comprehension. From the early stage of the disease, patients performed worse at understanding familiar phrases than single words or novel phrases. The results uphold common observations that AD patients have difficulty interpreting abstract meanings. Cognitive variables responsible for poor idiom/proverb comprehension and the clinical implications of this new protocol are discussed.
Misinterpretations in agreement and agreement attraction.
Patson, Nikole D; Husband, E Matthew
2016-01-01
It has been well established that subject-verb number agreement can be disrupted by local noun phrases that differ in number from the subject head noun phrase. In sentence production, mismatches in the grammatical number of the head and local noun phrases lead to agreement errors on the verb as in: the key to the cabinets are. Similarly, although ungrammaticality typically causes disruption in measures of sentence comprehension, the disruption is reduced when the local noun phrase has a plural feature. Using a forced-choice comprehension question method, we report two experiments that provide evidence that comprehenders were likely to misinterpret the number information on the head noun phrase when morphosyntactic number markings on the local noun phrase and verb did not match the head. These results are consistent with a growing body of research that suggests that comprehenders often arrive at a final interpretation of a sentence that is not faithful to the linguistic input.
System Connection via SSH Gateway | High-Performance Computing | NREL
;@peregrine.hpc.nrel.gov First time logging in? If this is the first time you've logged in with your new account, you will password. You will be prompted to enter it a second time, then you will be logged off. Just reconnect with your HPC password at any time, you can simply use the passwd command. Remote Users If you're connecting
One Time Passwords in Everything (OPIE): Experiences with Building and Using Stringer Authentication
1995-01-01
opiepasswd(1). The name change brings it more in line with its UNIX counterpart passwd (1), which should make both programs easier to remember for users. This...char * passwd ) int opiehash(char *x, unsigned algorithm) The one-time password schemes implemented in OPIE, as rst described in [Hal94], compute a...seed, passwd ); while (sequence-- != 0) opiehash(result, algorithm); opiebtoe(result,words); Send words. : : : 6 Deployment Every machine that has
Teoh, Andrew B J; Goh, Alwyn; Ngo, David C L
2006-12-01
Biometric analysis for identity verification is becoming a widespread reality. Such implementations necessitate large-scale capture and storage of biometric data, which raises serious issues in terms of data privacy and (if such data is compromised) identity theft. These problems stem from the essential permanence of biometric data, which (unlike secret passwords or physical tokens) cannot be refreshed or reissued if compromised. Our previously presented biometric-hash framework prescribes the integration of external (password or token-derived) randomness with user-specific biometrics, resulting in bitstring outputs with security characteristics (i.e., noninvertibility) comparable to cryptographic ciphers or hashes. The resultant BioHashes are hence cancellable, i.e., straightforwardly revoked and reissued (via refreshed password or reissued token) if compromised. BioHashing furthermore enhances recognition effectiveness, which is explained in this paper as arising from the Random Multispace Quantization (RMQ) of biometric and external random inputs.
Mathematical Modelling and the Learning Trajectory: Tools to Support the Teaching of Linear Algebra
ERIC Educational Resources Information Center
Cárcamo Bahamonde, Andrea Dorila; Fortuny Aymemí, Josep Maria; Gómez i Urgellés, Joan Vicenç
2017-01-01
In this article we present a didactic proposal for teaching linear algebra based on two compatible theoretical models: emergent models and mathematical modelling. This proposal begins with a problematic situation related to the creation and use of secure passwords, which leads students toward the construction of the concepts of spanning set and…
The value of parsing as feature generation for gene mention recognition
Smith, Larry H; Wilbur, W John
2009-01-01
We measured the extent to which information surrounding a base noun phrase reflects the presence of a gene name, and evaluated seven different parsers in their ability to provide information for that purpose. Using the GENETAG corpus as a gold standard, we performed machine learning to recognize from its context when a base noun phrase contained a gene name. Starting with the best lexical features, we assessed the gain of adding dependency or dependency-like relations from a full sentence parse. Features derived from parsers improved performance in this partial gene mention recognition task by a small but statistically significant amount. There were virtually no differences between parsers in these experiments. PMID:19345281
Novel figurative phrases and idioms: phrase characteristics over multiple presentations.
Schweigert, Wendy A; Cintron, Jennifer; Sullivan, Karin; Ilic, Emily; Ellis, Shannon; Dobrowits, Carrie; Roberts, Crystal
2003-07-01
In a series of three studies, characteristics of novel figurative phrases were compared with those of established idioms. Studies 1 and 2 found that certain correlations were found to be strong and in one direction for familiar idioms and comparably strong but in the opposite direction for novel figurative phrases, with the correlations for less familiar idioms usually falling partway between these extremes. Study 2 also noted that written or auditory presentation had minimal effects on characteristic ratings. In Study 3 the correlations among characteristics stayed relatively constant for familiar idioms after one, three, or six presentations, but for the novel figurative phrases, after multiple presentations the correlations changed in the direction of the established idioms.
Increases in individualistic words and phrases in American books, 1960-2008.
Twenge, Jean M; Campbell, W Keith; Gentile, Brittany
2012-01-01
Cultural products such as song lyrics, television shows, and books reveal cultural differences, including cultural change over time. Two studies examine changes in the use of individualistic words (Study 1) and phrases (Study 2) in the Google Books Ngram corpus of millions of books in American English. Current samples from the general population generated and rated lists of individualistic words and phrases (e.g., "unique," "personalize," "self," "all about me," "I am special," "I'm the best"). Individualistic words and phrases increased in use between 1960 and 2008, even when controlling for changes in communal words and phrases. Language in American books has become increasingly focused on the self and uniqueness in the decades since 1960.
Effects of Motivation on Young Children's Object Recall and Strategy Use.
Nida, Robert E
2015-01-01
The study was designed to examine the effects of motivation on young children's recall for object names and early-emerging mnemonic activities. Seventy-two 4-year-old children were randomly assigned to 1 of 3 instructional conditions: incidental, intentional, or motivational. Each child was shown 10 small toy objects and provided a 90 s study period prior to recall. The children's mnemonic behaviors were videotaped for subsequent coding. The children in the incidental condition were instructed to simply look at the toys while children in the intentional and motivational condition were given explicit instructions to remember. The motivational group was also told that they could keep whichever toys they remembered. A recognition memory task was employed to examine the extent to which the stimuli were encoded during the study period. The children's recall memory did not vary as a function of instructional condition. Children's use of singular versus multiple strategies was calculated, along with a weighted summary score giving most weight to the participant's use of mature mnemonic strategies. Significant differences in strategy use were found, favoring the motivational condition. Significant positive correlations were found between the weighted summary scores and object recall, and the teacher ratings of mastery motivation and object recall. Mastery motivation was found to be unrelated to the strategic summary scores, failing to mediate strategic behaviors. The results suggest that when providing incentives to remember, children apparently engaged in more effortful mnemonic processing in order to remember the items, even though a greater number of items were not recalled.
Age-Related Impairment on a Forced-Choice Version of the Mnemonic Similarity Task
Huffman, Derek J.; Stark, Craig E. L.
2018-01-01
Previous studies from our lab have indicated that healthy older adults are impaired in their ability to mnemonically discriminate between previously viewed objects and similar lure objects in the Mnemonic Similarity Task (MST). These studies have used either old/similar/new or old/new test formats. The forced-choice test format (e.g., “Did you see object A or object A’ during the encoding phase?”) relies on different assumptions than the old/new test format (e.g., “Did you see this object during the encoding phase?”); hence, converging evidence from these approaches would bolster the conclusion that healthy aging is accompanied by impaired performance on the MST. Consistent with our hypothesis, healthy older adults exhibited impaired performance on a forced-choice test format that required discriminating between a target and a similar lure. We also tested the hypothesis that age-related impairments on the MST could be modeled within a global matching computational framework. We found that decreasing the probability of successful feature encoding in the models caused changes that were similar to the empirical data in healthy older adults. Collectively, our behavioral results extend to the forced-choice test format the finding that healthy aging is accompanied by an impaired ability to discriminate between targets and similar lures, and our modeling results suggest that a diminished probability of encoding stimulus features is a candidate mechanism for memory changes in healthy aging. We also discuss the ability of global matching models to account for findings in other studies that have used variants on mnemonic similarity tasks. PMID:28004951
Age-related impairment on a forced-choice version of the Mnemonic Similarity Task.
Huffman, Derek J; Stark, Craig E L
2017-02-01
Previous studies from our lab have indicated that healthy older adults are impaired in their ability to mnemonically discriminate between previously viewed objects and similar lure objects in the Mnemonic Similarity Task (MST). These studies have used either old/similar/new or old/new test formats. The forced-choice test format (e.g., "Did you see object A or object A' during the encoding phase?") relies on different assumptions than the old/new test format (e.g., "Did you see this object during the encoding phase?"); hence, converging evidence from these approaches would bolster the conclusion that healthy aging is accompanied by impaired performance on the MST. Consistent with our hypothesis, healthy older adults exhibited impaired performance on a forced-choice test format that required discriminating between a target and a similar lure. We also tested the hypothesis that age-related impairments on the MST could be modeled within a global matching computational framework. We found that decreasing the probability of successful feature encoding in the models caused changes that were similar to the empirical data in healthy older adults. Collectively, our behavioral results using the forced-choice format extend the finding that healthy aging is accompanied by an impaired ability to discriminate between targets and similar lures, and our modeling results suggest that a diminished probability of encoding stimulus features is a candidate mechanism for memory changes in healthy aging. We also discuss the ability of global matching models to account for findings in other studies that have used variants on mnemonic similarity tasks. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
40 CFR 63.1434 - Equipment leak provisions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... applicable compliance date. (h) The phrase “the provisions of subparts F, I, or PPP of this part” shall apply.... In addition, the phrase “subparts F, I, and PPP” shall apply instead of the phrase “subparts F and I...
Mnemonic convergence in social networks: The emergent properties of cognition at a collective level
Coman, Alin; Momennejad, Ida; Drach, Rae D.; Geana, Andra
2016-01-01
The development of shared memories, beliefs, and norms is a fundamental characteristic of human communities. These emergent outcomes are thought to occur owing to a dynamic system of information sharing and memory updating, which fundamentally depends on communication. Here we report results on the formation of collective memories in laboratory-created communities. We manipulated conversational network structure in a series of real-time, computer-mediated interactions in fourteen 10-member communities. The results show that mnemonic convergence, measured as the degree of overlap among community members’ memories, is influenced by both individual-level information-processing phenomena and by the conversational social network structure created during conversational recall. By studying laboratory-created social networks, we show how large-scale social phenomena (i.e., collective memory) can emerge out of microlevel local dynamics (i.e., mnemonic reinforcement and suppression effects). The social-interactionist approach proposed herein points to optimal strategies for spreading information in social networks and provides a framework for measuring and forging collective memories in communities of individuals. PMID:27357678
Brahler, C Jayne; Walker, Diane
2008-09-01
For students pursuing careers in medical fields, knowledge of technical and medical terminology is prerequisite to being able to solve problems in their respective disciplines and professions. The Dean Vaughn Medical Terminology 350 Total Retention System, also known as Medical Terminology 350 (25), is a mnemonic instructional and learning strategy that combines mental imagery and keyword mnemonic elaboration processes to help students recall the scientific meaning of Greek and Latin word parts. High school students in Anatomy and Physiology classes at a career technology center were divided into experimental (Medical Terminology 350), control (rote memorization), or combination (Medical Terminology 350 and rote memorization) groups and completed pre- and posttests of standardized word recall tests. Students in the Dean Vaughn Medical Terminology 350 Total Retention System group achieved significantly greater pre- to posttest word recall improvement compared with students in both the rote memorization (P
How to Prevent Type-Flaw Guessing Attacks on Password Protocols
2003-01-01
How to prevent type-flaw guessing attacks on password protocols∗ Sreekanth Malladi , Jim Alves-Foss Center for Secure and Dependable Systems...respectively. R Retagging 〈−(t, f),+(t′, f)〉. The retagging strand captures the concept of receiving a message of one type and sending it, with a claim of a...referrees for insightful comments. Thanks are also due to Ricardo Corin for many helpful technical discus- sions. References [AN94] M. Abadi and R
2007-01-15
it can detect specifically proscribed content changes to critical files (e.g., illegal shells inserted into /etc/ passwd ). Fourth, it can detect the...UNIX password management involves a pair of inter-related files (/etc/ passwd and /etc/shadow). The corresponding access patterns seen at the storage...content integrity verification is utilized. As a concrete example, consider a UNIX system password file (/etc/ passwd ), which consists of a set of well
Implementing an Intrusion Detection System in the Mysea Architecture
2008-06-01
password for each user passwd <username> then follow the prompts 2. PostgreSQL 7.4.18 Installation Perform the following steps as root: 1. Copy...password changed Repeat for user snort. exit After making the groups and users the group and passwd file needs to be updated. Set security and...untrusted/bin/xtsmkgroup > /etc/group chmod 644 /etc/group /xts/untrusted/bin/xtsmkpasswd > /etc/ passwd chmod 644 /etc/ passwd 3. PostgreSQL 7.4.18
Security enhanced multi-factor biometric authentication scheme using bio-hash function.
Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho
2017-01-01
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.
Brain sites involved in fear memory reconsolidation and extinction of rodents.
Baldi, Elisabetta; Bucherelli, Corrado
2015-06-01
Fear memory is a motivational system essential for organisms survival having a central role in organization of defensive behaviors to threat. In the last years there has been a growing interest on conditioned fear memory reconsolidation and extinction, two specific phases of memorization process, both induced by memory retrieval. Understanding the mechanisms underlying these two mnemonic processes may allow to work out therapeutic interventions for treatment of human fear and anxiety disorders, such as specific phobias and post-traumatic stress disorder. Based on the use of one-trial conditioning paradigms, which allow to follow the evolution of a mnemonic trace in its various phases, the present paper has attempted to reorganize the current literature relative to the rodents highlighting both the role of several brain structures in conditioned fear memory reconsolidation and extinction and the selective cellular processes involved. A crucial role seems to be play by medial prefrontal cortex, in particular by prelimbic and infralimbic cortices, and by distinct connections between them and the amygdala, hippocampus and entorhinal cortex. Copyright © 2015 Elsevier Ltd. All rights reserved.
Shah, Peer Azmat; Hasbullah, Halabi B; Lawal, Ibrahim A; Aminu Mu'azu, Abubakar; Tang Jung, Low
2014-01-01
Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).
Lindley, Sarah W; Gillies, Elizabeth M; Hassell, Lewis A
2014-10-01
Surgical pathologists use a variety of phrases to communicate varying degrees of diagnostic certainty which have the potential to be interpreted differently than intended. This study sought to: (1) assess the setting, varieties and frequency of use of phrases of diagnostic uncertainty in the diagnostic line of surgical pathology reports, (2) evaluate use of uncertainty expressions by experience and gender, (3) determine how these phrases are interpreted by clinicians and pathologists, and (4) assess solutions to this communication problem. We evaluated 1500 surgical pathology reports to determine frequency of use of uncertainty terms, identified those most commonly used, and looked for variations in usage rates on the basis of case type, experience and gender. We surveyed 76 physicians at tumor boards who were asked to assign a percentage of certainty to diagnoses containing expressions of uncertainty. We found expressions of uncertainty in 35% of diagnostic reports, with no statistically significant difference in usage based on age or gender. We found wide variation in the percentage of certainty clinicians assigned to the phrases studied. We conclude that non-standardized language used in the communication of diagnostic uncertainty is a significant source of miscommunication, both amongst pathologists and between pathologists and clinicians. Copyright © 2014 The Authors. Published by Elsevier GmbH.. All rights reserved.
Clinical validation of a non-heteronormative version of the Social Interaction Anxiety Scale (SIAS).
Lindner, Philip; Martell, Christopher; Bergström, Jan; Andersson, Gerhard; Carlbring, Per
2013-12-19
Despite welcomed changes in societal attitudes and practices towards sexual minorities, instances of heteronormativity can still be found within healthcare and research. The Social Interaction Anxiety Scale (SIAS) is a valid and reliable self-rating scale of social anxiety, which includes one item (number 14) with an explicit heteronormative assumption about the respondent's sexual orientation. This heteronormative phrasing may confuse, insult or alienate sexual minority respondents. A clinically validated version of the SIAS featuring a non-heteronormative phrasing of item 14 is thus needed. 129 participants with diagnosed social anxiety disorder, enrolled in an Internet-based intervention trial, were randomly assigned to responding to the SIAS featuring either the original or a novel non-heteronormative phrasing of item 14, and then answered the other item version. Within-subject, correlation between item versions was calculated and the two scores were statistically compared. The two items' correlations with the other SIAS items and other psychiatric rating scales were also statistically compared. Item versions were highly correlated and scores did not differ statistically. The two items' correlations with other measures did not differ statistically either. The SIAS can be revised with a non-heteronormative formulation of item 14 with psychometric equivalence on item and scale level. Implications for other psychiatric instruments with heteronormative phrasings are discussed.
An improved authenticated key agreement protocol for telecare medicine information system.
Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin
2016-01-01
In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.
Tan, Zuowen
2014-03-01
The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical.
A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems.
Ko, Hoon; Song, MoonBae
2016-01-01
Despite of various benefits such as a convenience and efficiency, home healthcare systems have some inherent security risks that may cause a serious leak on personal health information. This work presents a Secure User Profiling Structure which has the patient information including their health information. A patient and a hospital keep it at that same time, they share the updated data. While they share the data and communicate, the data can be leaked. To solve the security problems, a secure communication channel with a hash function and an One-Time Password between a client and a hospital should be established and to generate an input value to an OTP, it uses a dual hash-function. This work presents a dual hash function-based approach to generate the One-Time Password ensuring a secure communication channel with the secured key. In result, attackers are unable to decrypt the leaked information because of the secured key; in addition, the proposed method outperforms the existing methods in terms of computation cost.
J-PAKE: Authenticated Key Exchange without PKI
NASA Astrophysics Data System (ADS)
Hao, Feng; Ryan, Peter
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication between two parties solely based on a shared password without requiring a Public Key Infrastructure (PKI). After more than a decade of extensive research in this field, there have been several PAKE protocols available. The EKE and SPEKE schemes are perhaps the two most notable examples. Both techniques are however patented. In this paper, we review these techniques in detail and summarize various theoretical and practical weaknesses. In addition, we present a new PAKE solution called J-PAKE. Our strategy is to depend on well-established primitives such as the Zero-Knowledge Proof (ZKP). So far, almost all of the past solutions have avoided using ZKP for the concern on efficiency. We demonstrate how to effectively integrate the ZKP into the protocol design and meanwhile achieve good efficiency. Our protocol has comparable computational efficiency to the EKE and SPEKE schemes with clear advantages on security.
Presentation of Repeated Phrases in a Computer-Assisted Abstracting Tool Kit.
ERIC Educational Resources Information Center
Craven, Timothy C.
2001-01-01
Discusses automatic indexing methods and describes the development of a prototype computerized abstractor's assistant. Highlights include the text network management system, TEXNET; phrase selection that follows indexing; phrase display, including Boolean capabilities; results of preliminary testing; and availability of TEXNET software. (LRW)
Preservation of memory-based automaticity in reading for older adults.
Rawson, Katherine A; Touron, Dayna R
2015-12-01
Concerning age-related effects on cognitive skill acquisition, the modal finding is that older adults do not benefit from practice to the same extent as younger adults in tasks that afford a shift from slower algorithmic processing to faster memory-based processing. In contrast, Rawson and Touron (2009) demonstrated a relatively rapid shift to memory-based processing in the context of a reading task. The current research extended beyond this initial study to provide more definitive evidence for relative preservation of memory-based automaticity in reading tasks for older adults. Younger and older adults read short stories containing unfamiliar noun phrases (e.g., skunk mud) followed by disambiguating information indicating the combination's meaning (either the normatively dominant meaning or an alternative subordinate meaning). Stories were repeated across practice blocks, and then the noun phrases were presented in novel sentence frames in a transfer task. Both age groups shifted from computation to retrieval after relatively few practice trials (as evidenced by convergence of reading times for dominant and subordinate items). Most important, both age groups showed strong evidence for memory-based processing of the noun phrases in the transfer task. In contrast, older adults showed minimal shifting to retrieval in an alphabet arithmetic task, indicating that the preservation of memory-based automaticity in reading was task-specific. Discussion focuses on important implications for theories of memory-based automaticity in general and for specific theoretical accounts of age effects on memory-based automaticity, as well as fruitful directions for future research. (c) 2015 APA, all rights reserved).
Interface Problems: Structural Constraints on Interpretation?
ERIC Educational Resources Information Center
Frazier, Lyn; Clifton, Charles; Rayner, Keith; Deevy, Patricia; Koh, Sungryong; Bader, Markus
2005-01-01
Five experiments investigated the interpretation of quantified noun phrases in relation to discourse structure. They demonstrated, using questionnaire and on-line reading techniques, that readers in English prefer to give a quantified noun phrase in (VP-external) subject position a presuppositional interpretation, in which the noun phrase limits…
2011-12-01
developed to address the two main research questions (see Annex A). Exact wording of the questions varied during interviews to accommodate the...centre at DMS 3rd floor. All electronic files (including digital audio and video recordings) with participant data are being encrypted and password...locked filing cabinet at the University of Ottawa. Electronic files will remain encrypted, password protected and stored on a server to which only the
Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita
2014-05-01
Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.
Real and Imagined Body Movement Primes Metaphor Comprehension
ERIC Educational Resources Information Center
Wilson, Nicole L.; Gibbs, Raymond W., Jr.
2007-01-01
We demonstrate in two experiments that real and imagined body movements appropriate to metaphorical phrases facilitate people's immediate comprehension of these phrases. Participants first learned to make different body movements given specific cues. In two reading time studies, people were faster to understand a metaphorical phrase, such as push…
Ethnic and Nationality Stereotypes in Everyday Language
ERIC Educational Resources Information Center
Kite, Mary E.; Whitley, Bernard E., Jr.
2012-01-01
The authors describe a demonstration of stereotype use in everyday language that focuses on common phrases reflecting stereotypic beliefs about ethnic groups or nationalities. The exercise encourages students' discussion of stereotype use. Students read 13 common phrases from the English language and stated whether they had used each phrase and…
Mining Quality Phrases from Massive Text Corpora
Liu, Jialu; Shang, Jingbo; Wang, Chi; Ren, Xiang; Han, Jiawei
2015-01-01
Text data are ubiquitous and play an essential role in big data applications. However, text data are mostly unstructured. Transforming unstructured text into structured units (e.g., semantically meaningful phrases) will substantially reduce semantic ambiguity and enhance the power and efficiency at manipulating such data using database technology. Thus mining quality phrases is a critical research problem in the field of databases. In this paper, we propose a new framework that extracts quality phrases from text corpora integrated with phrasal segmentation. The framework requires only limited training but the quality of phrases so generated is close to human judgment. Moreover, the method is scalable: both computation time and required space grow linearly as corpus size increases. Our experiments on large text corpora demonstrate the quality and efficiency of the new method. PMID:26705375
Increases in Individualistic Words and Phrases in American Books, 1960–2008
Twenge, Jean M.; Campbell, W. Keith; Gentile, Brittany
2012-01-01
Cultural products such as song lyrics, television shows, and books reveal cultural differences, including cultural change over time. Two studies examine changes in the use of individualistic words (Study 1) and phrases (Study 2) in the Google Books Ngram corpus of millions of books in American English. Current samples from the general population generated and rated lists of individualistic words and phrases (e.g., “unique,” “personalize,” “self,” “all about me,” “I am special,” “I’m the best”). Individualistic words and phrases increased in use between 1960 and 2008, even when controlling for changes in communal words and phrases. Language in American books has become increasingly focused on the self and uniqueness in the decades since 1960. PMID:22808113
Phonological Planning during Sentence Production: Beyond the Verb.
Schnur, Tatiana T
2011-01-01
The current study addresses the extent of phonological planning during spontaneous sentence production. Previous work shows that at articulation, phonological encoding occurs for entire phrases, but encoding beyond the initial phrase may be due to the syntactic relevance of the verb in planning the utterance. I conducted three experiments to investigate whether phonological planning crosses multiple grammatical phrase boundaries (as defined by the number of lexical heads of phrase) within a single phonological phrase. Using the picture-word interference paradigm, I found in two separate experiments a significant phonological facilitation effect to both the verb and noun of sentences like "He opens the gate." I also altered the frequency of the direct object and found longer utterance initiation times for sentences ending with a low-frequency vs. high-frequency object offering further support that the direct object was phonologically encoded at the time of utterance initiation. That phonological information for post-verbal elements was activated suggests that the grammatical importance of the verb does not restrict the extent of phonological planning. These results suggest that the phonological phrase is unit of planning, where all elements within a phonological phrase are encoded before articulation. Thus, consistent with other action sequencing behavior, there is significant phonological planning ahead in sentence production.
Janssen, Eva; van Osch, Liesbeth; Lechner, Lilian; de Vries, Hein
2015-01-01
Evidence is accumulating for the importance of feelings of risk in explaining cancer preventive behaviors, but best practices for influencing these feelings are limited. This study investigated the direct and moderational influence of affectively laden phrases in cancer risk messages. Two experimental studies were conducted in relation to different cancer-related behaviors--sunbed use (n = 112) and red meat consumption (n = 447)--among student and nonstudent samples. Participants were randomly assigned to one of two conditions: (a) a cognitive message using cognitively laden phrases or (b) an affective message using affectively laden phrases. The results revealed that affective phrases did not directly influence feelings of risk in both studies. Evidence for a moderational influence was found in Study 2, suggesting that affective information strengthened the relation between feelings of risk and intention (i.e., participants relied more on their feelings in the decision-making process after exposure to affective information). These findings suggest that solely using affective phrases in risk communication may not be sufficient to directly influence feelings of risk and other methods need to be explored in future research. Moreover, research is needed to replicate our preliminary indications for a moderational influence of affective phrases to advance theory and practice.
Jongman, Suzanne R; Meyer, Antje S; Roelofs, Ardi
2015-01-01
It has previously been shown that language production, performed simultaneously with a nonlinguistic task, involves sustained attention. Sustained attention concerns the ability to maintain alertness over time. Here, we aimed to replicate the previous finding by showing that individuals call upon sustained attention when they plan single noun phrases (e.g., "the carrot") and perform a manual arrow categorization task. In addition, we investigated whether speakers also recruit sustained attention when they produce conjoined noun phrases (e.g., "the carrot and the bucket") describing two pictures, that is, when both the first and second task are linguistic. We found that sustained attention correlated with the proportion of abnormally slow phrase-production responses. Individuals with poor sustained attention displayed a greater number of very slow responses than individuals with better sustained attention. Importantly, this relationship was obtained both for the production of single phrases while performing a nonlinguistic manual task, and the production of noun phrase conjunctions in referring to two spatially separated objects. Inhibition and updating abilities were also measured. These scores did not correlate with our measure of sustained attention, suggesting that sustained attention and executive control are distinct. Overall, the results suggest that planning conjoined noun phrases involves sustained attention, and that language production happens less automatically than has often been assumed.
Bias in the exchange of arguments: the case of scientists' evaluation of lay viewpoints on GM food.
Cuppen, Eefje; Hisschemøller, Matthijs; Midden, Cees
2009-09-01
Most perspectives on public participation share the notion that dialogues should be open, allowing participants to articulate and evaluate different views and knowledge claims. We hypothesize that participants' evaluation of claims may be biased because participants have a preference for a particular type or source of a claim. This would hamper an open dialogue. We tested the effect of three variables on scientists' evaluation of claims of the general public about GM food: the claim's favorability towards GM food, the phrasing, and the source of the claim. Results are based on a survey-experiment among 73 biotechnology-scientists. Biased processing occurred when scientists evaluated claims. Claims that were corresponding with the attitude of the scientists and that were phrased in a cognitive way were evaluated more positively than claims that were contrasting the attitude of the scientists and that were phrased in an affective way. Contrary to our expectation, scientists evaluated claims of the public more positively than claims of experts.
Setting a disordered password on a photonic memory
NASA Astrophysics Data System (ADS)
Su, Shih-Wei; Gou, Shih-Chuan; Chew, Lock Yue; Chang, Yu-Yen; Yu, Ite A.; Kalachev, Alexey; Liao, Wen-Te
2017-06-01
An all-optical method of setting a disordered password on different schemes of photonic memory is theoretically studied. While photons are regarded as ideal information carriers, it is imperative to implement such data protection on all-optical storage. However, we wish to address the intrinsic risk of data breaches in existing schemes of photonic memory. We theoretically demonstrate a protocol using spatially disordered laser fields to encrypt data stored on an optical memory, namely, encrypted photonic memory. To address the broadband storage, we also investigate a scheme of disordered echo memory with a high fidelity approaching unity. The proposed method increases the difficulty for the eavesdropper to retrieve the stored photon without the preset password even when the randomized and stored photon state is nearly perfectly cloned. Our results pave ways to significantly reduce the exposure of memories, required for long-distance communication, to eavesdropping and therefore restrict the optimal attack on communication protocols. The present scheme also increases the sensitivity of detecting any eavesdropper and so raises the security level of photonic information technology.
Security enhanced multi-factor biometric authentication scheme using bio-hash function
Lee, Youngsook; Moon, Jongho
2017-01-01
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867
Electronic patient data confidentiality practices among surgical trainees: questionnaire study.
Mole, Damian J; Fox, Colin; Napolitano, Giulio
2006-10-01
The objective of this work was to evaluate the safeguards implemented by surgical trainees to protect the confidentiality of electronic patient data through a structured questionnaire sent to Northern Ireland surgical trainees. A group of 32 basic and higher surgical trainees attending a meeting of the Northern Ireland Association of Surgeons-in-Training were invited to complete a questionnaire regarding their computer use, UK Data Protection Act, 1988 registration and electronic data confidentiality practices. Of these 32 trainees, 29 returned completed questionnaires of whom 26 trainees regularly stored sensitive patient data for audit or research purposes on a computer. Only one person was registered under the Data Protection Act, 1988. Of the computers used to store and analyse sensitive data, only 3 of 14 desktops, 8 of 19 laptops and 3 of 14 hand-held computers forced a password logon. Of the 29 trainees, 16 used the same password for all machines, and 25 of 27 passwords were less than 8 characters long. Two respondents declined to reveal details of their secure passwords. Half of all trainees had never adjusted their internet security settings, despite all 14 desktops, 16 of 19 laptops and 5 of 14 hand-helds being routinely connected to the internet. Of the 29 trainees, 28 never encrypted their sensitive data files. Ten trainees had sent unencrypted sensitive patient data over the internet, using a non-secure server. Electronic data confidentiality practices amongst Northern Ireland surgical trainees are unsafe. Simple practical measures to safeguard confidentiality are recommended.
Interactive Context Integration in Children? Evidence from an Action Memory Study
ERIC Educational Resources Information Center
Mecklenbrauker, Silvia; Steffens, Melanie C.; Jelenec, Petra; Goergens, N. Kristine
2011-01-01
Action-object phrases (e.g., "lift the bottle") are remembered better if they have been enacted rather than learned verbally. This enactment effect is largest in free recall for phrases with objects (e.g., "bottle") present because these phrases can be interactively encoded with those context objects ("interactive context integration") that serve…
The Structure of Jarai Clauses and Noun Phrases
ERIC Educational Resources Information Center
Jensen, Joshua Martin
2013-01-01
This dissertation provides a syntactic account for the Jarai noun phrase and for the three regions of the Jarai clause: the operator domain, the inflectional domain, and the theta domain. Within the noun phrase, I argue that demonstrative-final word order involves phrasal movement of the demonstrative's complement into Spec,D, where it…
Planning in Sentence Production: Evidence for the Phrase as a Default Planning Scope
ERIC Educational Resources Information Center
Martin, Randi C.; Crowther, Jason E.; Knight, Meredith; Tamborello, Franklin P., II; Yang, Chin-Lung
2010-01-01
Controversy remains as to the scope of advanced planning in language production. Smith and Wheeldon (1999) found significantly longer onset latencies when subjects described moving-picture displays by producing sentences beginning with a complex noun phrase than for matched sentences beginning with a simple noun phrase. While these findings are…
ERIC Educational Resources Information Center
Tutunjian, Damon A.
2010-01-01
This dissertation examines the influence of lexical-semantic representations, conceptual similarity, and contextual fit on the processing of coordinated verb phrases. The study integrates information gleaned from current linguistic theory with current psycholinguistic approaches to examining the processing of coordinated verb phrases. It has…
The Dependency Structure of Coordinate Phrases: A Corpus Approach
ERIC Educational Resources Information Center
Temperley, David
2005-01-01
Hudson (1990) proposes that each conjunct in a coordinate phrase forms dependency relations with heads or dependents outside the coordinate phrase (the "multi-head" view). This proposal is tested through corpus analysis of Wall Street Journal text. For right-branching constituents (such as direct-object NPs), a short-long preference for conjunct…
Planning in sentence production: Evidence for the phrase as a default planning scope
Martin, Randi C.; Crowther, Jason E.; Knight, Meredith; Tamborello, Franklin P.; Yang, Chin-Lung
2010-01-01
Controversy remains as to the scope of advanced planning in language production. Smith and Wheeldon (1999) found significantly longer onset latencies when subjects described moving picture displays by producing sentences beginning with a complex noun phrase than for matched sentences beginning with a simple noun phrase. While these findings are consistent with a phrasal scope of planning, they might also be explained on the basis of: 1) greater retrieval fluency for the second content word in the simple initial noun phrase sentences and 2) visual grouping factors. In Experiments 1 and 2, retrieval fluency for the second content word was equated for the complex and simple initial noun phrase conditions. Experiments 3 and 4 addressed the visual grouping hypothesis by using stationary displays and by comparing onset latencies for the same display for sentence and list productions. Longer onset latencies for the sentences beginning with a complex noun phrase were obtained in all experiments, supporting the phrasal scope of planning hypothesis. The results indicate that in speech, as in other motor production domains, planning occurs beyond the minimal production unit. PMID:20501338
Similarity of wh-Phrases and Acceptability Variation in wh-Islands
Atkinson, Emily; Apple, Aaron; Rawlins, Kyle; Omaki, Akira
2016-01-01
In wh-questions that form a syntactic dependency between the fronted wh-phrase and its thematic position, acceptability is severely degraded when the dependency crosses another wh-phrase. It is well known that the acceptability degradation in wh-island violation ameliorates in certain contexts, but the source of this variation remains poorly understood. In the syntax literature, an influential theory – Featural Relativized Minimality – has argued that the wh-island effect is modulated exclusively by the distinctness of morpho-syntactic features in the two wh-phrases, but psycholinguistic theories of memory encoding and retrieval mechanisms predict that semantic properties of wh-phrases should also contribute to wh-island amelioration. We report four acceptability judgment experiments that systematically investigate the role of morpho-syntactic and semantic features in wh-island violations. The results indicate that the distribution of wh-island amelioration is best explained by an account that incorporates the distinctness of morpho-syntactic features as well as the semantic denotation of the wh-phrases. We argue that an integration of syntactic theories and perspectives from psycholinguistics can enrich our understanding of acceptability variation in wh-dependencies. PMID:26793156
Brezis, Noam; Bronfman, Zohar Z; Yovel, Galit; Goshen-Gottstein, Yonatan
2017-02-01
The quantity and nature of the processes underlying recognition memory remains an open question. A majority of behavioral, neuropsychological, and brain studies have suggested that recognition memory is supported by two dissociable processes: recollection and familiarity. It has been conversely argued, however, that recollection and familiarity map onto a single continuum of mnemonic strength and hence that recognition memory is mediated by a single process. Previous electrophysiological studies found marked dissociations between recollection and familiarity, which have been widely held as corroborating the dual-process account. However, it remains unknown whether a strength interpretation can likewise apply for these findings. Here we describe an ERP study, using a modified remember-know (RK) procedure, which allowed us to control for mnemonic strength. We find that ERPs of high and low mnemonic strength mimicked the electrophysiological distinction between R and K responses, in a lateral positive component (LPC), 500-1000 msec poststimulus onset. Critically, when contrasting strength with RK experience, by comparing weak R to strong K responses, the electrophysiological signal mapped onto strength, not onto subjective RK experience. Invoking the LPC as support for dual-process accounts may, therefore, be amiss.
Sinha, Neha; Berg, Chelsie N; Tustison, Nicholas J; Shaw, Ashlee; Hill, Diane; Yassa, Michael A; Gluck, Mark A
2018-05-26
African Americans are 1.4 times more likely than European Americans to carry the apolipoprotein E (APOE) ε4 allele, a risk factor for Alzheimer's disease (AD). However, little is known about the neural correlates of cognitive function in older African Americans and how they relate to genetic risk for AD. In particular, no past study on African Americans has examined the effect of APOE ε4 status on pattern separation-mnemonic discrimination performance and its corresponding neural computations in the hippocampus. Previous work using the mnemonic discrimination paradigm has localized increased activation in the DG/CA3 hippocampal subregions as being correlated with discrimination deficits. In a case-control high-resolution functional magnetic resonance imaging study of 30 healthy African Americans, aged 60 years and older, we observed APOE ε4-related impairments in mnemonic discrimination, coincident with dysfunctional hyperactivation in the DG/CA3, and CA1 regions, despite no evidence of structural differences in the hippocampus between carriers and noncarriers. Our results add to the growing body of evidence that deficits in pattern separation may be an early marker for AD-related neuronal dysfunction. Copyright © 2018 Elsevier Inc. All rights reserved.
Using phrases and document metadata to improve topic modeling of clinical reports.
Speier, William; Ong, Michael K; Arnold, Corey W
2016-06-01
Probabilistic topic models provide an unsupervised method for analyzing unstructured text, which have the potential to be integrated into clinical automatic summarization systems. Clinical documents are accompanied by metadata in a patient's medical history and frequently contains multiword concepts that can be valuable for accurately interpreting the included text. While existing methods have attempted to address these problems individually, we present a unified model for free-text clinical documents that integrates contextual patient- and document-level data, and discovers multi-word concepts. In the proposed model, phrases are represented by chained n-grams and a Dirichlet hyper-parameter is weighted by both document-level and patient-level context. This method and three other Latent Dirichlet allocation models were fit to a large collection of clinical reports. Examples of resulting topics demonstrate the results of the new model and the quality of the representations are evaluated using empirical log likelihood. The proposed model was able to create informative prior probabilities based on patient and document information, and captured phrases that represented various clinical concepts. The representation using the proposed model had a significantly higher empirical log likelihood than the compared methods. Integrating document metadata and capturing phrases in clinical text greatly improves the topic representation of clinical documents. The resulting clinically informative topics may effectively serve as the basis for an automatic summarization system for clinical reports. Copyright © 2016 Elsevier Inc. All rights reserved.
Neural correlates of implicit and explicit combinatorial semantic processing
Graves, William W.; Binder, Jeffrey R.; Desai, Rutvik H.; Conant, Lisa L.; Seidenberg, Mark S.
2010-01-01
Language consists of sequences of words, but comprehending phrases involves more than concatenating meanings: A boat house is a shelter for boats, whereas a summer house is a house used during summer, and a ghost house is typically uninhabited. Little is known about the brain bases of combinatorial semantic processes. We performed two fMRI experiments using familiar, highly meaningful phrases (LAKE HOUSE) and unfamiliar phrases with minimal meaning created by reversing the word order of the familiar items (HOUSE LAKE). The first experiment used a 1-back matching task to assess implicit semantic processing, and the second used a classification task to engage explicit semantic processing. These conditions required processing of the same words, but with more effective combinatorial processing in the meaningful condition. The contrast of meaningful versus reversed phrases revealed activation primarily during the classification task, to a greater extent in the right hemisphere, including right angular gyrus, dorsomedial prefrontal cortex, and bilateral posterior cingulate/precuneus, areas previously implicated in semantic processing. Positive correlations of fMRI signal with lexical (word-level) frequency occurred exclusively with the 1-back task and to a greater spatial extent on the left, including left posterior middle temporal gyrus and bilateral parahippocampus. These results reveal strong effects of task demands on engagement of lexical versus combinatorial processing and suggest a hemispheric dissociation between these levels of semantic representation. PMID:20600969
Kaipa, Ramesh; Jones, Richard D; Robb, Michael P
2016-07-01
The benefits of different practice conditions in limb-based rehabilitation of motor disorders are well documented. Conversely, the role of practice structure in the treatment of motor-based speech disorders has only been minimally investigated. Considering this limitation, the current study aimed to investigate the effectiveness of selected practice conditions in spatial and temporal learning of novel speech utterances in individuals with Parkinson's disease (PD). Participants included 16 individuals with PD who were randomly and equally assigned to constant, variable, random, and blocked practice conditions. Participants in all four groups practiced a speech phrase for two consecutive days, and reproduced the speech phrase on the third day without further practice or feedback. There were no significant differences (p > 0.05) between participants across the four practice conditions with respect to either spatial or temporal learning of the speech phrase. Overall, PD participants demonstrated diminished spatial and temporal learning in comparison to healthy controls. Tests of strength of association between participants' demographic/clinical characteristics and speech-motor learning outcomes did not reveal any significant correlations. The findings from the current study suggest that repeated practice facilitates speech-motor learning in individuals with PD irrespective of the type of practice. Clinicians need to be cautious in applying practice conditions to treat speech deficits associated with PD based on the findings of non-speech-motor learning tasks. Copyright © 2016 Elsevier Ltd. All rights reserved.
Jongman, Suzanne R.; Meyer, Antje S.; Roelofs, Ardi
2015-01-01
It has previously been shown that language production, performed simultaneously with a nonlinguistic task, involves sustained attention. Sustained attention concerns the ability to maintain alertness over time. Here, we aimed to replicate the previous finding by showing that individuals call upon sustained attention when they plan single noun phrases (e.g., "the carrot") and perform a manual arrow categorization task. In addition, we investigated whether speakers also recruit sustained attention when they produce conjoined noun phrases (e.g., "the carrot and the bucket") describing two pictures, that is, when both the first and second task are linguistic. We found that sustained attention correlated with the proportion of abnormally slow phrase-production responses. Individuals with poor sustained attention displayed a greater number of very slow responses than individuals with better sustained attention. Importantly, this relationship was obtained both for the production of single phrases while performing a nonlinguistic manual task, and the production of noun phrase conjunctions in referring to two spatially separated objects. Inhibition and updating abilities were also measured. These scores did not correlate with our measure of sustained attention, suggesting that sustained attention and executive control are distinct. Overall, the results suggest that planning conjoined noun phrases involves sustained attention, and that language production happens less automatically than has often been assumed. PMID:26335441
... a tranquil mind. During meditation, you focus your attention and eliminate the stream of jumbled thoughts that ... word, thought or phrase to prevent distracting thoughts. Mindfulness meditation. This type of meditation is based on ...
Blue Car, Red Car: Developing Efficiency in Online Interpretation of Adjective-Noun Phrases
ERIC Educational Resources Information Center
Fernald, Anne; Thorpe, Kirsten; Marchman, Virginia A.
2010-01-01
Two experiments investigated the development of fluency in interpreting adjective-noun phrases in 30- and 36-month-old English-learning children. Using online processing measures, children's gaze patterns were monitored as they heard the familiar adjective-noun phrases (e.g. "blue car") in visual contexts where the adjective was either informative…
ERIC Educational Resources Information Center
Hendrix, Peter; Bolger, Patrick; Baayen, Harald
2017-01-01
Recent studies have documented frequency effects for word n-grams, independently of word unigram frequency. Further studies have revealed constructional prototype effects, both at the word level as well as for phrases. The present speech production study investigates the time course of these effects for the production of prepositional phrases in…
ERIC Educational Resources Information Center
Hwang, Hyekyung; Steinhauer, Karsten
2011-01-01
In spoken language comprehension, syntactic parsing decisions interact with prosodic phrasing, which is directly affected by phrase length. Here we used ERPs to examine whether a similar effect holds for the on-line processing of written sentences during silent reading, as suggested by theories of "implicit prosody." Ambiguous Korean sentence…
Facilitating Lecture Recall: The Effects of Embedded Imagery-Evoking Phrases.
ERIC Educational Resources Information Center
Thrailkill, Nancy J.; Ormrod, Jeanne Ellis
Three experiments describe the effects of imagery on learning a large and integrated body of information from a college lecture. It was hypothesized that high-imagery phrases would be more easily recalled and would promote recall of abstract verbal phrases in close temporal proximity to them. In experiment 1, 22 undergraduates attended a lecture…
Doing the Best You Can: A Study of Values in a Group of Nun Educators
ERIC Educational Resources Information Center
Hogard, Elaine
2004-01-01
A group of experienced and well-qualified nun educators were interviewed regarding their experiences and values. A recurrent phrase occurring in the interviews was "Doing the best you can". This phrase served to both justify and anticipate statements. A questionnaire was constructed to encourage elaboration of the phrase and to detect…
A Bidirectional Study on the Acquisition of Plural Noun Phrase Interpretation in English and Spanish
ERIC Educational Resources Information Center
Ionin, Tania; Montrul, Silvina; Crivos, Monica
2013-01-01
This paper investigates how learners interpret definite plural noun phrases (e.g., "the tigers") and bare (article-less) plural noun phrases (e.g., "tigers") in their second language. Whereas Spanish allows definite plurals to have both generic and specific readings, English requires definite plurals to have specific, nongeneric readings. Generic…
An "Alms-Basket" of "Bric-a-Brac": "Brewer's Dictionary of Phrase and Fable".
ERIC Educational Resources Information Center
Bunge, Charles A.
1999-01-01
Describes the development and history of "Brewer's Dictionary of Phrase and Fable," a reference source first published in 1870 that includes the etymology of phrases, allusions and words. Discusses reviews that reflected and shaped its status as a standard reference book, describes the current edition, and considers its enduring value.…
Insecure Behaviors on Mobile Devices Under Stress
2014-04-08
a text or in an email . The most secure network is only as secure as its most careless user. Thus, in the current project we sought to discover the...challenges in mobile security is human behavior. The most secure password may be useless if it is sent as a text or in an email . The most secure network...The most secure password may be useless if it is sent as a text or in an email . The most secure network is only as secure as its most careless user
The 60 Minute Network Security Guide (First Steps Towards a Secure Network Environment)
2001-10-16
default/ passwd file in UNIX. Administrators should obtain and run password-guessing programs (i.e., “John the Ripper,’’ “L0phtCrack,” and “Crack...system on which it is running, it is a good idea to transfer the encrypted passwords (the dumped SAM database for Windows and the /etc/ passwd and /etc...ownership by root and group sys. The /etc/ passwd file should have permissions 644 with owner root and group root. n Be cracked every month to find
Shah, Peer Azmat; Hasbullah, Halabi B.; Lawal, Ibrahim A.; Aminu Mu'azu, Abubakar; Tang Jung, Low
2014-01-01
Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO). PMID:24688398
Li, Chun-Ta; Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming
2017-06-23
In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.
Kawahara, Shigeto; Shinya, Takahito
2008-01-01
In previous studies of Japanese intonational phonology, levels of prosodic constituents above the Major Phrase have not received much attention. This paper argues that at least two prosodic levels exist above the Major Phrase in Japanese. Through a detailed investigation of the intonation of gapping and coordination in Japanese, we argue that each syntactic clause projects its own Intonational Phrase, while an entire sentence constitutes one Utterance. We show that the Intonational Phrase is characterized by tonal lowering, creakiness and a pause in final position, as well as a distinctive large initial rise and pitch reset at its beginning. The Utterance defines a domain of declination, and it is signaled by an even larger initial rise, as well as a phrasal H tone at its right edge. Building on our empirical findings, we discuss several implications for the theory of intonational phonology. (c) 2007 S. Karger AG, Basel.
NASA automatic subject analysis technique for extracting retrievable multi-terms (NASA TERM) system
NASA Technical Reports Server (NTRS)
Kirschbaum, J.; Williamson, R. E.
1978-01-01
Current methods for information processing and retrieval used at the NASA Scientific and Technical Information Facility are reviewed. A more cost effective computer aided indexing system is proposed which automatically generates print terms (phrases) from the natural text. Satisfactory print terms can be generated in a primarily automatic manner to produce a thesaurus (NASA TERMS) which extends all the mappings presently applied by indexers, specifies the worth of each posting term in the thesaurus, and indicates the areas of use of the thesaurus entry phrase. These print terms enable the computer to determine which of several terms in a hierarchy is desirable and to differentiate ambiguous terms. Steps in the NASA TERMS algorithm are discussed and the processing of surrogate entry phrases is demonstrated using four previously manually indexed STAR abstracts for comparison. The simulation shows phrase isolation, text phrase reduction, NASA terms selection, and RECON display.
NASA Astrophysics Data System (ADS)
Looney, Craig W.
2009-10-01
Wolfram|Alpha (http://www.wolframalpha.com/), a free internet-based mathematical engine released earlier this year, represents an orders-of magnitude advance in mathematical power freely available - without money, passwords, or downloads - on the web. Wolfram|Alpha is based on Mathematica, so it can plot functions, take derivatives, solve systems of equations, perform symbolic and numerical integration, and more. These capabilities (especially plotting and integration) will be explored in the context of topics covered in upper level undergraduate physics courses.
Curriculum Research: Toward a Framework for "Research-based Curricula"
ERIC Educational Resources Information Center
Clements, Douglas H.
2007-01-01
Government agencies and members of the educational research community have petitioned for research-based curricula. The ambiguity of the phrase "research-based", however, undermines attempts to create a shared research foundation for the development of, and informed choices about, classroom curricula. This article presents a framework…
Essie: A Concept-based Search Engine for Structured Biomedical Text
Ide, Nicholas C.; Loane, Russell F.; Demner-Fushman, Dina
2007-01-01
This article describes the algorithms implemented in the Essie search engine that is currently serving several Web sites at the National Library of Medicine. Essie is a phrase-based search engine with term and concept query expansion and probabilistic relevancy ranking. Essie’s design is motivated by an observation that query terms are often conceptually related to terms in a document, without actually occurring in the document text. Essie’s performance was evaluated using data and standard evaluation methods from the 2003 and 2006 Text REtrieval Conference (TREC) Genomics track. Essie was the best-performing search engine in the 2003 TREC Genomics track and achieved results comparable to those of the highest-ranking systems on the 2006 TREC Genomics track task. Essie shows that a judicious combination of exploiting document structure, phrase searching, and concept based query expansion is a useful approach for information retrieval in the biomedical domain. PMID:17329729
7 CFR 15f.4 - What do certain words and phrases in these regulations mean?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 1 2010-01-01 2010-01-01 false What do certain words and phrases in these regulations mean? 15f.4 Section 15f.4 Agriculture Office of the Secretary of Agriculture ADJUDICATIONS UNDER....4 What do certain words and phrases in these regulations mean? Agency means the USDA agency, office...
Metaphorical Salience in Artistic Text Processing: Evidence From Eye Movement.
Novikova, Eleonora G; Janyan, Armina; Tsaregorodtseva, Oksana V
2015-01-01
The study aimed to explore processing difference between a literal phrase and a metaphoric one. Unlike artificially created stimuli in most experimental research, an artistic text with an ambiguous binary metaphoric phrase was used. Eye tracking methodology was applied. Results suggested difference between the two types of phrases in both early and late processing measures. © The Author(s) 2015.
Planning in sentence production: evidence for the phrase as a default planning scope.
Martin, Randi C; Crowther, Jason E; Knight, Meredith; Tamborello, Franklin P; Yang, Chin-Lung
2010-08-01
Controversy remains as to the scope of advanced planning in language production. Smith and Wheeldon (1999) found significantly longer onset latencies when subjects described moving-picture displays by producing sentences beginning with a complex noun phrase than for matched sentences beginning with a simple noun phrase. While these findings are consistent with a phrasal scope of planning, they might also be explained on the basis of: (1) greater retrieval fluency for the second content word in the simple initial noun phrase sentences and (2) visual grouping factors. In Experiments 1 and 2, retrieval fluency for the second content word was equated for the complex and simple initial noun phrase conditions. Experiments 3 and 4 addressed the visual grouping hypothesis by using stationary displays and by comparing onset latencies for the same display for sentence and list productions. Longer onset latencies for the sentences beginning with a complex noun phrase were obtained in all experiments, supporting the phrasal scope of planning hypothesis. The results indicate that in speech, as in other motor production domains, planning occurs beyond the minimal production unit. Copyright (c) 2010 Elsevier B.V. All rights reserved.
Unconditional security from noisy quantum storage
NASA Astrophysics Data System (ADS)
Wehner, Stephanie
2010-03-01
We consider the implementation of two-party cryptographic primitives based on the sole physical assumption that no large-scale reliable quantum storage is available to the cheating party. An important example of such a task is secure identification. Here, Alice wants to identify herself to Bob (possibly an ATM machine) without revealing her password. More generally, Alice and Bob wish to solve problems where Alice holds an input x (e.g. her password), and Bob holds an input y (e.g. the password an honest Alice should possess), and they want to obtain the value of some function f(x,y) (e.g. the equality function). Security means that the legitimate users should not learn anything beyond this specification. That is, Alice should not learn anything about y and Bob should not learn anything about x, other than what they may be able to infer from the value of f(x,y). We show that any such problem can be solved securely in the noisy-storage model by constructing protocols for bit commitment and oblivious transfer, where we prove security against the most general attack. Our protocols can be implemented with present-day hardware used for quantum key distribution. In particular, no quantum storage is required for the honest parties. Our work raises a large number of immediate theoretical as well as experimental questions related to many aspects of quantum information science, such as for example understanding the information carrying properties of quantum channels and memories, randomness extraction, min-entropy sampling, as well as constructing small handheld devices which are suitable for the task of secure identification. [4pt] Full version available at arXiv:0906.1030 (theoretical) and arXiv:0911.2302 (practically oriented).
Identification and Treatment of Adolescents With Perinatal Anxiety and Depression.
Hughes, Linda Paine; Austin-Ketch, Tammy; Volpe, Ellen M; Campbell-Heider, Nancy
2017-06-01
Perinatal mood and anxiety disorders (PMAD) are the most common, yet under-diagnosed and undertreated complication of pregnancy, affecting up to 50% of pregnant and parenting teens. PMAD are a global health issue that can have devastating effects on the mental, physical, emotional, developmental health, and social life of the mother, infant, and family. Adolescents present with similar symptoms of PMAD as their adult counterparts, but also experience isolation from their peer group and lack of resources and coping strategies, as well as difficulty sleeping and lack of concentration and ability to focus. Nurses and nurse practitioners are in an ideal position to assess preexisting risk factors for PMAD. The current applied evidence-based article addresses the diagnosis of PMAD, provides a conceptual framework for understanding the intra- and interpersonal dynamics affecting teens with PMAD, and suggests a new screening tool to guide diagnosis. An easy to recall mnemonic for diagnosis and referral (SAIL AHEAD) is proposed. By using the SAIL AHEAD mnemonic, providers will impact adolescents' parenting success and resiliency, thereby enhancing their future success in life. [Journal of Psychosocial Nursing and Mental Health Services, 55(6), 23-29.]. Copyright 2017, SLACK Incorporated.
Syntactic Complexity and Frequency in the Neurocognitive Language System.
Yang, Yun-Hsuan; Marslen-Wilson, William D; Bozic, Mirjana
2017-09-01
Prominent neurobiological models of language follow the widely accepted assumption that language comprehension requires two principal mechanisms: a lexicon storing the sound-to-meaning mapping of words, primarily involving bilateral temporal regions, and a combinatorial processor for syntactically structured items, such as phrases and sentences, localized in a left-lateralized network linking left inferior frontal gyrus (LIFG) and posterior temporal areas. However, recent research showing that the processing of simple phrasal sequences may engage only bilateral temporal areas, together with the claims of distributional approaches to grammar, raise the question of whether frequent phrases are stored alongside individual words in temporal areas. In this fMRI study, we varied the frequency of words and of short and long phrases in English. If frequent phrases are indeed stored, then only less frequent items should generate selective left frontotemporal activation, because memory traces for such items would be weaker or not available in temporal cortex. Complementary univariate and multivariate analyses revealed that, overall, simple words (verbs) and long phrases engaged LIFG and temporal areas, whereas short phrases engaged bilateral temporal areas, suggesting that syntactic complexity is a key factor for LIFG activation. Although we found a robust frequency effect for words in temporal areas, no frequency effects were found for the two phrasal conditions. These findings support the conclusion that long and short phrases are analyzed, respectively, in the left frontal network and in a bilateral temporal network but are not retrieved from memory in the same way as simple words during spoken language comprehension.
Ranak, M S A Noman; Azad, Saiful; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z
2017-01-01
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)-a.k.a., Force Touch in Apple's MacBook, Apple Watch, ZTE's Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on-is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme.
Ranak, M. S. A. Noman; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z.
2017-01-01
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)—a.k.a., Force Touch in Apple’s MacBook, Apple Watch, ZTE’s Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on—is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme. PMID:29084262
Electronic Patient Data Confidentiality Practices Among Surgical Trainees: Questionnaire Study
Mole, Damian J; Fox, Colin; Napolitano, Giulio
2006-01-01
INTRODUCTION The objective of this work was to evaluate the safeguards implemented by surgical trainees to protect the confidentiality of electronic patient data through a structured questionnaire sent to Northern Ireland surgical trainees. PARTICIPANTS AND METHODS A group of 32 basic and higher surgical trainees attending a meeting of the Northern Ireland Association of Surgeons-in-Training were invited to complete a questionnaire regarding their computer use, UK Data Protection Act, 1988 registration and electronic data confidentiality practices. RESULTS Of these 32 trainees, 29 returned completed questionnaires of whom 26 trainees regularly stored sensitive patient data for audit or research purposes on a computer. Only one person was registered under the Data Protection Act, 1988. Of the computers used to store and analyse sensitive data, only 3 of 14 desktops, 8 of 19 laptops and 3 of 14 hand-held computers forced a password logon. Of the 29 trainees, 16 used the same password for all machines, and 25 of 27 passwords were less than 8 characters long. Two respondents declined to reveal details of their secure passwords. Half of all trainees had never adjusted their internet security settings, despite all 14 desktops, 16 of 19 laptops and 5 of 14 hand-helds being routinely connected to the internet. Of the 29 trainees, 28 never encrypted their sensitive data files. Ten trainees had sent unencrypted sensitive patient data over the internet, using a non-secure server. CONCLUSIONS Electronic data confidentiality practices amongst Northern Ireland surgical trainees are unsafe. Simple practical measures to safeguard confidentiality are recommended. PMID:17059715
Using macroinvertebrate response to inform sediment criteria development in mountain streams
The phrase biologically-based sediment criterion indicates that biological data is used to develop regional sediment criteria that will protect and maintain self-sustaining populations of native sediment-sensitive biota. To develop biologically-based sediment criteria we must qua...
RUASN: a robust user authentication framework for wireless sensor networks.
Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae
2011-01-01
In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.
Web Searching: A Process-Oriented Experimental Study of Three Interactive Search Paradigms.
ERIC Educational Resources Information Center
Dennis, Simon; Bruza, Peter; McArthur, Robert
2002-01-01
Compares search effectiveness when using query-based Internet search via the Google search engine, directory-based search via Yahoo, and phrase-based query reformulation-assisted search via the Hyperindex browser by means of a controlled, user-based experimental study of undergraduates at the University of Queensland. Discusses cognitive load,…
13 CFR 142.6 - What does the phrase “know or have reason to know” mean?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What does the phrase âknow or have reason to knowâ mean? 142.6 Section 142.6 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION PROGRAM FRAUD CIVIL REMEDIES ACT REGULATIONS Overview and Definitions § 142.6 What does the phrase “know...
Hirst, William; Phelps, Elizabeth A.
2015-01-01
We review and analyze the key theories, debates, findings, and omissions of the existing literature on flashbulb memories (FBMs), including what factors affect their formation, retention, and degree of confidence. We argue that FBMs do not require special memory mechanisms and are best characterized as involving both forgetting and mnemonic distortions, despite a high level of confidence. Factual memories for FBM-inducing events generally follow a similar pattern. Although no necessary and sufficient factors straightforwardly account for FBM retention, media attention particularly shapes memory for the events themselves. FBMs are best characterized in term of repetitions, even of mnemonic distortions, whereas event memories evidence corrections. The bearing of this literature on social identity and traumatic memories is also discussed. PMID:26997762
NASA Astrophysics Data System (ADS)
1991-12-01
Radon variations D J Noble Plockton High School, Ross shire IV52 8TU, UK Environmental physics A T Jackson Belfast Institute of Further and Higher Education On mnemonic schemes A T Bardócz Teacher Training College, Szombathely, Hungary Regarding mnemonic devices for Maxwell's relations A H Kalantar Department of Chemistry, University of Alberta, Edmonton, Canada TG6 2G2 On an analogy for Ohm's law H S Fricker Bradford Grammar School Further reflections D Hinson `Brenig', Town Hill, Llanrwst, Gwynedd LL26 0NF, UK Moving charges W Jarvis 6 Peggy''s Mill Road, Edinburgh EH4 6JY, UK More on the distance travelled A Tan Department of Physics, Alabama A&M University, USA
Collaborative, Trust-Based Security Mechanisms for a National Utility Intranet
2007-09-01
time_message_ceated … username bearnold operation_type copy from_file C:/etc/ passwd \\MPLpw.txt from_file_data_type ND //network data...time_message_created … username bearnold operation_type paste from_file C:\\etc\\ passwd \\MPLpw.txt //logon server password file...from_file_data_type ND from_file_caveat restricted-release to_file F:\\Copy of C:\\etc\\ passwd \\MPLpw.txt //removable drive //end message data
Zipf's law holds for phrases, not words.
Williams, Jake Ryland; Lessard, Paul R; Desu, Suma; Clark, Eric M; Bagrow, James P; Danforth, Christopher M; Dodds, Peter Sheridan
2015-08-11
With Zipf's law being originally and most famously observed for word frequency, it is surprisingly limited in its applicability to human language, holding over no more than three to four orders of magnitude before hitting a clear break in scaling. Here, building on the simple observation that phrases of one or more words comprise the most coherent units of meaning in language, we show empirically that Zipf's law for phrases extends over as many as nine orders of rank magnitude. In doing so, we develop a principled and scalable statistical mechanical method of random text partitioning, which opens up a rich frontier of rigorous text analysis via a rank ordering of mixed length phrases.
NASA Astrophysics Data System (ADS)
Kataoka, Haruno; Utsumi, Akira; Hirose, Yuki; Yoshiura, Hiroshi
Disclosure control of natural language information (DCNL), which we are trying to realize, is described. DCNL will be used for securing human communications over the internet, such as through blogs and social network services. Before sentences in the communications are disclosed, they are checked by DCNL and any phrases that could reveal sensitive information are transformed or omitted so that they are no longer revealing. DCNL checks not only phrases that directly represent sensitive information but also those that indirectly suggest it. Combinations of phrases are also checked. DCNL automatically learns the knowledge of sensitive phrases and the suggestive relations between phrases by using co-occurrence analysis and Web retrieval. The users' burden is therefore minimized, i.e., they do not need to define many disclosure control rules. DCNL complements the traditional access control in the fields where reliability needs to be balanced with enjoyment and objects classes for the access control cannot be predefined.
Dopamine Alters the Fidelity of Working Memory Representations according to Attentional Demands
Fallon, Sean James; Zokaei, Nahid; Norbury, Agnes; Manohar, Sanjay G.; Husain, Masud
2018-01-01
Capacity limitations in working memory (WM) necessitate the need to effectively control its contents. Here, we examined the effect of cabergoline, a dopamine D2 receptor agonist, on WM using a continuous report paradigm that allowed us to assess the fidelity with which items are stored. We assessed recall performance under three different gating conditions: remembering only one item, being cued to remember one target among distractors, and having to remember all items. Cabergoline had differential effects on recall performance according to whether distractors had to be ignored and whether mnemonic resources could be deployed exclusively to the target. Compared with placebo, cabergoline improved mnemonic performance when there were no distractors but significantly reduced performance when distractors were presented in a precue condition. No significant difference in performance was observed under cabergoline when all items had to be remembered. By applying a stochastic model of response selection, we established that the causes of drug-induced changes in performance were due to changes in the precision with which items were stored in WM. However, there was no change in the extent to which distractors were mistaken for targets. Thus, D2 agonism causes changes in the fidelity of mnemonic representations without altering interference between memoranda. PMID:27897674
NASA Astrophysics Data System (ADS)
Painter, Terence J.
1996-10-01
The mnemonic derives from the mythical tale of Scylla and Charybdis in Homer's Odyssey (chapter 12). It takes the form of an imaginary headline in a newspaper: SCYLLA MEETS CHARYBDIS - EPIC NEWS MUCH ALARMS SICILY. The first two or three letters in each of these eight words remind the user that the nine configurational prefixes are scyllo-, meso-, (or myo-), chiro- [(+) and (-)], epi-, neo-, muco-, allo-, and cis-, respectively. The mnemonic also arranges the prefixes in an order that allows the configurations to be derived in a logical manner by performing a defined sequence of imaginary configurational inversions (epimerizations) around a cyclohexane ring. The all-equatorial, chair conformation of scyllo-inositol is selected as the starting point, and the sequence of inversions is defined by a systematic permutation of possibilities for performing one, two or three inversions in succession (1; 1 and 2; 1 and 3; 1 and 4; 1, 2 and 3; 1, 2 and 4; and finally 1, 3 and 5). In the case of the two chiro-inositols, the enantiomeric form is determined simply by the direction (clockwise or counterclockwise) around the ring in which the imaginary inversions are performed. This also applies formally to allo-inositol, but in that case the two optical enantiomers are isoenergetic chair conformers in rapid equilibrium.
A novel approach to transformed biometrics using successive projections
NASA Astrophysics Data System (ADS)
Gopi, E. S.
2010-02-01
Unlike user created password, number of biometrics is limited for creating account in different organizations. Transformed biometrics attempts to solve the problem by transforming the biometric into another form, which is unique to the particular organization. This makes the availability of different transformed biometrics in different organizations transformed from the same biometrics and helps in foolproof transactions. In this article a novel approach to transformed biometrics using successive projection technique is suggested .In the proposed technique, the user can register up to 5*4n-1 organizations if the length of the biometric password is 'n'.
Code of Best Practice: Experimentation
2002-07-01
verb phrases , and are connected via arrows, named as nouns or noun phrases , which define inputs (from the left), controls (from the top), outputs (to the...Mark Mandeles, Telyvin Murphy, Dan Oertel, Dr. Walter Perry, John Poirier , Dennis Popiela, Steve Shaker, Dr. David Signori, Dr. Ed Smith, Marcy Stahl...inevitably include the unhappy phrase , “it depends.” In other words, context matters. Hence, individual experiments, which can only look at a small
21 CFR 4.2 - How does FDA define key terms and phrases in this subpart?
Code of Federal Regulations, 2014 CFR
2014-04-01
... 21 Food and Drugs 1 2014-04-01 2014-04-01 false How does FDA define key terms and phrases in this subpart? 4.2 Section 4.2 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... Combination Products § 4.2 How does FDA define key terms and phrases in this subpart? The terms listed in this...
21 CFR 4.2 - How does FDA define key terms and phrases in this subpart?
Code of Federal Regulations, 2013 CFR
2013-04-01
... 21 Food and Drugs 1 2013-04-01 2013-04-01 false How does FDA define key terms and phrases in this subpart? 4.2 Section 4.2 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... Combination Products § 4.2 How does FDA define key terms and phrases in this subpart? The terms listed in this...
Managing ambiguity in reference generation: the role of surface structure.
Khan, Imtiaz H; van Deemter, Kees; Ritchie, Graeme
2012-04-01
This article explores the role of surface ambiguities in referring expressions, and how the risk of such ambiguities should be taken into account by an algorithm that generates referring expressions, if these expressions are to be optimally effective for a hearer. We focus on the ambiguities that arise when adjectives occur in coordinated structures. The central idea is to use statistical information about lexical co-occurrence to estimate which interpretation of a phrase is most likely for human readers, and to avoid generating phrases where misunderstandings are likely. Various aspects of the problem were explored in three experiments in which responses by human participants provided evidence about which reading was most likely for certain phrases, which phrases were deemed most suitable for particular referents, and the speed at which various phrases were read. We found a preference for ''clear'' expressions to ''unclear'' ones, but if several of the expressions are ''clear,'' then brief expressions are preferred over non-brief ones even though the brief ones are syntactically ambiguous and the non-brief ones are not; the notion of clarity was made precise using Kilgarriff's Word Sketches. We outline an implemented algorithm that generates noun phrases conforming to our hypotheses. Copyright © 2011 Cognitive Science Society, Inc.
Kim, Sahyang; Cho, Taehong
2009-05-01
This study investigated the role of phrase-level prosodic boundary information in word segmentation in Korean with two word-spotting experiments. In experiment 1, it was found that intonational cues alone helped listeners with lexical segmentation. Listeners paid more attention to local intonational cues (...H#L...) across the prosodic boundary than the intonational information within a prosodic phrase. The results imply that intonation patterns with high frequency are used, though not exclusively, in lexical segmentation. In experiment 2, final lengthening was added to see how multiple prosodic cues influence lexical segmentation. The results showed that listeners did not necessarily benefit from the presence of both intonational and final lengthening cues: Their performance was improved only when intonational information contained infrequent tonal patterns for boundary marking, showing only partially cumulative effects of prosodic cues. When the intonational information was optimal (frequent) for boundary marking, however, poorer performance was observed with final lengthening. This is arguably because the phrase-initial segmental allophonic cues for the accentual phrase were not matched with the prosodic cues for the intonational phrase. It is proposed that the asymmetrical use of multiple cues was due to interaction between prosodic and segmental information that are computed in parallel in lexical segmentation.
A Menu-Driven Interface to Unix-Based Resources
Evans, Elizabeth A.
1989-01-01
Unix has often been overlooked in the past as a viable operating system for anyone other than computer scientists. Its terseness, non-mnemonic nature of the commands, and the lack of user-friendly software to run under it are but a few of the user-related reasons which have been cited. It is, nevertheless, the operating system of choice in many cases. This paper describes a menu-driven interface to Unix which provides user-friendlier access to the software resources available on the computers running under Unix.
Metaphor Identification in Large Texts Corpora
Neuman, Yair; Assaf, Dan; Cohen, Yohai; Last, Mark; Argamon, Shlomo; Howard, Newton; Frieder, Ophir
2013-01-01
Identifying metaphorical language-use (e.g., sweet child) is one of the challenges facing natural language processing. This paper describes three novel algorithms for automatic metaphor identification. The algorithms are variations of the same core algorithm. We evaluate the algorithms on two corpora of Reuters and the New York Times articles. The paper presents the most comprehensive study of metaphor identification in terms of scope of metaphorical phrases and annotated corpora size. Algorithms’ performance in identifying linguistic phrases as metaphorical or literal has been compared to human judgment. Overall, the algorithms outperform the state-of-the-art algorithm with 71% precision and 27% averaged improvement in prediction over the base-rate of metaphors in the corpus. PMID:23658625
Koul, Rajinder; Corwin, Melinda; Hayes, Summer
2005-01-01
The study employed a single-subject multiple baseline design to examine the ability of 9 individuals with severe Broca's aphasia or global aphasia to produce graphic symbol sentences of varying syntactical complexity using a software program that turns a computer into a speech output communication device. The sentences ranged in complexity from simple two-word phrases to those with morphological inflections, transformations, and relative clauses. Overall, results indicated that individuals with aphasia are able to access, manipulate, and combine graphic symbols to produce phrases and sentences of varying degrees of syntactical complexity. The findings are discussed in terms of the clinical and public policy implications.
System, method and apparatus for generating phrases from a database
NASA Technical Reports Server (NTRS)
McGreevy, Michael W. (Inventor)
2004-01-01
A phrase generation is a method of generating sequences of terms, such as phrases, that may occur within a database of subsets containing sequences of terms, such as text. A database is provided and a relational model of the database is created. A query is then input. The query includes a term or a sequence of terms or multiple individual terms or multiple sequences of terms or combinations thereof. Next, several sequences of terms that are contextually related to the query are assembled from contextual relations in the model of the database. The sequences of terms are then sorted and output. Phrase generation can also be an iterative process used to produce sequences of terms from a relational model of a database.
Proactive interference effects on sentence production
FERREIRA, VICTOR S.; FIRATO, CARLA E.
2007-01-01
Proactive interference refers to recall difficulties caused by prior similar memory-related processing. Information-processing approaches to sentence production predict that retrievability affects sentence form: Speakers may word sentences so that material that is difficult to retrieve is spoken later. In this experiment, speakers produced sentence structures that could include an optional that, thereby delaying the mention of a subsequent noun phrase. This subsequent noun phrase was either (1) conceptually similar to three previous noun phrases in the same sentence, leading to greater proactive interference, or (2) conceptually dissimilar, leading to less proactive interference. Speakers produced more thats (and were more disfluencies) before conceptually similar noun phrases, suggesting that retrieval difficulties during sentence production affect the syntactic structures of sentences that speakers produce. PMID:12613685