Science.gov

Sample records for privacy-preserving context collection

  1. Privacy-Preserving Health Data Collection for Preschool Children

    PubMed Central

    Zhang, Yuan; Ji, Yue

    2013-01-01

    With the development of network technology, more and more data are transmitted over the network and privacy issues have become a research focus. In this paper, we study the privacy in health data collection of preschool children and present a new identity-based encryption protocol for privacy protection. The background of the protocol is as follows. A physical examination for preschool children is needed every year out of consideration for the children's health. After the examination, data are transmitted through the Internet to the education authorities for analysis. In the process of data collection, it is unnecessary for the education authorities to know the identities of the children. Based on this, we designed a privacy-preserving protocol, which delinks the children's identities from the examination data. Thus, the privacy of the children is preserved during data collection. We present the protocol in detail and prove the correctness of the protocol. PMID:24285984

  2. Privacy-preserving health data collection for preschool children.

    PubMed

    Guan, Shaopeng; Zhang, Yuan; Ji, Yue

    2013-01-01

    With the development of network technology, more and more data are transmitted over the network and privacy issues have become a research focus. In this paper, we study the privacy in health data collection of preschool children and present a new identity-based encryption protocol for privacy protection. The background of the protocol is as follows. A physical examination for preschool children is needed every year out of consideration for the children's health. After the examination, data are transmitted through the Internet to the education authorities for analysis. In the process of data collection, it is unnecessary for the education authorities to know the identities of the children. Based on this, we designed a privacy-preserving protocol, which delinks the children's identities from the examination data. Thus, the privacy of the children is preserved during data collection. We present the protocol in detail and prove the correctness of the protocol.

  3. Context Sensing System Analysis for Privacy Preservation Based on Game Theory.

    PubMed

    Wang, Shengling; Li, Luyun; Sun, Weiman; Guo, Junqi; Bie, Rongfang; Lin, Kai

    2017-02-10

    In a context sensing system in which a sensor-equipped mobile phone runs an unreliable context-aware application, the application can infer the user's contexts, based on which it provides personalized services. However, the application may sell the user's contexts to some malicious adversaries to earn extra profits, which will hinder its widespread use. In the real world, the actions of the user, the application and the adversary in the context sensing system affect each other, so that their payoffs are constrained mutually. To figure out under which conditions they behave well (the user releases, the application does not leak and the adversary does not retrieve the context), we take advantage of game theory to analyze the context sensing system. We use the extensive form game and the repeated game, respectively, to analyze two typical scenarios, single interaction and multiple interaction among three players, from which Nash equilibriums and cooperation conditions are obtained. Our results show that the reputation mechanism for the context-sensing system in the former scenario is crucial to privacy preservation, so is the extent to which the participants are concerned about future payoffs in the latter one.

  4. Context Sensing System Analysis for Privacy Preservation Based on Game Theory †

    PubMed Central

    Wang, Shengling; Li, Luyun; Sun, Weiman; Guo, Junqi; Bie, Rongfang; Lin, Kai

    2017-01-01

    In a context sensing system in which a sensor-equipped mobile phone runs an unreliable context-aware application, the application can infer the user’s contexts, based on which it provides personalized services. However, the application may sell the user’s contexts to some malicious adversaries to earn extra profits, which will hinder its widespread use. In the real world, the actions of the user, the application and the adversary in the context sensing system affect each other, so that their payoffs are constrained mutually. To figure out under which conditions they behave well (the user releases, the application does not leak and the adversary does not retrieve the context), we take advantage of game theory to analyze the context sensing system. We use the extensive form game and the repeated game, respectively, to analyze two typical scenarios, single interaction and multiple interaction among three players, from which Nash equilibriums and cooperation conditions are obtained. Our results show that the reputation mechanism for the context-sensing system in the former scenario is crucial to privacy preservation, so is the extent to which the participants are concerned about future payoffs in the latter one. PMID:28208593

  5. Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme.

    PubMed

    Zhu, Hui; Gao, Lijuan; Li, Hui

    2016-02-01

    With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users' personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users' query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users' queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs.

  6. Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme

    PubMed Central

    Zhu, Hui; Gao, Lijuan; Li, Hui

    2016-01-01

    With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users’ personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users’ query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users’ queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs. PMID:26840319

  7. Data collection framework for energy efficient privacy preservation in wireless sensor networks having many-to-many structures.

    PubMed

    Bahşi, Hayretdin; Levi, Albert

    2010-01-01

    Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-to-many structures evolved due to the need for conveying collected event information to multiple sinks. Privacy preserved data collection models in the literature do not solve the problems of WSN applications in which network has multiple un-trusted sinks with different level of privacy requirements. This study proposes a data collection framework bases on k-anonymity for preventing record disclosure of collected event information in WSNs. Proposed method takes the anonymity requirements of multiple sinks into consideration by providing different levels of privacy for each destination sink. Attributes, which may identify an event owner, are generalized or encrypted in order to meet the different anonymity requirements of sinks at the same anonymized output. If the same output is formed, it can be multicasted to all sinks. The other trivial solution is to produce different anonymized outputs for each sink and send them to related sinks. Multicasting is an energy efficient data sending alternative for some sensor nodes. Since minimization of energy consumption is an important design criteria for WSNs, multicasting the same event information to multiple sinks reduces the energy consumption of overall network.

  8. Target-Based Maintenance of Privacy Preserving Association Rules

    ERIC Educational Resources Information Center

    Ahluwalia, Madhu V.

    2011-01-01

    In the context of association rule mining, the state-of-the-art in privacy preserving data mining provides solutions for categorical and Boolean association rules but not for quantitative association rules. This research fills this gap by describing a method based on discrete wavelet transform (DWT) to protect input data privacy while preserving…

  9. Privacy-preserving restricted boltzmann machine.

    PubMed

    Li, Yu; Zhang, Yuan; Ji, Yue

    2014-01-01

    With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model.

  10. Privacy-preserving backpropagation neural network learning.

    PubMed

    Chen, Tingting; Zhong, Sheng

    2009-10-01

    With the development of distributed computing environment , many learning problems now have to deal with distributed input data. To enhance cooperations in learning, it is important to address the privacy concern of each data holder by extending the privacy preservation notion to original learning algorithms. In this paper, we focus on preserving the privacy in an important learning model, multilayer neural networks. We present a privacy-preserving two-party distributed algorithm of backpropagation which allows a neural network to be trained without requiring either party to reveal her data to the other. We provide complete correctness and security analysis of our algorithms. The effectiveness of our algorithms is verified by experiments on various real world data sets.

  11. Privacy preserving RBF kernel support vector machine.

    PubMed

    Li, Haoran; Xiong, Li; Ohno-Machado, Lucila; Jiang, Xiaoqian

    2014-01-01

    Data sharing is challenging but important for healthcare research. Methods for privacy-preserving data dissemination based on the rigorous differential privacy standard have been developed but they did not consider the characteristics of biomedical data and make full use of the available information. This often results in too much noise in the final outputs. We hypothesized that this situation can be alleviated by leveraging a small portion of open-consented data to improve utility without sacrificing privacy. We developed a hybrid privacy-preserving differentially private support vector machine (SVM) model that uses public data and private data together. Our model leverages the RBF kernel and can handle nonlinearly separable cases. Experiments showed that this approach outperforms two baselines: (1) SVMs that only use public data, and (2) differentially private SVMs that are built from private data. Our method demonstrated very close performance metrics compared to nonprivate SVMs trained on the private data.

  12. Privacy Preserving Publication of Moving Object Data

    NASA Astrophysics Data System (ADS)

    Bonchi, Francesco

    The increasing availability of space-time trajectories left by location-aware devices is expected to enable novel classes of applications where the discovery of consumable, concise, and actionable knowledge is the key step. However, the analysis of mobility data is a critic task by the privacy point of view: in fact, the peculiar nature of location data might enable intrusive inferences in the life of the individuals whose data is analyzed. It is thus important to develop privacy-preserving techniques for the publication and the analysis of mobility data.

  13. The study on privacy preserving data mining for information security

    NASA Astrophysics Data System (ADS)

    Li, Xiaohui

    2012-04-01

    Privacy preserving data mining have a rapid development in a short year. But it still faces many challenges in the future. Firstly, the level of privacy has different definitions in different filed. Therefore, the measure of privacy preserving data mining technology protecting private information is not the same. So, it's an urgent issue to present a unified privacy definition and measure. Secondly, the most of research in privacy preserving data mining is presently confined to the theory study.

  14. Privacy-preserving heterogeneous health data sharing

    PubMed Central

    Mohammed, Noman; Jiang, Xiaoqian; Chen, Rui; Fung, Benjamin C M; Ohno-Machado, Lucila

    2013-01-01

    Objective Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees and makes no assumptions about an adversary's background knowledge. All existing solutions that ensure ε-differential privacy handle the problem of disclosing relational and set-valued data in a privacy-preserving manner separately. In this paper, we propose an algorithm that considers both relational and set-valued data in differentially private disclosure of healthcare data. Methods The proposed approach makes a simple yet fundamental switch in differentially private algorithm design: instead of listing all possible records (ie, a contingency table) for noise addition, records are generalized before noise addition. The algorithm first generalizes the raw data in a probabilistic way, and then adds noise to guarantee ε-differential privacy. Results We showed that the disclosed data could be used effectively to build a decision tree induction classifier. Experimental results demonstrated that the proposed algorithm is scalable and performs better than existing solutions for classification analysis. Limitation The resulting utility may degrade when the output domain size is very large, making it potentially inappropriate to generate synthetic data for large health databases. Conclusions Unlike existing techniques, the proposed algorithm allows the disclosure of health data containing both relational and set-valued data in a differentially private manner, and can retain essential information for discriminative analysis. PMID:23242630

  15. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    ERIC Educational Resources Information Center

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  16. Privacy preserving interactive record linkage (PPIRL)

    PubMed Central

    Kum, Hye-Chung; Krishnamurthy, Ashok; Machanavajjhala, Ashwin; Reiter, Michael K; Ahalt, Stanley

    2014-01-01

    Objective Record linkage to integrate uncoordinated databases is critical in biomedical research using Big Data. Balancing privacy protection against the need for high quality record linkage requires a human–machine hybrid system to safely manage uncertainty in the ever changing streams of chaotic Big Data. Methods In the computer science literature, private record linkage is the most published area. It investigates how to apply a known linkage function safely when linking two tables. However, in practice, the linkage function is rarely known. Thus, there are many data linkage centers whose main role is to be the trusted third party to determine the linkage function manually and link data for research via a master population list for a designated region. Recently, a more flexible computerized third-party linkage platform, Secure Decoupled Linkage (SDLink), has been proposed based on: (1) decoupling data via encryption, (2) obfuscation via chaffing (adding fake data) and universe manipulation; and (3) minimum information disclosure via recoding. Results We synthesize this literature to formalize a new framework for privacy preserving interactive record linkage (PPIRL) with tractable privacy and utility properties and then analyze the literature using this framework. Conclusions Human-based third-party linkage centers for privacy preserving record linkage are the accepted norm internationally. We find that a computer-based third-party platform that can precisely control the information disclosed at the micro level and allow frequent human interaction during the linkage process, is an effective human–machine hybrid system that significantly improves on the linkage center model both in terms of privacy and utility. PMID:24201028

  17. Privacy-preserving matching of similar patients.

    PubMed

    Vatsalan, Dinusha; Christen, Peter

    2016-02-01

    The identification of similar entities represented by records in different databases has drawn considerable attention in many application areas, including in the health domain. One important type of entity matching application that is vital for quality healthcare analytics is the identification of similar patients, known as similar patient matching. A key component of identifying similar records is the calculation of similarity of the values in attributes (fields) between these records. Due to increasing privacy and confidentiality concerns, using the actual attribute values of patient records to identify similar records across different organizations is becoming non-trivial because the attributes in such records often contain highly sensitive information such as personal and medical details of patients. Therefore, the matching needs to be based on masked (encoded) values while being effective and efficient to allow matching of large databases. Bloom filter encoding has widely been used as an efficient masking technique for privacy-preserving matching of string and categorical values. However, no work on Bloom filter-based masking of numerical data, such as integer (e.g. age), floating point (e.g. body mass index), and modulus (numbers wrap around upon reaching a certain value, e.g. date and time), which are commonly required in the health domain, has been presented in the literature. We propose a framework with novel methods for masking numerical data using Bloom filters, thereby facilitating the calculation of similarities between records. We conduct an empirical study on publicly available real-world datasets which shows that our framework provides efficient masking and achieves similar matching accuracy compared to the matching of actual unencoded patient records.

  18. Quantifying the Correctness, Computational Complexity, and Security of Privacy-Preserving String Comparators for Record Linkage.

    PubMed

    Durham, Elizabeth; Xue, Yuan; Kantarcioglu, Murat; Malin, Bradley

    2012-10-01

    Record linkage is the task of identifying records from disparate data sources that refer to the same entity. It is an integral component of data processing in distributed settings, where the integration of information from multiple sources can prevent duplication and enrich overall data quality, thus enabling more detailed and correct analysis. Privacy-preserving record linkage (PPRL) is a variant of the task in which data owners wish to perform linkage without revealing identifiers associated with the records. This task is desirable in various domains, including healthcare, where it may not be possible to reveal patient identity due to confidentiality requirements, and in business, where it could be disadvantageous to divulge customers' identities. To perform PPRL, it is necessary to apply string comparators that function in the privacy-preserving space. A number of privacy-preserving string comparators (PPSCs) have been proposed, but little research has compared them in the context of a real record linkage application. This paper performs a principled and comprehensive evaluation of six PPSCs in terms of three key properties: 1) correctness of record linkage predictions, 2) computational complexity, and 3) security. We utilize a real publicly-available dataset, derived from the North Carolina voter registration database, to evaluate the tradeoffs between the aforementioned properties. Among our results, we find that PPSCs that partition, encode, and compare strings yield highly accurate record linkage results. However, as a tradeoff, we observe that such PPSCs are less secure than those that map and compare strings in a reduced dimensional space.

  19. Privacy-preserving periodical publishing for medical information

    NASA Astrophysics Data System (ADS)

    Jin, Hua; Ju, Shi-guang; Liu, Shan-cheng

    2013-07-01

    Existing privacy-preserving publishing models can not meet the requirement of periodical publishing for medical information whether these models are static or dynamic. This paper presents a (k,l)-anonymity model with keeping individual association and a principle based on (Epsilon)-invariance group for subsequent periodical publishing, and then, the PKIA and PSIGI algorithms are designed for them. The proposed methods can reserve more individual association with privacy-preserving and have better publishing quality. Experiments confirm our theoretical results and its practicability.

  20. A Robust Conditional Privacy-Preserving Authentication Protocol in VANET

    NASA Astrophysics Data System (ADS)

    Jung, Chae Duk; Sur, Chul; Park, Youngho; Rhee, Kyung-Hyune

    Recently, Lu et al. proposed an efficient conditional privacy preservation protocol, named ECPP, based on group signature scheme for secure vehicular communications. However, ECPP dose not provide unlinkability and traceability when multiple RSUs are compromised. In this paper, we make up for the limitations and propose a robust conditional privacy-preserving authentication protocol without loss of efficiency as compared with ECPP. Furthermore, in our protocol, RSUs can issue multiple anonymous certificates to an OBU to alleviate system overheads for validity check of RSUs. In order to achieve these goals, we consider a universal re-encryption scheme as our building block.

  1. A Collaborative Framework for Distributed Privacy-Preserving Support Vector Machine Learning

    PubMed Central

    Que, Jialan; Jiang, Xiaoqian; Ohno-Machado, Lucila

    2012-01-01

    A Support Vector Machine (SVM) is a popular tool for decision support. The traditional way to build an SVM model is to estimate parameters based on a centralized repository of data. However, in the field of biomedicine, patient data are sometimes stored in local repositories or institutions where they were collected, and may not be easily shared due to privacy concerns. This creates a substantial barrier for researchers to effectively learn from the distributed data using machine learning tools like SVMs. To overcome this difficulty and promote efficient information exchange without sharing sensitive raw data, we developed a Distributed Privacy Preserving Support Vector Machine (DPP-SVM). The DPP-SVM enables privacy-preserving collaborative learning, in which a trusted server integrates “privacy-insensitive” intermediary results. The globally learned model is guaranteed to be exactly the same as learned from combined data. We also provide a free web-service (http://privacy.ucsd.edu:8080/ppsvm/) for multiple participants to collaborate and complete the SVM-learning task in an efficient and privacy-preserving manner. PMID:23304414

  2. A collaborative framework for Distributed Privacy-Preserving Support Vector Machine learning.

    PubMed

    Que, Jialan; Jiang, Xiaoqian; Ohno-Machado, Lucila

    2012-01-01

    A Support Vector Machine (SVM) is a popular tool for decision support. The traditional way to build an SVM model is to estimate parameters based on a centralized repository of data. However, in the field of biomedicine, patient data are sometimes stored in local repositories or institutions where they were collected, and may not be easily shared due to privacy concerns. This creates a substantial barrier for researchers to effectively learn from the distributed data using machine learning tools like SVMs. To overcome this difficulty and promote efficient information exchange without sharing sensitive raw data, we developed a Distributed Privacy Preserving Support Vector Machine (DPP-SVM). The DPP-SVM enables privacy-preserving collaborative learning, in which a trusted server integrates "privacy-insensitive" intermediary results. The globally learned model is guaranteed to be exactly the same as learned from combined data. We also provide a free web-service (http://privacy.ucsd.edu:8080/ppsvm/) for multiple participants to collaborate and complete the SVM-learning task in an efficient and privacy-preserving manner.

  3. Characterizing and Implementing Efficient Primitives for Privacy-Preserving Computation

    DTIC Science & Technology

    2015-07-01

    CHARACTERIZING AND IMPLEMENTING EFFICIENT PRIMITIVES FOR PRIVACY-PRESERVING COMPUTATION GEORGIA INSTITUTE OF TECHNOLOGY JULY 2015...FINAL TECHNICAL REPORT 3. DATES COVERED (From - To) MAY 2011 – MAR 2015 4. TITLE AND SUBTITLE CHARACTERIZING AND IMPLEMENTING EFFICIENT PRIMITIVES ...computation to be executed upon it. However, the primitives making such computation possible are extremely expensive, and have long been viewed as

  4. Architecture and Assessment: Privacy Preserving Biometrically Secured Electronic Documents

    DTIC Science & Technology

    visit Canada. Rather than traditional biometrics, we use privacy enhancing techniques to derive references from the biometrics so that no biometric...TA) system in which foreign passport holders obtain electronic credentials which permit entry to Canada. This b-TA can be seen as a privacy preserving

  5. A Secure and Privacy-Preserving Targeted Ad-System

    NASA Astrophysics Data System (ADS)

    Androulaki, Elli; Bellovin, Steven M.

    Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods violate consumers' privacy, which has engendered resistance to the ads. However, protecting privacy through anonymity seems to encourage click-fraud. In this paper, we define consumer's privacy and present a privacy-preserving, targeted ad system (PPOAd) which is resistant towards click fraud. Our scheme is structured to provide financial incentives to all entities involved.

  6. The Theory and Application of Privacy-preserving Computation

    DTIC Science & Technology

    2015-03-26

    39 4.2.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 4.2.2.1 Pavlov et al...4.2.2.1 Pavlov et al. One of the earliest works in privacy-preserving decentralized reputation systems comes from Pavlov et al. [64]. An important proof...original work by Pavlov et al. In the case of dynamic networks, the problem with Pavlov’s protocol is that, while honest parties which could provide

  7. Privacy-preserving outlier detection through random nonlinear data distortion.

    PubMed

    Bhaduri, Kanishka; Stefanski, Mark D; Srivastava, Ashok N

    2011-02-01

    Consider a scenario in which the data owner has some private or sensitive data and wants a data miner to access them for studying important patterns without revealing the sensitive information. Privacy-preserving data mining aims to solve this problem by randomly transforming the data prior to their release to the data miners. Previous works only considered the case of linear data perturbations--additive, multiplicative, or a combination of both--for studying the usefulness of the perturbed output. In this paper, we discuss nonlinear data distortion using potentially nonlinear random data transformation and show how it can be useful for privacy-preserving anomaly detection from sensitive data sets. We develop bounds on the expected accuracy of the nonlinear distortion and also quantify privacy by using standard definitions. The highlight of this approach is to allow a user to control the amount of privacy by varying the degree of nonlinearity. We show how our general transformation can be used for anomaly detection in practice for two specific problem instances: a linear model and a popular nonlinear model using the sigmoid function. We also analyze the proposed nonlinear transformation in full generality and then show that, for specific cases, it is distance preserving. A main contribution of this paper is the discussion between the invertibility of a transformation and privacy preservation and the application of these techniques to outlier detection. The experiments conducted on real-life data sets demonstrate the effectiveness of the approach.

  8. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    PubMed Central

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  9. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  10. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs.

    PubMed

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-03-24

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme.

  11. Privacy-preserving data aggregation protocols for wireless sensor networks: a survey.

    PubMed

    Bista, Rabindra; Chang, Jae-Woo

    2010-01-01

    Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.

  12. Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey

    PubMed Central

    Bista, Rabindra; Chang, Jae-Woo

    2010-01-01

    Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs. PMID:22399893

  13. A comprehensive review on privacy preserving data mining.

    PubMed

    Aldeen, Yousra Abdul Alsahib S; Salleh, Mazleena; Razzaque, Mohammad Abdur

    2015-01-01

    Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publishing. Ever-escalating internet phishing posed severe threat on widespread propagation of sensitive information over the web. Conversely, the dubious feelings and contentions mediated unwillingness of various information providers towards the reliability protection of data from disclosure often results utter rejection in data sharing or incorrect information sharing. This article provides a panoramic overview on new perspective and systematic interpretation of a list published literatures via their meticulous organization in subcategories. The fundamental notions of the existing privacy preserving data mining methods, their merits, and shortcomings are presented. The current privacy preserving data mining techniques are classified based on distortion, association rule, hide association rule, taxonomy, clustering, associative classification, outsourced data mining, distributed, and k-anonymity, where their notable advantages and disadvantages are emphasized. This careful scrutiny reveals the past development, present research challenges, future trends, the gaps and weaknesses. Further significant enhancements for more robust privacy protection and preservation are affirmed to be mandatory.

  14. Privacy-preserving record linkage on large real world datasets.

    PubMed

    Randall, Sean M; Ferrante, Anna M; Boyd, James H; Bauer, Jacqueline K; Semmens, James B

    2014-08-01

    Record linkage typically involves the use of dedicated linkage units who are supplied with personally identifying information to determine individuals from within and across datasets. The personally identifying information supplied to linkage units is separated from clinical information prior to release by data custodians. While this substantially reduces the risk of disclosure of sensitive information, some residual risks still exist and remain a concern for some custodians. In this paper we trial a method of record linkage which reduces privacy risk still further on large real world administrative data. The method uses encrypted personal identifying information (bloom filters) in a probability-based linkage framework. The privacy preserving linkage method was tested on ten years of New South Wales (NSW) and Western Australian (WA) hospital admissions data, comprising in total over 26 million records. No difference in linkage quality was found when the results were compared to traditional probabilistic methods using full unencrypted personal identifiers. This presents as a possible means of reducing privacy risks related to record linkage in population level research studies. It is hoped that through adaptations of this method or similar privacy preserving methods, risks related to information disclosure can be reduced so that the benefits of linked research taking place can be fully realised.

  15. Personalized privacy-preserving frequent itemset mining using randomized response.

    PubMed

    Sun, Chongjing; Fu, Yan; Zhou, Junlin; Gao, Hui

    2014-01-01

    Frequent itemset mining is the important first step of association rule mining, which discovers interesting patterns from the massive data. There are increasing concerns about the privacy problem in the frequent itemset mining. Some works have been proposed to handle this kind of problem. In this paper, we introduce a personalized privacy problem, in which different attributes may need different privacy levels protection. To solve this problem, we give a personalized privacy-preserving method by using the randomized response technique. By providing different privacy levels for different attributes, this method can get a higher accuracy on frequent itemset mining than the traditional method providing the same privacy level. Finally, our experimental results show that our method can have better results on the frequent itemset mining while preserving personalized privacy.

  16. Personalized Privacy-Preserving Frequent Itemset Mining Using Randomized Response

    PubMed Central

    Sun, Chongjing; Fu, Yan; Zhou, Junlin; Gao, Hui

    2014-01-01

    Frequent itemset mining is the important first step of association rule mining, which discovers interesting patterns from the massive data. There are increasing concerns about the privacy problem in the frequent itemset mining. Some works have been proposed to handle this kind of problem. In this paper, we introduce a personalized privacy problem, in which different attributes may need different privacy levels protection. To solve this problem, we give a personalized privacy-preserving method by using the randomized response technique. By providing different privacy levels for different attributes, this method can get a higher accuracy on frequent itemset mining than the traditional method providing the same privacy level. Finally, our experimental results show that our method can have better results on the frequent itemset mining while preserving personalized privacy. PMID:25143989

  17. Privacy Preserving Facial and Fingerprint Multi-biometric Authentication

    NASA Astrophysics Data System (ADS)

    Anzaku, Esla Timothy; Sohn, Hosik; Ro, Yong Man

    The cases of identity theft can be mitigated by the adoption of secure authentication methods. Biohashing and its variants, which utilizes secret keys and biometrics, are promising methods for secure authentication; however, their shortcoming is the degraded performance under the assumption that secret keys are compromised. In this paper, we extend the concept of Biohashing to multi-biometrics - facial and fingerprint traits. We chose these traits because they are widely used, howbeit, little research attention has been given to designing privacy preserving multi-biometric systems using them. Instead of just using a single modality (facial or fingerprint), we presented a framework for using both modalities. The improved performance of the proposed method, using face and fingerprint, as against either facial or fingerprint trait used in isolation is evaluated using two chimerical bimodal databases formed from publicly available facial and fingerprint databases.

  18. Enabling Privacy-Preserving GWASs in Heterogeneous Human Populations.

    PubMed

    Simmons, Sean; Sahinalp, Cenk; Berger, Bonnie

    2016-07-01

    The proliferation of large genomic databases offers the potential to perform increasingly larger-scale genome-wide association studies (GWASs). Due to privacy concerns, however, access to these data is limited, greatly reducing their usefulness for research. Here, we introduce a computational framework for performing GWASs that adapts principles of differential privacy-a cryptographic theory that facilitates secure analysis of sensitive data-to both protect private phenotype information (e.g., disease status) and correct for population stratification. This framework enables us to produce privacy-preserving GWAS results based on EIGENSTRAT and linear mixed model (LMM)-based statistics, both of which correct for population stratification. We test our differentially private statistics, PrivSTRAT and PrivLMM, on simulated and real GWAS datasets and find they are able to protect privacy while returning meaningful results. Our framework can be used to securely query private genomic datasets to discover which specific genomic alterations may be associated with a disease, thus increasing the availability of these valuable datasets.

  19. Digression and Value Concatenation to Enable Privacy-Preserving Regression

    PubMed Central

    Li, Xiao-Bai; Sarkar, Sumit

    2015-01-01

    Regression techniques can be used not only for legitimate data analysis, but also to infer private information about individuals. In this paper, we demonstrate that regression trees, a popular data-analysis and data-mining technique, can be used to effectively reveal individuals’ sensitive data. This problem, which we call a “regression attack,” has not been addressed in the data privacy literature, and existing privacy-preserving techniques are not appropriate in coping with this problem. We propose a new approach to counter regression attacks. To protect against privacy disclosure, our approach introduces a novel measure, called digression, which assesses the sensitive value disclosure risk in the process of building a regression tree model. Specifically, we develop an algorithm that uses the measure for pruning the tree to limit disclosure of sensitive data. We also propose a dynamic value-concatenation method for anonymizing data, which better preserves data utility than a user-defined generalization scheme commonly used in existing approaches. Our approach can be used for anonymizing both numeric and categorical data. An experimental study is conducted using real-world financial, economic and healthcare data. The results of the experiments demonstrate that the proposed approach is very effective in protecting data privacy while preserving data quality for research and analysis. PMID:26752802

  20. Infrastructure Aided Privacy Preserving-Authentication in VANETs

    NASA Astrophysics Data System (ADS)

    Chaurasia, Brijesh Kumar; Verma, Shekhar; Tomar, G. S.

    The paper presents a privacy preserving authentication protocol for vehicles in a VANET. The authentication process involves authentication of the vehicle and the corresponding RSU by a fixed infrastructure (CTA). Every RSU has a public key infrastructure and continuously broadcasts public key. The vehicle encrypts its identity, RSU Id and timestamp using its symmetric key. The encrypted bits along with the pseudonym of vehicle and timestamp are again encrypted by the public key of RSU and send to the RSU. RSU forwards the encrypted part to the CTA. CTA sends its verification to the RSU. The verification of the vehicle is encrypted by the vehicle symmetric key and sends along with authentication of the vehicle to the RSU. The encrypted portion is forwarded to the vehicle which confirms the authentication of the RSU after decryption. The CTA also sends a temporary short certificate to the vehicle for vehicle to vehicle communication. The whole process needs only one request and reply between different entities. Simulation results indicate the time taken (~ 223 ms) for the whole process is small and constitutes only a small portion of the stay time of a vehicle within an RSU region.

  1. Privacy-preserving GWAS analysis on federated genomic datasets

    PubMed Central

    2015-01-01

    Background The biomedical community benefits from the increasing availability of genomic data to support meaningful scientific research, e.g., Genome-Wide Association Studies (GWAS). However, high quality GWAS usually requires a large amount of samples, which can grow beyond the capability of a single institution. Federated genomic data analysis holds the promise of enabling cross-institution collaboration for effective GWAS, but it raises concerns about patient privacy and medical information confidentiality (as data are being exchanged across institutional boundaries), which becomes an inhibiting factor for the practical use. Methods We present a privacy-preserving GWAS framework on federated genomic datasets. Our method is to layer the GWAS computations on top of secure multi-party computation (MPC) systems. This approach allows two parties in a distributed system to mutually perform secure GWAS computations, but without exposing their private data outside. Results We demonstrate our technique by implementing a framework for minor allele frequency counting and χ2 statistics calculation, one of typical computations used in GWAS. For efficient prototyping, we use a state-of-the-art MPC framework, i.e., Portable Circuit Format (PCF) [1]. Our experimental results show promise in realizing both efficient and secure cross-institution GWAS computations. PMID:26733045

  2. EGPS: An Efficient Privacy Preserving Scheme for Vehicular ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Zhao, Baokang; Su, Xiangyu; Su, Jinshu; Song, Ziming; Sun, Yipin; Tao, Jing; Tang, Yong; Chen, Shuhui; Zhao, Guohong; Chen, Yijiao

    2010-09-01

    In this paper, we propose EGPS, an efficient privacy preserving scheme for vehicular ad hoc networks. The EGPS scheme is based on a very efficient group signature and Identity Based Cryptography(IBC) techniques. Several security properties of EGPS, including the correctness and unforgeability have been proved. Furthermore, EGPS is also proved to be more efficient than GSIS, which is currently one of the best state-of-the-art VANET privacy preserving schemes.

  3. RiPPAS: A Ring-Based Privacy-Preserving Aggregation Scheme in Wireless Sensor Networks

    PubMed Central

    Zhang, Kejia; Han, Qilong; Cai, Zhipeng; Yin, Guisheng

    2017-01-01

    Recently, data privacy in wireless sensor networks (WSNs) has been paid increased attention. The characteristics of WSNs determine that users’ queries are mainly aggregation queries. In this paper, the problem of processing aggregation queries in WSNs with data privacy preservation is investigated. A Ring-based Privacy-Preserving Aggregation Scheme (RiPPAS) is proposed. RiPPAS adopts ring structure to perform aggregation. It uses pseudonym mechanism for anonymous communication and uses homomorphic encryption technique to add noise to the data easily to be disclosed. RiPPAS can handle both sum() queries and min()/max() queries, while the existing privacy-preserving aggregation methods can only deal with sum() queries. For processing sum() queries, compared with the existing methods, RiPPAS has advantages in the aspects of privacy preservation and communication efficiency, which can be proved by theoretical analysis and simulation results. For processing min()/max() queries, RiPPAS provides effective privacy preservation and has low communication overhead. PMID:28178197

  4. RiPPAS: A Ring-Based Privacy-Preserving Aggregation Scheme in Wireless Sensor Networks.

    PubMed

    Zhang, Kejia; Han, Qilong; Cai, Zhipeng; Yin, Guisheng

    2017-02-07

    Recently, data privacy in wireless sensor networks (WSNs) has been paid increased attention. The characteristics of WSNs determine that users' queries are mainly aggregation queries. In this paper, the problem of processing aggregation queries in WSNs with data privacy preservation is investigated. A Ring-based Privacy-Preserving Aggregation Scheme (RiPPAS) is proposed. RiPPAS adopts ring structure to perform aggregation. It uses pseudonym mechanism for anonymous communication and uses homomorphic encryption technique to add noise to the data easily to be disclosed. RiPPAS can handle both s u m ( ) queries and m i n ( ) / m a x ( ) queries, while the existing privacy-preserving aggregation methods can only deal with s u m ( ) queries. For processing s u m ( ) queries, compared with the existing methods, RiPPAS has advantages in the aspects of privacy preservation and communication efficiency, which can be proved by theoretical analysis and simulation results. For processing m i n ( ) / m a x ( ) queries, RiPPAS provides effective privacy preservation and has low communication overhead.

  5. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data †

    PubMed Central

    Xie, Qingqing; Wang, Liangmin

    2016-01-01

    With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead. PMID:27897984

  6. A Neural-Network Clustering-Based Algorithm for Privacy Preserving Data Mining

    NASA Astrophysics Data System (ADS)

    Tsiafoulis, S.; Zorkadis, V. C.; Karras, D. A.

    The increasing use of fast and efficient data mining algorithms in huge collections of personal data, facilitated through the exponential growth of technology, in particular in the field of electronic data storage media and processing power, has raised serious ethical, philosophical and legal issues related to privacy protection. To cope with these concerns, several privacy preserving methodologies have been proposed, classified in two categories, methodologies that aim at protecting the sensitive data and those that aim at protecting the mining results. In our work, we focus on sensitive data protection and compare existing techniques according to their anonymity degree achieved, the information loss suffered and their performance characteristics. The ℓ-diversity principle is combined with k-anonymity concepts, so that background information can not be exploited to successfully attack the privacy of data subjects data refer to. Based on Kohonen Self Organizing Feature Maps (SOMs), we firstly organize data sets in subspaces according to their information theoretical distance to each other, then create the most relevant classes paying special attention to rare sensitive attribute values, and finally generalize attribute values to the minimum extend required so that both the data disclosure probability and the information loss are possibly kept negligible. Furthermore, we propose information theoretical measures for assessing the anonymity degree achieved and empirical tests to demonstrate it.

  7. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data.

    PubMed

    Xie, Qingqing; Wang, Liangmin

    2016-11-25

    With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead.

  8. PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems

    PubMed Central

    Xu, Chang; Lu, Rongxing; Wang, Huaxiong; Zhu, Liehuang; Huang, Cheng

    2017-01-01

    Air pollution has become one of the most pressing environmental issues in recent years. According to a World Health Organization (WHO) report, air pollution has led to the deaths of millions of people worldwide. Accordingly, expensive and complex air-monitoring instruments have been exploited to measure air pollution. Comparatively, a vehicle sensing system (VSS), as it can be effectively used for many purposes and can bring huge financial benefits in reducing high maintenance and repair costs, has received considerable attention. However, the privacy issues of VSS including vehicles’ location privacy have not been well addressed. Therefore, in this paper, we propose a new privacy-preserving data aggregation scheme, called PAVS, for VSS. Specifically, PAVS combines privacy-preserving classification and privacy-preserving statistics on both the mean E(·) and variance Var(·), which makes VSS more promising, as, with minimal privacy leakage, more vehicles are willing to participate in sensing. Detailed analysis shows that the proposed PAVS can achieve the properties of privacy preservation, data accuracy and scalability. In addition, the performance evaluations via extensive simulations also demonstrate its efficiency. PMID:28273795

  9. PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems.

    PubMed

    Xu, Chang; Lu, Rongxing; Wang, Huaxiong; Zhu, Liehuang; Huang, Cheng

    2017-03-03

    Air pollution has become one of the most pressing environmental issues in recent years. According to a World Health Organization (WHO) report, air pollution has led to the deaths of millions of people worldwide. Accordingly, expensive and complex air-monitoring instruments have been exploited to measure air pollution. Comparatively, a vehicle sensing system (VSS), as it can be effectively used for many purposes and can bring huge financial benefits in reducing high maintenance and repair costs, has received considerable attention. However, the privacy issues of VSS including vehicles' location privacy have not been well addressed. Therefore, in this paper, we propose a new privacy-preserving data aggregation scheme, called PAVS, for VSS. Specifically, PAVS combines privacy-preserving classification and privacy-preserving statistics on both the mean E(·) and variance Var(·), which makes VSS more promising, as, with minimal privacy leakage, more vehicles are willing to participate in sensing. Detailed analysis shows that the proposed PAVS can achieve the properties of privacy preservation, data accuracy and scalability. In addition, the performance evaluations via extensive simulations also demonstrate its efficiency.

  10. Efficient and Privacy-Preserving Online Medical Pre-Diagnosis Framework Using Nonlinear SVM.

    PubMed

    Zhu, Hui; Liu, Xiaoxia; Lu, Rongxing; Li, Hui

    2016-03-29

    With the advances of machine learning algorithms and the pervasiveness of network terminals, online medical prediagnosis system, which can provide the diagnosis of healthcare provider anywhere anytime, has attracted considerable interest recently. However, the flourish of online medical pre-diagnosis system still faces many challenges including information security and privacy preservation. In this paper, we propose an efficient and privacy-preserving online medical pre-diagnosis framework, called eDiag, by using nonlinear kernel support vector machine (SVM). With eDiag, the sensitive personal health information can be processed without privacy disclosure during online prediagnosis service. Specifically, based on an improved expression for the nonlinear SVM, an efficient and privacy-preserving classification scheme is introduced with lightweight multi-party random masking and polynomial aggregation techniques. The encrypted user query is directly operated at the service provider without decryption, and the diagnosis result can only be decrypted by user. Through extensive analysis, we show that eDiag can ensure that users' health information and healthcare provider's prediction model are kept confidential, and has significantly less computation and communication overhead than existing schemes. In addition, performance evaluations via implementing eDiag on smartphone and computer demonstrate eDiag's effectiveness in term of real online environment.

  11. Collusion-aware privacy-preserving range query in tiered wireless sensor networks.

    PubMed

    Zhang, Xiaoying; Dong, Lei; Peng, Hui; Chen, Hong; Zhao, Suyun; Li, Cuiping

    2014-12-11

    Wireless sensor networks (WSNs) are indispensable building blocks for the Internet of Things (IoT). With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromisedmaster nodes, but neglects the damage of node collusion. In this paper, we propose a series of collusion-aware privacy-preserving range query protocols in two-tiered WSNs. To the best of our knowledge, this paper is the first to consider collusion attacks for a range query in tiered WSNs while fulfilling the preservation of privacy and integrity. To preserve the privacy of data and queries, we propose a novel encoding scheme to conceal sensitive information. To preserve the integrity of the results, we present a verification scheme using the correlation among data. In addition, two schemes are further presented to improve result accuracy and reduce communication cost. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and privacy of our proposals.

  12. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.

    PubMed

    Sahi, Aqeel; Lai, David; Li, Yan

    2016-11-01

    Cloud computing was introduced as an alternative storage and computing model in the health sector as well as other sectors to handle large amounts of data. Many healthcare companies have moved their electronic data to the cloud in order to reduce in-house storage, IT development and maintenance costs. However, storing the healthcare records in a third-party server may cause serious storage, security and privacy issues. Therefore, many approaches have been proposed to preserve security as well as privacy in cloud computing projects. Cryptographic-based approaches were presented as one of the best ways to ensure the security and privacy of healthcare data in the cloud. Nevertheless, the cryptographic-based approaches which are used to transfer health records safely remain vulnerable regarding security, privacy, or the lack of any disaster recovery strategy. In this paper, we review the related work on security and privacy preserving as well as disaster recovery in the eHealth cloud domain. Then we propose two approaches, the Security-Preserving approach and the Privacy-Preserving approach, and a disaster recovery plan. The Security-Preserving approach is a robust means of ensuring the security and integrity of Electronic Health Records, and the Privacy-Preserving approach is an efficient authentication approach which protects the privacy of Personal Health Records. Finally, we discuss how the integrated approaches and the disaster recovery plan can ensure the reliability and security of cloud projects.

  13. Privacy-Preserving Data Exploration in Genome-Wide Association Studies

    PubMed Central

    Johnson, Aaron; Shmatikov, Vitaly

    2013-01-01

    Genome-wide association studies (GWAS) have become a popular method for analyzing sets of DNA sequences in order to discover the genetic basis of disease. Unfortunately, statistics published as the result of GWAS can be used to identify individuals participating in the study. To prevent privacy breaches, even previously published results have been removed from public databases, impeding researchers’ access to the data and hindering collaborative research. Existing techniques for privacy-preserving GWAS focus on answering specific questions, such as correlations between a given pair of SNPs (DNA sequence variations). This does not fit the typical GWAS process, where the analyst may not know in advance which SNPs to consider and which statistical tests to use, how many SNPs are significant for a given dataset, etc. We present a set of practical, privacy-preserving data mining algorithms for GWAS datasets. Our framework supports exploratory data analysis, where the analyst does not know a priori how many and which SNPs to consider. We develop privacy-preserving algorithms for computing the number and location of SNPs that are significantly associated with the disease, the significance of any statistical test between a given SNP and the disease, any measure of correlation between SNPs, and the block structure of correlations. We evaluate our algorithms on real-world datasets and demonstrate that they produce significantly more accurate results than prior techniques while guaranteeing differential privacy. PMID:26691928

  14. Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks†

    PubMed Central

    Zhang, Xiaoying; Dong, Lei; Peng, Hui; Chen, Hong; Zhao, Suyun; Li, Cuiping

    2014-01-01

    Wireless sensor networks (WSNs) are indispensable building blocks for the Internet of Things (IoT). With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromised master nodes, but neglects the damage of node collusion. In this paper, we propose a series of collusion-aware privacy-preserving range query protocols in two-tiered WSNs. To the best of our knowledge, this paper is the first to consider collusion attacks for a range query in tiered WSNs while fulfilling the preservation of privacy and integrity. To preserve the privacy of data and queries, we propose a novel encoding scheme to conceal sensitive information. To preserve the integrity of the results, we present a verification scheme using the correlation among data. In addition, two schemes are further presented to improve result accuracy and reduce communication cost. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and privacy of our proposals. PMID:25615731

  15. Privacy-Preserving Data Exploration in Genome-Wide Association Studies.

    PubMed

    Johnson, Aaron; Shmatikov, Vitaly

    2013-08-01

    Genome-wide association studies (GWAS) have become a popular method for analyzing sets of DNA sequences in order to discover the genetic basis of disease. Unfortunately, statistics published as the result of GWAS can be used to identify individuals participating in the study. To prevent privacy breaches, even previously published results have been removed from public databases, impeding researchers' access to the data and hindering collaborative research. Existing techniques for privacy-preserving GWAS focus on answering specific questions, such as correlations between a given pair of SNPs (DNA sequence variations). This does not fit the typical GWAS process, where the analyst may not know in advance which SNPs to consider and which statistical tests to use, how many SNPs are significant for a given dataset, etc. We present a set of practical, privacy-preserving data mining algorithms for GWAS datasets. Our framework supports exploratory data analysis, where the analyst does not know a priori how many and which SNPs to consider. We develop privacy-preserving algorithms for computing the number and location of SNPs that are significantly associated with the disease, the significance of any statistical test between a given SNP and the disease, any measure of correlation between SNPs, and the block structure of correlations. We evaluate our algorithms on real-world datasets and demonstrate that they produce significantly more accurate results than prior techniques while guaranteeing differential privacy.

  16. Secure and Privacy-Preserving Distributed Information Brokering

    ERIC Educational Resources Information Center

    Li, Fengjun

    2010-01-01

    As enormous structured, semi-structured and unstructured data are collected and archived by organizations in many realms ranging from business to health networks to government agencies, the needs for efficient yet secure inter-organization information sharing naturally arise. Unlike early information sharing approaches that only involve a small…

  17. Privacy-Preserving and Usable Data Publishing and Analysis

    ERIC Educational Resources Information Center

    Shen, Entong

    2013-01-01

    In the current digital world, data is becoming an increasingly valuable resource and the demand for sharing or releasing data has never been higher. Organizations need to make available versions of the data they collected for business or legal reasons and at the same time they are under strong obligation to protect sensitive information about…

  18. Differential Privacy Preserving in Big Data Analytics for Connected Health.

    PubMed

    Lin, Chi; Song, Zihao; Song, Houbing; Zhou, Yanhong; Wang, Yi; Wu, Guowei

    2016-04-01

    In Body Area Networks (BANs), big data collected by wearable sensors usually contain sensitive information, which is compulsory to be appropriately protected. Previous methods neglected privacy protection issue, leading to privacy exposure. In this paper, a differential privacy protection scheme for big data in body sensor network is developed. Compared with previous methods, this scheme will provide privacy protection with higher availability and reliability. We introduce the concept of dynamic noise thresholds, which makes our scheme more suitable to process big data. Experimental results demonstrate that, even when the attacker has full background knowledge, the proposed scheme can still provide enough interference to big sensitive data so as to preserve the privacy.

  19. Efficient spatial privacy preserving scheme for sensor network

    NASA Astrophysics Data System (ADS)

    Debnath, Ashmita; Singaravelu, Pradheepkumar; Verma, Shekhar

    2013-03-01

    The privacy of sensitive events observed by a wireless sensor networks (WSN) needs to be protected. Adversaries with the knowledge of sensor deployment and network protocols can infer the location of a sensed event by monitoring the communication from the sensors even when the messages are encrypted. Encryption provides confidentiality; however, the context of the event can used to breach the privacy of sensed objects. An adversary can track the trajectory of a moving object or determine the location of the occurrence of a critical event to breach its privacy. In this paper, we propose ring signature to obfuscate the spatial information. Firstly, the extended region of location of an event of interest as estimated from a sensor communication is presented. Then, the increase in this region of spatial uncertainty due to the effect of ring signature is determined. We observe that ring signature can effectively enhance the region of location uncertainty of a sensed event. As the event of interest can be situated anywhere in the enhanced region of uncertainty, its privacy against local or global adversary is ensured. Both analytical and simulation results show that induced delay and throughput are insignificant with negligible impact on the performance of a WSN.

  20. δ-dependency for privacy-preserving XML data publishing.

    PubMed

    Landberg, Anders H; Nguyen, Kinh; Pardede, Eric; Rahayu, J Wenny

    2014-08-01

    An ever increasing amount of medical data such as electronic health records, is being collected, stored, shared and managed in large online health information systems and electronic medical record systems (EMR) (Williams et al., 2001; Virtanen, 2009; Huang and Liou, 2007) [1-3]. From such rich collections, data is often published in the form of census and statistical data sets for the purpose of knowledge sharing and enabling medical research. This brings with it an increasing need for protecting individual people privacy, and it becomes an issue of great importance especially when information about patients is exposed to the public. While the concept of data privacy has been comprehensively studied for relational data, models and algorithms addressing the distinct differences and complex structure of XML data are yet to be explored. Currently, the common compromise method is to convert private XML data into relational data for publication. This ad hoc approach results in significant loss of useful semantic information previously carried in the private XML data. Health data often has very complex structure, which is best expressed in XML. In fact, XML is the standard format for exchanging (e.g. HL7 version 3(1)) and publishing health information. Lack of means to deal directly with data in XML format is inevitably a serious drawback. In this paper we propose a novel privacy protection model for XML, and an algorithm for implementing this model. We provide general rules, both for transforming a private XML schema into a published XML schema, and for mapping private XML data to the new privacy-protected published XML data. In addition, we propose a new privacy property, δ-dependency, which can be applied to both relational and XML data, and that takes into consideration the hierarchical nature of sensitive data (as opposed to "quasi-identifiers"). Lastly, we provide an implementation of our model, algorithm and privacy property, and perform an experimental analysis

  1. Analysis of Existing Privacy-Preserving Protocols in Domain Name System

    NASA Astrophysics Data System (ADS)

    Zhao, Fangming; Hori, Yoshiaki; Sakurai, Kouichi

    In a society preoccupied with gradual erosion of electronic privacy, loss of privacy in the current Domain Name System is an important issue worth considering. In this paper, we first review the DNS and some security & privacy threats to make average users begin to concern about the significance of privacy preservation in DNS protocols. Then, by an careful survey of four noise query generation based existing privacy protection approaches, we analyze some benefits and limitations of these proposals in terms of both related performance evaluation results and theoretic proofs. Finally, we point out some problems that still exist for research community's continuing efforts in the future.

  2. Privacy preservation and information security protection for patients' portable electronic health records.

    PubMed

    Huang, Lu-Chou; Chu, Huei-Chung; Lien, Chung-Yueh; Hsiao, Chia-Hung; Kao, Tsair

    2009-09-01

    As patients face the possibility of copying and keeping their electronic health records (EHRs) through portable storage media, they will encounter new risks to the protection of their private information. In this study, we propose a method to preserve the privacy and security of patients' portable medical records in portable storage media to avoid any inappropriate or unintentional disclosure. Following HIPAA guidelines, the method is designed to protect, recover and verify patient's identifiers in portable EHRs. The results of this study show that our methods are effective in ensuring both information security and privacy preservation for patients through portable storage medium.

  3. An efficient reversible privacy-preserving data mining technology over data streams.

    PubMed

    Lin, Chen-Yi; Kao, Yuan-Hung; Lee, Wei-Bin; Chen, Rong-Chang

    2016-01-01

    With the popularity of smart handheld devices and the emergence of cloud computing, users and companies can save various data, which may contain private data, to the cloud. Topics relating to data security have therefore received much attention. This study focuses on data stream environments and uses the concept of a sliding window to design a reversible privacy-preserving technology to process continuous data in real time, known as a continuous reversible privacy-preserving (CRP) algorithm. Data with CRP algorithm protection can be accurately recovered through a data recovery process. In addition, by using an embedded watermark, the integrity of the data can be verified. The results from the experiments show that, compared to existing algorithms, CRP is better at preserving knowledge and is more effective in terms of reducing information loss and privacy disclosure risk. In addition, it takes far less time for CRP to process continuous data than existing algorithms. As a result, CRP is confirmed as suitable for data stream environments and fulfills the requirements of being lightweight and energy-efficient for smart handheld devices.

  4. A Lightweight Encryption Scheme Combined with Trust Management for Privacy-Preserving in Body Sensor Networks.

    PubMed

    Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N

    2015-12-01

    With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.

  5. A Privacy Preservation Model for Health-Related Social Networking Sites

    PubMed Central

    2015-01-01

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS. PMID:26155953

  6. An innovative privacy preserving technique for incremental datasets on cloud computing.

    PubMed

    Aldeen, Yousra Abdul Alsahib S; Salleh, Mazleena; Aljeroudi, Yazan

    2016-08-01

    Cloud computing (CC) is a magnificent service-based delivery with gigantic computer processing power and data storage across connected communications channels. It imparted overwhelming technological impetus in the internet (web) mediated IT industry, where users can easily share private data for further analysis and mining. Furthermore, user affable CC services enable to deploy sundry applications economically. Meanwhile, simple data sharing impelled various phishing attacks and malware assisted security threats. Some privacy sensitive applications like health services on cloud that are built with several economic and operational benefits necessitate enhanced security. Thus, absolute cyberspace security and mitigation against phishing blitz became mandatory to protect overall data privacy. Typically, diverse applications datasets are anonymized with better privacy to owners without providing all secrecy requirements to the newly added records. Some proposed techniques emphasized this issue by re-anonymizing the datasets from the scratch. The utmost privacy protection over incremental datasets on CC is far from being achieved. Certainly, the distribution of huge datasets volume across multiple storage nodes limits the privacy preservation. In this view, we propose a new anonymization technique to attain better privacy protection with high data utility over distributed and incremental datasets on CC. The proficiency of data privacy preservation and improved confidentiality requirements is demonstrated through performance evaluation.

  7. A Privacy Preservation Model for Health-Related Social Networking Sites.

    PubMed

    Li, Jingquan

    2015-07-08

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS.

  8. Privacy-preserving genomic testing in the clinic: a model using HIV treatment

    PubMed Central

    McLaren, Paul J.; Raisaro, Jean Louis; Aouri, Manel; Rotger, Margalida; Ayday, Erman; Bartha, István; Delgado, Maria B.; Vallet, Yannick; Günthard, Huldrych F.; Cavassini, Matthias; Furrer, Hansjakob; Doco-Lecompte, Thanh; Marzolini, Catia; Schmid, Patrick; Di Benedetto, Caroline; Decosterd, Laurent A.; Fellay, Jacques; Hubaux, Jean-Pierre; Telenti, Amalio

    2016-01-01

    Purpose: The implementation of genomic-based medicine is hindered by unresolved questions regarding data privacy and delivery of interpreted results to health-care practitioners. We used DNA-based prediction of HIV-related outcomes as a model to explore critical issues in clinical genomics. Genet Med 18 8, 814–822. Methods: We genotyped 4,149 markers in HIV-positive individuals. Variants allowed for prediction of 17 traits relevant to HIV medical care, inference of patient ancestry, and imputation of human leukocyte antigen (HLA) types. Genetic data were processed under a privacy-preserving framework using homomorphic encryption, and clinical reports describing potentially actionable results were delivered to health-care providers. Genet Med 18 8, 814–822. Results: A total of 230 patients were included in the study. We demonstrated the feasibility of encrypting a large number of genetic markers, inferring patient ancestry, computing monogenic and polygenic trait risks, and reporting results under privacy-preserving conditions. The average execution time of a multimarker test on encrypted data was 865 ms on a standard computer. The proportion of tests returning potentially actionable genetic results ranged from 0 to 54%. Genet Med 18 8, 814–822. Conclusions: The model of implementation presented herein informs on strategies to deliver genomic test results for clinical care. Data encryption to ensure privacy helps to build patient trust, a key requirement on the road to genomic-based medicine. Genet Med 18 8, 814–822. PMID:26765343

  9. Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks.

    PubMed

    Meganathan, Navamani Thandava; Palanichamy, Yogesh

    2015-01-01

    Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, and anonymity are to be ensured during route discovery. These properties can be achieved by implementing group signature and ID-based encryption schemes during route discovery. Due to the characteristics of WMNs, it is more vulnerable to many network layer attacks. Hence, a strong protection is needed to avoid these attacks and this can be achieved by introducing a new Cross-Layer and Subject Logic based Dynamic Reputation (CLSL-DR) mechanism during route discovery. In this paper, we propose a new Privacy preserved and Secured Reliable Routing (PSRR) protocol for WMNs. This protocol incorporates group signature, ID-based encryption schemes, and CLSL-DR mechanism to ensure strong privacy, security, and reliability in WMNs. Simulation results prove this by showing better performance in terms of most of the chosen parameters than the existing protocols.

  10. Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks

    PubMed Central

    Thandava Meganathan, Navamani; Palanichamy, Yogesh

    2015-01-01

    Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, and anonymity are to be ensured during route discovery. These properties can be achieved by implementing group signature and ID-based encryption schemes during route discovery. Due to the characteristics of WMNs, it is more vulnerable to many network layer attacks. Hence, a strong protection is needed to avoid these attacks and this can be achieved by introducing a new Cross-Layer and Subject Logic based Dynamic Reputation (CLSL-DR) mechanism during route discovery. In this paper, we propose a new Privacy preserved and Secured Reliable Routing (PSRR) protocol for WMNs. This protocol incorporates group signature, ID-based encryption schemes, and CLSL-DR mechanism to ensure strong privacy, security, and reliability in WMNs. Simulation results prove this by showing better performance in terms of most of the chosen parameters than the existing protocols. PMID:26484361

  11. A Framework for Privacy-preserving Classification of Next-generation PHR data.

    PubMed

    Koufi, Vassiliki; Malamateniou, Flora; Prentza, Andriana; Vassilacopoulos, George

    2014-01-01

    Personal Health Records (PHRs), integrated with data from various sources, such as social care data, Electronic Health Record data and genetic information, are envisaged as having a pivotal role in transforming healthcare. These data, lumped under the term 'big data', are usually complex, noisy, heterogeneous, longitudinal and voluminous thus prohibiting their meaningful use by clinicians. Deriving value from these data requires the utilization of innovative data analysis techniques, which, however, may be hindered due to potential security and privacy breaches that may arise from improper release of personal health information. This paper presents a HIPAA-compliant machine learning framework that enables privacy-preserving classification of next-generation PHR data. The predictive models acquired can act as supporting tools to clinical practice by enabling more effective prevention, diagnosis and treatment of new incidents. The proposed framework has a huge potential for complementing medical staff expertise as it outperforms the manual inspection of PHR data while protecting patient privacy.

  12. PREMIX: PRivacy-preserving EstiMation of Individual admiXture

    PubMed Central

    Chen, Feng; Dow, Michelle; Ding, Sijie; Lu, Yao; Jiang, Xiaoqian; Tang, Hua; Wang, Shuang

    2016-01-01

    In this paper we proposed a framework: PRivacy-preserving EstiMation of Individual admiXture (PREMIX) using Intel software guard extensions (SGX). SGX is a suite of software and hardware architectures to enable efficient and secure computation over confidential data. PREMIX enables multiple sites to securely collaborate on estimating individual admixture within a secure enclave inside Intel SGX. We implemented a feature selection module to identify most discriminative Single Nucleotide Polymorphism (SNP) based on informativeness and an Expectation Maximization (EM)-based Maximum Likelihood estimator to identify the individual admixture. Experimental results based on both simulation and 1000 genome data demonstrated the efficiency and accuracy of the proposed framework. PREMIX ensures a high level of security as all operations on sensitive genomic data are conducted within a secure enclave using SGX. PMID:28269933

  13. Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials

    NASA Astrophysics Data System (ADS)

    Park, Jun-Cheol

    User privacy preservation is critical to prevent many sophisticated attacks that are based on the user's server access patterns and ID-related information. We propose a password-based user authentication scheme that provides strong privacy protection using one-time credentials. It eliminates the possibility of tracing a user's authentication history and hides the user's ID and password even from servers. In addition, it is resistant against user impersonation even if both a server's verification database and a user's smart card storage are disclosed. We also provide a revocation scheme for a user to promptly invalidate the user's credentials on a server when the user's smart card is compromised. The schemes use lightweight operations only such as computing hashes and bitwise XORs.

  14. PREMIX: PRivacy-preserving EstiMation of Individual admiXture.

    PubMed

    Chen, Feng; Dow, Michelle; Ding, Sijie; Lu, Yao; Jiang, Xiaoqian; Tang, Hua; Wang, Shuang

    2016-01-01

    In this paper we proposed a framework: PRivacy-preserving EstiMation of Individual admiXture (PREMIX) using Intel software guard extensions (SGX). SGX is a suite of software and hardware architectures to enable efficient and secure computation over confidential data. PREMIX enables multiple sites to securely collaborate on estimating individual admixture within a secure enclave inside Intel SGX. We implemented a feature selection module to identify most discriminative Single Nucleotide Polymorphism (SNP) based on informativeness and an Expectation Maximization (EM)-based Maximum Likelihood estimator to identify the individual admixture. Experimental results based on both simulation and 1000 genome data demonstrated the efficiency and accuracy of the proposed framework. PREMIX ensures a high level of security as all operations on sensitive genomic data are conducted within a secure enclave using SGX.

  15. Privacy-Preserving Location-Based Query Using Location Indexes and Parallel Searching in Distributed Networks

    PubMed Central

    Liu, Lei; Zhao, Jing

    2014-01-01

    An efficient location-based query algorithm of protecting the privacy of the user in the distributed networks is given. This algorithm utilizes the location indexes of the users and multiple parallel threads to search and select quickly all the candidate anonymous sets with more users and their location information with more uniform distribution to accelerate the execution of the temporal-spatial anonymous operations, and it allows the users to configure their custom-made privacy-preserving location query requests. The simulated experiment results show that the proposed algorithm can offer simultaneously the location query services for more users and improve the performance of the anonymous server and satisfy the anonymous location requests of the users. PMID:24790579

  16. EXpectation Propagation LOgistic REgRession (EXPLORER): Distributed Privacy-Preserving Online Model Learning

    PubMed Central

    Wang, Shuang; Jiang, Xiaoqian; Wu, Yuan; Cui, Lijuan; Cheng, Samuel; Ohno-Machado, Lucila

    2013-01-01

    We developed an EXpectation Propagation LOgistic REgRession (EXPLORER) model for distributed privacy-preserving online learning. The proposed framework provides a high level guarantee for protecting sensitive information, since the information exchanged between the server and the client is the encrypted posterior distribution of coefficients. Through experimental results, EXPLORER shows the same performance (e.g., discrimination, calibration, feature selection etc.) as the traditional frequentist Logistic Regression model, but provides more flexibility in model updating. That is, EXPLORER can be updated one point at a time rather than having to retrain the entire data set when new observations are recorded. The proposed EXPLORER supports asynchronized communication, which relieves the participants from coordinating with one another, and prevents service breakdown from the absence of participants or interrupted communications. PMID:23562651

  17. Privacy-preserving location-based query using location indexes and parallel searching in distributed networks.

    PubMed

    Zhong, Cheng; Liu, Lei; Zhao, Jing

    2014-01-01

    An efficient location-based query algorithm of protecting the privacy of the user in the distributed networks is given. This algorithm utilizes the location indexes of the users and multiple parallel threads to search and select quickly all the candidate anonymous sets with more users and their location information with more uniform distribution to accelerate the execution of the temporal-spatial anonymous operations, and it allows the users to configure their custom-made privacy-preserving location query requests. The simulated experiment results show that the proposed algorithm can offer simultaneously the location query services for more users and improve the performance of the anonymous server and satisfy the anonymous location requests of the users.

  18. A privacy-preserving solution for compressed storage and selective retrieval of genomic data.

    PubMed

    Huang, Zhicong; Ayday, Erman; Lin, Huang; Aiyar, Raeka S; Molyneaux, Adam; Xu, Zhenyu; Fellay, Jacques; Steinmetz, Lars M; Hubaux, Jean-Pierre

    2016-12-01

    In clinical genomics, the continuous evolution of bioinformatic algorithms and sequencing platforms makes it beneficial to store patients' complete aligned genomic data in addition to variant calls relative to a reference sequence. Due to the large size of human genome sequence data files (varying from 30 GB to 200 GB depending on coverage), two major challenges facing genomics laboratories are the costs of storage and the efficiency of the initial data processing. In addition, privacy of genomic data is becoming an increasingly serious concern, yet no standard data storage solutions exist that enable compression, encryption, and selective retrieval. Here we present a privacy-preserving solution named SECRAM (Selective retrieval on Encrypted and Compressed Reference-oriented Alignment Map) for the secure storage of compressed aligned genomic data. Our solution enables selective retrieval of encrypted data and improves the efficiency of downstream analysis (e.g., variant calling). Compared with BAM, the de facto standard for storing aligned genomic data, SECRAM uses 18% less storage. Compared with CRAM, one of the most compressed nonencrypted formats (using 34% less storage than BAM), SECRAM maintains efficient compression and downstream data processing, while allowing for unprecedented levels of security in genomic data storage. Compared with previous work, the distinguishing features of SECRAM are that (1) it is position-based instead of read-based, and (2) it allows random querying of a subregion from a BAM-like file in an encrypted form. Our method thus offers a space-saving, privacy-preserving, and effective solution for the storage of clinical genomic data.

  19. Constructing distributed Hippocratic video databases for privacy-preserving online patient training and counseling.

    PubMed

    Peng, Jinye; Babaguchi, Noboru; Luo, Hangzai; Gao, Yuli; Fan, Jianping

    2010-07-01

    Digital video now plays an important role in supporting more profitable online patient training and counseling, and integration of patient training videos from multiple competitive organizations in the health care network will result in better offerings for patients. However, privacy concerns often prevent multiple competitive organizations from sharing and integrating their patient training videos. In addition, patients with infectious or chronic diseases may not want the online patient training organizations to identify who they are or even which video clips they are interested in. Thus, there is an urgent need to develop more effective techniques to protect both video content privacy and access privacy . In this paper, we have developed a new approach to construct a distributed Hippocratic video database system for supporting more profitable online patient training and counseling. First, a new database modeling approach is developed to support concept-oriented video database organization and assign a degree of privacy of the video content for each database level automatically. Second, a new algorithm is developed to protect the video content privacy at the level of individual video clip by filtering out the privacy-sensitive human objects automatically. In order to integrate the patient training videos from multiple competitive organizations for constructing a centralized video database indexing structure, a privacy-preserving video sharing scheme is developed to support privacy-preserving distributed classifier training and prevent the statistical inferences from the videos that are shared for cross-validation of video classifiers. Our experiments on large-scale video databases have also provided very convincing results.

  20. TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs

    PubMed Central

    Hu, Hao; Lu, Rongxing; Huang, Cheng; Zhang, Zonghua

    2016-01-01

    In this paper, we propose a trust-based vehicular platoon crowdsensing scheme, named TripSense, in VANET. The proposed TripSense scheme introduces a trust-based system to evaluate vehicles’ sensing abilities and then selects the more capable vehicles in order to improve sensing results accuracy. In addition, the sensing tasks are accomplished by platoon member vehicles and preprocessed by platoon head vehicles before the data are uploaded to server. Hence, it is less time-consuming and more efficient compared with the way where the data are submitted by individual platoon member vehicles. Hence it is more suitable in ephemeral networks like VANET. Moreover, our proposed TripSense scheme integrates unlinkable pseudo-ID techniques to achieve PM vehicle identity privacy, and employs a privacy-preserving sensing vehicle selection scheme without involving the PM vehicle’s trust score to keep its location privacy. Detailed security analysis shows that our proposed TripSense scheme not only achieves desirable privacy requirements but also resists against attacks launched by adversaries. In addition, extensive simulations are conducted to show the correctness and effectiveness of our proposed scheme. PMID:27258287

  1. Privacy-preserving photo sharing based on a public key infrastructure

    NASA Astrophysics Data System (ADS)

    Yuan, Lin; McNally, David; Küpçü, Alptekin; Ebrahimi, Touradj

    2015-09-01

    A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the best interest of many such services if their users restrict access to their shared pictures, most services keep users' photos unprotected which makes them available to all insiders. This paper presents an architecture for a privacy-preserving photo sharing based on an image scrambling scheme and a public key infrastructure. A secure JPEG scrambling is applied to protect regional visual information in photos. Protected images are still compatible with JPEG coding and therefore can be viewed by any one on any device. However, only those who are granted secret keys will be able to descramble the photos and view their original versions. The proposed architecture applies an attribute-based encryption along with conventional public key cryptography, to achieve secure transmission of secret keys and a fine-grained control over who may view shared photos. In addition, we demonstrate the practical feasibility of the proposed photo sharing architecture with a prototype mobile application, ProShare, which is built based on iOS platform.

  2. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    PubMed

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes.

  3. Privacy preserving data publishing of categorical data through k-anonymity and feature selection.

    PubMed

    Aristodimou, Aristos; Antoniades, Athos; Pattichis, Constantinos S

    2016-03-01

    In healthcare, there is a vast amount of patients' data, which can lead to important discoveries if combined. Due to legal and ethical issues, such data cannot be shared and hence such information is underused. A new area of research has emerged, called privacy preserving data publishing (PPDP), which aims in sharing data in a way that privacy is preserved while the information lost is kept at a minimum. In this Letter, a new anonymisation algorithm for PPDP is proposed, which is based on k-anonymity through pattern-based multidimensional suppression (kPB-MS). The algorithm uses feature selection for reducing the data dimensionality and then combines attribute and record suppression for obtaining k-anonymity. Five datasets from different areas of life sciences [RETINOPATHY, Single Proton Emission Computed Tomography imaging, gene sequencing and drug discovery (two datasets)], were anonymised with kPB-MS. The produced anonymised datasets were evaluated using four different classifiers and in 74% of the test cases, they produced similar or better accuracies than using the full datasets.

  4. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks

    PubMed Central

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant’s profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes. PMID:27337001

  5. TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs.

    PubMed

    Hu, Hao; Lu, Rongxing; Huang, Cheng; Zhang, Zonghua

    2016-06-01

    In this paper, we propose a trust-based vehicular platoon crowdsensing scheme, named TripSense, in VANET. The proposed TripSense scheme introduces a trust-based system to evaluate vehicles' sensing abilities and then selects the more capable vehicles in order to improve sensing results accuracy. In addition, the sensing tasks are accomplished by platoon member vehicles and preprocessed by platoon head vehicles before the data are uploaded to server. Hence, it is less time-consuming and more efficient compared with the way where the data are submitted by individual platoon member vehicles. Hence it is more suitable in ephemeral networks like VANET. Moreover, our proposed TripSense scheme integrates unlinkable pseudo-ID techniques to achieve PM vehicle identity privacy, and employs a privacy-preserving sensing vehicle selection scheme without involving the PM vehicle's trust score to keep its location privacy. Detailed security analysis shows that our proposed TripSense scheme not only achieves desirable privacy requirements but also resists against attacks launched by adversaries. In addition, extensive simulations are conducted to show the correctness and effectiveness of our proposed scheme.

  6. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge.

    PubMed

    Yu, Fei; Ji, Zhanglong

    2014-01-01

    In response to the growing interest in genome-wide association study (GWAS) data privacy, the Integrating Data for Analysis, Anonymization and SHaring (iDASH) center organized the iDASH Healthcare Privacy Protection Challenge, with the aim of investigating the effectiveness of applying privacy-preserving methodologies to human genetic data. This paper is based on a submission to the iDASH Healthcare Privacy Protection Challenge. We apply privacy-preserving methods that are adapted from Uhler et al. 2013 and Yu et al. 2014 to the challenge's data and analyze the data utility after the data are perturbed by the privacy-preserving methods. Major contributions of this paper include new interpretation of the χ2 statistic in a GWAS setting and new results about the Hamming distance score, a key component for one of the privacy-preserving methods.

  7. Hiding in Plain Sight: Anonymity and Privacy Preserving Mechanisms for Data Collection and Collaboration

    ERIC Educational Resources Information Center

    Kumar, Rajeev

    2009-01-01

    This dissertation contributes to the society by providing mechanisms that can potentially increase the availability of valuable personal level information without sacrificing the privacy of citizens. We consider two settings by which personal level data can be made available to its users such as researchers, who then may use it for the benefit of…

  8. Design and implementation of a privacy preserving electronic health record linkage tool in Chicago

    PubMed Central

    Cashy, John P; Jackson, Kathryn L; Pah, Adam R; Goel, Satyender; Boehnke, Jörn; Humphries, John Eric; Kominers, Scott Duke; Hota, Bala N; Sims, Shannon A; Malin, Bradley A; French, Dustin D; Walunas, Theresa L; Meltzer, David O; Kaleba, Erin O; Jones, Roderick C; Galanter, William L

    2015-01-01

    Objective To design and implement a tool that creates a secure, privacy preserving linkage of electronic health record (EHR) data across multiple sites in a large metropolitan area in the United States (Chicago, IL), for use in clinical research. Methods The authors developed and distributed a software application that performs standardized data cleaning, preprocessing, and hashing of patient identifiers to remove all protected health information. The application creates seeded hash code combinations of patient identifiers using a Health Insurance Portability and Accountability Act compliant SHA-512 algorithm that minimizes re-identification risk. The authors subsequently linked individual records using a central honest broker with an algorithm that assigns weights to hash combinations in order to generate high specificity matches. Results The software application successfully linked and de-duplicated 7 million records across 6 institutions, resulting in a cohort of 5 million unique records. Using a manually reconciled set of 11 292 patients as a gold standard, the software achieved a sensitivity of 96% and a specificity of 100%, with a majority of the missed matches accounted for by patients with both a missing social security number and last name change. Using 3 disease examples, it is demonstrated that the software can reduce duplication of patient records across sites by as much as 28%. Conclusions Software that standardizes the assignment of a unique seeded hash identifier merged through an agreed upon third-party honest broker can enable large-scale secure linkage of EHR data for epidemiologic and public health research. The software algorithm can improve future epidemiologic research by providing more comprehensive data given that patients may make use of multiple healthcare systems. PMID:26104741

  9. A security and privacy preserving e-prescription system based on smart cards.

    PubMed

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.

  10. A review on the state-of-the-art privacy-preserving approaches in the e-health clouds.

    PubMed

    Abbas, Assad; Khan, Samee U

    2014-07-01

    Cloud computing is emerging as a new computing paradigm in the healthcare sector besides other business domains. Large numbers of health organizations have started shifting the electronic health information to the cloud environment. Introducing the cloud services in the health sector not only facilitates the exchange of electronic medical records among the hospitals and clinics, but also enables the cloud to act as a medical record storage center. Moreover, shifting to the cloud environment relieves the healthcare organizations of the tedious tasks of infrastructure management and also minimizes development and maintenance costs. Nonetheless, storing the patient health data in the third-party servers also entails serious threats to data privacy. Because of probable disclosure of medical records stored and exchanged in the cloud, the patients' privacy concerns should essentially be considered when designing the security and privacy mechanisms. Various approaches have been used to preserve the privacy of the health information in the cloud environment. This survey aims to encompass the state-of-the-art privacy-preserving approaches employed in the e-Health clouds. Moreover, the privacy-preserving approaches are classified into cryptographic and noncryptographic approaches and taxonomy of the approaches is also presented. Furthermore, the strengths and weaknesses of the presented approaches are reported and some open issues are highlighted.

  11. Privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks.

    PubMed

    Sun, Yi; Wen, Qiaoyan; Zhang, Yudong; Li, Wenmin

    2014-01-01

    With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients' health information and doctors' diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions.

  12. Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks

    PubMed Central

    Wen, Qiaoyan; Zhang, Yudong; Li, Wenmin

    2014-01-01

    With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients' health information and doctors' diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions. PMID:25126107

  13. Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query

    NASA Astrophysics Data System (ADS)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2017-01-01

    The point-inclusion problem is an important secure multi-party computation that it involves two parties, where one has a private point and the other has a private area, and they want to determine whether the point is inside the area without revealing their respective private information. All previously proposed point-inclusion protocols are only suitable for a specific area, such as circle, rectangle and convex polygon. In this paper, we present a novel privacy-preserving point-inclusion quantum protocol for an arbitrary area, which is surrounded by any plane geometric figure. Compared to the classical related protocols, our protocol has the advantages of the higher security and the lower communication complexity.

  14. Collective Contexts in Conversation: Grounding by Proxy

    ERIC Educational Resources Information Center

    Eshghi, Arash; Healey, Patrick G. T.

    2016-01-01

    Anecdotal evidence suggests that participants in conversation can sometimes act as a coalition. This implies a level of conversational organization in which groups of individuals form a coherent unit. This paper investigates the implications of this phenomenon for psycholinguistic and semantic models of shared context in dialog. We present a…

  15. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  16. Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Privacy Preserving Authentication Model by Features Matching

    PubMed Central

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration. PMID:22550398

  17. Using medical history embedded in biometrics medical card for user identity authentication: privacy preserving authentication model by features matching.

    PubMed

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.

  18. A smart-card-enabled privacy preserving E-prescription system.

    PubMed

    Yang, Yanjiang; Han, Xiaoxi; Bao, Feng; Deng, Robert H

    2004-03-01

    Within the overall context of protection of health care information, privacy of prescription data needs special treatment. First, the involvement of diverse parties, especially nonmedical parties in the process of drug prescription complicates the protection of prescription data. Second, both patients and doctors have privacy stakes in prescription, and their privacy should be equally protected. Third, the following facts determine that prescription should not be processed in a truly anonymous manner: certain involved parties conduct useful research on the basis of aggregation of prescription data that are linkable with respect to either the patients or the doctors; prescription data has to be identifiable in some extreme circumstances, e.g., under the court order for inspection and assign liability. In this paper, we propose an e-prescription system to address issues pertaining to the privacy protection in the process of drug prescription. In our system, patients' smart cards play an important role. For one thing, the smart cards are implemented to be portable repositories carrying up-to-date personal medical records and insurance information, providing doctors instant data access crucial to the process of diagnosis and prescription. For the other, with the secret signing key being stored inside, the smart card enables the patient to sign electronically the prescription pad, declaring his acceptance of the prescription. To make the system more realistic, we identify the needs for a patient to delegate his signing capability to other people so as to protect the privacy of information housed on his card. A strong proxy signature scheme achieving technologically mutual agreements on the delegation is proposed to implement the delegation functionality.

  19. Harms and benefits: collecting ethnicity data in a clinical context.

    PubMed

    Varcoe, Colleen; Browne, Annette J; Wong, Sabrina; Smye, Victoria L

    2009-05-01

    Although ethnicity data are collected in most countries at the population level, it has become more common to collect such data in healthcare settings, partially in response to growing health and social inequities worldwide. However, the implications of doing so have not been studied. This two-year study was designed to critically examine the implications of collecting ethnicity data in healthcare settings. Using a critical ethnographic approach, we interviewed 104 patients, community and healthcare leaders, and healthcare workers within diverse clinical contexts in a large city in Western Canada in 2006-2007. This paper presents an interpretive thematic analysis, using an ethical lens, of the harms and benefits associated with the process of data collection in a clinical context. While most leaders and healthcare workers and some patients envisioned potential benefits associated with having ethnicity data, these benefits were seen as largely contingent upon action being taken to ameliorate inequities. Overwhelmingly, however, leaders from ethno-cultural communities and patients of diverse identities anticipated potential harm arising both from having ethnicity data and the process of collection. The analysis illustrates that in today's sociopolitical context, collecting ethnicity data in clinical contexts may engender considerable harm, particularly for racialized, vulnerable patients. If ethnicity data are currently collected at the population level, evidence of benefit is required before proceeding to collect these data at the point of care.

  20. Scalable privacy-preserving data sharing methodology for genome-wide association studies.

    PubMed

    Yu, Fei; Fienberg, Stephen E; Slavković, Aleksandra B; Uhler, Caroline

    2014-08-01

    The protection of privacy of individual-level information in genome-wide association study (GWAS) databases has been a major concern of researchers following the publication of "an attack" on GWAS data by Homer et al. (2008). Traditional statistical methods for confidentiality and privacy protection of statistical databases do not scale well to deal with GWAS data, especially in terms of guarantees regarding protection from linkage to external information. The more recent concept of differential privacy, introduced by the cryptographic community, is an approach that provides a rigorous definition of privacy with meaningful privacy guarantees in the presence of arbitrary external information, although the guarantees may come at a serious price in terms of data utility. Building on such notions, Uhler et al. (2013) proposed new methods to release aggregate GWAS data without compromising an individual's privacy. We extend the methods developed in Uhler et al. (2013) for releasing differentially-private χ(2)-statistics by allowing for arbitrary number of cases and controls, and for releasing differentially-private allelic test statistics. We also provide a new interpretation by assuming the controls' data are known, which is a realistic assumption because some GWAS use publicly available data as controls. We assess the performance of the proposed methods through a risk-utility analysis on a real data set consisting of DNA samples collected by the Wellcome Trust Case Control Consortium and compare the methods with the differentially-private release mechanism proposed by Johnson and Shmatikov (2013).

  1. Efficient privacy-preserving string search and an application in genomics

    PubMed Central

    Shimizu, Kana; Nuida, Koji; Rätsch, Gunnar

    2016-01-01

    Motivation: Personal genomes carry inherent privacy risks and protecting privacy poses major social and technological challenges. We consider the case where a user searches for genetic information (e.g. an allele) on a server that stores a large genomic database and aims to receive allele-associated information. The user would like to keep the query and result private and the server the database. Approach: We propose a novel approach that combines efficient string data structures such as the Burrows–Wheeler transform with cryptographic techniques based on additive homomorphic encryption. We assume that the sequence data is searchable in efficient iterative query operations over a large indexed dictionary, for instance, from large genome collections and employing the (positional) Burrows–Wheeler transform. We use a technique called oblivious transfer that is based on additive homomorphic encryption to conceal the sequence query and the genomic region of interest in positional queries. Results: We designed and implemented an efficient algorithm for searching sequences of SNPs in large genome databases. During search, the user can only identify the longest match while the server does not learn which sequence of SNPs the user queried. In an experiment based on 2184 aligned haploid genomes from the 1000 Genomes Project, our algorithm was able to perform typical queries within ≈ 4.6 s and ≈ 10.8 s for client and server side, respectively, on laptop computers. The presented algorithm is at least one order of magnitude faster than an exhaustive baseline algorithm. Availability and implementation: https://github.com/iskana/PBWT-sec and https://github.com/ratschlab/PBWT-sec. Contacts: shimizu-kana@aist.go.jp or Gunnar.Ratsch@ratschlab.org Supplementary information: Supplementary data are available at Bioinformatics online. PMID:27153731

  2. Privacy preserving, real-time and location secured biometrics for mCommerce authentication

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Al-Assam, Hisham; Jassim, Sabah; Lami, Ihsan A.

    2011-06-01

    Secure wireless connectivity between mobile devices and financial/commercial establishments is mature, and so is the security of remote authentication for mCommerce. However, the current techniques are open for hacking, false misrepresentation, replay and other attacks. This is because of the lack of real-time and current-precise-location in the authentication process. This paper proposes a new technique that includes freshly-generated real-time personal biometric data of the client and present-position of the mobile device used by the client to perform the mCommerce so to form a real-time biometric representation to authenticate any remote transaction. A fresh GPS fix generates the "time and location" to stamp the biometric data freshly captured to produce a single, real-time biometric representation on the mobile device. A trusted Certification Authority (CA) acts as an independent authenticator of such client's claimed realtime location and his/her provided fresh biometric data. Thus eliminates the necessity of user enrolment with many mCommerce services and application providers. This CA can also "independently from the client" and "at that instant of time" collect the client's mobile device "time and location" from the cellular network operator so to compare with the received information, together with the client's stored biometric information. Finally, to preserve the client's location privacy and to eliminate the possibility of cross-application client tracking, this paper proposes shielding the real location of the mobile device used prior to submission to the CA or authenticators.

  3. Privacy in Georeferenced Context-Aware Services: A Survey

    NASA Astrophysics Data System (ADS)

    Riboni, Daniele; Pareschi, Linda; Bettini, Claudio

    Location based services (LBS) are a specific instance of a broader class of Internet services that are predicted to become popular in a near future: context-aware services. The privacy concerns that LBS have raised are likely to become even more serious when several context data, other than location and time, are sent to service providers as part of an Internet request. This paper provides a classification and a brief survey of the privacy preservation techniques that have been proposed for this type of services. After identifying the benefits and shortcomings of each class of techniques, the paper proposes a combined approach to achieve a more comprehensive solution for privacy preservation in georeferenced context-aware services.

  4. Privacy-preserving telecardiology sensor networks: toward a low-cost portable wireless hardware/software codesign.

    PubMed

    Hu, Fei; Jiang, Meng; Wagner, Mark; Dong, De-Cun

    2007-11-01

    Recently, a remote-sensing platform based on wireless interconnection of tiny ECG sensors called Telecardiology Sensor Networks (TSN) provided a promising approach to perform low-cost real-time cardiac patient monitoring at any time in community areas (such as elder nursing homes or hospitals). The contribution of this research is the design of a practical TSN hardware/software platform for a typical U.S. healthcare community scenario (such as large nursing homes with many elder patients) to perform real-time healthcare data collections. On the other hand, due to the radio broadcasting nature of MANET, a TSN has the risk of losing the privacy of patients' data. Medical privacy has been highly emphasized by U.S. Department of Health and Human Services. This research also designs a medical security scheme with low communication overhead to achieve confidential electrocardiogram data transmission in wireless medium.

  5. Collective Decision Making in the Social Context of Science.

    ERIC Educational Resources Information Center

    Aikenhead, Glen S.

    1985-01-01

    Addresses the meaning of decision making on societal issues related to science/technology and explores practical implications for secondary science teaching. Cases on marijuana, abortion, and public inquiries are included together with discussion of collective decision making at the global, strategic, personal, and scientific community levels. A…

  6. Exemplary Mentors' Perspectives towards Mentoring across Mentoring Contexts: Lessons from Collective Case Studies

    ERIC Educational Resources Information Center

    Orland-Barak, Lily; Hasin, Ronit

    2010-01-01

    Framed as collective case studies, this study examined the perspectives that mentors, who are considered exemplary in the field, exhibit towards mentoring in different mentoring contexts in the Israeli school system from a variety of view points: The mentors themselves, their mentees, supervisors, school principals, and project leaders. Mentoring…

  7. Collective secondary cremation in a pit grave: a unique funerary context in Portuguese Chalcolithic burial practices.

    PubMed

    Silva, A M; Leandro, I; Pereira, D; Costa, C; Valera, A C

    2015-02-01

    Perdigões is a large site with a set of ditched enclosures located at Reguengos de Monsaraz, Alentejo, South Portugal. Recently at the central area of this site burnt human remains were found in a pit (#16). This structure had inside human remains, animal bones (namely pig, sheep or goat, cattle, dog, deer and rabbit), shards, ivory idols and arrowheads. All have been subjected to fire and later deposited in that pit, resulting in a secondary disposal of human bones. The recovered fragmented human bones (4845.18 g) correspond to a minimal number of 9 individuals: 6 adults and 3 sub-adults. The aim of this work is to document and interpret this funerary context based on the study of the recovered human remains. For that purpose, observations of all alterations due to fire, such as colour change and type of bone distortion, as well as anthropological data were collected. The data obtained suggest that these human remains were probably intentionally cremated, carefully collected and finally deposited in this pit. The cremation was conducted on probably complete corpses, some of them still fairly fresh and fleshed, as some bones presented thumbnail fractures. The collective cremation of the pit 16 represents an unprecedented funerary context for Portuguese, and Iberian Peninsula, Chalcolithic burial practices. Moreover, it is an example of the increasing diversity of mortuary practices of Chalcolithic human populations described in present Portuguese territory, as well as, in the Iberian Peninsula.

  8. Privacy-Preserving Distributed Information Sharing

    DTIC Science & Technology

    2006-07-01

    Pittsburgh, PA 15213 Thesis Committee: Dawn Song, Chair Manuel Blum Dan Boneh , Stanford University Benny Pinkas, Haifa University Michael Reiter Submitted in...her over the last four years, and this thesis could not have been written without her guidance. My thesis committee, Manuel Blum, Dan Boneh , Benny...identification work in this thesis. I would also like to extend my thanks to Dan Boneh , Benny Pinkas, David Molnar, and Alexandre Evfimievski for their

  9. Privacy-Preserving Security for Vehicular Communications

    ERIC Educational Resources Information Center

    Weerasinghe, Hesiri Dhammika

    2011-01-01

    Because of the large number of deaths, severe injuries and huge financial loss due to auto accidents and poor traffic management, road safety and traffic management have become very important areas of interest among research community. As a result, Vehicular Ad-hoc Network (VANET) becomes a promising technology to improve road safety and quality…

  10. Randomization Based Privacy Preserving Categorical Data Analysis

    ERIC Educational Resources Information Center

    Guo, Ling

    2010-01-01

    The success of data mining relies on the availability of high quality data. To ensure quality data mining, effective information sharing between organizations becomes a vital requirement in today's society. Since data mining often involves sensitive information of individuals, the public has expressed a deep concern about their privacy.…

  11. Cryptographic Techniques for Privacy Preserving Identity

    DTIC Science & Technology

    2011-05-13

    information is often sufficient to match an individual to their pseudonym, for example, as in the case of the Netflix Prize movie rental dataset [71]. It was...up relying on similarities in subject matter, such as specific words related to the topic of the blog. We take the following strategies in avoiding...problems with more than two labels. Due to the very large number of labels in our case, we employ the one-versus-all strategy for reducing the problem to

  12. Privacy Preserving PCA on Distributed Bioinformatics Datasets

    ERIC Educational Resources Information Center

    Li, Xin

    2011-01-01

    In recent years, new bioinformatics technologies, such as gene expression microarray, genome-wide association study, proteomics, and metabolomics, have been widely used to simultaneously identify a huge number of human genomic/genetic biomarkers, generate a tremendously large amount of data, and dramatically increase the knowledge on human…

  13. Privacy-Preserving Location-Based Services

    ERIC Educational Resources Information Center

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  14. Towards Practical Privacy-Preserving Internet Services

    ERIC Educational Resources Information Center

    Wang, Shiyuan

    2012-01-01

    Today's Internet offers people a vast selection of data centric services, such as online query services, the cloud, and location-based services, etc. These internet services bring people a lot of convenience, but at the same time raise privacy concerns, e.g., sensitive information revealed by the queries, sensitive data being stored and…

  15. Perinatal data collection: current practice in the Australian nursing and midwifery healthcare context.

    PubMed

    Craswell, Alison; Moxham, Lorna; Broadbent, Marc

    2013-01-01

    The collection of perinatal data within Queensland, Australia, has traditionally been achieved via a paper form completed by midwives after each birth. Recently, with an increase in the use of e-health systems in healthcare, perinatal data collection has migrated to an online system. It is suggested that this move from paper to an ehealth platform has resulted in improvement to error rates, completion levels, timeliness of data transfer from healthcare institutions to the perinatal data collection and subsequent publication of data items. Worldwide, perinatal data are collected utilising a variety of methods, but essentially data are used for similar purposes: to monitor outcome patterns within obstetrics and midwifery. This paper discusses current practice in relation to perinatal data collection worldwide and within Australia, with a specific focus on Queensland, highlights relevant issues for midwives, and points to the need for further research into the efficient use of an e-health platform for perinatal data collection.

  16. Collective Capacity Building of Academic Leaders: A University Model of Leadership and Learning in Context

    ERIC Educational Resources Information Center

    Debowski, Shelda; Blake, Vivienne

    2007-01-01

    Academic leaders face particular challenges when they assume formal leadership roles in higher education. For the most part, they have had little prior engagement with the political, economic and strategic context of their institution and limited leadership networks on which to draw. The University of Western Australia has trialled a number of…

  17. Performance of the Landsat-Data Collection System in a Total System Context

    NASA Technical Reports Server (NTRS)

    Paulson, R. W. (Principal Investigator); Merk, C. F.

    1975-01-01

    The author has identified the following significant results. This experiment was, and continues to be, an integration of the LANDSAT-DCS with the data collection and processing system of the Geological Survey. Although an experimental demonstration, it was a successful integration of a satellite relay system that is capable of continental data collection, and an existing governmental nationwide operational data processing and distributing networks. The Survey's data processing system uses a large general purpose computer with insufficient redundancy for 24-hour a day, 7 day a week operation. This is significant, but soluble obstacle to converting the experimental integration of the system to an operational integration.

  18. Teachers' Collective Efficacy, Job Satisfaction, and Job Stress in Cross-Cultural Context

    ERIC Educational Resources Information Center

    Klassen, Robert M.; Usher, Ellen L.; Bong, Mimi

    2010-01-01

    This study examines how teachers' collective efficacy (TCE), job stress, and the cultural dimension of collectivism are associated with job satisfaction for 500 teachers from Canada, Korea (South Korea or Republic of Korea), and the United States. Multigroup path analysis revealed that TCE predicted job satisfaction across settings. Job stress was…

  19. Preparing Teachers for Diverse Contexts: A Collective Case Study of Critical Reflection

    ERIC Educational Resources Information Center

    Ramirez, Laurie A.

    2009-01-01

    This collective case study focused on 4 novice teachers' reflections on diversity in their classrooms and schools. The 4 participants were followed throughout their final year of an undergraduate, secondary teacher education program and into their 1st year of teaching in public secondary schools. This research was an effort to engage…

  20. Literacies and the Workplace: A Collection of Original Essays. EAE646 Language and Literacies: Contexts and Challenges in the Workplace.

    ERIC Educational Resources Information Center

    Deakin Univ., Victoria (Australia).

    This book is part of the study materials for the distance education course, Language and Literacies: Contexts and Challenges in the Workplace, in the Open Campus Program at Deakin University. It contains five essays about literacies in the workplace. The "Introduction" (Mike Brown) discusses the following topics: literacies in the…

  1. How risk perception shapes collective action intentions in repressive contexts: A study of Egyptian activists during the 2013 post-coup uprising.

    PubMed

    Ayanian, Arin H; Tausch, Nicole

    2016-12-01

    Social psychological research has overlooked collective action in repressive contexts, where activists face substantial personal risks. This paper examines the social psychological processes motivating activists to engage in collective action in risky contexts. We investigate the idea that perceived risks due to government sanctions can galvanize action through fuelling anger, shaping efficacy beliefs, and increasing identification with the movement. We also argue that anger, efficacy, and identification motivate action intentions directly and indirectly through reducing the personal importance activists attach to these risks. We tested our hypotheses within a sample of Egyptian activists (N = 146) from two protest movements who protested against Morsi's government and the military interventions, respectively, during the 2013 anticoup uprising. In line with our hypotheses, the perceived likelihood of risks was positively associated with anger and identity consolidation efficacy and positively predicted action intentions indirectly through these variables. Risk was also associated with increased political efficacy, but only among antimilitary protesters. Anger and political efficacy predicted action intentions directly and indirectly through reduced risk importance. Results also highlighted differential significance of emotional and instrumental motives for the two protest movements. We discuss directions for future research on the motivators of collective action in repressive contexts.

  2. Security and Privacy Preservation in Human-Involved Networks

    NASA Astrophysics Data System (ADS)

    Asher, Craig; Aumasson, Jean-Philippe; Phan, Raphael C.-W.

    This paper discusses security within human-involved networks, with a focus on social networking services (SNS). We argue that more secure networks could be designed using semi-formal security models inspired from cryptography, as well as notions like that of ceremony, which exploits human-specific abilities and psychology to assist creating more secure protocols. We illustrate some of our ideas with the example of the SNS Facebook.

  3. Privacy preserving processing of genomic data: A survey.

    PubMed

    Akgün, Mete; Bayrak, A Osman; Ozer, Bugra; Sağıroğlu, M Şamil

    2015-08-01

    Recently, the rapid advance in genome sequencing technology has led to production of huge amount of sensitive genomic data. However, a serious privacy challenge is confronted with increasing number of genetic tests as genomic data is the ultimate source of identity for humans. Lately, privacy threats and possible solutions regarding the undesired access to genomic data are discussed, however it is challenging to apply proposed solutions to real life problems due to the complex nature of security definitions. In this review, we have categorized pre-existing problems and corresponding solutions in more understandable and convenient way. Additionally, we have also included open privacy problems coming with each genomic data processing procedure. We believe our classification of genome associated privacy problems will pave the way for linking of real-life problems with previously proposed methods.

  4. Facilitating Trust in Privacy-Preserving E-Learning Environments

    ERIC Educational Resources Information Center

    Anwar, M.; Greer, J.

    2012-01-01

    This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants,…

  5. Privacy-Preserving Relationship Path Discovery in Social Networks

    NASA Astrophysics Data System (ADS)

    Mezzour, Ghita; Perrig, Adrian; Gligor, Virgil; Papadimitratos, Panos

    As social networks sites continue to proliferate and are being used for an increasing variety of purposes, the privacy risks raised by the full access of social networking sites over user data become uncomfortable. A decentralized social network would help alleviate this problem, but offering the functionalities of social networking sites is a distributed manner is a challenging problem. In this paper, we provide techniques to instantiate one of the core functionalities of social networks: discovery of paths between individuals. Our algorithm preserves the privacy of relationship information, and can operate offline during the path discovery phase. We simulate our algorithm on real social network topologies.

  6. Privacy-Preserving Content-Based Publish/Subscribe Networks

    NASA Astrophysics Data System (ADS)

    Shikfa, Abdullatif; Önen, Melek; Molva, Refik

    Privacy and confidentiality are crucial issues in content-based publish/subscribe (CBPS) networks. We tackle the problem of end-user privacy in CBPS. This problem raises a challenging requirement for handling encrypted data for the purpose of routing based on protected content and encrypted subscription information. We suggest a solution based on a commutative multiple encryption scheme in order to allow brokers to operate in-network matching and content based routing without having access to the content of the packets. This is the first solution that avoids key sharing among end-users and targets an enhanced CBPS model where brokers can also be subscribers at the same time.

  7. Performance-Oriented Privacy-Preserving Data Integration

    SciTech Connect

    Pon, R K; Critchlow, T

    2004-09-15

    Current solutions to integrating private data with public data have provided useful privacy metrics, such as relative information gain, that can be used to evaluate alternative approaches. Unfortunately, they have not addressed critical performance issues, especially when the public database is very large. The use of hashes and noise yields better performance than existing techniques while still making it difficult for unauthorized entities to distinguish which data items truly exist in the private database. As we show here, leveraging the uncertainty introduced by collisions caused by hashing and the injection of noise, we present a technique for performing a relational join operation between a massive public table and a relatively smaller private one.

  8. A Randomized Response Model For Privacy Preserving Smart Metering.

    PubMed

    Wang, Shuang; Cui, Lijuan; Que, Jialan; Choi, Dae-Hyun; Jiang, Xiaoqian; Cheng, Samuel; Xie, Le

    2012-09-01

    The adoption of smart meters may bring new privacy concerns to the general public. Given the fact that metering data of individual homes/factories is accumulated every 15 minutes, it is possible to infer the pattern of electricity consumption of individual users. In order to protect the privacy of users in a completely de-centralized setting (i.e., individuals do not communicate with one another), we propose a novel protocol, which allows individual meters to report the true electricity consumption reading with a pre-determinted probability. Load serving entities (LSE) can reconstruct the total electricity consumption of a region or a district through inference algorithm, but their ability of identifying individual users' energy consumption pattern is significantly reduced. Using simulated data, we verify the feasibility of the proposed method and demonstrate performance advantages over existing approaches.

  9. A Randomized Response Model For Privacy Preserving Smart Metering

    PubMed Central

    Cui, Lijuan; Que, Jialan; Choi, Dae-Hyun; Jiang, Xiaoqian; Cheng, Samuel; Xie, Le

    2012-01-01

    The adoption of smart meters may bring new privacy concerns to the general public. Given the fact that metering data of individual homes/factories is accumulated every 15 minutes, it is possible to infer the pattern of electricity consumption of individual users. In order to protect the privacy of users in a completely de-centralized setting (i.e., individuals do not communicate with one another), we propose a novel protocol, which allows individual meters to report the true electricity consumption reading with a pre-determinted probability. Load serving entities (LSE) can reconstruct the total electricity consumption of a region or a district through inference algorithm, but their ability of identifying individual users’ energy consumption pattern is significantly reduced. Using simulated data, we verify the feasibility of the proposed method and demonstrate performance advantages over existing approaches. PMID:23243488

  10. Data privacy preservation in telemedicine: the PAIRSE project.

    PubMed

    Nageba, Ebrahim; Defude, Bruno; Morvan, Franck; Ghedira, Chirine; Fayn, Jocelyne

    2011-01-01

    The preservation of medical data privacy and confidentiality is a major challenge in eHealth systems and applications. A technological solution based on advanced information and communication systems architectures is needed in order to retrieve and exchange the patient's data in a secure and reliable manner. In this paper, we introduce the project PAIRSE, Preserving Privacy in Peer to Peer (P2P) environments, which proposes an original web service oriented framework preserving the privacy and confidentiality of shared or exchanged medical data.

  11. The context of collecting family health history: examining definitions of family and family communication about health among African American women.

    PubMed

    Thompson, Tess; Seo, Joann; Griffith, Julia; Baxter, Melanie; James, Aimee; Kaphingst, Kimberly A

    2015-04-01

    Public health initiatives encourage the public to discuss and record family health history information, which can inform prevention and screening for a variety of conditions. Most research on family health history discussion and collection, however, has predominantly involved White participants and has not considered lay definitions of family or family communication patterns about health. This qualitative study of 32 African American women-16 with a history of cancer-analyzed participants' definitions of family, family communication about health, and collection of family health history information. Family was defined by biological relatedness, social ties, interactions, and proximity. Several participants noted using different definitions of family for different purposes (e.g., biomedical vs. social). Health discussions took place between and within generations and were influenced by structural relationships (e.g., sister) and characteristics of family members (e.g., trustworthiness). Participants described managing tensions between sharing health information and protecting privacy, especially related to generational differences in sharing information, fear of familial conflict or gossip, and denial (sometimes described as refusal to "own" or "claim" a disease). Few participants reported that anyone in their family kept formal family health history records. Results suggest family health history initiatives should address family tensions and communication patterns that affect discussion and collection of family health history information.

  12. The Context of Collecting Family Health History: Examining Definitions of Family and Family Communication About Health Among African American Women

    PubMed Central

    THOMPSON, TESS; SEO, JOANN; GRIFFITH, JULIA; BAXTER, MELANIE; JAMES, AIMEE; KAPHINGST, KIMBERLY A.

    2015-01-01

    Public health initiatives encourage the public to discuss and record family health history (FHH) information, which can inform prevention and screening for a variety of conditions. Most research on FHH discussion and collection, however, has involved predominantly White participants and has not considered lay definitions of family or family communication patterns about health. This qualitative study of 32 African American women, 16 with a history of cancer, analyzed participants’ definitions of family, family communication about health, and collection of FHH information. “Family” was defined by biological relatedness, social ties, interactions, and proximity. Several participants noted using different definitions of family for different purposes (e.g. biomedical vs. social). Health discussions took place between and within generations and were influenced by structural relationships (e.g. sister) and characteristics of family members (e.g. trustworthiness). Participants described managing tensions between sharing health information and protecting privacy, especially related to generational differences in sharing information, fear of familial conflict or gossip, and denial (sometimes described as refusal to “own” or “claim” a disease). Few participants reported that anyone in their family kept formal FHH records. Results suggest FHH initiatives should address family tensions and communication patterns that affect discussion and collection of FHH information. PMID:25730634

  13. Caliper Context Annotation Library

    SciTech Connect

    2015-09-30

    To understand the performance of parallel programs, developers need to be able to relate performance measurement data with context information, such as the call path / line numbers or iteration numbers where measurements were taken. Caliper provides a generic way to specify and collect multi-dimensional context information across the software stack, and provide ti to third-party measurement tools or write it into a file or database in the form of context streams.

  14. The history of botany in Moscow and Russia in the 18th and early 19th centuries in the context of the Linnaean Collection at Moscow University (MW).

    PubMed

    Sokoloff, Dmitry D; Balandin, Sergey A; Gubanov, Ivan A; Jarvis, Charles E; Majorov, Sergey R; Simonov, Sergey S

    2002-01-01

    The Herbarium of Moscow State University, Russia, possesses a relatively small (63 specimens), but historically interesting, collection of herbarium specimens linked with Carl Linnaeus (1707-1778). Some of these originally formed part of Linnaeus' own herbarium while others, although never his property, were nevertheless studied by him and may be original material for the typification of his plant names. This paper discusses the broad historical background to the gathering of these specimens, their study by Linnaeus and their subsequent fate. Specimens linked with Linnaeus have been encountered in each of the four largest historical collections of the Herbarium of Moscow State University, i. e., in the herbaria of J. F. Ehrhart, G. F. Hoffmann, C. B. von Trinius and C. L. Goldbach. Ehrhart's General Herbarium contains 31 sheets, which were more or less certainly collected or studied by Linnaeus. Ehrhart, a pupil of Linnaeus, received some specimens directly from the latter, while others came to him from Linnaeus filius, A. Dahl, and P. J. Bergius. Ehrhart's collections were purchased by G. F. Hoffmann, later, the first head of the Department of Botany at Moscow University, who took them to Russia. Hoffmann's General Herbarium contains three specimens that may be connected with Linnaeus. They were received from C. P. Thunberg, J. A. Murray, and an unknown person, respectively. At least five specimens from Trinius' collection, although certainly never seen by Linnaeus, are probable duplicates of material that was studied by him. Some of them are almost certainly iso-lectotypes of Linnaean names. Finally, 24 specimens linked with Linnaeus were found in Goldbach's herbarium. The majority of them were collected in the Lower Volga Region by J. Lerche and during the Second Kamchatka Expedition (Great Northern Expedition) by J. G. Gmelin and G. W. Steller.

  15. Individual Participation in Collective Action in the Context of a Caribbean Island State: Testing the Effects of Multiple Dimensions of Social Capital

    ERIC Educational Resources Information Center

    Jicha, Karl A.; Thompson, Gretchen H.; Fulkerson, Gregory M.; May, Jonathan E.

    2011-01-01

    This article presents the findings of a case study examining the relationship between social capital and individual participation in collective action on a Caribbean island recovering from devastation inflicted by Hurricanes Ivan and Emily. Using data drawn from 114 residential surveys on the island of Carriacou, Grenada, over the summer of 2006,…

  16. Open Content in Open Context

    ERIC Educational Resources Information Center

    Kansa, Sarah Whitcher; Kansa, Eric C.

    2007-01-01

    This article presents the challenges and rewards of sharing research content through a discussion of Open Context, a new open access data publication system for field sciences and museum collections. Open Context is the first data repository of its kind, allowing self-publication of research data, community commentary through tagging, and clear…

  17. Generative Contexts

    NASA Astrophysics Data System (ADS)

    Lyles, Dan Allen

    Educational research has identified how science, technology, engineering, and mathematics (STEM) practice and education have underperforming metrics in racial and gender diversity, despite decades of intervention. These disparities are part of the construction of a culture of science that is alienating to these populations. Recent studies in a social science framework described as "Generative Justice" have suggested that the context of social and scientific practice might be modified to bring about more just and equitable relations among the disenfranchised by circulating the value they and their non-human allies create back to them in unalienated forms. What is not known are the underlying principles of social and material space that makes a system more or less generative. I employ an autoethnographic method at four sites: a high school science class; a farm committed to "Black and Brown liberation"; a summer program geared towards youth environmental mapping; and a summer workshop for Harlem middle school students. My findings suggest that by identifying instances where material affinity, participatory voice, and creative solidarity are mutually reinforcing, it is possible to create educational contexts that generate unalienated value, and circulate it back to the producers themselves. This cycle of generation may help explain how to create systems of justice that strengthen and grow themselves through successive iterations. The problem of lack of diversity in STEM may be addressed not merely by recruiting the best and the brightest from underrepresented populations, but by changing the context of STEM education to provide tools for its own systematic restructuring.

  18. Terminal context in context-sensitive grammars.

    NASA Technical Reports Server (NTRS)

    Book, R. V.

    1972-01-01

    Investigation of the conditions whereunder context-sensitive grammars generate context-free languages. The obtained results indicate that, if every noncontext-free rewriting rule of a context-sensitive grammar has as left context a string of terminal symbols and the left context is at least as long as the right context, then the language generated is context-free. Likewise, if every noncontext-free rewriting rule of a context-sensitive grammar has strings of terminal symbols as left and right contexts, then the language generated is also context-free.

  19. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system

    NASA Astrophysics Data System (ADS)

    Karabat, Cagatay; Kiraz, Mehmet Sabir; Erdogan, Hakan; Savas, Erkay

    2015-12-01

    In this paper, we introduce a new biometric verification and template protection system which we call THRIVE. The system includes novel enrollment and authentication protocols based on threshold homomorphic encryption where a private key is shared between a user and a verifier. In the THRIVE system, only encrypted binary biometric templates are stored in a database and verification is performed via homomorphically randomized templates, thus, original templates are never revealed during authentication. Due to the underlying threshold homomorphic encryption scheme, a malicious database owner cannot perform full decryption on encrypted templates of the users in the database. In addition, security of the THRIVE system is enhanced using a two-factor authentication scheme involving user's private key and biometric data. Using simulation-based techniques, the proposed system is proven secure in the malicious model. The proposed system is suitable for applications where the user does not want to reveal her biometrics to the verifier in plain form, but needs to prove her identity by using biometrics. The system can be used with any biometric modality where a feature extraction method yields a fixed size binary template and a query template is verified when its Hamming distance to the database template is less than a threshold. The overall connection time for the proposed THRIVE system is estimated to be 336 ms on average for 256-bit biometric templates on a desktop PC running with quad core 3.2 GHz CPUs at 10 Mbit/s up/down link connection speed. Consequently, the proposed system can be efficiently used in real-life applications.

  20. Privacy-preserving screen capture: towards closing the loop for health IT usability.

    PubMed

    Cooley, Joseph; Smith, Sean

    2013-08-01

    As information technology permeates healthcare (particularly provider-facing systems), maximizing system effectiveness requires the ability to document and analyze tricky or troublesome usage scenarios. However, real-world health IT systems are typically replete with privacy-sensitive data regarding patients, diagnoses, clinicians, and EMR user interface details; instrumentation for screen capture (capturing and recording the scenario depicted on the screen) needs to respect these privacy constraints. Furthermore, real-world health IT systems are typically composed of modules from many sources, mission-critical and often closed-source; any instrumentation for screen capture can rely neither on access to structured output nor access to software internals. In this paper, we present a tool to help solve this problem: a system that combines keyboard video mouse (KVM) capture with automatic text redaction (and interactively selectable unredaction) to produce precise technical content that can enrich stakeholder communications and improve end-user influence on system evolution. KVM-based capture makes our system both application-independent and OS-independent because it eliminates software-interface dependencies on capture targets. Using a corpus of EMR screenshots, we present empirical measurements of redaction effectiveness and processing latency to demonstrate system performances. We discuss how these techniques can translate into instrumentation systems that improve real-world health IT deployments.

  1. De-identification of unstructured paper-based health records for privacy-preserving secondary use.

    PubMed

    Fenz, Stefan; Heurix, Johannes; Neubauer, Thomas; Rella, Antonio

    2014-07-01

    Abstract Whenever personal data is processed, privacy is a serious issue. Especially in the document-centric e-health area, the patients' privacy must be preserved in order to prevent any negative repercussions for the patient. Clinical research, for example, demands structured health records to carry out efficient clinical trials, whereas legislation (e.g. HIPAA) regulates that only de-identified health records may be used for research. However, unstructured and often paper-based data dominates information technology, especially in the healthcare sector. Existing approaches are geared towards data in English-language documents only and have not been designed to handle the recognition of erroneous personal data which is the result of the OCR-based digitization of paper-based health records.

  2. A Privacy-Preserved Analytical Method for eHealth Database with Minimized Information Loss

    PubMed Central

    Chen, Ya-Ling; Cheng, Bo-Chao; Chen, Hsueh-Lin; Lin, Chia-I; Liao, Guo-Tan; Hou, Bo-Yu; Hsu, Shih-Chun

    2012-01-01

    Digitizing medical information is an emerging trend that employs information and communication technology (ICT) to manage health records, diagnostic reports, and other medical data more effectively, in order to improve the overall quality of medical services. However, medical information is highly confidential and involves private information, even legitimate access to data raises privacy concerns. Medical records provide health information on an as-needed basis for diagnosis and treatment, and the information is also important for medical research and other health management applications. Traditional privacy risk management systems have focused on reducing reidentification risk, and they do not consider information loss. In addition, such systems cannot identify and isolate data that carries high risk of privacy violations. This paper proposes the Hiatus Tailor (HT) system, which ensures low re-identification risk for medical records, while providing more authenticated information to database users and identifying high-risk data in the database for better system management. The experimental results demonstrate that the HT system achieves much lower information loss than traditional risk management methods, with the same risk of re-identification. PMID:22969273

  3. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.

  4. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    PubMed

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.

  5. Embedding a hiding function in a portable electronic health record for privacy preservation.

    PubMed

    Huang, Lu-Chou; Chu, Huei-Chung; Lien, Chung-Yueh; Hsiao, Chia-Hung; Kao, Tsair

    2010-06-01

    The objective of this study was to develop a method to hide information in a portable electronic health record (PEHR). In compliance with HIPAA guidelines, a hiding function for personal identifiers in a PEHR was implemented by recognizing and hiding techniques. The method emphasizes the feasibility of embedding a hiding function in a PEHR. The hiding function could be executed to hide identifiers in offline mode. The present study showed that embedding the hiding function in a PEHR is a practical way not only satisfies data confidentiability needs, but also meets patient's personal privacy requirements. The effects of executing the hiding function would be the same as through de-identification or anonymization process.

  6. Anatomisation with slicing: a new privacy preservation approach for multiple sensitive attributes.

    PubMed

    Susan, V Shyamala; Christopher, T

    2016-01-01

    An enormous quantity of personal health information is available in recent decades and tampering of any part of this information imposes a great risk to the health care field. Existing anonymization methods are only apt for single sensitive and low dimensional data to keep up with privacy specifically like generalization and bucketization. In this paper, an anonymization technique is proposed that is a combination of the benefits of anatomization, and enhanced slicing approach adhering to the principle of k-anonymity and l-diversity for the purpose of dealing with high dimensional data along with multiple sensitive data. The anatomization approach dissociates the correlation observed between the quasi identifier attributes and sensitive attributes (SA) and yields two separate tables with non-overlapping attributes. In the enhanced slicing algorithm, vertical partitioning does the grouping of the correlated SA in ST together and thereby minimizes the dimensionality by employing the advanced clustering algorithm. In order to get the optimal size of buckets, tuple partitioning is conducted by MFA. The experimental outcomes indicate that the proposed method can preserve privacy of data with numerous SA. The anatomization approach minimizes the loss of information and slicing algorithm helps in the preservation of correlation and utility which in turn results in reducing the data dimensionality and information loss. The advanced clustering algorithms prove its efficiency by minimizing the time and complexity. Furthermore, this work sticks to the principle of k-anonymity, l-diversity and thus avoids privacy threats like membership, identity and attributes disclosure.

  7. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    PubMed

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-09-03

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  8. Quantifying the costs and benefits of privacy-preserving health data publishing.

    PubMed

    Khokhar, Rashid Hussain; Chen, Rui; Fung, Benjamin C M; Lui, Siu Man

    2014-08-01

    Cost-benefit analysis is a prerequisite for making good business decisions. In the business environment, companies intend to make profit from maximizing information utility of published data while having an obligation to protect individual privacy. In this paper, we quantify the trade-off between privacy and data utility in health data publishing in terms of monetary value. We propose an analytical cost model that can help health information custodians (HICs) make better decisions about sharing person-specific health data with other parties. We examine relevant cost factors associated with the value of anonymized data and the possible damage cost due to potential privacy breaches. Our model guides an HIC to find the optimal value of publishing health data and could be utilized for both perturbative and non-perturbative anonymization techniques. We show that our approach can identify the optimal value for different privacy models, including K-anonymity, LKC-privacy, and ∊-differential privacy, under various anonymization algorithms and privacy parameters through extensive experiments on real-life data.

  9. A Privacy-Preserving ID-Based Group Key Agreement Scheme Applied in VPAN

    NASA Astrophysics Data System (ADS)

    de Mulder, Yoni; Wouters, Karel; Preneel, Bart

    In 2008, Wan et al. presented an anonymous ID-based group key agreement scheme for wireless networks, for which they claim that it ensures anonymity and unlinkability of the group members, as well as forward and backward secrecy of the group session key. In this paper, we show that forward and backward secrecy do not hold for the protocol. We propose a correction that introduces a shielding factor that protects each member's input to the group key. we also introduce a new feature that assures the correctness of the key as computed by all group members. This results in an increased computation cost, due to extra public key operations, and a similar communication cost. We also show in which practical setting the protocol can be deployed.

  10. kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity

    NASA Astrophysics Data System (ADS)

    Kisilevich, Slava; Elovici, Yuval; Shapira, Bracha; Rokach, Lior

    k-anonymity is the method used for masking sensitive data which successfully solves the problem of re-linking of data with an external source and makes it difficult to re-identify the individual. Thus k-anonymity works on a set of quasi-identifiers (public sensitive attributes), whose possible availability and linking is anticipated from external dataset, and demands that the released dataset will contain at least k records for every possible quasi-identifier value. Another aspect of k is its capability of maintaining the truthfulness of the released data (unlike other existing methods). This is achieved by generalization, a primary technique in k-anonymity. Generalization consists of generalizing attribute values and substituting them with semantically consistent but less precise values. When the substituted value doesn’t preserve semantic validity the technique is called suppression which is a private case of generalization. We present a hybrid approach called compensation which is based on suppression and swapping for achieving privacy. Since swapping decreases the truthfulness of attribute values there is a tradeoff between level of swapping (information truthfulness) and suppression (information loss) incorporated in our algorithm.

  11. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    PubMed Central

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-01-01

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300

  12. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  13. Privacy Preserving Service Discovery for Interoperability in Power to the Edge Approach

    DTIC Science & Technology

    2011-06-01

    IEICE Technical Report vol. 109, No. 271, pp. 69-74 (2009) [4] S . Tsujii, H. Yamaguchi, A. Kitazawa , K. Kurosawa: “A method for voting protocols with...Discovery for Interoperability in Power to the Edge Approach 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR( S ) 5d. PROJECT...NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) Chuo University,Research and Development Initiative

  14. Collective enumeration.

    PubMed

    Bahrami, Bahador; Didino, Daniele; Frith, Chris; Butterworth, Brian; Rees, Geraint

    2013-04-01

    Many joint decisions in everyday life (e.g., Which bar is less crowded?) depend on approximate enumeration, but very little is known about the psychological characteristics of counting together. Here we systematically investigated collective approximate enumeration. Pairs of participants made individual and collective enumeration judgments in a 2-alternative forced-choice task and when in disagreement, they negotiated joint decisions via verbal communication and received feedback about accuracy at the end of each trial. The results showed that two people could collectively count better than either one alone, but not as well as expected by previous models of collective sensory decision making in more basic perceptual domains (e.g., luminance contrast). Moreover, such collective enumeration benefited from prior, noninteractive practice showing that social learning of how to combine shared information about enumeration required substantial individual experience. Finally, the collective context had a positive but transient impact on an individual's enumeration sensitivity. This transient social influence may be explained as a motivational factor arising from the fact that members of a collective must take responsibility for their individual decisions and face the consequences of their judgments.

  15. Managing University Research Microdata Collections

    ERIC Educational Resources Information Center

    Woolfrey, Lynn; Fry, Jane

    2015-01-01

    This article examines the management of microdata collections in a university context. It is a cross-country analysis: Collection management at data services in Canada and South Africa are considered. The case studies are of two university sub-contexts: One collection is located in a library; the other at a Faculty-based Data Service. Stages in…

  16. Personality and social context.

    PubMed

    Webster, Mike M; Ward, Ashley J W

    2011-11-01

    There has been considerable interest among biologists in the phenomenon of non-human animal personality in recent years. Consistent variations among individuals in their behavioural responses to ecologically relevant stimuli, often relating to a trade-off between level of risk and reward, have been recorded in a wide variety of species, representing many animal taxa. Research into behavioural variation among individuals has major implications for our understanding of ecological patterns and processes at scales from the level of the individual to the level of the population. Until recently, however, many studies that have considered the broader ecological implications of animal personality have failed to take into account the crucial moderating effect of social context. It is well documented that social processes, such as conformity and facilitation, exert considerable influence on the behaviour of grouping animals and hence that isolated individuals may often behave in a qualitatively as well as quantitatively different manner to those in groups. Recently, a number of studies have begun to address aspects of this gap in our knowledge and have provided vital insights. In this review we examine the state of our knowledge on the relationship between individual personality and sociality. In doing so we consider the influence of the social context on individual personality responses, the interaction between the collective personalities of group members and the expression of those personalities in the individual, and the influence of the personalities of group members on group structure and function. We propose key areas of focus for future studies in order to develop our understanding of this fundamentally important area.

  17. Context and Pavlovian conditioning.

    PubMed

    Landeira-Fernandez, J

    1996-02-01

    Procedurally, learning has to occur in a context. Several lines of evidence suggest that contextual stimuli actively affect learning and expression of the conditional response. The experimental context can become associated with the unconditional stimulus (US), especially when the US is presented in a context in the absence of a discrete conditional stimulus (CS). Moreover, context can modulate CS-US associations. Finally, it appears that context can become associated with the CS when it is presented before the CS-US training. The purpose of the present paper is to review some of the relevant literature that considers the context as an important feature of Pavlovian conditioning and to discuss some of the main learning theories that incorporate the context into their theoretical framework. The paper starts by mentioning historical positions that considered context an important variable in conditioning and then describes how the approach to contextual conditioning changed with the modern study of Pavlovian conditioning. Various forms of measurement of context conditioning are presented and the associative strength attached to context in several experimental paradigms is examined. The possible functions that context may acquire during conditioning are pointed out and related to major learning theories. Moreover, the effect of certain neurological manipulations on context conditioning is presented and these results are discussed in terms of possible functions that the context might acquire during Pavlovian conditioning. It is concluded that contextual stimuli acquire different functions during normal conditioning. A procedure in which animals are exposed to an aversive US immediately after they are placed in the experimental context is suggested as a useful control for the study of context conditioning.

  18. Imagining Another Context during Encoding Offsets Context-Dependent Forgetting

    ERIC Educational Resources Information Center

    Masicampo, E. J.; Sahakyan, Lili

    2014-01-01

    We tested whether imagining another context during encoding would offset context-dependent forgetting. All participants studied a list of words in Context A. Participants who remained in Context A during the test recalled more than participants who were tested in another context (Context B), demonstrating the standard context-dependent forgetting…

  19. Collection Mapping.

    ERIC Educational Resources Information Center

    Harbour, Denise

    2002-01-01

    Explains collection mapping for library media collections. Discusses purposes for creating collection maps, including helping with selection and weeding decisions, showing how the collection supports the curriculum, and making budget decisions; and methods of data collection, including evaluating a collaboratively taught unit with the classroom…

  20. Imagining another context during encoding offsets context-dependent forgetting.

    PubMed

    Masicampo, E J; Sahakyan, Lili

    2014-11-01

    We tested whether imagining another context during encoding would offset context-dependent forgetting. All participants studied a list of words in Context A. Participants who remained in Context A during the test recalled more than participants who were tested in another context (Context B), demonstrating the standard context-dependent forgetting effect (e.g., Smith & Vela, 2001). Importantly, some participants imagined another mental context during encoding. Some of these participants imagined Context B during encoding, and when they were later tested in Context B or even in a completely new Context C, they did not show forgetting, confirming our predictions. Other participants imagined a new context during encoding simply by transforming the current context (i.e., by imagining that it was snowing in the room), and this likewise counteracted context-dependent forgetting. These data suggest a moderator of context-dependent forgetting. When the context surrounding a memory is largely mentally generated, context-dependent forgetting is eliminated.

  1. Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network Based on Linear System and Histogram

    NASA Astrophysics Data System (ADS)

    Dang, Van H.; Wohlgemuth, Sven; Yoshiura, Hiroshi; Nguyen, Thuc D.; Echizen, Isao

    Wireless sensor network (WSN) has been one of key technologies for the future with broad applications from the military to everyday life [1,2,3,4,5]. There are two kinds of WSN model models with sensors for sensing data and a sink for receiving and processing queries from users; and models with special additional nodes capable of storing large amounts of data from sensors and processing queries from the sink. Among the latter type, a two-tiered model [6,7] has been widely adopted because of its storage and energy saving benefits for weak sensors, as proved by the advent of commercial storage node products such as Stargate [8] and RISE. However, by concentrating storage in certain nodes, this model becomes more vulnerable to attack. Our novel technique, called zip-histogram, contributes to solving the problems of previous studies [6,7] by protecting the stored data's confidentiality and integrity (including data from the sensor and queries from the sink) against attackers who might target storage nodes in two-tiered WSNs.

  2. Privacy-Preserving Discovery of Topic-Based Events from Social Sensor Signals: An Experimental Study on Twitter

    PubMed Central

    Nguyen, Duc T.; Jung, Jai E.

    2014-01-01

    Social network services (e.g., Twitter and Facebook) can be regarded as social sensors which can capture a number of events in the society. Particularly, in terms of time and space, various smart devices have improved the accessibility to the social network services. In this paper, we present a social software platform to detect a number of meaningful events from information diffusion patterns on such social network services. The most important feature is to process the social sensor signal for understanding social events and to support users to share relevant information along the social links. The platform has been applied to fetch and cluster tweets from Twitter into relevant categories to reveal hot topics. PMID:24955388

  3. User Situational Context: An Essential Challenge to Context Awareness

    ERIC Educational Resources Information Center

    Mowafi, Yaser Abdallah

    2009-01-01

    Existing research on context and context awareness has broadly focused on the technical aspects of context acquisition and interpretation of users' surroundings, also called physical or sensor-based context. Such an approach has lacked from reconciling the perception of real-world context exhibited by humans, also known as user context, and…

  4. Contexts as Shared Commitments

    PubMed Central

    García-Carpintero, Manuel

    2015-01-01

    Contemporary semantics assumes two influential notions of context: one coming from Kaplan (1989), on which contexts are sets of predetermined parameters, and another originating in Stalnaker (1978), on which contexts are sets of propositions that are “common ground.” The latter is deservedly more popular, given its flexibility in accounting for context-dependent aspects of language beyond manifest indexicals, such as epistemic modals, predicates of taste, and so on and so forth; in fact, properly dealing with demonstratives (perhaps ultimately all indexicals) requires that further flexibility. Even if we acknowledge Lewis (1980)'s point that, in a sense, Kaplanian contexts already include common ground contexts, it is better to be clear and explicit about what contexts constitutively are. Now, Stalnaker (1978, 2002, 2014) defines context-as-common-ground as a set of propositions, but recent work shows that this is not an accurate conception. The paper explains why, and provides an alternative. The main reason is that several phenomena (presuppositional treatments of pejoratives and predicates of taste, forces other than assertion) require that the common ground includes non-doxastic attitudes such as appraisals, emotions, etc. Hence the common ground should not be taken to include merely contents (propositions), but those together with attitudes concerning them: shared commitments, as I will defend. PMID:26733087

  5. Nanotechnology and Social Context

    ERIC Educational Resources Information Center

    Sandler, Ronald

    2007-01-01

    The central claims defended in this article are the following: (a) The social and ethical challenges of nanotechnology can be fully identified only if both the characteristic features of nanotechnologies and the social contexts into which they are emerging are considered. (b) When this is done, a host of significant social context issues, or…

  6. Chapter Three: Investigating Context

    ERIC Educational Resources Information Center

    Young, Richard F.

    2008-01-01

    This chapter begins with the statement that all talk happens somewhere, somehow, at some time and is produced by somebody for some purpose, and the approach that practice theorists have taken is that talk and its context are inseparable. The challenges that face an analyst of practice are then to describe the context, describe the talk, and…

  7. Contexts as Shared Commitments.

    PubMed

    García-Carpintero, Manuel

    2015-01-01

    Contemporary semantics assumes two influential notions of context: one coming from Kaplan (1989), on which contexts are sets of predetermined parameters, and another originating in Stalnaker (1978), on which contexts are sets of propositions that are "common ground." The latter is deservedly more popular, given its flexibility in accounting for context-dependent aspects of language beyond manifest indexicals, such as epistemic modals, predicates of taste, and so on and so forth; in fact, properly dealing with demonstratives (perhaps ultimately all indexicals) requires that further flexibility. Even if we acknowledge Lewis (1980)'s point that, in a sense, Kaplanian contexts already include common ground contexts, it is better to be clear and explicit about what contexts constitutively are. Now, Stalnaker (1978, 2002, 2014) defines context-as-common-ground as a set of propositions, but recent work shows that this is not an accurate conception. The paper explains why, and provides an alternative. The main reason is that several phenomena (presuppositional treatments of pejoratives and predicates of taste, forces other than assertion) require that the common ground includes non-doxastic attitudes such as appraisals, emotions, etc. Hence the common ground should not be taken to include merely contents (propositions), but those together with attitudes concerning them: shared commitments, as I will defend.

  8. Developing Collections to Empower Learners

    ERIC Educational Resources Information Center

    Kimmel, Sue C.

    2014-01-01

    "Developing Collections to Empower Learners" examines collection development in the context of today's shifts toward digital resources while emphasizing the foundational beliefs of the school library profession. Writer Sue Kimmel includes practical advice about needs assessment, planning, selection, acquisitions, evaluation, and…

  9. Collective neutrino oscillations in supernovae

    SciTech Connect

    Duan, Huaiyu

    2014-06-24

    In a dense neutrino medium neutrinos can experience collective flavor transformation through the neutrino-neutrino forward scattering. In this talk we present some basic features of collective neutrino flavor transformation in the context in core-collapse supernovae. We also give some qualitative arguments for why and when this interesting phenomenon may occur and how it may affect supernova nucleosynthesis.

  10. Measuring School Contexts

    PubMed Central

    Muller, Chandra L.

    2016-01-01

    This article describes issues in measuring school contexts with an eye toward understanding students’ experiences and outcomes. I begin with an overview of the conceptual underpinnings related to measuring contexts, briefly describe the initiatives at the National Center for Education Statistics to measure school contexts, and identify possible gaps in those initiatives that if filled could provide valuable new data for researchers. Next, I discuss new approaches and opportunities for measurement, and special considerations related to diverse populations and youth development. I conclude with recommendations for future priorities. PMID:27158640

  11. Collecting apparatus

    DOEpatents

    Duncan, Charles P.

    1983-01-01

    An improved collecting apparatus for small aquatic or airborne organisms such as plankton, larval fish, insects, etc. The improvement constitutes an apertured removal container within which is retained a collecting bag, and which is secured at the apex of a conical collecting net. Such collectors are towed behind a vessel or vehicle with the open end of the conical net facing forward for trapping the aquatic or airborne organisms within the collecting bag, while allowing the water or air to pass through the apertures in the container. The container is readily removable from the collecting net whereby the collecting bag can be quickly removed and replaced for further sample collection. The collecting bag is provided with means for preventing the bag from being pulled into the container by the water or air flowing therethrough.

  12. Collections Conservation.

    ERIC Educational Resources Information Center

    DeCandido, Robert

    Collections conservation is an approach to the preservation treatment of books and book-like materials that is conceptualized and organized in terms of large groups of materials. This guide is intended to enable a library to evaluate its current collections conservation activities. The introduction describes collections conservation and gives…

  13. Stories, skulls, and colonial collections.

    PubMed

    Roque, Ricardo

    2011-01-01

    The essay explores the hypothesis of colonial collecting processes involving the active addition of the colonial context and historical past to museum objects through the production of short stories. It examines the emergent historicity of collections through a focus on the "histories" that museum workers and colonial agents have been attaching to scientific collections of human skulls. Drawing on the notions of collection trajectory and historiographical work, it offers an alternative perspective from which to approach the creation of singular histories and individual archives for objects in collections.

  14. A Context Vector Model for Information Retrieval.

    ERIC Educational Resources Information Center

    Billhardt, Holger; Borrajo, Daniel; Maojo, Victor

    2002-01-01

    Presents an indexing and information retrieval method that, based on the vector space model, incorporates term dependencies and thus obtains semantically richer representations of documents. Highlights include term context vectors; techniques for estimating the dependencies among terms; term weights; experimental results on four text collections;…

  15. Loneliness in Chinese Children across Contexts

    ERIC Educational Resources Information Center

    Chen, Xinyin; Wang, Li; Li, Dan; Liu, Junsheng

    2014-01-01

    This study examined loneliness and its associations with social functioning in children across different historical times and contexts in China. We collected data from urban and rural groups of school-age children (N = 2,588; M age = 10 years) using self-reports and peer assessments. The results indicated that children in 2002 and 2005 urban…

  16. Beauty in the Context of Particular Lives

    ERIC Educational Resources Information Center

    Rautio, Pauliina

    2010-01-01

    This paper is based on empirical research by the author into the everyday lives of people living in a small village. Everyday life is approached as a subjective process in time and space, experienced by particular people in a particular environmental and social context. The data of this research has been collected through correspondence in which…

  17. English in the Ecuadorian Commercial Context.

    ERIC Educational Resources Information Center

    Alm, Cecilia Ovesdotter

    2003-01-01

    Presents a study completed in Quito, Ecuador that investigates the attitudinal perceptions toward English in advertising in the Ecuadorian commercial context. Findings are the result of four data collection procedures; a questionnaire administered to advertising experts, an analysis of business names in ten shopping centers, an analysis of…

  18. Collection Mapping and Collection Development.

    ERIC Educational Resources Information Center

    Murray, William; And Others

    1985-01-01

    Describes the use of collection mapping to assess media collections of Aurora, Colorado, Public Schools. Case studies of elementary, middle, and high school media centers describe materials selection and weeding and identify philosophies that library collections should support school curriculum, and teacher-library media specialist cooperation in…

  19. Synthetic collective intelligence.

    PubMed

    Solé, Ricard; Amor, Daniel R; Duran-Nebreda, Salva; Conde-Pueyo, Núria; Carbonell-Ballestero, Max; Montañez, Raúl

    2016-10-01

    Intelligent systems have emerged in our biosphere in different contexts and achieving different levels of complexity. The requirement of communication in a social context has been in all cases a determinant. The human brain, probably co-evolving with language, is an exceedingly successful example. Similarly, social insects complex collective decisions emerge from information exchanges between many agents. The difference is that such processing is obtained out of a limited individual cognitive power. Computational models and embodied versions using non-living systems, particularly involving robot swarms, have been used to explore the potentiality of collective intelligence. Here we suggest a novel approach to the problem grounded in the genetic engineering of unicellular systems, which can be modified in order to interact, store memories or adapt to external stimuli in collective ways. What we label as Synthetic Swarm Intelligence defines a parallel approach to the evolution of computation and swarm intelligence and allows to explore potential embodied scenarios for decision making at the microscale. Here, we consider several relevant examples of collective intelligence and their synthetic organism counterparts.

  20. Collecting Rocks.

    ERIC Educational Resources Information Center

    Barker, Rachel M.

    One of a series of general interest publications on science topics, the booklet provides those interested in rock collecting with a nontechnical introduction to the subject. Following a section examining the nature and formation of igneous, sedimentary, and metamorphic rocks, the booklet gives suggestions for starting a rock collection and using…

  1. Collective Enumeration

    ERIC Educational Resources Information Center

    Bahrami, Bahador; Didino, Daniele; Frith, Chris; Butterworth, Brian; Rees, Geraint

    2013-01-01

    Many joint decisions in everyday life (e.g., Which bar is less crowded?) depend on approximate enumeration, but very little is known about the psychological characteristics of counting together. Here we systematically investigated collective approximate enumeration. Pairs of participants made individual and collective enumeration judgments in a…

  2. Jay's Collectibles

    ERIC Educational Resources Information Center

    Cappel, James J.; Gillman, Jason R., Jr.

    2011-01-01

    There is growing interest in collectibles of many types, as indicated by the popularity of television programs such as the History Channel's "Pawn Stars" and "American Pickers" and the Public Broadcasting Service's "Antiques Road Show." The availability of online auction sites such as eBay has enabled many people to collect items of interest as a…

  3. Technology in Context

    ERIC Educational Resources Information Center

    Jeans, Nick; Manches, Andrew; Stokes, Eleanor; Balmer, Kim

    2011-01-01

    People frequently hear competing media and research claims about the educational value of new technologies. But too often it is not clear how, if at all, these technologies are supporting learning. And there is not enough attention paid to the challenges of trying to introduce these technologies successfully into an educational context. To what…

  4. Context, Learning, and Extinction

    ERIC Educational Resources Information Center

    Gershman, Samuel J.; Blei, David M.; Niv, Yael

    2010-01-01

    A. Redish et al. (2007) proposed a reinforcement learning model of context-dependent learning and extinction in conditioning experiments, using the idea of "state classification" to categorize new observations into states. In the current article, the authors propose an interpretation of this idea in terms of normative statistical inference. They…

  5. From Context to Core

    ERIC Educational Resources Information Center

    Campus Technology, 2008

    2008-01-01

    At Campus Technology 2008, Arizona State University Technology Officer Adrian Sannier mesmerized audiences with his mandate to become more efficient by doing only the "core" tech stuff--and getting someone else to slog through the context. This article presents an excerpt from Sannier's hour-long keynote address at Campus Technology '08. Sannier…

  6. Formative Assessment in Context

    ERIC Educational Resources Information Center

    Oxenford-O'Brian, Julie

    2013-01-01

    This dissertation responds to critical gaps in current research on formative assessment practice which could limit successful implementation of this practice within the K-12 classroom context. The study applies a socio cultural perspective of learning to interpret a cross-case analysis of formative assessment practice occurring during one…

  7. Community Contexts for Mentoring

    ERIC Educational Resources Information Center

    Hamilton, Stephen F.; Hamilton, Mary Agnes; Hirsch, Barton J.; Hughes, Jan; King, Jacqueline; Maton, Kenneth

    2006-01-01

    Mentoring programs attempt to foster a relationship that is too often missing from the lives of disadvantaged children and youth. However, in view of both the power and the limitations of mentoring programs, it is important to understand how mentoring occurs naturally. Assuming an ecological perspective, we examine mentoring in four contexts:…

  8. Putting tumours in context

    SciTech Connect

    Bissell, Mina J.; Radisky, Derek

    2001-10-01

    The interactions between cancer cells and their micro- and macroenvironment create a context that promotes tumor growth and protects it from immune attack. The functional association of cancer cells with their surrounding tissues forms a new 'organ' that changes as malignancy progresses. Investigation of this process might provide new insights into the mechanisms of tumorigenesis and could also lead to new therapeutic targets. Under normal conditions, ORGANS are made up of TISSUES that exchange information with other cell types via cell-cell contact, cytokines and the EXTRACELLULAR MATRIX (ECM). The ECM, which is produced by collaboration between STROMAL fibroblasts and EPITHELIAL cells, provides structural scaffolding for cells, as well as contextual information. The endothelial vasculature provides nutrients and oxygen, and cells of the immune system combat pathogens and remove apoptotic cells. Epithelial cells associate into intact, polarized sheets. These tissues communicate through a complex network of interactions: physically, through direct contact or through the intervening ECM, and biochemically, through both soluble and insoluble signalling molecules. In combination, these interactions provide the information that is necessary to maintain cellular differentiation and to create complex tissue structures. Occasionally, the intercellular signals that define the normal context become disrupted. Alterations in epithelial tissues can lead to movement of epithelial sheets and proliferation - for example, after activation of mesenchymal fibroblasts due to wounding.Normally, these conditions are temporary and reversible, but when inflammation is sustained, an escalating feedback loop ensues.Under persistent inflammatory conditions, continual upregulation of enzymes such as matrix metalloproteinases (MMPs) by stromal fibroblasts can disrupt the ECM, and invading immune cells can overproduce factors that promote abnormal proliferation. As this process progresses

  9. The Cultural Context of Learning in International Joint Ventures.

    ERIC Educational Resources Information Center

    Liu, Shimin; Vince, Russ

    1999-01-01

    A study of Chinese-Western joint business ventures showed that cultural context and different modes of managing and organizing must be considered. Successful joint ventures involve a process of collective, two-way learning. (SK)

  10. Micrometeorite Collecting

    ERIC Educational Resources Information Center

    Toubes, Joe; Hoff, Darrel

    1974-01-01

    Describes how to collect micrometeorites and suggests a number of related activities such as determining the number of meteors entering the atmosphere and determining the composition of the micrometeorites. (BR)

  11. Image Acquisition Context

    PubMed Central

    Bidgood, W. Dean; Bray, Bruce; Brown, Nicolas; Mori, Angelo Rossi; Spackman, Kent A.; Golichowski, Alan; Jones, Robert H.; Korman, Louis; Dove, Brent; Hildebrand, Lloyd; Berg, Michael

    1999-01-01

    Objective: To support clinically relevant indexing of biomedical images and image-related information based on the attributes of image acquisition procedures and the judgments (observations) expressed by observers in the process of image interpretation. Design: The authors introduce the notion of “image acquisition context,” the set of attributes that describe image acquisition procedures, and present a standards-based strategy for utilizing the attributes of image acquisition context as indexing and retrieval keys for digital image libraries. Methods: The authors' indexing strategy is based on an interdependent message/terminology architecture that combines the Digital Imaging and Communication in Medicine (DICOM) standard, the SNOMED (Systematized Nomenclature of Human and Veterinary Medicine) vocabulary, and the SNOMED DICOM microglossary. The SNOMED DICOM microglossary provides context-dependent mapping of terminology to DICOM data elements. Results: The capability of embedding standard coded descriptors in DICOM image headers and image-interpretation reports improves the potential for selective retrieval of image-related information. This favorably affects information management in digital libraries. PMID:9925229

  12. Teacher Thinking in Cultural Contexts. SUNY Series, The Social Context of Education.

    ERIC Educational Resources Information Center

    Rios, Francisco A., Ed.

    This collection sheds light on current research on teacher thinking in cultural contexts and identifies promising practices in teacher education that take the most salient contextual variables into account. Teacher cognition as influenced by race, ethnicity, and culture is explored in: (1) "Teacher Thinking in Urban Schools: The Need for a…

  13. Blood Collection

    NASA Technical Reports Server (NTRS)

    1999-01-01

    The method that is used for the collection, storage and real-time analysis of blood and other bodily fluids has been licensed to DBCD, Inc. by NASA. The result of this patent licensing agreement has been the development of a commercial product that can provide serum or plasma from whole blood volumes of 20 microliters to 4 milliliters. The device has a fibrous filter with a pore size of less than about 3 microns, and is coated with a mixture of mannitol and plasma fraction protein. The coating causes the cellular fraction to be trapped by the small pores, leaving the cellular fraction intact on the fibrous filter while the acellular fraction passes through the filter for collection in unaltered form from the serum sample collection chamber. The method used by this product is useful to NASA for blood analysis on manned space missions.

  14. Context-dependent hierarchies in pigeons

    PubMed Central

    Nagy, Máté; Vásárhelyi, Gábor; Pettit, Benjamin; Roberts-Mariani, Isabella; Vicsek, Tamás; Biro, Dora

    2013-01-01

    Hierarchical organization is widespread in the societies of humans and other animals, both in social structure and in decision-making contexts. In the case of collective motion, the majority of case studies report that dominant individuals lead group movements, in agreement with the common conflation of the terms “dominance” and “leadership.” From a theoretical perspective, if social relationships influence interactions during collective motion, then social structure could also affect leadership in large, swarm-like groups, such as fish shoals and bird flocks. Here we use computer-vision–based methods and miniature GPS tracking to study, respectively, social dominance and in-flight leader–follower relations in pigeons. In both types of behavior we find hierarchically structured networks of directed interactions. However, instead of being conflated, dominance and leadership hierarchies are completely independent of each other. Although dominance is an important aspect of variation among pigeons, correlated with aggression and access to food, our results imply that the stable leadership hierarchies in the air must be based on a different set of individual competences. In addition to confirming the existence of independent and context-specific hierarchies in pigeons, we succeed in setting out a robust, scalable method for the automated analysis of dominance relationships, and thus of social structure, applicable to many species. Our results, as well as our methods, will help to incorporate the broader context of animal social organization into the study of collective behavior. PMID:23878247

  15. Context-dependent hierarchies in pigeons.

    PubMed

    Nagy, Máté; Vásárhelyi, Gábor; Pettit, Benjamin; Roberts-Mariani, Isabella; Vicsek, Tamás; Biro, Dora

    2013-08-06

    Hierarchical organization is widespread in the societies of humans and other animals, both in social structure and in decision-making contexts. In the case of collective motion, the majority of case studies report that dominant individuals lead group movements, in agreement with the common conflation of the terms "dominance" and "leadership." From a theoretical perspective, if social relationships influence interactions during collective motion, then social structure could also affect leadership in large, swarm-like groups, such as fish shoals and bird flocks. Here we use computer-vision-based methods and miniature GPS tracking to study, respectively, social dominance and in-flight leader-follower relations in pigeons. In both types of behavior we find hierarchically structured networks of directed interactions. However, instead of being conflated, dominance and leadership hierarchies are completely independent of each other. Although dominance is an important aspect of variation among pigeons, correlated with aggression and access to food, our results imply that the stable leadership hierarchies in the air must be based on a different set of individual competences. In addition to confirming the existence of independent and context-specific hierarchies in pigeons, we succeed in setting out a robust, scalable method for the automated analysis of dominance relationships, and thus of social structure, applicable to many species. Our results, as well as our methods, will help to incorporate the broader context of animal social organization into the study of collective behavior.

  16. Wastewater Collection.

    ERIC Educational Resources Information Center

    Chatterjee, Samar; And Others

    1978-01-01

    Presents a literature review of wastewater collection systems and components. This review covers: (1) planning, (2) construction; (3) sewer system evaluation; (4) maintenance; (5) rehabilitation; (6) overview prevention; and (7) wastewater pumping. A list of 111 references is also presented. (HM)

  17. Collecting Artifacts

    ERIC Educational Resources Information Center

    Coffey, Natalie

    2004-01-01

    Fresh out of college, the author had only a handful of items worthy of displaying, which included some fossils she had collected in her paleontology class. She had binders filled with great science information, but kids want to see "real" science, not paper science. Then it came to her: she could fill the shelves with science artifacts with the…

  18. Making Connections: Learning and Teaching Chemistry in Context

    NASA Astrophysics Data System (ADS)

    King, Donna; Bellocchi, Alberto; Ritchie, Stephen M.

    2008-05-01

    Even though several studies have reported positive attitudinal outcomes from context-based chemistry programs, methodological obstacles have prevented researchers from comparing satisfactorily the chemistry-learning outcomes between students who experience a context-based program with those who experience a content-driven program. In this narrative inquiry we are able to address the question: how do the recalled experiences of a student and her teacher in context-based and concept-based chemistry programs compare? From the student’s unique perspective of experiencing both programs with the same teacher, we have constructed our collective account around four themes; namely, the extent to which the student makes connections between chemistry concepts and real-world contexts, developing research independence through engaging in extended experimental investigations related to contexts, learning chemistry concepts through contexts, and conceptual sequencing in a context-based program. The student reported real-world connections between chemistry concepts and contexts, found her engagement in the context-driven tasks interesting and productive, and identified connected sequences of concepts across the contexts studied. Despite difficulties for teachers who are required to shift pedagogies, the student’s lived experiences and outcomes from a context-based program provide some encouragement in working through these issues.

  19. Putting teamwork in context.

    PubMed

    Boaden, N; Leaviss, J

    2000-11-01

    Multidisciplinary teamwork is becoming more important in both the delivery of health care and in the organization and management of that delivery. The first of these has been accepted but traditional professional education has done little to address the challenge it presents to professionals. Recent reforms in the British NHS have made the challenge more urgent. Professionals must work together but in increasingly flexible and innovatory ways. They are also required to play more formal roles in NHS management and policy. Where teamwork has been addressed in professional education it has concentrated on the inter-personal dynamics of working teams. This remains important but to respond effectively to the new challenges curricula and educational practice will have to be clearer about the variety of teams involved and the importance of the context within which teams work. One view is offered as to how that context might be understood in order to map team diversity. Two models are offered to help develop multidisciplinary team learning. One of these deals with key aspects of the organizational setting and the other with factors that affect team processes. It is argued that both should help to facilitate multidisciplinary curriculum development but also suggest learning needs to be met within unidisciplinary professional education. Concentration on team dynamics alone will not deliver the teamwork required in the new NHS.

  20. Mindfulness in cultural context.

    PubMed

    Kirmayer, Laurence J

    2015-08-01

    Mindfulness meditation and other techniques drawn from Buddhism have increasingly been integrated into forms of psychotherapeutic intervention. In much of this work, mindfulness is understood as a mode of awareness that is present-centered and nonevaluative. This form of awareness is assumed to have intrinsic value in promoting positive mental health and adaptation by interrupting discursive thoughts that give rise to suffering. However, in the societies where it originated, mindfulness meditation is part of a larger system of Buddhist belief and practice with strong ethical and moral dimensions. Extracting techniques like mindfulness meditation from the social contexts in which they originate may change the nature and effects of the practice. The papers in this issue of Transcultural Psychiatry explore the implications of a cultural and contextual view of mindfulness for continued dialogue between Buddhist thought and psychiatry. This introductory essay considers the meanings of mindfulness meditation in cultural context and the uses of mindfulness as a therapeutic intervention in contemporary psychiatry and psychology.

  1. Endeavour Crater in Context

    NASA Technical Reports Server (NTRS)

    2009-01-01

    [figure removed for brevity, see original site]

    The largest crater in this mosaic of images taken by the Context Camera on NASA's Mars Reconnaissance Orbiter is Endeavour Crater, which is 22 kilometers (14 miles) in diameter.

    The team operating NASA's Mars Exploration Rover Opportunity in the Meridiani Planum region of Mars chose to drive the rover toward Endeavour after Opportunity ascended out of smaller Victoria Crater in August 2008.

    Opportunity caught its first glimpse of Endeavour's rim on March 7, 2008, during the 1,820th Martian day, or sol, of the rover's mission on Mars. The rover was about 12 kilometers (7 miles) from the closest point of the crater.

    Annotations on Figure 1 show vectors from Opportunity's position on that date toward the portions of the rim seen in images that Opportunity's panoramic camera (Pancam) took from the Sol 1820 location. In addition to three portions of Endeavour's rim, the rim of a smaller, more distant crater, Iazu, appears faintly on the horizon in the Pancam images.

    NASA's Jet Propulsion Laboratory, a division of the California Institute of Technology in Pasadena, manages the Mars Reconnaissance Orbiter for NASA's Science Mission Directorate, Washington. Lockheed Martin Space Systems, Denver, is the prime contractor for the project and built the spacecraft. Malin Space Science Systems, San Diego, provided and operates the Context Camera.

  2. Identifying Context Variables in Research.

    ERIC Educational Resources Information Center

    Piazza, Carolyn L.

    1987-01-01

    Identifies context variables in written composition from theoretical perspectives in cognitive psychology, sociology, and anthropology. Considers how multiple views of context from across the disciplines can build toward a broader definition of writing. (JD)

  3. Collective instabilities

    SciTech Connect

    K.Y. Ng

    2003-08-25

    The lecture covers mainly Sections 2.VIII and 3.VII of the book ''Accelerator Physics'' by S.Y. Lee, plus mode-coupling instabilities and chromaticity-driven head-tail instability. Besides giving more detailed derivation of many equations, simple interpretations of many collective instabilities are included with the intention that the phenomena can be understood more easily without going into too much mathematics. The notations of Lee's book as well as the e{sup jwt} convention are followed.

  4. Collective Electrodynamics

    NASA Astrophysics Data System (ADS)

    Mead, Carver A.

    2002-08-01

    In this book Carver Mead offers a radically new approach to the standard problems of electromagnetic theory. Motivated by the belief that the goal of scientific research should be the simplification and unification of knowledge, he describes a new way of doing electrodynamics--collective electrodynamics--that does not rely on Maxwell's equations, but rather uses the quantum nature of matter as its sole basis. Collective electrodynamics is a way of looking at how electrons interact, based on experiments that tell us about the electrons directly. (As Mead points out, Maxwell had no access to these experiments.) The results Mead derives for standard electromagnetic problems are identical to those found in any text. Collective electrodynamics reveals, however, that quantities that we usually think of as being very different are, in fact, the same--that electromagnetic phenomena are simple and direct manifestations of quantum phenomena. Mead views his approach as a first step toward reformulating quantum concepts in a clear and comprehensible manner. The book is divided into five sections: magnetic interaction of steady currents, propagating waves, electromagnetic energy, radiation in free space, and electromagnetic interaction of atoms. In an engaging preface, Mead tells how his approach to electromagnetic theory was inspired by his interaction with Richard Feynman. Carver A. Mead is the Gordon and Betty Moore Professor of Engineering and Applied Science, Emeritus, at the California Institute of Technology. He won the 1999 Lemelson-MIT Prize for Invention and Innovation.

  5. The HFEA in context.

    PubMed

    Franklin, Sarah

    2013-04-01

    While the regulatory role of the HFEA, its independence and its shortcomings are debated in the context of a fiscal economic crisis, the larger sociological importance of the Authority may be overlooked. Harder to calculate than its annual budget and more elusive than its technical remit as a licensing body, the cultural value of the HFEA as a historical and symbolic entity that was born out of a pioneering debate unique to the UK must be included in a discussion of its future role. Against its perceived shortcomings as an expensive and outdated quango is the importance of the Authority as a public instrument for enhancing the future of translational bioscience. From this point of view, the HFEA is crucial not only to ensuring the successful realization of a domestic bioscience agenda but also to protecting the international reputation of UK Plc as a best-practice model of publicly supported bioinnovation.

  6. Measuring local context as context-word probabilities.

    PubMed

    Hahn, Lance W

    2012-06-01

    Context enables readers to quickly recognize a related word but disturbs recognition of unrelated words. The relatedness of a final word to a sentence context has been estimated as the probability (cloze probability) that a participant will complete a sentence with a word. In four studies, I show that it is possible to estimate local context-word relatedness based on common language usage. Conditional probabilities were calculated for sentences with published cloze probabilities. Four-word contexts produced conditional probabilities significantly correlated with cloze probabilities, but usage statistics were unavailable for some sentence contexts. The present studies demonstrate that a composite context measure based on conditional probabilities for one- to four-word contexts and the presence of a final period represents all of the sentences and maintains significant correlations (.25, .52, .53) with cloze probabilities. Finally, the article provides evidence for the effectiveness of this measure by showing that local context varies in ways that are similar to the N400 effect and that are consistent with a role for local context in reading. The Supplemental materials include local context measures for three cloze probability data sets.

  7. Collective motion

    NASA Astrophysics Data System (ADS)

    Vicsek, Tamás; Zafeiris, Anna

    2012-08-01

    We review the observations and the basic laws describing the essential aspects of collective motion - being one of the most common and spectacular manifestation of coordinated behavior. Our aim is to provide a balanced discussion of the various facets of this highly multidisciplinary field, including experiments, mathematical methods and models for simulations, so that readers with a variety of background could get both the basics and a broader, more detailed picture of the field. The observations we report on include systems consisting of units ranging from macromolecules through metallic rods and robots to groups of animals and people. Some emphasis is put on models that are simple and realistic enough to reproduce the numerous related observations and are useful for developing concepts for a better understanding of the complexity of systems consisting of many simultaneously moving entities. As such, these models allow the establishing of a few fundamental principles of flocking. In particular, it is demonstrated, that in spite of considerable differences, a number of deep analogies exist between equilibrium statistical physics systems and those made of self-propelled (in most cases living) units. In both cases only a few well defined macroscopic/collective states occur and the transitions between these states follow a similar scenario, involving discontinuity and algebraic divergences.

  8. Generation disrupts memory for intrinsic context but not extrinsic context.

    PubMed

    Mulligan, Neil W

    2011-08-01

    Although generation typically enhances item memory, the effect is subject to a number of theoretically important limitations. One potential limitation concerns context memory but there has been debate about whether generation actually enhances or disrupts memory for contextual details. Five experiments assessed the effect of generation on context memory for perceptual attributes of the study stimulus (intrinsic context). The results indicate that despite enhancing item memory, generation disrupts memory for intrinsic context. This result generalized over different intrinsic details (print colour and font), different generation manipulations, and several methodological factors identified in earlier research as potential moderators of this negative generation effect. Despite the negative generation effect on intrinsic context, contextual details external to the target item (extrinsic context) are not disrupted. In a sixth experiment, a visually based generation task (letter transposition) enhanced context memory for the extrinsic detail of location. Coupled with earlier research, the results indicate that generation disrupts context memory for intrinsic details but either does not harm or enhances memory for extrinsic context.

  9. A Semantic Web Based System for Context Metadata Management

    NASA Astrophysics Data System (ADS)

    Stefanov, Svetlin; Huang, Vincent

    With the increasing usage of embedded systems and sensors in our surroundings, a new type of information systems - context aware systems - are gaining importance. These user-centric systems acquire context information which describes the state of the user and the user environment, and offer adaptable and personalized services based on the user context information. The central part of a context aware system is the context model used for describing user context information. The context information originates from a multitude of heterogeneous sources, such as personal calendars, sensors attached to the users or to the user’s environment and Web based sources, such as social networking sites. The information from these sources is typically on different abstraction levels and is organized according to different data models. This work proposes a Semantic Web based context metadata management system. The first part of the work develops an ontology model for user context. The user context model integrates information from multiple and heterogeneous sources which are modeled largely by reusing existing well accepted ontologies. The second part of the work proposes a method to infer and reason about additional user context information based on the available context information using rules and ontologies. We instantiate and evaluate the proposed system by performing a social networking case study called meetFriends. In this application, information is collected from various sources such as sensors attached to the users and public web sources - YellowPages. The moods of the users are inferred from a set of rules. A meeting between two users can be set up based on the moods, locations and preferences of the users. The results indicate that Semantic Web technologies are well suited for integrating various data sources, processing of user context information, and enabling adaptable and personalized services.

  10. 78 FR 25450 - Agency Information Collection Activities; Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-01

    ... used to collect data regarding attitudes about and perceptions of the health IT workflows staff engage... interviewed to gather in depth information about the sociotechnical context of the practice. The...

  11. Cognitive context detection using pupillary measurements

    NASA Astrophysics Data System (ADS)

    Mannaru, Pujitha; Balasingam, Balakumar; Pattipati, Krishna; Sibley, Ciara; Coyne, Joseph

    2016-05-01

    In this paper, we demonstrate the use of pupillary measurements as indices of cognitive workload. We analyze the pupillary data of twenty individuals engaged in a simulated Unmanned Aerial System (UAS) operation in order to understand and characterize the behavior of pupil dilation under varying task load (i.e., workload) levels. We present three metrics that can be employed as real-time indices of cognitive workload. In addition, we develop a predictive system utilizing the pupillary metrics to demonstrate cognitive context detection within simulated supervisory control of UAS. Further, we use pupillary data collected concurrently from the left and right eye and present comparative results of the use of separate vs. combined pupillary data for detecting cognitive context.

  12. Disagreeing in context

    PubMed Central

    Marques, Teresa

    2015-01-01

    This paper argues for contextualism about predicates of personal taste and evaluative predicates in general, and offers a proposal of how apparently resilient disagreements are to be explained. The present proposal is complementary to others that have been made in the recent literature. Several authors, for instance (López de Sa, 2008; Sundell, 2011; Huvenes, 2012; Marques and García-Carpintero, 2014; Marques, 2014a), have recently defended semantic contextualism for those kinds of predicates from the accusation that it faces the problem of lost disagreement. These authors have proposed that a proper account of the resilient disagreement in the cases studied is to be achieved by an appeal to pragmatic processes, and to conflicting non-doxastic attitudes. It is argued here that the existing contextualist solutions are incomplete as they stand, and are subject to objections because of this. A supplementation of contextualism is offered, together with an explanation of why failed presuppositions of commonality (López de Sa), disputes over the appropriateness of a contextually salient standard (Sundell), and differences in non-doxastic attitudes (Sundell, Huvenes, Marques, and García-Carpintero) give rise to conflicts. This paper claims that conflicts of attitudes are the reason why people still have impressions of disagreement in spite of failed commonality presuppositions, that those conflicts drive metalinguistic disputes over the selection of appropriate standards, and hence conflicting non-doxastic attitudes demand an explanation that is independent of those context dependent pragmatic processes. The paper further argues that the missing explanation is 2-fold: first, disagreement prevails where the properties expressed by taste and value predicates are response-dependent properties, and, secondly, it prevails where those response-dependent properties are involved in evolved systems of coordination that respond to evolutionarily recurrent situations. PMID

  13. Non-context-free grammars generating context-free languages

    NASA Technical Reports Server (NTRS)

    Baker, B. S.

    1974-01-01

    If G is a grammar such that in each non-context-free rule of G, the right side contains a string of terminals longer than any terminal string appearing between two nonterminals in the left side, then the language generated by G is context free. Six previous results follow as corollaries of this theorem.

  14. Distributed Control with Collective Intelligence

    NASA Technical Reports Server (NTRS)

    Wolpert, David H.; Wheeler, Kevin R.; Tumer, Kagan

    1998-01-01

    We consider systems of interacting reinforcement learning (RL) algorithms that do not work at cross purposes , in that their collective behavior maximizes a global utility function. We call such systems COllective INtelligences (COINs). We present the theory of designing COINs. Then we present experiments validating that theory in the context of two distributed control problems: We show that COINs perform near-optimally in a difficult variant of Arthur's bar problem [Arthur] (and in particular avoid the tragedy of the commons for that problem), and we also illustrate optimal performance in the master-slave problem.

  15. Hierarchical video summarization based on context clustering

    NASA Astrophysics Data System (ADS)

    Tseng, Belle L.; Smith, John R.

    2003-11-01

    A personalized video summary is dynamically generated in our video personalization and summarization system based on user preference and usage environment. The three-tier personalization system adopts the server-middleware-client architecture in order to maintain, select, adapt, and deliver rich media content to the user. The server stores the content sources along with their corresponding MPEG-7 metadata descriptions. In this paper, the metadata includes visual semantic annotations and automatic speech transcriptions. Our personalization and summarization engine in the middleware selects the optimal set of desired video segments by matching shot annotations and sentence transcripts with user preferences. Besides finding the desired contents, the objective is to present a coherent summary. There are diverse methods for creating summaries, and we focus on the challenges of generating a hierarchical video summary based on context information. In our summarization algorithm, three inputs are used to generate the hierarchical video summary output. These inputs are (1) MPEG-7 metadata descriptions of the contents in the server, (2) user preference and usage environment declarations from the user client, and (3) context information including MPEG-7 controlled term list and classification scheme. In a video sequence, descriptions and relevance scores are assigned to each shot. Based on these shot descriptions, context clustering is performed to collect consecutively similar shots to correspond to hierarchical scene representations. The context clustering is based on the available context information, and may be derived from domain knowledge or rules engines. Finally, the selection of structured video segments to generate the hierarchical summary efficiently balances between scene representation and shot selection.

  16. Collective accelerator for electron colliders

    SciTech Connect

    Briggs, R.J.

    1985-05-13

    A recent concept for collective acceleration and focusing of a high energy electron bunch is discussed, in the context of its possible applicability to large linear colliders in the TeV range. The scheme can be considered to be a member of the general class of two-beam accelerators, where a high current, low voltage beam produces the acceleration fields for a trailing high energy bunch.

  17. Interval Recognition in Minimal Context.

    ERIC Educational Resources Information Center

    Shatzkin, Merton

    1984-01-01

    Music majors were asked to identify interval when it was either preceded or followed by a tone moving in the same direction. Difficulties in interval recognition in context appear to be an effect not just of placement within the context or of tonality, but of particular combinations of these aspects. (RM)

  18. Popular Culture, Methods, and Context.

    ERIC Educational Resources Information Center

    Harmer, Jeremy

    2003-01-01

    Responds to an earlier article that argues that the dominance of communicative language teaching (CLT) has led to the neglect of one crucial aspect of language pedagogy, namely the context in which that pedagogy takes place. Suggests that it is time to replace CLT as the central paradigm in language teaching with a context approach. (Author/VWL)

  19. Language Teaching and Its Contexts

    ERIC Educational Resources Information Center

    Byram, Michael

    2013-01-01

    The title of this new journal provides opportunity to review the many contexts which need to be taken into account in reflecting upon foreign language teaching. These contexts include the educational, the fact that much language teaching takes place within general educational and often compulsory educational settings and institutions. Learners…

  20. The Context Oriented Training Method.

    ERIC Educational Resources Information Center

    Cavrini, Andrea

    The Context Oriented Training (COT) method is introduced and explored in this paper. COT is a means of improving the training process, beginning with the observation and analysis of current corporate experiences in the field. The learning context lies between the development of professional competencies in training and the operational side in the…

  1. Context-Enabled Business Intelligence

    SciTech Connect

    Troy Hiltbrand

    2012-04-01

    To truly understand context and apply it in business intelligence, it is vital to understand what context is and how it can be applied in addressing organizational needs. Context describes the facets of the environment that impact the way that end users interact with the system. Context includes aspects of location, chronology, access method, demographics, social influence/ relationships, end-user attitude/ emotional state, behavior/ past behavior, and presence. To be successful in making Business Intelligence content enabled, it is important to be able to capture the context of use user. With advances in technology, there are a number of ways in which this user based information can be gathered and exposed to enhance the overall end user experience.

  2. Social Context in School: Its Relation to Adolescents' Depressive Mood

    ERIC Educational Resources Information Center

    Boulard, Aurore; Quertemont, Etienne; Gauthier, Jean-Marie; Born, Michel

    2012-01-01

    This study examined the impact of various school-related factors on adolescents' depressive mood, including prosocial behavior, verbal aggression, and relationships with teachers. The data used in this study were collected in the context of a larger survey on victimization in secondary schools from the French Community of Belgium. Participants…

  3. Washback of English National Examination in the Indonesian Context

    ERIC Educational Resources Information Center

    Furaidah; Saukah, Ali; Widiati, Utami

    2015-01-01

    This study examines how teachers teach English to prepare students for high-stakes English national examination in the Indonesian context. Data were collected from two high-achieving and three low-achieving schools with eleven teachers as the subjects of in-depth interviews and non-participatory classroom observations. The findings reveal that…

  4. Reinventing Urban Education. Multiculturalism and the Social Context of Schooling.

    ERIC Educational Resources Information Center

    Rivera-Batiz, Francisco L., Ed.

    The papers in this collection describe how education is being reinvented in urban school systems in the United States. Selections discuss the urban landscape, the social context of schooling, and the theory and practice of multiculturalism. Papers include: (1) "Introduction: Reinventing Urban Education" (Francisco L. Rivera-Batiz); (2) "The…

  5. Learning in Authentic Contexts: Projects Integrating Spatial Technologies and Fieldwork

    ERIC Educational Resources Information Center

    Huang, Kuo-Hung

    2011-01-01

    In recent years, professional practice has been an issue of concern in higher education. The purpose of this study is to design students' projects to facilitate collaborative learning in authentic contexts. Ten students majoring in Management Information Systems conducted fieldwork with spatial technologies to collect data and provided information…

  6. A Context-Based Strategy for Teaching Vocabulary

    ERIC Educational Resources Information Center

    Nelson, Deanna L.

    2008-01-01

    Students in Deanna L. Nelson's high school classroom study vocabulary gradually over a period of time. Students begin by collecting words from readings and listing them on a designated whiteboard. They prepare practice quizzes to exchange with peers and engage in frequent vocabulary discussions that emphasize recognition of context clues and other…

  7. ESL Readers' Comprehension Performance: The Chinese Secondary Context

    ERIC Educational Resources Information Center

    Chau, Juliana; Wu, Winnie; Chen, Julia; Lughmani, Shari

    2012-01-01

    Recent research in reading comprehension in Western settings has focused on collecting evidence from reading tests that would measure relevant ESL reading constructs to inform reading instruction and assessment. Similar studies in non-Western contexts, however, remain under-reported. This study involved 958 senior secondary Hong Kong (Chinese)…

  8. Program Management Collection. "LINCS" Resource Collection News

    ERIC Educational Resources Information Center

    Literacy Information and Communication System, 2011

    2011-01-01

    This edition of "'LINCS' Resource Collection News" features the Program Management Collection, which covers the topics of Assessment, Learning Disabilities, and Program Improvement. Each month Collections News features one of the three "LINCS" (Literacy Information and Communication System) Resource Collections--Basic Skills, Program Management,…

  9. Workforce Competitiveness Collection. "LINCS" Resource Collection News

    ERIC Educational Resources Information Center

    Literacy Information and Communication System, 2011

    2011-01-01

    This edition of "'LINCS' Resource Collection News" features the Workforce Competitiveness Collection, covering the topics of workforce education, English language acquisition, and technology. Each month Collections News features one of the three "LINCS" (Literacy Information and Communication System) Resource Collections--Basic…

  10. Context Switch Effects and Context Experience in Rats' Conditioned Taste Aversion

    ERIC Educational Resources Information Center

    Leon, Samuel P.; Callejas-Aguilera, Jose E.; Rosas, Juan M.

    2012-01-01

    Context specificity of rats' conditioned taste aversion as a function of context experience was assessed in two experiments. Rats received a single pairing between a flavor X and a LiCl injection in a distinctive context (context A) being subsequently tested either in the same context or in a different but equally familiar context (context B).…

  11. Transfer from classical mechanics context to electricity and magnetism context

    NASA Astrophysics Data System (ADS)

    Gonzalez, Maria D.; Kanim, Stephen

    2008-10-01

    Some classical mechanics concepts, like density, vectors use, conservative fields, 3^rd Newton Law, velocity and acceleration physical and mathematical relations, are the basis for the development of related concepts that are central to the subsequent electricity and magnetism course. We believe that if students and instructors involved recognize the underlying features that are common to the two contexts, a better understanding and performance will be achieved. We are developing a pre- and post-test that is intended to measure the extent to which (1) students enter the electricity and magnetism course with a sufficient mechanics foundation; (2) there is a correlation between student responses to similar questions in mechanics and electrostatics contexts; and (3) mechanics understanding is strengthened through reintroduction of physics principles in a second context. We will give examples of ``paired'' questions and give data from administrations of the pre- and post-tests.

  12. Collective Bargaining in Higher Education. The State of the Art.

    ERIC Educational Resources Information Center

    Julius, Daniel J., Ed.

    American higher education collective bargaining is addressed in 21 essays by administrators and academicians who are actively engaged in the process. Titles and authors are as follows: "The Context of Collective Bargaining in American Colleges and Universities" (Kenneth P. Mortimer); "Collective Bargaining in the Multi-Campus System" (Richard E.…

  13. Integrating Risk Context into Risk Assessments: The Risk Context Scale

    ERIC Educational Resources Information Center

    Kroner, Daryl G.; Gray, Andrew L.; Goodrich, Ben

    2013-01-01

    The context in which offenders are released is an important component of conducting risk assessments. A sample of 257 supervised male parolees were followed in the community ("M" = 870 days) after an initial risk assessment. Drawing on community-based information, the purpose of this study was to evaluate the recently developed Risk…

  14. The social context of well-being.

    PubMed Central

    Helliwell, John F; Putnam, Robert D

    2004-01-01

    Large samples of data from the World Values Survey, the US Benchmark Survey and a comparable Canadian survey are used to estimate equations designed to explore the social context of subjective evaluations of well-being, of happiness, and of health. Social capital, as measured by the strength of family, neighbourhood, religious and community ties, is found to support both physical health and subjective well-being. Our new evidence confirms that social capital is strongly linked to subjective well-being through many independent channels and in several different forms. Marriage and family, ties to friends and neighbours, workplace ties, civic engagement (both individually and collectively), trustworthiness and trust: all appear independently and robustly related to happiness and life satisfaction, both directly and through their impact on health. PMID:15347534

  15. Classification of Tumor Histology via Morphometric Context.

    PubMed

    Chang, Hang; Borowsky, Alexander; Spellman, Paul; Parvin, Bahram

    2013-06-23

    Image-based classification of tissue histology, in terms of different components (e.g., normal signature, categories of aberrant signatures), provides a series of indices for tumor composition. Subsequently, aggregation of these indices in each whole slide image (WSI) from a large cohort can provide predictive models of clinical outcome. However, the performance of the existing techniques is hindered as a result of large technical and biological variations that are always present in a large cohort. In this paper, we propose two algorithms for classification of tissue histology based on robust representations of morphometric context, which are built upon nuclear level morphometric features at various locations and scales within the spatial pyramid matching (SPM) framework. These methods have been evaluated on two distinct datasets of different tumor types collected from The Cancer Genome Atlas (TCGA), and the experimental results indicate that our methods are (i) extensible to different tumor types; (ii) robust in the presence of wide technical and biological variations; (iii) invariant to different nuclear segmentation strategies; and (iv) scalable with varying training sample size. In addition, our experiments suggest that enforcing sparsity, during the construction of morphometric context, further improves the performance of the system.

  16. Collections Management, Collections Maintenance, and Conservation.

    ERIC Educational Resources Information Center

    American Association of Museums, Washington, DC.

    This national survey of the state of the nation's museum collections investigates collection care policies and practices, conservation issues, and private sector and federal support for museum needs. It consists of two major projects and four additional information gathering projects. The Museum Collection Survey is designed to examine all major…

  17. Teaching Context in Information Security

    ERIC Educational Resources Information Center

    Bishop, Matt

    2006-01-01

    This article investigates teaching the application of technical ideas by non-technical means, especially by using puzzles to engage students. After discussing the need to teach students to evaluate contexts in which decisions about computer security must be made, we suggest questions and scenarios drawn from political science, history, as well as…

  18. Bringing Context and Methodology Together.

    ERIC Educational Resources Information Center

    Bax, Stephen

    2003-01-01

    Responds to comments made by Jeremy Harmer about an earlier article written by the author that argued the dominance of communicative language teaching (CLT) has led to the neglect of one crucial aspect of language pedagogy, namely the context in which that pedagogy takes place. (Author/VWL)

  19. Motivational Interviewing in Relational Context

    ERIC Educational Resources Information Center

    Miller, William R.; Rose, Gary S.

    2010-01-01

    Responds to M. Stanton's comments on the current author's original article. One of the puzzles of motivational interviewing is why it works at all. How can it be that an individual interview or two yields change in a long-standing problem behavior even without any effort to alter social context? The time involved is such a tiny part of the…

  20. The Context of Media Study.

    ERIC Educational Resources Information Center

    O'Grady, Gerald

    Media study is centered on composing and understanding the codes of three image-making technologies--film, video, and computer. It locates these activities within the context of the changing materials, processes, and systems of these technologies; within contemporary developments in their creative and critical practices; and within the evolution…

  1. School Grading and Institutional Contexts

    ERIC Educational Resources Information Center

    Dardanoni, Valentino; Modica, Salvatore; Pennisi, Aline

    2011-01-01

    We study how the relationship between students' cognitive ability and their school grades depends on institutional contexts. In a simple abstract model, we show that unless competence standards are set at above-school level or the variation of competence across schools is low, students' competence valuation will be heterogeneous, with weaker…

  2. The Quest for Historical Context.

    ERIC Educational Resources Information Center

    Aronson, Marc

    2000-01-01

    Explains how the author put a young adult book on Sir Walter Raleigh into the proper historical context. Describes reading other authors about the Elizabethan period and discovering the passions that motivated explorers, and suggests further reading on Sir Walter Raleigh and this period in history. (LRW)

  3. Health Behavior in Ecological Context

    ERIC Educational Resources Information Center

    Simons-Morton, Bruce

    2013-01-01

    Health is best understood within an ecological context. Accordingly, health promotion involves processes that foster supportive environments and healthful behavior. Thus, effective health promotion programs are typically multilevel, focusing not only on the population at risk but also on the environmental conditions that contribute so importantly…

  4. Abortion, infanticide and moral context.

    PubMed

    Porter, Lindsey

    2013-05-01

    In 'After-birth abortion: why should the baby live?', Giubilini and Minerva argue that infanticide should be permitted for the same reasons as abortion. In particular, they argue that infanticide should be permitted even for reasons that do not primarily serve the interests (or would-be best interests) of the newborn. They claim that abortion is permissible for reasons that do not primarily serve the interests (or would-be interests) of the fetus because fetuses lack a right to life. They argue that newborns also lack a right to life, and they conclude that therefore, the same reasons that justify abortion can justify infanticide. This conclusion does not follow. The lack of a right to life is not decisive. Furthermore, the justificatory power of a given reason is a function of moral context. Generalisations about reasons across dissimilar moral contexts are invalid. However, a similar conclusion does follow-that fetus-killing and newborn-killing are morally identical in identical moral contexts-but this conclusion is trivial, since fetuses and newborns are never in identical moral contexts.

  5. Context Orientated Teaching in Praxis

    ERIC Educational Resources Information Center

    Nikos, Klaoudatos; Stavros, Papastavridis

    2004-01-01

    In this paper, we describe the skeleton of two teaching units, based on a Model for teaching mathematics, Context Orientated Teaching (COT). The first teaching unit concerns the proof of a mathematical proposition, while the second one concerns the solution of an open problem. Both are taught in the 10th grade, under the specific conditions of the…

  6. Digital Citizenship within Global Contexts

    ERIC Educational Resources Information Center

    Searson, Michael; Hancock, Marsali; Soheil, Nusrat; Shepherd, Gregory

    2015-01-01

    EduSummIT 2013 featured a working group that examined digital citizenship within a global context. Group members recognized that, given today's international, regional, political, and social dynamics, the notion of "global" might be more aspirational than practical. The development of informed policies and practices serving and involving…

  7. The Cultural Context of Administration.

    ERIC Educational Resources Information Center

    Ortiz, Flora Ida

    To explicate the relevance of cultural context to educational administration practices, this paper contrasts United States cultural attitudes and administrative practices with those of Latin America. Drawing on Leslie A. White's definition of culture, the author presents the Weberian model of administration as exemplary for the United States,…

  8. Effects of similarity on environmental context cueing.

    PubMed

    Smith, Steven M; Handy, Justin D; Angello, Genna; Manzano, Isabel

    2014-01-01

    Three experiments examined the prediction that context cues which are similar to study contexts can facilitate episodic recall, even if those cues are never seen before the recall test. Environmental context cueing effects have typically produced such small effect sizes that influences of moderating factors, such as the similarity between encoding and retrieval contexts, would be difficult to observe experimentally. Videos of environmental contexts, however, can be used to produce powerful context-dependent memory effects, particularly when only one memory target is associated with each video context, intentional item-context encoding is encouraged, and free recall tests are used. Experiment 1 showed that a not previously viewed video of the study context provided an effective recall cue, although it was not as effective as the originally viewed video context. Experiments 2 and 3 showed that videos of environments that were conceptually similar to encoding contexts (e.g., both were videos of ball field games) also cued recall, but not as well if the encoding contexts were given specific labels (e.g., "home run") incompatible with test contexts (e.g., a soccer scene). A fourth experiment that used incidental item-context encoding showed that video context reinstatement has a robust effect on paired associate memory, indicating that the video context reinstatement effect does not depend on interactive item-context encoding or free recall testing.

  9. Collection Directions: The Evolution of Library Collections and Collecting

    ERIC Educational Resources Information Center

    Dempsey, Lorcan; Malpas, Constance; Lavoie, Brian

    2014-01-01

    This article takes a broad view of the evolution of collecting behaviors in a network environment and suggests some future directions based on various simple models. The authors look at the changing dynamics of print collections, at the greater engagement with research and learning behaviors, and at trends in scholarly communication. The goal is…

  10. Effects of Multiple Context and Cumulative Stress on Urban Children's Adjustment in Elementary School

    ERIC Educational Resources Information Center

    Morales, Julie R.; Guerra, Nancy G.

    2006-01-01

    Using longitudinal data collected over 2 years on a sample of 2,745 urban elementary school children (1st-6th graders, ages 6-11 years) from economically disadvantaged communities, effects of stressful experiences within 3 contexts (school, family, neighborhood), cumulative stress, and multiple context stress on 3 indices of children's adjustment…

  11. Theorizing College Governance across Epistemic Differences: Awareness Contexts of College Administrators and Faculty

    ERIC Educational Resources Information Center

    Muzzin, Linda

    2016-01-01

    Awareness contexts are useful concepts in symbolic interactionist research, which focusses on how everyday realities are constructed. To provide a fresh perspective on governance in Canada's colleges, I sorted vignettes in interview data collected from administrators and faculty into four types of contexts originally derived from observation of…

  12. Instructional Context and Student Motivation, Learning, and Development: Commentary and Implications for School Psychologists

    ERIC Educational Resources Information Center

    Pendergast, Laura L.; Kaplan, Avi

    2015-01-01

    From an ecological perspective, learning and development in childhood and throughout the lifespan occur in the context of interactions within complex social networks. Collectively, the articles in this special issue illuminate three important themes related to teacher-student interactions within instructional contexts: relationships, competence,…

  13. Russian Organizational Learning in the Context of the Afghanistan and Chechnya Counterinsurgencies

    DTIC Science & Technology

    2014-12-04

    Russian Organizational Learning in the Context of the Afghanistan and Chechnya Counterinsurgencies A Monograph By MAJ Anthony M. Roh...for this collection of information is estimated to average 1 hour per response , including the time for reviewing instructions, searching existing data...SUBTITLE 5a. CONTRACT NUMBER Russian Organizational Learning in the Context of the Afghanistan and Chechnya Counterinsurgencies 5b

  14. Arc-An OAI Service Provider for Digital Library Federation; Kepler-An OAI Data/Service Provider for the Individual; Information Objects and Rights Management: A Mediation-Based Approach to DRM Interoperability; Automated Name Authority Control and Enhanced Searching in the Levy Collection; Renardus Project Developments and the Wider Digital Library Context.

    ERIC Educational Resources Information Center

    Liu, Xiaoming; Maly, Kurt; Zubair, Mohammad; Nelson, Michael L.; Erickson, John S.; DiLauro, Tim; Choudhury, G. Sayeed; Patton, Mark; Warner, James W.; Brown, Elizabeth W.; Heery, Rachel; Carpenter, Leona; Day, Michael

    2001-01-01

    Includes five articles that discuss the OAI (Open Archive Initiative), an interface between data providers and service providers; information objects and digital rights management interoperability; digitizing library collections, including automated name authority control, metadata, and text searching engines; and building digital library services…

  15. Collecting Artists' Books.

    ERIC Educational Resources Information Center

    Dalberto, Janet

    1983-01-01

    Discussion of increase in library collections of artists' books (artwork conceived in book form and designed entirely by artists) highlights reasons to collect artists' books, major collections, establishing a collection, housing and preservation, organization, outreach, and networking. Collection policy and procedures of Virginia Commonwealth…

  16. Social Context and Resources for Language Learning

    ERIC Educational Resources Information Center

    Palfreyman, David

    2006-01-01

    Until recently, research in applied linguistics has tended to treat learners in relative isolation from their context, and to study primarily classroom and other educational contexts. This paper in contrast focuses on the contexts which frame learning, and in particular the resources which these contexts provide. A model is outlined which includes…

  17. Influence of Contexts on Vocabulary Testing

    ERIC Educational Resources Information Center

    Gao, Chun-mei

    2007-01-01

    In vocabulary testing, whether to adopt context is a heat-debated topic. In the article, an experiment is designed to investigate what is the effect of zero context and sentence context on the vocabulary testing? And how do the different kinds of context in vocabulary affect the subjects' performance? The experimental result demonstrates that…

  18. Effects of extended context discrimination training and context extinction on transfer of context dependency of conditioned flavor aversion.

    PubMed

    Iguchi, Yoshio; Fukumoto, Kazuya; Sawa, Kosuke; Ishii, Kiyoshi

    2014-03-01

    We trained rats in a context discrimination paradigm by pairing a sucrose solution with lithium chloride in one context (conditioning context) and simple exposure to the same fluid in a second (neutral) context to establish a context-dependent aversion to the conditioned fluid. We then investigated whether transfer of the context dependency to a test fluid (a sodium chloride solution) was affected by two post-discrimination training treatments, an extended context discrimination training, and non-reinforced exposure to the conditioning context (context extinction). We found that the context-dependent flavor aversion that had been specific to sucrose transferred to the test fluid after the extensive training (Experiment 1). Context extinction eliminated the transfer effect that had been observed immediately after the context discrimination training (Experiment 2). In addition, an aversion acquired by sucrose through a simple conditioning of sucrose-LiCl pairings did not generalize to the test fluid (Experiment 3). These results emphasize the importance of a Pavlovian excitatory association between the conditioning context and nausea as a primary source of transfer of the context dependency, rather than a generalization of aversion acquired by the conditioned fluid to the test fluid.

  19. Overview of the Student Collection on ComPADRE

    NASA Astrophysics Data System (ADS)

    Donnelly, David

    2006-12-01

    The Nucleus is the student collection in the ComPADRE digital library. The collection has been developed with two main goals: to provide valuable resources to physics and astronomy students, and to build an online student community. The author will present the salient features of the collection, and discuss their historical development. The author will also discuss the student collection in the context of the entire ComPADRE project. The relation of the collection to the other collections in ComPADRE will also be discussed.

  20. Context Aware Middleware Architectures: Survey and Challenges

    PubMed Central

    Li, Xin; Eckert, Martina; Martinez, José-Fernán; Rubio, Gregorio

    2015-01-01

    Context aware applications, which can adapt their behaviors to changing environments, are attracting more and more attention. To simplify the complexity of developing applications, context aware middleware, which introduces context awareness into the traditional middleware, is highlighted to provide a homogeneous interface involving generic context management solutions. This paper provides a survey of state-of-the-art context aware middleware architectures proposed during the period from 2009 through 2015. First, a preliminary background, such as the principles of context, context awareness, context modelling, and context reasoning, is provided for a comprehensive understanding of context aware middleware. On this basis, an overview of eleven carefully selected middleware architectures is presented and their main features explained. Then, thorough comparisons and analysis of the presented middleware architectures are performed based on technical parameters including architectural style, context abstraction, context reasoning, scalability, fault tolerance, interoperability, service discovery, storage, security & privacy, context awareness level, and cloud-based big data analytics. The analysis shows that there is actually no context aware middleware architecture that complies with all requirements. Finally, challenges are pointed out as open issues for future work. PMID:26307988

  1. Context Aware Middleware Architectures: Survey and Challenges.

    PubMed

    Li, Xin; Eckert, Martina; Martinez, José-Fernán; Rubio, Gregorio

    2015-08-20

    Context aware applications, which can adapt their behaviors to changing environments, are attracting more and more attention. To simplify the complexity of developing applications, context aware middleware, which introduces context awareness into the traditional middleware, is highlighted to provide a homogeneous interface involving generic context management solutions. This paper provides a survey of state-of-the-art context aware middleware architectures proposed during the period from 2009 through 2015. First, a preliminary background, such as the principles of context, context awareness, context modelling, and context reasoning, is provided for a comprehensive understanding of context aware middleware. On this basis, an overview of eleven carefully selected middleware architectures is presented and their main features explained. Then, thorough comparisons and analysis of the presented middleware architectures are performed based on technical parameters including architectural style, context abstraction, context reasoning, scalability, fault tolerance, interoperability, service discovery, storage, security & privacy, context awareness level, and cloud-based big data analytics. The analysis shows that there is actually no context aware middleware architecture that complies with all requirements. Finally, challenges are pointed out as open issues for future work.

  2. Design Research in the Context of Federal Law Enforcement

    DTIC Science & Technology

    2014-10-13

    solution to automate and standardize the processing and collection of paper-based evidence using OCR . Resources 18 Months | Team of 3–7 | 50–100...inform the current project. Data Agency documentation, training, directives, etc. OCR technology solutions Purpose Define product context Understand the...scanners to automate the intake of evidence and related information. Use OCR technology to provide efficient, complete and accurate records. Provide

  3. Vehicle Detection in Wide Area Aerial Surveillance using Temporal Context

    DTIC Science & Technology

    2013-07-01

    and these vehicles will cover a continuous region of the road, we propose a novel Temporal Context(TC) method, which can capture the road information...collection of information if it does not display a currently valid OMB control number 1. REPORT DATE JUL 2013 2. REPORT TYPE 3. DATES COVERED 00-00...car, the boundary of the front windshield and the shadow as features and integrated these features in the structure of the Bayesian network. Also

  4. Context representation and fusion: advancements and opportunities.

    PubMed

    Khattak, Asad Masood; Akbar, Noman; Aazam, Mohammad; Ali, Taqdir; Khan, Adil Mehmood; Jeon, Seokhee; Hwang, Myunggwon; Lee, Sungyoung

    2014-05-30

    The acceptance and usability of context-aware systems have given them the edge of wide use in various domains and has also attracted the attention of researchers in the area of context-aware computing. Making user context information available to such systems is the center of attention. However, there is very little emphasis given to the process of context representation and context fusion which are integral parts of context-aware systems. Context representation and fusion facilitate in recognizing the dependency/relationship of one data source on another to extract a better understanding of user context. The problem is more critical when data is emerging from heterogeneous sources of diverse nature like sensors, user profiles, and social interactions and also at different timestamps. Both the processes of context representation and fusion are followed in one way or another; however, they are not discussed explicitly for the realization of context-aware systems. In other words most of the context-aware systems underestimate the importance context representation and fusion. This research has explicitly focused on the importance of both the processes of context representation and fusion and has streamlined their existence in the overall architecture of context-aware systems' design and development. Various applications of context representation and fusion in context-aware systems are also highlighted in this research. A detailed review on both the processes is provided in this research with their applications. Future research directions (challenges) are also highlighted which needs proper attention for the purpose of achieving the goal of realizing context-aware systems.

  5. Context Representation and Fusion: Advancements and Opportunities

    PubMed Central

    Khattak, Asad Masood; Akbar, Noman; Aazam, Mohammad; Ali, Taqdir; Khan, Adil Mehmood; Jeon, Seokhee; Hwang, Myunggwon; Lee, Sungyoung

    2014-01-01

    The acceptance and usability of context-aware systems have given them the edge of wide use in various domains and has also attracted the attention of researchers in the area of context-aware computing. Making user context information available to such systems is the center of attention. However, there is very little emphasis given to the process of context representation and context fusion which are integral parts of context-aware systems. Context representation and fusion facilitate in recognizing the dependency/relationship of one data source on another to extract a better understanding of user context. The problem is more critical when data is emerging from heterogeneous sources of diverse nature like sensors, user profiles, and social interactions and also at different timestamps. Both the processes of context representation and fusion are followed in one way or another; however, they are not discussed explicitly for the realization of context-aware systems. In other words most of the context-aware systems underestimate the importance context representation and fusion. This research has explicitly focused on the importance of both the processes of context representation and fusion and has streamlined their existence in the overall architecture of context-aware systems’ design and development. Various applications of context representation and fusion in context-aware systems are also highlighted in this research. A detailed review on both the processes is provided in this research with their applications. Future research directions (challenges) are also highlighted which needs proper attention for the purpose of achieving the goal of realizing context-aware systems. PMID:24887042

  6. 78 FR 65674 - Agency Information Collection Activities: Proposed Collection: Public Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-01

    ... Collection Request Title: Nurse Faculty Loan Program-- New Program Specific Data Form. OMB No.: 0915-xxxx--NEW. Abstract: This clearance request is for approval of the new Nurse Faculty Loan Program (NFLP... education programs that will prepare students to teach. Burden Statement: Burden in this context means...

  7. Reward, context, and human behaviour.

    PubMed

    Blaukopf, Clare L; DiGirolamo, Gregory J

    2007-05-29

    Animal models of reward processing have revealed an extensive network of brain areas that process different aspects of reward, from expectation and prediction to calculation of relative value. These results have been confirmed and extended in human neuroimaging to encompass secondary rewards more unique to humans, such as money. The majority of the extant literature covers the brain areas associated with rewards whilst neglecting analysis of the actual behaviours that these rewards generate. This review strives to redress this imbalance by illustrating the importance of looking at the behavioural outcome of rewards and the context in which they are produced. Following a brief review of the literature of reward-related activity in the brain, we examine the effect of reward context on actions. These studies reveal how the presence of reward vs. reward and punishment, or being conscious vs. unconscious of reward-related actions, differentially influence behaviour. The latter finding is of particular importance given the extent to which animal models are used in understanding the reward systems of the human mind. It is clear that further studies are needed to learn about the human reaction to reward in its entirety, including any distinctions between conscious and unconscious behaviours. We propose that studies of reward entail a measure of the animal's (human or nonhuman) knowledge of the reward and knowledge of its own behavioural outcome to achieve that reward.

  8. The shading cue in context

    PubMed Central

    Wagemans, Johan; van Doorn, Andrea J; Koenderink, Jan J

    2010-01-01

    The shading cue is supposed to be a major factor in monocular stereopsis. However, the hypothesis is hardly corroborated by available data. For instance, the conventional stimulus used in perception research, which involves a circular disk with monotonic luminance gradient on a uniform surround, is theoretically ‘explained’ by any quadric surface, including spherical caps or cups (the conventional response categories), cylindrical ruts or ridges, and saddle surfaces. Whereas cylindrical ruts or ridges are reported when the outline is changed from circular to square, saddle surfaces are never reported. We introduce a method that allows us to differentiate between such possible responses. We report observations on a number of variations of the conventional stimulus, including variations of shape and quality of the boundary, and contexts that allow the observer to infer illumination direction. We find strong and expected influences of outline shape, but, perhaps surprisingly, we fail to find any influence of context, and only partial influence of outline quality. Moreover, we report appreciable differences within the generic population. We trace some of the idiosyncrasies (as compared to shape from shading algorithms) of the human observer to generic properties of the environment, in particular the fact that many objects are limited in size and elliptically convex over most of their boundaries. PMID:23145221

  9. Motor interference in interactive contexts

    PubMed Central

    Chinellato, Eris; Castiello, Umberto; Sartori, Luisa

    2015-01-01

    Action observation and execution share overlapping neural substrates, so that simultaneous activation by observation and execution modulates motor performance. Previous literature on simple prehension tasks has revealed that motor influence can be two-sided: facilitation for observed and performed congruent actions and interference for incongruent actions. But little is known of the specific modulations of motor performance in complex forms of interaction. Is it possible that the very same observed movement can lead either to interference or facilitation effects on a temporally overlapping congruent executed action, depending on the context? To answer this question participants were asked to perform a reach-to-grasp movement adopting a precision grip (PG) while: (i) observing a fixation cross, (ii) observing an actor performing a PG with interactive purposes, (iii) observing an actor performing a PG without interactive purposes. In particular, in the interactive condition the actor was shown trying to pour some sugar on a large cup located out of her reach but close to the participant watching the video, thus eliciting in reaction a complementary whole-hand grasp. Notably, fine-grained kinematic analysis for this condition revealed a specific delay in the grasping and reaching components and an increased trajectory deviation despite the observed and executed movement’s congruency. Moreover, early peaks of trajectory deviation seem to indicate that socially relevant stimuli are acknowledged by the motor system very early. These data suggest that interactive contexts can determine a prompt modulation of stimulus–response compatibility effects. PMID:26113835

  10. Context-Aware Recommender Systems

    NASA Astrophysics Data System (ADS)

    Adomavicius, Gediminas; Tuzhilin, Alexander

    The importance of contextual information has been recognized by researchers and practitioners in many disciplines, including e-commerce personalization, information retrieval, ubiquitous and mobile computing, data mining, marketing, and management. While a substantial amount of research has already been performed in the area of recommender systems, most existing approaches focus on recommending the most relevant items to users without taking into account any additional contextual information, such as time, location, or the company of other people (e.g., for watching movies or dining out). In this chapter we argue that relevant contextual information does matter in recommender systems and that it is important to take this information into account when providing recommendations. We discuss the general notion of context and how it can be modeled in recommender systems. Furthermore, we introduce three different algorithmic paradigms - contextual prefiltering, post-filtering, and modeling - for incorporating contextual information into the recommendation process, discuss the possibilities of combining several contextaware recommendation techniques into a single unifying approach, and provide a case study of one such combined approach. Finally, we present additional capabilities for context-aware recommenders and discuss important and promising directions for future research.

  11. Collective Learning: Interaction and a Shared Action Arena

    ERIC Educational Resources Information Center

    Doos, Marianne; Wilhelmson, Lena

    2011-01-01

    Purpose: The paper seeks to argue for a theoretical contribution that deals with the detection of collective learning. The aim is to examine and clarify the genesis processes of collective learning. The empirical basis is a telecoms context with task-driven networking across both internal and external organisational borders.…

  12. High School Accountability: The Role of Perceived Collective Efficacy

    ERIC Educational Resources Information Center

    Goddard, Roger D.; LoGerfo, Laura; Hoy, Wayne K.

    2004-01-01

    This study examined the relationship between collective efficacy and high school student achievement in a state with an accountability system heavily focused on achievement, measured by mandatory assessments in multiple content areas. Using social cognitive theory, a theoretical model was developed linking school context and collective efficacy to…

  13. Visualising Cultures: The "European Picture Book Collection" Moves "Down Under"

    ERIC Educational Resources Information Center

    Cotton, Penni; Daly, Nicola

    2015-01-01

    The potential for picture books in national collections to act as mirrors reflecting the reader's cultural identity, is widely accepted. This paper shows that the books in a New Zealand Picture Book Collection can also become windows into unfamiliar worlds for non-New Zealand readers, giving them the opportunity to learn more about a context in…

  14. Context-Free Languages of Countable Words

    NASA Astrophysics Data System (ADS)

    Ésik, Zoltán; Iván, Szabolcs

    We define context-free grammars with Büchi acceptance condition generating languages of countable words. We establish several closure properties and decidability results for the class of Büchi context-free languages generated by these grammars. We also define context-free grammars with Müller acceptance condition and show that there is a language generated by a grammar with Müller acceptance condition which is not a Büchi context-free language.

  15. False Context Fear Memory in Rats

    ERIC Educational Resources Information Center

    Bae, Sarah; Holmes, Nathan M.; Westbrook, R. Frederick

    2015-01-01

    Four experiments used rats to study false context fear memories. In Experiment 1, rats were pre-exposed to a distinctive chamber (context A) or to a control environment (context C), shocked after a delay in a second chamber (context B) and tested either in B or A. Rats pre-exposed to A froze just as much as control rats in B but more than control…

  16. A First Step Forward: Context Assessment

    ERIC Educational Resources Information Center

    Conner, Ross F.; Fitzpatrick, Jody L.; Rog, Debra J.

    2012-01-01

    In this chapter, we revisit and expand the context framework of Debra Rog, informed by three cases and by new aspects that we have identified. We then propose a way to move the framework into action, making context explicit. Based on the framework's components, we describe and illustrate a process we label context assessment (CA), which provides a…

  17. The Importance of Context in Task Selection

    ERIC Educational Resources Information Center

    Weiland, Travis

    2017-01-01

    Context is at the core of any statistical investigation, yet many statistics tasks barely require students to go beyond superficial consideration of the contexts the tasks are situated in. In this article, I discuss a framework for evaluating the level of interaction with context a task requires of students and how to modify tasks to increase the…

  18. Stress Disrupts Context-Dependent Memory

    ERIC Educational Resources Information Center

    Schwabe, Lars; Bohringer, Andreas; Wolf, Oliver T.

    2009-01-01

    Memory is facilitated when the retrieval context resembles the learning context. The brain structures underlying contextual influences on memory are susceptible to stress. Whether stress interferes with context-dependent memory is still unknown. We exposed healthy adults to stress or a control procedure before they learned an object-location task…

  19. Context Management Platform for Tourism Applications

    PubMed Central

    Buján, David; Martín, David; Torices, Ortzi; López-de-Ipiña, Diego; Lamsfus, Carlos; Abaitua, Joseba; Alzua-Sorzabal, Aurkene

    2013-01-01

    The notion of context has been widely studied and there are several authors that have proposed different definitions of context. However, context has not been widely studied in the framework of human mobility and the notion of context has been imported directly from other computing fields without specifically addressing the tourism domain requirements. In order to store and manage context information a context data model and a context management platform are needed. Ontologies have been widely used in context modelling, but many of them are designed to be applied in general ubiquitous computing environments, do not contain specific concepts related to the tourism domain or some approaches do not contain enough concepts to represent context information related to the visitor on the move. That is why we propose a new approach to provide a better solution to model context data in tourism environments, adding more value to our solution reusing data about tourist resources from an Open Data repository and publishing it as Linked Data. We also propose the architecture for a context information management platform based on this context data model. PMID:23797739

  20. Hierarchical Context Modeling for Video Event Recognition.

    PubMed

    Wang, Xiaoyang; Ji, Qiang

    2016-10-11

    Current video event recognition research remains largely target-centered. For real-world surveillance videos, targetcentered event recognition faces great challenges due to large intra-class target variation, limited image resolution, and poor detection and tracking results. To mitigate these challenges, we introduced a context-augmented video event recognition approach. Specifically, we explicitly capture different types of contexts from three levels including image level, semantic level, and prior level. At the image level, we introduce two types of contextual features including the appearance context features and interaction context features to capture the appearance of context objects and their interactions with the target objects. At the semantic level, we propose a deep model based on deep Boltzmann machine to learn event object representations and their interactions. At the prior level, we utilize two types of prior-level contexts including scene priming and dynamic cueing. Finally, we introduce a hierarchical context model that systematically integrates the contextual information at different levels. Through the hierarchical context model, contexts at different levels jointly contribute to the event recognition. We evaluate the hierarchical context model for event recognition on benchmark surveillance video datasets. Results show that incorporating contexts in each level can improve event recognition performance, and jointly integrating three levels of contexts through our hierarchical model achieves the best performance.

  1. The Embedded Narrative: Navigating through Multiple Contexts

    ERIC Educational Resources Information Center

    Zilber, Tammar B.; Tuval-Mashiach, Rivka; Lieblich, Amia

    2008-01-01

    Narrative psychology theoreticians emphasized the importance of context to the construction, communication, and understanding of individuals' life stories. Still, the various contexts in which, and in reference to which, life stories are told, the methodological implications of the importance of context, and the possible interpretive moves…

  2. Context management platform for tourism applications.

    PubMed

    Buján, David; Martín, David; Torices, Ortzi; López-de-Ipiña, Diego; Lamsfus, Carlos; Abaitua, Joseba; Alzua-Sorzabal, Aurkene

    2013-06-24

    The notion of context has been widely studied and there are several authors that have proposed different definitions of context. However, context has not been widely studied in the framework of human mobility and the notion of context has been imported directly from other computing fields without specifically addressing the tourism domain requirements. In order to store and manage context information a context data model and a context management platform are needed. Ontologies have been widely used in context modelling, but many of them are designed to be applied in general ubiquitous computing environments, do not contain specific concepts related to the tourism domain or some approaches do not contain enough concepts to represent context information related to the visitor on the move. That is why we propose a new approach to provide a better solution to model context data in tourism environments, adding more value to our solution reusing data about tourist resources from an Open Data repository and publishing it as Linked Data. We also propose the architecture for a context information management platform based on this context data model.

  3. Context and the human microbiome.

    PubMed

    McDonald, Daniel; Birmingham, Amanda; Knight, Rob

    2015-11-04

    Human microbiome reference datasets provide epidemiological context for researchers, enabling them to uncover new insights into their own data through meta-analyses. In addition, large and comprehensive reference sets offer a means to develop or test hypotheses and can pave the way for addressing practical study design considerations such as sample size decisions. We discuss the importance of reference sets in human microbiome research, limitations of existing resources, technical challenges to employing reference sets, examples of their usage, and contributions of the American Gut Project to the development of a comprehensive reference set. Through engaging the general public, the American Gut Project aims to address many of the issues present in existing reference resources, characterizing health and disease, lifestyle, and dietary choices of the participants while extending its efforts globally through international collaborations.

  4. [The contradictory contexts of interdisciplinarity].

    PubMed

    Schilling, T; Haverich, A

    2012-04-01

    The benefits of interdisciplinary approaches in patient care, research and education are quite obvious and set the trend for more interdisciplinary structures. In order to achieve sustained success, however, there are numerous risks of interdisciplinary collaboration that have to be considered. Interdisciplinarity leads to an increasing degree of specialization and consequently to a greater experience of specialists in highly specific procedures. Nevertheless, this is accompanied by a loss of experience of those who do not perform these procedures anymore. Not least, due to the high specialization, the surgeon's profession is changing from generalist to specialist. Hence, the education of young physicians, students and researchers has to be adapted to this reality. It remains unanswered if these changes contribute to the decline in the number of applicants in surgery. In conclusion, the risks of the contradictory contexts of interdisciplinarity can be counteracted with simple principles of fair and cooperative partnership.

  5. Galaxies in the Cosmological Context

    NASA Astrophysics Data System (ADS)

    Lucia, Gabriella De

    In the last decades, a number of observational experiments have converged to establish the cold dark matter model as the "de facto" standard model for structure formation. While the cosmological paradigm appears to be firmly established, a theory of galaxy formation remains elusive, and our understanding of the physical processes that determine the observed variety of galaxy properties and their evolution as a function of cosmic time and environment is far from complete. Although much progress has been made, both on the theoretical and observational side, understanding how galaxies form and evolve remains one of the most outstanding questions of modern astrophysics. This chapter provides an introduction to ideas and concepts that underpin modern models of galaxy formation and evolution, in the currently favoured cosmological context.

  6. Sample collection, biobanking, and analysis.

    PubMed

    Ahsman, Maurice J; Tibboel, Dick; Mathot, Ron A A; de Wildt, Saskia N

    2011-01-01

    Pediatric pharmacokinetic studies require sampling of biofluids from neonates and children. Limitations on sampling frequency and sample volume complicate the design of these studies. In addition, strict guidelines, designed to guarantee patient safety, are in place. This chapter describes the practical implications of sample collection and their storage, with special focus on the selection of the appropriate type of biofluid and withdrawal technique. In addition, we describe appropriate measures for storage of these specimens, for example, in the context of biobanking, and the requirements on drug assay methods that they pose. Pharmacokinetic studies in children are possible, but they require careful selection of an appropriate sampling method, specimen volume, and assay method. The checklist provided could help prospective researchers with the design of an appropriate study protocol and infrastructure.

  7. Epigenetics in an ecotoxicological context.

    PubMed

    Vandegehuchte, Michiel B; Janssen, Colin R

    2014-04-01

    Epigenetics can play a role in interactions between chemicals and exposed species, between species and abiotic ecosystem components or between species of the same or another population in a community. Technological progress and advanced insights into epigenetic processes have led to the description of epigenetic features (mainly DNA methylation) in many ecologically relevant species: algae, plants, several invertebrates and fish. Epigenetic changes in plants, insects and cladocerans have been reported to be induced by various environmental stress factors including nutrition or water deficiency, grazing, light or temperature alterations, social environment, and dissolved organic matter concentrations. As regards chemicals, studies in rats and mice exposed to specific pesticides, hydrocarbons, dioxins, and endocrine disrupting chemicals demonstrated the induction of epigenetic changes, suggesting the need for further research with these substances in an ecotoxicological context. In fish and plants, exposure to polyaromatic hydrocarbons, metals, and soluble fractions of solid waste affected the epigenetic status. A novel concept in ecotoxicological epigenetics is the induction of transgenerational stress resistance upon chemical exposure, as demonstrated in rice exposed to metals. Evaluating epigenetics in ecotoxicological field studies is a second relatively new approach. A cryptic lineage of earthworms had developed arsenic tolerance in the field, concurrent with specific DNA methylation patterns. Flatfish caught in the framework of environmental monitoring had developed tumours, exhibiting specific DNA methylation patterns. Two main potential implications of epigenetics in an ecotoxicological context are (1) the possibility of transgenerationally inherited, chemical stress-induced epigenetic changes with associated phenotypes and (2) epigenetically induced adaptation to stress upon long-term chemical exposure. Key knowledge gaps are concerned with the causality of

  8. Collection Mode Lens System

    DOEpatents

    Fletcher, Daniel A.; Kino, Gordon S.

    2002-11-05

    A lens system including a collection lens and a microlens spaced from the collection lens adjacent the region to be observed. The diameter of the observablel region depends substantially on the radius of the microlens.

  9. Context based configuration management system

    NASA Technical Reports Server (NTRS)

    Gawdiak, Yuri O. (Inventor); Gurram, Mohana M. (Inventor); Maluf, David A. (Inventor); Mederos, Luis A. (Inventor)

    2010-01-01

    A computer-based system for configuring and displaying information on changes in, and present status of, a collection of events associated with a project. Classes of icons for decision events, configurations and feedback mechanisms, and time lines (sequential and/or simultaneous) for related events are displayed. Metadata for each icon in each class is displayed by choosing and activating the corresponding icon. Access control (viewing, reading, writing, editing, deleting, etc.) is optionally imposed for metadata and other displayed information.

  10. Social capital in an outdoor recreation context.

    PubMed

    Mann, Marilynne; Leahy, Jessica

    2010-02-01

    This study examined social capital development in three all-terrain vehicles (ATV) clubs in Maine using an adapted version of Lin's (2001) social capital theory model. The structural components of social capital identified included collective assets and individual assets in the form of normative behavior and trust relationships. Also identified were counter-norms for individual ATV riders identified as having divergent norms from club members. The second component of social capital is access to and mobilization of network contacts and resources. Access networks in the context of the ATV clubs studied were identified as community and landowner relations while mobilization of resources was existent in club membership attempts toward self-governance and efforts of the statewide "umbrella" organization. Instrumental outcomes benefit society and expressive outcomes benefit the individual. Both types of returns are present in the data suggesting that ATV clubs are creating social capital. This is important information to clubs who desire to market themselves, improve their reputations, and enhance their volunteer association. It is of further interest to state governments who fund clubs through trail grants as proof that a return on investment is being realized. Theoretical and applied implications for these and other types of recreation-based volunteer associations (e.g., clubs, friends groups, advocacy groups) are presented.

  11. Conscientiousness in life course context: a commentary.

    PubMed

    Costanzo, Philip R

    2014-05-01

    In this commentary, the common themes from the interesting articles in this special section of Developmental Psychology are considered as they illuminate the potential ontogenetic sources of the conscientiousness-well-being-longevity interconnections that have emerged in recent research. In particular, consideration is given to the changing nature of the expression of conscientiousness over the life course and the importance of the causally linked chain of developmental events associated with the sustenance of this trait from early childhood to later life. Methodological as well as conceptual issues are part of the common thematic analysis provided. In addition, several more or less neglected issues are addressed in the commentary. These include an examination of the potential roles of self-presentation social context and social aggregation in the developmentally emergent conscientiousness-well-being relationship. Further, the potential downside of the moral tinge of the conscientiousness construct is considered, as is the cultural variation in the benefits of conscientiousness to well-being. Finally, the applied significance of research on the conscientiousness-well-being link to health promotion over the life course is addressed. The commentary concludes with reflections on the transformation of 1970s trait-like conceptions as unbending tautological predictors of behavior into the situationally and developmentally nuanced conceptions of conscientiousness provided in these collected articles.

  12. Privacy and Property in the Biobank Context

    PubMed Central

    2010-01-01

    A research biobank is a collection of personal health and lifestyle information, including genetic samples of yet unknown but possibly large information potential about the participant. For the participants, the risk of taking part is not bodily harm but infringements of their privacy and the harmful consequences such infringements might have. But what do we mean by privacy? Which harms are we talking about? To address such questions we need to get a grip on what privacy is all about and aim for a fruitful perspective on the issues of property and privacy rights in the context of biobanking. This paper argues that the limits and handling of private matters is determined in specific social relations. The crucial point is thus to determine which information and activities are or are not the legitimate concern of others. Privacy and property rights should be seen as balanced by duties, that is as inherently relational interests extending into the public sphere, rather than to see these rights as the control of an object—for instance the participant’s biobank material. PMID:20799053

  13. Guide to data collection

    NASA Technical Reports Server (NTRS)

    1981-01-01

    Guidelines and recommendations are presented for the collection of software development data. Motivation and planning for, and implementation and management of, a data collection effort are discussed. Topics covered include types, sources, and availability of data; methods and costs of data collection; types of analyses supported; and warnings and suggestions based on software engineering laboratory (SEL) experiences. This document is intended as a practical guide for software managers and engineers, abstracted and generalized from 5 years of SEL data collection.

  14. Use of Context in Video Processing

    NASA Astrophysics Data System (ADS)

    Wu, Chen; Aghajan, Hamid

    Interpreting an event or a scene based on visual data often requires additional contextual information. Contextual information may be obtained from different sources. In this chapter, we discuss two broad categories of contextual sources: environmental context and user-centric context. Environmental context refers to information derived from domain knowledge or from concurrently sensed effects in the area of operation. User-centric context refers to information obtained and accumulated from the user. Both types of context can include static or dynamic contextual elements. Examples from a smart home environment are presented to illustrate how different types of contextual data can be applied to aid the decision-making process.

  15. Student Loan Collection Procedures.

    ERIC Educational Resources Information Center

    National Association of College and University Business Officers, Washington, DC.

    This manual on the collection of student loans is intended for the use of business officers and loan collection personnel of colleges and universities of all sizes. The introductory chapter is an overview of sound collection practices and procedures. It discusses the making of a loan, in-school servicing of the accounts, the exit interview, the…

  16. Collection Development Project.

    ERIC Educational Resources Information Center

    Nuby, Mary

    Undertaken to provide data on the current status of collection development in selected academic libraries, this study also analyzed the structure of the collection development function at Chicago Academic Library Council (CALC) institutions and outlined a formal collection development policy for Chicago State University's Douglas Library.…

  17. Collection Assessment Manual.

    ERIC Educational Resources Information Center

    Hall, Blaine H.

    This manual is designed to help bibliographers, librarians, and other materials selectors plan and conduct systematic collection evaluations using both collection centered and client centered techniques. Topics covered in five chapters are: (1) planning the assessment; (2) collection-centered techniques, comprising the compilation of statistics,…

  18. Faculty Collective Bargaining.

    ERIC Educational Resources Information Center

    Nelson, Hershel H.

    Faculties in a number of institutions of higher education utilize collective bargaining agents to represent their interests. Collective bargaining is primarily a community college phenomenon. Of 212 institutions with certified bargaining agents, 150 are 2-year institutions. Motivating factors in choosing the collective bargaining process are: the…

  19. Concepts of context in music therapy

    PubMed Central

    Rolvsjord, Randi; Stige, Brynjulf

    2015-01-01

    In contemporary music therapy as well as in related interdisciplinary fields, the importance of context in relation to theory, research, and practice has been emphasized. However, the word context seems to be used in several different ways and conceptualizations of contextual approaches vary too. The objective of this theoretical article is to clarify traditions of language use in relation to context in music therapy. In reviewing and discussing the literature, we focus on the field of mental health care. When discussing issues related to context, this literature partly focuses on the surroundings of music therapy practice, partly on the ecology of reciprocal influences within and between situations or systems. On this basis, three types of context awareness in music therapy are identified: music therapy in context; music therapy as context; and music therapy as interacting contexts. The identified types of context awareness are exemplified through references to music therapy literature and then discussed in relation to two very different metaphors, namely context as frame and context as link. Implications for practice, research, and theory development in music therapy are suggested. PMID:26157199

  20. Concepts of context in music therapy.

    PubMed

    Rolvsjord, Randi; Stige, Brynjulf

    2015-01-02

    In contemporary music therapy as well as in related interdisciplinary fields, the importance of context in relation to theory, research, and practice has been emphasized. However, the word context seems to be used in several different ways and conceptualizations of contextual approaches vary too. The objective of this theoretical article is to clarify traditions of language use in relation to context in music therapy. In reviewing and discussing the literature, we focus on the field of mental health care. When discussing issues related to context, this literature partly focuses on the surroundings of music therapy practice, partly on the ecology of reciprocal influences within and between situations or systems. On this basis, three types of context awareness in music therapy are identified: music therapy in context; music therapy as context; and music therapy as interacting contexts. The identified types of context awareness are exemplified through references to music therapy literature and then discussed in relation to two very different metaphors, namely context as frame and context as link. Implications for practice, research, and theory development in music therapy are suggested.

  1. Context-specific adaptation of saccade gain

    NASA Technical Reports Server (NTRS)

    Shelhamer, Mark; Clendaniel, Richard A.

    2002-01-01

    Previous studies established that vestibular reflexes can have two adapted states (e.g., gain) simultaneously, and that a context cue (e.g., vertical eye position) can switch between the two states. The present study examined this phenomenon of context-specific adaptationfor horizontal saccades, using a variety of contexts. Our overall goal was to assess the efficacy of different context cues in switching between adapted states. A standard double-step paradigm was used to adapt saccade gain. In each experiment, we asked for a simultaneous gain decrease in one context and gain increase in another context, and then determined if a change in the context would invoke switching between the adapted states. Horizontal eye position worked well as a context cue: saccades with the eyes deviated to the right could be made to have higher gains while saccades with the eyes deviated to the left could be made to have lower gains. Vertical eye position was less effective. This suggests that the more closely related a context cue is to the response being adapted, the more effective it is. Roll tilt of the head, and upright versus supine orientations, were somewhat effective in context switching; these paradigms contain orientation of gravity with respect to the head as part of the context.

  2. Language context modulates reading route: an electrical neuroimaging study

    PubMed Central

    Buetler, Karin A.; de León Rodríguez, Diego; Laganaro, Marina; Müri, René; Spierer, Lucas; Annoni, Jean-Marie

    2014-01-01

    Introduction: The orthographic depth hypothesis (Katz and Feldman, 1983) posits that different reading routes are engaged depending on the type of grapheme/phoneme correspondence of the language being read. Shallow orthographies with consistent grapheme/phoneme correspondences favor encoding via non-lexical pathways, where each grapheme is sequentially mapped to its corresponding phoneme. In contrast, deep orthographies with inconsistent grapheme/phoneme correspondences favor lexical pathways, where phonemes are retrieved from specialized memory structures. This hypothesis, however, lacks compelling empirical support. The aim of the present study was to investigate the impact of orthographic depth on reading route selection using a within-subject design. Method: We presented the same pseudowords (PWs) to highly proficient bilinguals and manipulated the orthographic depth of PW reading by embedding them among two separated German or French language contexts, implicating respectively, shallow or deep orthography. High density electroencephalography was recorded during the task. Results: The topography of the ERPs to identical PWs differed 300–360 ms post-stimulus onset when the PWs were read in different orthographic depth context, indicating distinct brain networks engaged in reading during this time window. The brain sources underlying these topographic effects were located within left inferior frontal (German > French), parietal (French > German) and cingular areas (German > French). Conclusion: Reading in a shallow context favors non-lexical pathways, reflected in a stronger engagement of frontal phonological areas in the shallow versus the deep orthographic context. In contrast, reading PW in a deep orthographic context recruits less routine non-lexical pathways, reflected in a stronger engagement of visuo-attentional parietal areas in the deep versus shallow orthographic context. These collective results support a modulation of reading route by orthographic

  3. Context vector approach to image retrieval

    NASA Astrophysics Data System (ADS)

    Ren, Clara Z.; Means, Robert W.

    1998-04-01

    HNC developed a unique context vector approach to image retrieval in Image Contrast Addressable Retrieval System. The basis for this approach is the context vector approach to image representation. A context vector is a high dimensional vector of real numbers, derived from a set of features that are useful in discriminating between images in a particular domain. The image features are trained based upon the constrained 2D self-organizing learning law. The image context vector encodes both intra-image features and inter-image relationship. The similarity in the directions of the context vectors of a pair of images indicates their similarity of content. The context vector approach to image representation simplifies the image and retrieval indexing problem because simple Euclidean distance measurements between sets of context vectors are used as a measure of similarity.

  4. Identifying nonspecific SAGE tags by context of gene expression.

    PubMed

    Ge, Xijin; Wang, San Ming

    2008-01-01

    Many serial analysis of gene expression (SAGE) tags can be matched to multiple genes, leading to difficulty in SAGE data interpretation and analysis. As only a subset of genes in the human genome are transcribed in a certain type of tissue/cell, we used microarray expression data from different tissue types to define contexts of gene expression and to annotate SAGE tags collected from the same or similar tissue sources. To predict the original transcript contributing a nonspecific SAGE tag collected from a particular tissue, we ranked the corresponding genes by their expression levels determined by microarray. We developed a tissue-specific SAGE tag annotation database based on microarray data collected from 73 normal human tissues and 18 cancer tissues and cell lines. The database can be queried online at: http://www.basic.northwestern.edu/SAGE/. The accuracy of this database was confirmed by experimental data.

  5. A spatial planetary image database in the context of processing

    NASA Astrophysics Data System (ADS)

    Willner, K.; Tasdelen, E.

    2015-10-01

    Planetary image data is collected and archived by e.g. the European Planetary Science Archive (PSA) or its US counterpart the Planetary Data System (PDS). These archives usually organize the data according to missions and their respective instruments. Search queries can be posted to retrieve data of interest for a specific instrument data set. In the context of processing data of a number of sensors and missions this is not practical. In the scope of the EU FP7 project PRoViDE meta-data from imaging sensors were collected from PSA as well as PDS and were rearranged and restructured according to the processing needs. Exemplary image data gathered from rover and lander missions operated on the Martian surface was organized into a new unique data base. The data base is a core component of the PRoViDE processing and visualization system as it enables multi-mission and -sensor searches to fully exploit the collected data.

  6. Recall Improves in Short-Term Memory The More Recall Context Resembles Learning Context

    ERIC Educational Resources Information Center

    Falkenberg, Philippe R.

    1972-01-01

    Eight experiments are reported: the first four demonstrate the context effects in short-term-memory (that retrieval from STM improves as the context for learning is made more similar to the context for retrieval), and four more experiments examine the mechanism by which the context effect might operate. (Author/MB)

  7. Dynamics of Context-Dependent Recall: An Examination of Internal and External Context Change

    ERIC Educational Resources Information Center

    Unsworth, Nash; Spillers, Gregory J.; Brewer, Gene A.

    2012-01-01

    Retrieval dynamics in context-dependent recall were explored via manipulations of external and internal context in two experiments. Participants were tested in either the same or different context as the material was learned in and correct recalls, errors, and recall latency measures were examined. In both experiments changes in context resulted…

  8. Determinants of Prosocial Behavior in Included Versus Excluded Contexts.

    PubMed

    Cuadrado, Esther; Tabernero, Carmen; Steinel, Wolfgang

    2015-01-01

    Prosocial behavior (PSB) is increasingly becoming necessary as more and more individuals experience exclusion. In this context it is important to understand the motivational determinants of PSB. Here we report two experiments which analyzed the influence of dispositional (prosocialness; rejection sensitivity) and motivational variables (prosocial self-efficacy; prosocial collective efficacy; trust; anger; social affiliation motivation) on PSB under neutral contexts (Study 1), and once under inclusion or exclusion conditions (Study 2). Both studies provided evidence for the predicted mediation of PSB. Results in both neutral and inclusion and exclusion conditions supported our predictive model of PSB. In the model dispositional variables predicted motivational variables, which in turn predicted PSB. We showed that the investigated variables predicted PSB; this suggests that to promote PSB one could (1) foster prosocialness, prosocial self and collective efficacy, trust in others and affiliation motivation and (2) try to reduce negative feelings and the tendency to dread rejection in an attempt to reduce the negative impact that these variables have on PSB. Moreover, the few differences that emerged in the model between the inclusion and exclusion contexts suggested that in interventions with excluded individuals special care emphasis should be placed on addressing rejection sensitivity and lack of trust.

  9. Determinants of Prosocial Behavior in Included Versus Excluded Contexts

    PubMed Central

    Cuadrado, Esther; Tabernero, Carmen; Steinel, Wolfgang

    2016-01-01

    Prosocial behavior (PSB) is increasingly becoming necessary as more and more individuals experience exclusion. In this context it is important to understand the motivational determinants of PSB. Here we report two experiments which analyzed the influence of dispositional (prosocialness; rejection sensitivity) and motivational variables (prosocial self-efficacy; prosocial collective efficacy; trust; anger; social affiliation motivation) on PSB under neutral contexts (Study 1), and once under inclusion or exclusion conditions (Study 2). Both studies provided evidence for the predicted mediation of PSB. Results in both neutral and inclusion and exclusion conditions supported our predictive model of PSB. In the model dispositional variables predicted motivational variables, which in turn predicted PSB. We showed that the investigated variables predicted PSB; this suggests that to promote PSB one could (1) foster prosocialness, prosocial self and collective efficacy, trust in others and affiliation motivation and (2) try to reduce negative feelings and the tendency to dread rejection in an attempt to reduce the negative impact that these variables have on PSB. Moreover, the few differences that emerged in the model between the inclusion and exclusion contexts suggested that in interventions with excluded individuals special care emphasis should be placed on addressing rejection sensitivity and lack of trust. PMID:26779103

  10. Sensory, motor, and combined contexts for context-specific adaptation of saccade gain in humans

    NASA Technical Reports Server (NTRS)

    Shelhamer, Mark; Clendaniel, Richard

    2002-01-01

    Saccadic eye movements can be adapted in a context-specific manner such that their gain can be made to depend on the state of a prevailing context cue. We asked whether context cues are more effective if their nature is primarily sensory, motor, or a combination of sensory and motor. Subjects underwent context-specific adaptation using one of three different context cues: a pure sensory context (head roll-tilt right or left); a pure motor context (changes in saccade direction); or a combined sensory-motor context (head roll-tilt and changes in saccade direction). We observed context-specific adaptation in each condition; the greatest degree of context-specificity occurred in paradigms that used the motor cue, alone or in conjunction with the sensory cue. Copyright 2002 Elsevier Science Ireland Ltd.

  11. Environmental indicators of biofuel sustainability: what about context?

    PubMed

    Efroymson, Rebecca A; Dale, Virginia H; Kline, Keith L; McBride, Allen C; Bielicki, Jeffrey M; Smith, Raymond L; Parish, Esther S; Schweizer, Peter E; Shaw, Denice M

    2013-02-01

    Indicators of the environmental sustainability of biofuel production, distribution, and use should be selected, measured, and interpreted with respect to the context in which they are used. The context of a sustainability assessment includes the purpose, the particular biofuel production and distribution system, policy conditions, stakeholder values, location, temporal influences, spatial scale, baselines, and reference scenarios. We recommend that biofuel sustainability questions be formulated with respect to the context, that appropriate indicators of environmental sustainability be developed or selected from more generic suites, and that decision makers consider context in ascribing meaning to indicators. In addition, considerations such as technical objectives, varying values and perspectives of stakeholder groups, indicator cost, and availability and reliability of data need to be understood and considered. Sustainability indicators for biofuels are most useful if adequate historical data are available, information can be collected at appropriate spatial and temporal scales, organizations are committed to use indicator information in the decision-making process, and indicators can effectively guide behavior toward more sustainable practices.

  12. Environmental Indicators of Biofuel Sustainability: What About Context?

    NASA Astrophysics Data System (ADS)

    Efroymson, Rebecca A.; Dale, Virginia H.; Kline, Keith L.; McBride, Allen C.; Bielicki, Jeffrey M.; Smith, Raymond L.; Parish, Esther S.; Schweizer, Peter E.; Shaw, Denice M.

    2013-02-01

    Indicators of the environmental sustainability of biofuel production, distribution, and use should be selected, measured, and interpreted with respect to the context in which they are used. The context of a sustainability assessment includes the purpose, the particular biofuel production and distribution system, policy conditions, stakeholder values, location, temporal influences, spatial scale, baselines, and reference scenarios. We recommend that biofuel sustainability questions be formulated with respect to the context, that appropriate indicators of environmental sustainability be developed or selected from more generic suites, and that decision makers consider context in ascribing meaning to indicators. In addition, considerations such as technical objectives, varying values and perspectives of stakeholder groups, indicator cost, and availability and reliability of data need to be understood and considered. Sustainability indicators for biofuels are most useful if adequate historical data are available, information can be collected at appropriate spatial and temporal scales, organizations are committed to use indicator information in the decision-making process, and indicators can effectively guide behavior toward more sustainable practices.

  13. Vygotsky's Crisis: Argument, context, relevance.

    PubMed

    Hyman, Ludmila

    2012-06-01

    Vygotsky's The Historical Significance of the Crisis in Psychology (1926-1927) is an important text in the history and philosophy of psychology that has only become available to scholars in 1982 in Russian, and in 1997 in English. The goal of this paper is to introduce Vygotsky's conception of psychology to a wider audience. I argue that Vygotsky's argument about the "crisis" in psychology and its resolution can be fully understood only in the context of his social and political thinking. Vygotsky shared the enthusiasm, widespread among Russian leftist intelligentsia in the 1920s, that Soviet society had launched an unprecedented social experiment: The socialist revolution opened the way for establishing social conditions that would let the individual flourish. For Vygotsky, this meant that "a new man" of the future would become "the first and only species in biology that would create itself." He envisioned psychology as a science that would serve this humanist teleology. I propose that The Crisis is relevant today insofar as it helps us define a fundamental problem: How can we systematically account for the development of knowledge in psychology? I evaluate how Vygotsky addresses this problem as a historian of the crisis.

  14. Cloud Computing with Context Cameras

    NASA Astrophysics Data System (ADS)

    Pickles, A. J.; Rosing, W. E.

    2016-05-01

    We summarize methods and plans to monitor and calibrate photometric observations with our autonomous, robotic network of 2m, 1m and 40cm telescopes. These are sited globally to optimize our ability to observe time-variable sources. Wide field "context" cameras are aligned with our network telescopes and cycle every ˜2 minutes through BVr'i'z' filters, spanning our optical range. We measure instantaneous zero-point offsets and transparency (throughput) against calibrators in the 5-12m range from the all-sky Tycho2 catalog, and periodically against primary standards. Similar measurements are made for all our science images, with typical fields of view of ˜0.5 degrees. These are matched against Landolt, Stetson and Sloan standards, and against calibrators in the 10-17m range from the all-sky APASS catalog. Such measurements provide pretty good instantaneous flux calibration, often to better than 5%, even in cloudy conditions. Zero-point and transparency measurements can be used to characterize, monitor and inter-compare sites and equipment. When accurate calibrations of Target against Standard fields are required, monitoring measurements can be used to select truly photometric periods when accurate calibrations can be automatically scheduled and performed.

  15. Multiperspective Focus+Context Visualization.

    PubMed

    Wu, Meng-Lin; Popescu, Voicu

    2016-05-01

    Occlusions are a severe bottleneck for the visualization of large and complex datasets. Conventional images only show dataset elements to which there is a direct line of sight, which significantly limits the information bandwidth of the visualization. Multiperspective visualization is a powerful approach for alleviating occlusions to show more than what is visible from a single viewpoint. However, constructing and rendering multiperspective visualizations is challenging. We present a framework for designing multiperspective focus+context visualizations with great flexibility by manipulating the underlying camera model. The focus region viewpoint is adapted to alleviate occlusions. The framework supports multiperspective visualization in three scenarios. In a first scenario, the viewpoint is altered independently for individual image regions to avoid occlusions. In a second scenario, conventional input images are connected into a multiperspective image. In a third scenario, one or several data subsets of interest (i.e., targets) are visualized where they would be seen in the absence of occluders, as the user navigates or the targets move. The multiperspective images are rendered at interactive rates, leveraging the camera model's fast projection operation. We demonstrate the framework on terrain, urban, and molecular biology geometric datasets, as well as on volume rendered density datasets.

  16. The context of space architecture

    NASA Astrophysics Data System (ADS)

    Häuplik, Sandra; Lorenz, Susanne

    2002-10-01

    So far architects were mainly working with the organisation of singular project-flows and their integration into the space mission system. The emerging tourism is changing the view of our society concerning space missions. Up to now they have been always seen as high-technologized and scientific performances but in the future more and more humans will be able to participate in trips into space which will become part of our every day life. Within this paradigm-shift the role of the space-architect changes as well. By investigating into design concepts of space habitats new key issues will be found and through their interpretation a change of the designing process takes place. That creates a new context for space architecture. For a successful accomplishment of a space mission, it not only requires, that the engineering secures the safety issues, but it also requires a specific and distinct design of the technological space, which is also characterised by a distinguished atmosphere, designed by incorporating issues such as light, material, texture and colour.

  17. Ecological context shapes hybridization dynamics.

    PubMed

    Buerkle, C Alex

    2009-05-01

    Gene exchange among oak species (Quercus) in Europe is known to be pervasive and to complicate population genetic studies of this species complex. A study in this issue of Molecular Ecology adds geographical and stand-level resolution to the patterns of genetic variation among four species and documents the relatively high frequency of hybrids (10.7-30.5% of trees in a population, including hybrids between all pairs of species; Lepais et al. 2009). In addition, the authors show that the relative abundance of parental species affects the genetic composition of hybrids and shifts the average direction of introgression. Variation in the relative abundance of parental species is one example of how the ecological context of hybridization can influence the dynamics and outcome of contact between species and represents an opportunity to investigate the components of reproductive isolation between species. This research raises several questions about the dynamics of hybridization in this well-studied species complex, and highlights methodological and conceptual issues associated with contemporary research on hybridization.

  18. Modeling Users, Context and Devices for Ambient Assisted Living Environments

    PubMed Central

    Castillejo, Eduardo; Almeida, Aitor; López-de-Ipiña, Diego; Chen, Liming

    2014-01-01

    The participation of users within AAL environments is increasing thanks to the capabilities of the current wearable devices. Furthermore, the significance of considering user's preferences, context conditions and device's capabilities help smart environments to personalize services and resources for them. Being aware of different characteristics of the entities participating in these situations is vital for reaching the main goals of the corresponding systems efficiently. To collect different information from these entities, it is necessary to design several formal models which help designers to organize and give some meaning to the gathered data. In this paper, we analyze several literature solutions for modeling users, context and devices considering different approaches in the Ambient Assisted Living domain. Besides, we remark different ongoing standardization works in this area. We also discuss the used techniques, modeled characteristics and the advantages and drawbacks of each approach to finally draw several conclusions about the reviewed works. PMID:24643006

  19. Modeling users, context and devices for ambient assisted living environments.

    PubMed

    Castillejo, Eduardo; Almeida, Aitor; López-de-Ipiña, Diego; Chen, Liming

    2014-03-17

    The participation of users within AAL environments is increasing thanks to the capabilities of the current wearable devices. Furthermore, the significance of considering user's preferences, context conditions and device's capabilities help smart environments to personalize services and resources for them. Being aware of different characteristics of the entities participating in these situations is vital for reaching the main goals of the corresponding systems efficiently. To collect different information from these entities, it is necessary to design several formal models which help designers to organize and give some meaning to the gathered data. In this paper, we analyze several literature solutions for modeling users, context and devices considering different approaches in the Ambient Assisted Living domain. Besides, we remark different ongoing standardization works in this area. We also discuss the used techniques, modeled characteristics and the advantages and drawbacks of each approach to finally draw several conclusions about the reviewed works.

  20. Abortion and politics in Mexico: 'context is all'.

    PubMed

    Lamas, M; Bissell, S

    2000-11-01

    A strong collective pro-choice mentality was recently manifested in Mexico when a legislative initiative to revoke the legal right of rape survivor to abortion in the state of Guanajuato awakened national indignation. Pro-choice values were expressed in public opinion with such force that it sparked off the passage of liberalising law reforms in Mexico City and the state of Morelos. In this paper we trace the development of these manifestations of pro-choice views, beginning with the Democratic Revolution Party's (PRD) refusal in 1999 to modify abortion legislation within the context of penal code reform, and moving through the events surrounding the Guanajuato reform, and the pro-choice response of Mexico City and Morelos legislators. This analysis allows us to recognise the emergence of a pro-choice consciousness and to understand that, when it comes to abortion, 'context is all'.

  1. Temporal context in floristic classification

    NASA Astrophysics Data System (ADS)

    Fitzgerald, R. W.; Lees, B. G.

    1996-11-01

    Multi-temporal remote sensing data present a number of significant problems for the statistical and spatial competence of a classifier. Ideally, a classifier of multi-temporal data should be temporally invariant. It must have the capacity to account for the variations in season, growth cycle, radiometric, and atmospheric conditions at any point in time when classifying the land cover. This paper tests two methods of creating a temporally invariant classifier based on the pattern recognition capabilities of a neural network. A suite of twelve multi-temporal datasets spread over 5 yr along with a comprehensive mix of environmental variables are fused into floristic classification images by the neural network. Uncertainties in the classifications are addressed explicitly with a confidence mask generated from the fuzzy membership value's output by the neural network. These confidence masks are used to produce constrained classification images. The overall accuracy percentage achieved from a study site containing highly disturbed undulating terrain averages 60%. The first method of training, sequential learning of temporal context, is tested by an examination of the step-by-step evolution of the sequential training process. This reveals that the sequential classifier may not have learned about time, because time was constant during each network training session. It also suggests that there are optimal times during the annual cycle to train the classifier for particular floristic classes. The second method of training the classifier is randomised exposure to the entire temporal training suite. Time was now a fluctuating input variable during the network training process. This method produced the best spatially accurate results. The performance of this classifier as a temporally invariant classifier is tested amongst four multi-temporal datasets with encouraging results. The classifier consistently achieved an overall accuracy percentage of 60%. The pairwise predicted

  2. Solar energy collection system

    NASA Technical Reports Server (NTRS)

    Selcuk, M. K. (Inventor)

    1977-01-01

    An improved solar energy collection system, having enhanced energy collection and conversion capabilities, is delineated. The system is characterized by a plurality of receivers suspended above a heliostat field comprising a multiplicity of reflector surfaces, each being adapted to direct a concentrated beam of solar energy to illuminate a target surface for a given receiver. A magnitude of efficiency, suitable for effectively competing with systems employed in collecting and converting energy extracted from fossil fuels, is indicated.

  3. An Approach for Incorporating Context in Building Probabilistic Predictive Models.

    PubMed

    Wu, Juan Anna; Hsu, William; Bui, Alex At

    2012-09-01

    With the increasing amount of information collected through clinical practice and scientific experimentation, a growing challenge is how to utilize available resources to construct predictive models to facilitate clinical decision making. Clinicians often have questions related to the treatment and outcome of a medical problem for individual patients; however, few tools exist that leverage the large collection of patient data and scientific knowledge to answer these questions. Without appropriate context, existing data that have been collected for a specific task may not be suitable for creating new models that answer different questions. This paper presents an approach that leverages available structured or unstructured data to build a probabilistic predictive model that assists physicians with answering clinical questions on individual patients. Various challenges related to transforming available data to an end-user application are addressed: problem decomposition, variable selection, context representation, automated extraction of information from unstructured data sources, model generation, and development of an intuitive application to query the model and present the results. We describe our efforts towards building a model that predicts the risk of vasospasm in aneurysm patients.

  4. Collective decision-making in microbes

    PubMed Central

    Ross-Gillespie, Adin; Kümmerli, Rolf

    2014-01-01

    Microbes are intensely social organisms that routinely cooperate and coordinate their activities to express elaborate population level phenotypes. Such coordination requires a process of collective decision-making, in which individuals detect and collate information not only from their physical environment, but also from their social environment, in order to arrive at an appropriately calibrated response. Here, we present a conceptual overview of collective decision-making as it applies to all group-living organisms; we introduce key concepts and principles developed in the context of animal and human group decisions; and we discuss, with appropriate examples, the applicability of each of these concepts in microbial contexts. In particular, we discuss the roles of information pooling, control skew, speed vs. accuracy trade-offs, local feedbacks, quorum thresholds, conflicts of interest, and the reliability of social information. We conclude that collective decision-making in microbes shares many features with collective decision-making in higher taxa, and we call for greater integration between this fledgling field and other allied areas of research, including in the humanities and the physical sciences. PMID:24624121

  5. Context effects in auditory implicit memory.

    PubMed

    Besken, Miri; Mulligan, Neil W

    2010-10-01

    The context effect in implicit memory is the finding that presentation of words in meaningful context reduces or eliminates repetition priming compared to words presented in isolation. Virtually all of the research on the context effect has been conducted in the visual modality but preliminary results raise the question of whether context effects are less likely in auditory priming. Context effects in the auditory modality were systematically examined in five experiments using the auditory implicit tests of word-fragment and word-stem completion. The first three experiments revealed the classical context effect in auditory priming: Words heard in isolation produced substantial priming, whereas there was little priming for the words heard in meaningful passages. Experiments 4 and 5 revealed that a meaningful context is not required for the context effect to be obtained: Words presented in an unrelated audio stream produced less priming than words presented individually and no more priming than words presented in meaningful passages. Although context effects are often explained in terms of the transfer-appropriate processing (TAP) framework, the present results are better explained by Masson and MacLeod's (2000) reduced-individuation hypothesis.

  6. Using context to treat traumatized children.

    PubMed

    Terr, Lenore C

    2009-01-01

    When treating childhood psychic trauma, context means "putting a perspective to the terrifying experience"--"seeing it in a new light", one might say, or understanding its magnitude and meaning. Of three essential mechanisms behind a young person's psychological recovery from a stress disorder--abreaction, context, and correction-context is the most reflective, cognitive, and conscious of these processes; while abreaction is primarily emotive, and correction is primarily behavioral (involving real or fantasied action). Because context, newly introduced by this author to the psychiatric literature (Terr, 2003), is the most recent and the least well understood of the three mechanisms, it will be the sole focus here.

  7. Average: the juxtaposition of procedure and context

    NASA Astrophysics Data System (ADS)

    Watson, Jane; Chick, Helen; Callingham, Rosemary

    2014-09-01

    This paper presents recent data on the performance of 247 middle school students on questions concerning average in three contexts. Analysis includes considering levels of understanding linking definition and context, performance across contexts, the relative difficulty of tasks, and difference in performance for male and female students. The outcomes lead to a discussion of the expectations of the curriculum and its implementation, as well as assessment, in relation to students' skills in carrying out procedures and their understanding about the meaning of average in context.

  8. Context in Mathematics Learning: Problems and Possibilities

    ERIC Educational Resources Information Center

    Lee, Ji-Eun

    2007-01-01

    This article presents an instructional idea that facilitates the students' active participation in the problem analysis process using insufficient or contradictory problem contexts. (Contains 1 figure.)

  9. Family contexts, individualism-collectivism, and adolescents' aspirations for their futures.

    PubMed

    Marjoribanks, Kevin

    2003-08-01

    Relations were examined among family contexts, parents' individualistic-collectivistic value orientations, and adolescents' aspirations. Data were collected from 456 Australian families using two surveys when the subjects were 11 and 16 years old, respectively. Findings indicated that family ethnicity had large associations with parents' individualistic-collectivistic value orientations, but that these orientations were not associated with adolescents' aspirations, after taking into account differences in family contexts.

  10. A Tasteful Collection.

    ERIC Educational Resources Information Center

    Canadian Architect, 2003

    2003-01-01

    Describes the design of the Canadian Wine Library at the University of British Columbia, including the educational context and design goals. Includes information on the architects, manufacturers/suppliers, and construction team; a general building description; and commentary on the design. Also includes the floor plan and photographs. (EV)

  11. A Systematic Mapping on the Learning Analytics Field and Its Analysis in the Massive Open Online Courses Context

    ERIC Educational Resources Information Center

    Moissa, Barbara; Gasparini, Isabela; Kemczinski, Avanilde

    2015-01-01

    Learning Analytics (LA) is a field that aims to optimize learning through the study of dynamical processes occurring in the students' context. It covers the measurement, collection, analysis and reporting of data about students and their contexts. This study aims at surveying existing research on LA to identify approaches, topics, and needs for…

  12. Context Effects in Forensic Entomology and Use of Sequential Unmasking in Casework.

    PubMed

    Archer, Melanie S; Wallman, James F

    2016-09-01

    Context effects are pervasive in forensic science, and are being recognized by a growing number of disciplines as a threat to objectivity. Cognitive processes can be affected by extraneous context information, and many proactive scientists are therefore introducing context-minimizing systems into their laboratories. Forensic entomologists are also subject to context effects, both in the processes they undertake (e.g., evidence collection) and decisions they make (e.g., whether an invertebrate taxon is found in a certain geographic area). We stratify the risk of bias into low, medium, and high for the decisions and processes undertaken by forensic entomologists, and propose that knowledge of the time the deceased was last seen alive is the most potentially biasing piece of information for forensic entomologists. Sequential unmasking is identified as the best system for minimizing context information, illustrated with the results of a casework trial (n = 19) using this approach in Victoria, Australia.

  13. Visualizing context through theory deconstruction: a content analysis of three bodies of evaluation theory literature.

    PubMed

    Vo, Anne T

    2013-06-01

    While the evaluation field collectively agrees that contextual factors bear on evaluation practice and related scholarly endeavors, the discipline does not yet have an explicit framework for understanding evaluation context. To address this gap in the knowledge base, this paper explores the ways in which evaluation context has been addressed in the practical-participatory, values-engaged, and emergent realist evaluation literatures. Five primary dimensions that constitute evaluation context were identified for this purpose: (1) stakeholder; (2) program; (3) organization; (4) historical/political; and (5) evaluator. Journal articles, book chapters, and conference papers rooted in the selected evaluation approaches were compared along these dimensions in order to explore points of convergence and divergence in the theories. Study results suggest that the selected prescriptive theories most clearly explicate stakeholder and evaluator contexts. Programmatic, organizational, and historical/political contexts, on the other hand, require further clarification.

  14. High context illness and dying in a low context medical world.

    PubMed

    Hallenbeck, James

    2006-01-01

    This article provides an introduction to the field of intercultural communication. Miscommunication among patients, families, and clinicians often results when participants are contextually "out-of-synch. " High context communication embeds more information in the contexts within which people communicate and is less dependent on language. Very sick and dying patients often use high context communication strategies. Low context communication stresses explicit verbal communication and is commonly used by clinicians. When clinicians use low context forms of communication with patients using high context styles, misunderstandings frequently arise. Suggestions are given for avoiding miscommunication and enhancing mutual understanding.

  15. Lightweight Adaptation of Classifiers to Users and Contexts: Trends of the Emerging Domain

    PubMed Central

    Vildjiounaite, Elena; Gimel'farb, Georgy; Kyllönen, Vesa; Peltola, Johannes

    2015-01-01

    Intelligent computer applications need to adapt their behaviour to contexts and users, but conventional classifier adaptation methods require long data collection and/or training times. Therefore classifier adaptation is often performed as follows: at design time application developers define typical usage contexts and provide reasoning models for each of these contexts, and then at runtime an appropriate model is selected from available ones. Typically, definition of usage contexts and reasoning models heavily relies on domain knowledge. However, in practice many applications are used in so diverse situations that no developer can predict them all and collect for each situation adequate training and test databases. Such applications have to adapt to a new user or unknown context at runtime just from interaction with the user, preferably in fairly lightweight ways, that is, requiring limited user effort to collect training data and limited time of performing the adaptation. This paper analyses adaptation trends in several emerging domains and outlines promising ideas, proposed for making multimodal classifiers user-specific and context-specific without significant user efforts, detailed domain knowledge, and/or complete retraining of the classifiers. Based on this analysis, this paper identifies important application characteristics and presents guidelines to consider these characteristics in adaptation design. PMID:26473165

  16. Student Behaviour Problems: Context, Initiatives and Programs. Selected Papers from the National Conference on Student Behaviour Problems: Context, Initiatives and Programs (3rd, Brisbane, Queensland, Australia, October 1991).

    ERIC Educational Resources Information Center

    Elkins, John, Ed.; Izard, John, Ed.

    The conference papers in this collection are grouped under the following topics: behavior problems in context; interpersonal relationships; initiatives by systems and schools; and programs in special settings. Papers included are: (1) National Trends in Discipline Policy Development (Roger Slee); (2) Balancing: The Protocols of Discipline (William…

  17. Collecting Best Practices

    ERIC Educational Resources Information Center

    Tedford, Jennifer

    2008-01-01

    How many beginning teachers struggle to create new lessons despite the fact that experienced teachers have already designed effective lessons for the same content? Shulman (1987) used the term "collective amnesia" to describe the failure of school leaders to design professional development that included the collection of its best…

  18. UNO's Afghanistan Collection.

    ERIC Educational Resources Information Center

    McKernan, M. D.

    This paper explores the background history and sources of the Afghanistan collection at the University Library, University of Nebraska at Omaha (UNO). Credit for the impetus behind the development of the collection is given to Chris Jung, a former UNO geography/geology faculty member; Ronald Roskens, then UNO chancellor; and the Afghanistan…

  19. Weeding Library Collections.

    ERIC Educational Resources Information Center

    Slote, Stanley J.

    This work, based on two recent research projects in the weeding of library collections and the identification of core collections, provides a comprehensive summary of the literature and research on these topics. It also presents practical guidance in weeding for the professional librarian or for the library school student. The book is divided into…

  20. Collection Development Plan.

    ERIC Educational Resources Information Center

    Minnesota State Law Library, St. Paul.

    This collection development plan of the Minnesota State Law Library includes detailed information on policies and annotations. After an overview of the Library's collection, general policy guidelines on the following are discussed: material selection; principles of selection; exclusions; gifts; interlibrary loan; cooperation; replacements;…

  1. Open data sharing in the context of bioresources.

    PubMed

    De Castro, Paola; Calzolari, Alessia; Napolitani, Federica; Maria Rossi, Anna; Mabile, Laurence; Cambon-Thomsen, Anne; Bravo, Elena

    2013-12-01

    Recently many international initiatives have been developed to improve access to scientific information and to promote open data sharing. In the complex field of bioresources, the BRIF (Bioresource Research Impact Factor) project aims to create suitable methods to recognise and measure the use and impact of biological resources in scientific/academic work, in order to maximize access by researchers to collections of biological materials and attached databases, and to recognize efforts involved in their maintenance. The lack of a proper recognition of scientific contribution is in fact a major obstacle which impedes bioresource sharing. In this context, the BRIF initiative can be considered as a tool to facilitate research resource sharing.

  2. 1. Copy photo of context view taken in 1917 looking ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    1. Copy photo of context view taken in 1917 looking east along Farragut Avenue, then called Main Street, showing construction of double tracking. On right is Building 78 with original smoke stack. Building 59 is visible as third building from left. This photograph was taken from a hill that was later cut away in order to expand the shipyard. See photo for original caption. HABS negative is a 4x5' copy negative made from a print in the collection of the Photographic Branch, Puget Sound Naval Shipyard, Bremerton, WA. Photographer unknown. - Puget Sound Naval Shipyard, Administration Building, Farragut Avenue, Bremerton, Kitsap County, WA

  3. Urine collection device

    NASA Technical Reports Server (NTRS)

    Michaud, R. B. (Inventor)

    1981-01-01

    A urine collection device for females is described. It is comprised of a collection element defining a urine collection chamber and an inlet opening into the chamber and is adapted to be disposed in surrounding relation to the urethral opening of the user. A drainage conduit is connected to the collection element in communication with the chamber whereby the chamber and conduit together comprise a urine flow pathway for carrying urine generally away from the inlet. A first body of wicking material is mounted adjacent the collection element and extends at least partially into the flow pathway. The device preferably also comprise a vaginal insert element including a seal portion for preventing the entry of urine into the vagina.

  4. Effects of simple- and complex-place contexts in the multiple-context paradigm.

    PubMed

    Isarida, Takeo; Isarida, Toshiko K

    2010-12-01

    In four experiments, a total of 384 undergraduates incidentally learned a list of 24 nouns twice in the same context (same-context repetition) or different contexts (different-context repetition). Free recall was measured in a neutral context. Experiments 1, 2, and 3 used a context repetition (same- or different-context repetition) × inter-study and retention intervals (10 min or 1 day) between-participants design. Context was manipulated by the combination of place, social environment, and encoding task (Experiment 1), place and social environment (Experiment 2), or place alone (Experiment 3). Experiment 4 used a context repetition × type of context (context manipulated by place or by place, social environment, and encoding task) between-participants design, with a 10-min inter-study interval and a one-day retention interval. The present results indicate that the determinant of the superiority of same- or different-context repetition in recall is the type of context. Implications of the results were discussed.

  5. Effects of a context shift and multiple context extinction on reactivity to alcohol cues.

    PubMed

    MacKillop, James; Lisman, Stephen A

    2008-08-01

    Cue exposure treatment (CET) attempts to reduce the influence of conditioned substance cues on addictive behavior via extinction, but has received only modest empirical support in clinical trials. This may be because extinction learning appears to be context dependent and a change in context may result in a return of conditioned responding (i.e., renewal), although this has received only limited empirical examination. The current study used a 4-session laboratory analogue of CET to examine whether a change in context following 3 sessions of alcohol cue exposure with response prevention would result in renewal of conditioned responding. In addition, this study examined whether conducting extinction in multiple contexts would attenuate renewal of conditioned responding. In one-way between-subjects design, 73 heavy drinkers (71% men) were randomized to 3 conditions: (a) single context extinction (extinction to alcohol cues in the same context for 3 sessions followed by a context shift at the fourth session), (b) multiple context extinction (extinction to alcohol cues in different contexts each day for all 4 sessions), and (c) pseudoextinction control condition (exposure to neutral cues in the same context for 3 sessions followed by exposure to alcohol cues at the fourth session). The results revealed the predicted cue reactivity and extinction effects, but the hypotheses that a context shift would generate renewed cue reactivity and that multiple contexts would enhance extinction were not supported. Methodological aspects of the study and the need for parametric data on the context dependency of extinction to alcohol cues are discussed.

  6. How context dependent are species interactions?

    PubMed

    Chamberlain, Scott A; Bronstein, Judith L; Rudgers, Jennifer A

    2014-07-01

    The net effects of interspecific species interactions on individuals and populations vary in both sign (-, 0, +) and magnitude (strong to weak). Interaction outcomes are context-dependent when the sign and/or magnitude change as a function of the biotic or abiotic context. While context dependency appears to be common, its distribution in nature is poorly described. Here, we used meta-analysis to quantify variation in species interaction outcomes (competition, mutualism, or predation) for 247 published articles. Contrary to our expectations, variation in the magnitude of effect sizes did not differ among species interactions, and while mutualism was most likely to change sign across contexts (and predation least likely), mutualism did not strongly differ from competition. Both the magnitude and sign of species interactions varied the most along spatial and abiotic gradients, and least as a function of the presence/absence of a third species. However, the degree of context dependency across these context types was not consistent among mutualism, competition and predation studies. Surprisingly, study location and ecosystem type varied in the degree of context dependency, with laboratory studies showing the highest variation in outcomes. We urge that studying context dependency per se, rather than focusing only on mean outcomes, can provide a general method for describing patterns of variation in nature.

  7. Authoring of Learning Objects in Context

    ERIC Educational Resources Information Center

    Specht, Marcus; Kravcik, Milos

    2006-01-01

    Learning objects and content interchange standards provide new possibilities for e-learning. Nevertheless the content often lacks context data to find appropriate use for adaptive learning on demand and personalized learning experiences. In the Remotely Accessible Field Trips (RAFT) project mobile authoring of learning content in context has shown…

  8. Completion Mindsets and Contexts in Doctoral Supervision

    ERIC Educational Resources Information Center

    Green, Pam; Bowden, John

    2012-01-01

    Purpose: Doctoral candidates are now located within a research context of performativity where the push to successfully complete in a timely manner is central. The purpose of this paper is to develop a model of completion mindset within a completion context to assist research students and supervisors. Design/methodology/approach: The research was…

  9. Operational Context Training in Individual Technical Skills.

    ERIC Educational Resources Information Center

    Hoehn, Arthur J.; And Others

    Four papers were presented at a conference dealing with the objectives and problems of operational context training (OCT) sponsored by HumRRO in June 1958. The first paper (by William McCleland) outlines the objectives of the conference and its general goals. The second paper (by Arthur J. Hoehn) describes the use of operational context training…

  10. Shifting Context: A Better Approach to Training?

    ERIC Educational Resources Information Center

    Lefkoe, Morty

    1985-01-01

    Context shifting is an approach to training that aims to transform the participants' point of view, allowing them to create a new context in which to perform their jobs, a new way of defining their roles that motivates them to exhibit skills and use information. (SK)

  11. Philosophy in Context: Reply to Trohler

    ERIC Educational Resources Information Center

    Smith, Richard

    2007-01-01

    This paper responds to Trohler's charge that my paper "As if by Machinery: The levelling of educational research" takes Francis Bacon's vision of scientific research out of context. I distinguish four senses of "decontextualisation": as ignorance, as belief in "timeless truths", as comparison of contexts, and as genealogy. I argue that Trohler has…

  12. Language Proficiency, Reading Development, and Learning Context

    ERIC Educational Resources Information Center

    Li, Liu

    2014-01-01

    In the era of globalization, the number of students studying abroad is increasing dramatically. Accordingly, there is an increasing interest among researchers in students' language gains in the study-abroad (SA) context. To deepen our understanding of second language (L2) reading acquisition in different contexts, it is necessary to examine…

  13. Student Reasoning about Graphs in Different Contexts

    ERIC Educational Resources Information Center

    Ivanjek, Lana; Susac, Ana; Planinic, Maja; Andrasevic, Aneta; Milin-Sipus, Zeljka

    2016-01-01

    This study investigates university students' graph interpretation strategies and difficulties in mathematics, physics (kinematics), and contexts other than physics. Eight sets of parallel (isomorphic) mathematics, physics, and other context questions about graphs, which were developed by us, were administered to 385 first-year students at the…

  14. Children's Context Inappropriate Anger and Salivary Cortisol

    ERIC Educational Resources Information Center

    Locke, Robin L.; Davidson, Richard J.; Kalin, Ned H.; Goldsmith, H. Hill

    2009-01-01

    Some children show emotion that is not consistent with normative appraisal of the context and can therefore be defined as context inappropriate (CI). The authors used individual growth curve modeling and hierarchical multiple regression analyses to examine whether CI anger predicts differences in hypothalamic-pituitary-adrenal axis activity, as…

  15. Intertextuality in EAP: An African Context

    ERIC Educational Resources Information Center

    Holmes, John

    2004-01-01

    This paper focuses on the development of EAP methodology within an African EAP context. I describe the setting up and implementation of an EAP study skills programme at the University of Asmara, Eritrea, over the period 1994-1998 and its subsequent development up to 2002. The unique social and political context of the EAP programme served as a…

  16. Dimensions of Leadership in the Childcare Context

    ERIC Educational Resources Information Center

    Hujala, Eeva

    2004-01-01

    The contextual leadership theory provides a frame to investigate the leadership phenomenon in a childcare context. According to the contextual leadership theory, leadership is perceived of as a socially constructed, situational and interpretive phenomenon. The purpose of the study was to investigate leadership in a Finnish childcare context based…

  17. Assessing Grammatical Development in Interactional Contexts.

    ERIC Educational Resources Information Center

    Bardovi-Harlig, Kathleen

    1997-01-01

    Discusses potential problems and advantages of assessing grammatical competence from production data from interactional contexts. Argues that regardless of difficulties in assessing grammatical competence in interactional contexts, the types of interactions change with time, as the interlanguage grammar develops. (9 references) (Author/CK)

  18. Bilingual Lexical Activation in Sentence Context

    ERIC Educational Resources Information Center

    Schwartz, Ana I.; Kroll, Judith F.

    2006-01-01

    The present study investigated the cognitive nature of second language (L2) lexical processing in sentence context. We examined bilinguals' L2 word recognition performance for language-ambiguous words [cognates (e.g., "piano") and homographs (e.g., "pan")] in two sentence context experiments with highly proficient Spanish-English bilinguals living…

  19. Using Context to Resolve Temporal Ambiguity

    PubMed Central

    Molet, Mikaël; Urcelay, Gonzalo P.; Miguez, Gonzalo; Miller, Ralph R.

    2009-01-01

    Three conditioned lick suppression experiments with rats examined the role of the context in the selection and integration of independently acquired interval relationships. In Experiment 1, rats were exposed to separate CS1-CS2 pairings with two different interval relationships, each in its own distinctive context, X or Y. The resultant integration was determined by the training context (X or Y) in which US-CS2 backward pairings occurred, as assessed in a third neutral context (Z). In Experiment 2, rats experienced CS1-CS2 pairings with two different interval relationships as in Experiment 1, and then received US-CS2 pairings in both contexts X and Y. The testing context (i.e., X or Y) determined the resultant integration. In Experiment 3, rats were exposed to CS1-CS2 pairings in two different interval relationships each in different phases (i.e., Phases 1 and 2), and then in Phase 3 received US-CS2 pairings. The temporal context of testing (i.e., short or long retention interval) determined the resultant integration. Thus, context can be used to disambiguate conflicting temporal information. PMID:20141323

  20. Abstraction and context in concept representation.

    PubMed Central

    Hampton, James A

    2003-01-01

    This paper develops the notion of abstraction in the context of the psychology of concepts, and discusses its relation to context dependence in knowledge representation. Three general approaches to modelling conceptual knowledge from the domain of cognitive psychology are discussed, which serve to illustrate a theoretical dimension of increasing levels of abstraction. PMID:12903660

  1. Enhanced Latent Inhibition in Context Aversion Conditioning

    ERIC Educational Resources Information Center

    Hall, Geoffrey; Symonds, Michelle; Rodriguez, Marcial

    2009-01-01

    In four experiments, we investigated the effect of giving rats exposure to a distinctive environmental context before a phase of training in which an injection of LiCl was paired with that context. The results of Experiments 1 and 2 were consistent with the possibility that such preexposure served to retard subsequent conditioning to the context…

  2. Contexts of Child Rearing: Problems and Prospects.

    ERIC Educational Resources Information Center

    Bronfenbrenner, Urie

    1979-01-01

    Synthesizes existing knowledge regarding interpersonal contexts of human development with emerging concepts and data that point to trans-contextual parameters of child-rearing environments. Proposes properties of the environment that foster development: primary and secondary development contexts; the impact of third parties; and interconnections…

  3. Contexts of Child Rearing: Problems and Prospects.

    ERIC Educational Resources Information Center

    Bronfenbrenner, Urie

    1992-01-01

    Suggests the lack of research concerning contexts of human development has caused environmental influences to be not well known or studied. Discusses primary and secondary developmental contexts. Proposes four properties of the ecological environment that foster human development. Details impact of third parties on a setting, interconnections…

  4. Context Improves Comprehension of Fronted Objects

    ERIC Educational Resources Information Center

    Kristensen, Line Burholt; Engberg-Pedersen, Elisabeth; Poulsen, Mads

    2014-01-01

    Object-initial clauses (OCs) are associated with more processing difficulties than subject-initial clauses (SCs) in a number of languages (e.g. English, German and Finnish), but a supportive context can reduce or neutralize the difference between SCs and OCs with respect to reading times. Still, it is unresolved how context can affect the…

  5. Contexts of Knowing: Their Shape and Substance.

    ERIC Educational Resources Information Center

    Silverman, Robert J.

    1993-01-01

    Discusses constitutive and regulative knowledge; considers a knowledge community; discusses knowledge codes; describes a heuristic framework for knowledge contexts; and examines the problem of scientific misconduct, suggesting that its definition depends on the knowledge context in which it presents itself. (37 references) (LRW)

  6. The Large Context Problem (LCP) Approach

    ERIC Educational Resources Information Center

    Stinner, Arthur

    2006-01-01

    This article traces the development of a contextual approach to the teaching of science (physics) subsequently called the Large Context Problem (LCP) approach. This approach is based on the general observation that learning could be well motivated by a context with one unifying central idea capable of capturing the imagination of the students. The…

  7. The Social Context of Imitation in Infancy

    ERIC Educational Resources Information Center

    Learmonth, A.E.; Lamberth, R.; Rovee-Collier, C.

    2005-01-01

    Infants increasingly generalize deferred imitation across environmental contexts between 6 and 18 months of age. In three experiments with 126 6-, 9-, 12-, 15-, and 18-month-olds, we examined the role of the social context in deferred imitation. One experimenter demonstrated target actions on a hand puppet, and a second experimenter tested…

  8. Transforming Context and Developing Culture in Schools.

    ERIC Educational Resources Information Center

    Burrello, Leonard C.; Reitzug, Ulrich C.

    1993-01-01

    Examined how principals and staffs of four elementary schools and two middle schools assessed context of their schools and how they responded to contextual factors. Analyzed data within and between sites to develop cross-site summary of factors. Four factor clusters emerged and were examined in terms of context, school responses, and resultant…

  9. Interoperability Context-Setting Framework

    SciTech Connect

    Widergren, Steven E.; Hardin, Dave; Ambrosio, Ron; Drummond, R.; Gunther, E.; Gilchrist, Grant; Cohen, David

    2007-01-31

    -conditioning (HVAC) unit up several degrees. The resulting load reduction becomes part of an aggregated response from the electricity service provider to the bulk system operator who is now in a better position to manage total system load with available generation. Looking across the electric system, from generating plants, to transmission substations, to the distribution system, to factories, office parks, and buildings, automation is growing, and the opportunities for unleashing new value propositions are exciting. How can we facilitate this change and do so in a way that ensures the reliability of electric resources for the wellbeing of our economy and security? The GridWise Architecture Council (GWAC) mission is to enable interoperability among the many entities that interact with the electric power system. A good definition of interoperability is, “The capability of two or more networks, systems, devices, applications, or components to exchange information between them and to use the information so exchanged.” As a step in the direction of enabling interoperability, the GWAC proposes a context-setting framework to organize concepts and terminology so that interoperability issues can be identified and debated, improvements to address issues articulated, and actions prioritized and coordinated across the electric power community.

  10. Generating Personalized Web Search Using Semantic Context

    PubMed Central

    Xu, Zheng; Chen, Hai-Yan; Yu, Jie

    2015-01-01

    The “one size fits the all” criticism of search engines is that when queries are submitted, the same results are returned to different users. In order to solve this problem, personalized search is proposed, since it can provide different search results based upon the preferences of users. However, existing methods concentrate more on the long-term and independent user profile, and thus reduce the effectiveness of personalized search. In this paper, the method captures the user context to provide accurate preferences of users for effectively personalized search. First, the short-term query context is generated to identify related concepts of the query. Second, the user context is generated based on the click through data of users. Finally, a forgetting factor is introduced to merge the independent user context in a user session, which maintains the evolution of user preferences. Experimental results fully confirm that our approach can successfully represent user context according to individual user information needs. PMID:26000335

  11. Social Context as an Indirect Trigger in EFL Contexts: Issues and Solutions

    ERIC Educational Resources Information Center

    Gholami, Reza; Rahman, Sharifah Zainab Abd; Mustapha, Ghazali

    2012-01-01

    This paper investigates the value of the social context and its role in learning a second language in different contexts. Social context is believed to be able to influence attitude and motivation. It also provides learning opportunities which give rise to learner's outcomes. In fact, students acquire a language by using it in social interaction…

  12. Context-Outcome Associations Underlie Context-Switch Effects after Partial Reinforcement in Human Predictive Learning

    ERIC Educational Resources Information Center

    Moreno-Fernandez, Maria M.; Abad, Maria J. F.; Ramos-Alvarez, Manuel M.; Rosas, Juan M.

    2011-01-01

    Predictive value for continuously reinforced cues is affected by context changes when they are trained within a context in which a different cue undergoes partial reinforcement. An experiment was conducted with the goal of exploring the mechanisms underlying this context-switch effect. Human participants were trained in a predictive learning…

  13. Academic Success in Context-Based Chemistry: Demonstrating Fluid Transitions between Concepts and Context

    ERIC Educational Resources Information Center

    King, Donna Therese; Ritchie, Stephen M.

    2013-01-01

    Curriculum developers and researchers have promoted context-based programmes to arrest waning student interest and participation in the enabling sciences at high school and university. Context-based programmes aim for student connections between scientific discourse and real-world contexts to elevate curricular relevance without diminishing…

  14. 78 FR 70577 - Agency Information Collection Activities; Proposed Collection, Comments Requested, New Collection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-26

    ... Information Collection Activities; Proposed Collection, Comments Requested, New Collection: Uniform Crime... Collection (1) Type of information collection: New Collection. (2) The title of the form/collection: Uniform... agency form number, if any, and the applicable component of the department sponsoring the...

  15. F. M. Courtis Collection: A Window on Teacher Education at Bendigo, Australia

    ERIC Educational Resources Information Center

    Collet, Penelope

    2009-01-01

    For the best part of the last millennium collections have been used in universities in Europe to support teaching and research. European authors have referred to university collections as "windows on the university". This article uses the European context to historically situate art collections in Australian teacher education…

  16. Sweat collection capsule

    NASA Technical Reports Server (NTRS)

    Delaplaine, R. W.; Greenleaf, J. E.

    1979-01-01

    Capsule, with filter paper insert, is used to collect sweat for rate monitoring, chromatographic analysis, or active sweat gland location within specified area. Construction of capsule allows change of inserts while device remains strapped in place.

  17. Online Data Collection.

    ERIC Educational Resources Information Center

    Topp, Neal W.; Pawloski, Bob

    2002-01-01

    Describes the eventful history of online data collection and presents a review of current literature following by a list of pros and cons to be considered when stepping into online surveying. (Contains 14 references.) (Author/YDS)

  18. Consulting in Collection Development.

    ERIC Educational Resources Information Center

    Ash, Lee

    1980-01-01

    Considers the role of the consultant in the areas of library collection development and weeding, and offers suggestions on determining the need for a consultant, obtaining one, and what to do when the consultant arrives. (FM)

  19. Weeding Your Collection.

    ERIC Educational Resources Information Center

    Kerby, Ramona

    2002-01-01

    Offers guidelines for weeding as part of school library collection development. Highlights include developing a weeding policy; and the CREW (Continuous Review Evaluation and Weeding) method, including reasons for weeding, scheduling, and guidelines for fiction and for nonfiction. (LRW)

  20. How visual and semantic information influence learning in familiar contexts.

    PubMed

    Goujon, Annabelle; Brockmole, James R; Ehinger, Krista A

    2012-10-01

    Previous research using the contextual cuing paradigm has revealed both quantitative and qualitative differences in learning depending on whether repeated contexts are defined by letter arrays or real-world scenes. To clarify the relative contributions of visual features and semantic information likely to account for such differences, the typical contextual cuing procedure was adapted to use meaningless but nevertheless visually complex images. The data in reaction time and in eye movements show that, like scenes, such repeated contexts can trigger large, stable, and explicit cuing effects, and that those effects result from facilitated attentional guidance. Like simpler stimulus arrays, however, those effects were impaired by a sudden change of a repeating image's color scheme at the end of the learning phase (Experiment 1), or when the repeated images were presented in a different and unique color scheme across each presentation (Experiment 2). In both cases, search was driven by explicit memory. Collectively, these results suggest that semantic information is not required for conscious awareness of context-target covariation, but it plays a primary role in overcoming variability in specific features within familiar displays.

  1. Environmental indicators of biofuel sustainability: What about context?

    SciTech Connect

    Efroymson, Rebecca Ann; Dale, Virginia H; Kline, Keith L; McBride, Allen; Bielicki, Jeffrey M; Smith, Raymond; Parish, Esther S; Schweizer, Peter E; Shaw, Denice

    2013-01-01

    Indicators of the environmental sustainability of biofuel production, distribution, and use should be selected, measured, and interpreted with respect to the context in which they are used. These indicators include measures of soil quality, water quality and quantity, greenhouse-gas emissions, biodiversity, air quality, and vegetation productivity. Contextual considerations include the purpose for the sustainability analysis, the particular biofuel production and distribution system (including supply chain, management aspects, and system viability), policy conditions, stakeholder values, location, temporal influences, spatial scale, baselines, and reference scenarios. Recommendations presented in this paper include formulating the problem for particular analyses, selecting appropriate context-specific indicators of environmental sustainability, and developing indicators that can reflect multiple environmental properties at low cost within a defined context. In addition, contextual considerations such as technical objectives, varying values and perspectives of stakeholder groups, and availability and reliability of data need to be understood and considered. Sustainability indicators for biofuels are most useful if adequate historical data are available, information can be collected at appropriate spatial and temporal scales, organizations are committed to use indicator information in the decision-making process, and indicators can effectively guide behavior toward more sustainable practices.

  2. The Ecological Context of Interpersonal Violence: From Culture to Collective Efficacy

    ERIC Educational Resources Information Center

    Almgren, Gunnar

    2005-01-01

    This brief essay outlines the progression over the last 20 years of ecological theories of interpersonal violence. The period between the present and the early 1980s began with a revival of cultural explanations of violence that paralleled the introduction of the neo-conservative social science and then witnessed a rediscovery of deficits-based…

  3. Ingroup glorification, moral disengagement, and justice in the context of collective violence.

    PubMed

    Leidner, Bernhard; Castano, Emanuele; Zaiser, Erica; Giner-Sorolla, Roger

    2010-08-01

    What aspects of ingroup identification can lead people to resist justice for the victims of their ingroup's mistreatment? In three studies carried out in the United States and United Kingdom, in which participants read reports of mistreatment of prisoners and civilians by coalition troops in the Iraq war, ingroup glorification, but not ingroup attachment or other individual-difference variables, was a key predictor of lesser demands for justice, but only when the perpetrators belonged to the ingroup. This effect of glorification was mediated by two moral disengagement mechanisms focusing on the outgroup: minimization of the emotional suffering of the victims' families and explicit dehumanization of the victim group. These findings further reinforce the difference between glorification and other forms of ingroup identification, demonstrating that glorification is problematic in maintaining and fostering intergroup relations because of its connection to moral disengagement.

  4. Microscopic description of large amplitude collective motion in the nuclear astrophysics context

    NASA Astrophysics Data System (ADS)

    Lacroix, Denis; Tanimura, Yusuke; Scamps, Guillaume; Simenel, Cédric

    2015-08-01

    In the last 10 years, we have observed an important increase of interest in the application of time-dependent energy density functional (TD-EDF) theory. This approach allows to treat nuclear structure and nuclear reaction from small to large amplitude dynamics in a unified framework. The possibility to perform unrestricted three-dimensional simulations using state-of-the-art effective interactions has opened new perspectives. In the present paper, an overview of applications where the predictive power of TD-EDF has been benchmarked is given. A special emphasize is made on processes that are of astrophysical interest. Illustrations discussed here include giant resonances, fission, binary and ternary collisions leading to fusion, transfer and deep inelastic processes.

  5. Sweat collection capsule

    NASA Technical Reports Server (NTRS)

    Greenleaf, J. E.; Delaplaine, R. W. (Inventor)

    1980-01-01

    A sweat collection capsule permitting quantitative collection of sweat is described. The device consists of a frame held immobile on the skin, a closure secured to the frame and absorbent material located next to the skin in a cavity formed by the frame and the closure. The absorbent material may be removed from the device by removing the closure from the frame while the frame is held immobile on the skin.

  6. Sparse matrix test collections

    SciTech Connect

    Duff, I.

    1996-12-31

    This workshop will discuss plans for coordinating and developing sets of test matrices for the comparison and testing of sparse linear algebra software. We will talk of plans for the next release (Release 2) of the Harwell-Boeing Collection and recent work on improving the accessibility of this Collection and others through the World Wide Web. There will only be three talks of about 15 to 20 minutes followed by a discussion from the floor.

  7. Collective field accelerator

    DOEpatents

    Luce, John S.

    1978-01-01

    A collective field accelerator which operates with a vacuum diode and utilizes a grooved cathode and a dielectric anode that operates with a relativistic electron beam with a .nu./.gamma. of .about. 1, and a plurality of dielectric lenses having an axial magnetic field thereabout to focus the collectively accelerated electrons and ions which are ejected from the anode. The anode and lenses operate as unoptimized r-f cavities which modulate and focus the beam.

  8. Context awareness and sensitivity in SEA implementation

    SciTech Connect

    Hilding-Rydevik, Tuija Bjarnadottir, Holmfridur

    2007-10-15

    The Impact Assessment research community repeatedly asserts that the implementation of Strategic Environmental Assessment (SEA) should take the issue of context into consideration. The primary aim of this paper then is to attempt to give substance to the concept of 'context' in relation to the implementation of SEA. The second aim is to discuss the relevance of context consciousness and sensitivity in relation to one of the main aims given to SEA implementation i.e. to contribute to the 'integration' of environmental perspectives in planning processes. Context must be defined in relation to a certain question. In this paper the question in focus is the assumption that SEA implementation will contribute to integration of environmental issues in planning processes. Research results relating to the use of environmental tools, like for example SEA, and experiences of integration efforts, strongly indicate that the use of a single tool like SEA is not enough to achieve this integration. The current 'context free' normative and procedural assumptions concerning the aim of SEA implementation and 'best practice' in term of SEA can be criticised on the same grounds as normative and procedural planning theories, as being context free. The assumptions behind the current formulations of the aim and best practice of SEA need to be revisited. A firm empirical and theoretical knowledge and discussion is needed, especially in relation to the issue of context and integration. This paper provides a starting point in this direction.

  9. A Survey of Collectives

    NASA Technical Reports Server (NTRS)

    Tumer, Kagan; Wolpert, David

    2004-01-01

    Due to the increasing sophistication and miniaturization of computational components, complex, distributed systems of interacting agents are becoming ubiquitous. Such systems, where each agent aims to optimize its own performance, but where there is a well-defined set of system-level performance criteria, are called collectives. The fundamental problem in analyzing/designing such systems is in determining how the combined actions of self-interested agents leads to 'coordinated' behavior on a iarge scale. Examples of artificial systems which exhibit such behavior include packet routing across a data network, control of an array of communication satellites, coordination of multiple deployables, and dynamic job scheduling across a distributed computer grid. Examples of natural systems include ecosystems, economies, and the organelles within a living cell. No current scientific discipline provides a thorough understanding of the relation between the structure of collectives and how well they meet their overall performance criteria. Although still very young, research on collectives has resulted in successes both in understanding and designing such systems. It is eqected that as it matures and draws upon other disciplines related to collectives, this field will greatly expand the range of computationally addressable tasks. Moreover, in addition to drawing on them, such a fully developed field of collective intelligence may provide insight into already established scientific fields, such as mechanism design, economics, game theory, and population biology. This chapter provides a survey to the emerging science of collectives.

  10. Spectral imagery collection experiment

    NASA Astrophysics Data System (ADS)

    Romano, Joao M.; Rosario, Dalton; Farley, Vincent; Sohr, Brian

    2010-04-01

    The Spectral and Polarimetric Imagery Collection Experiment (SPICE) is a collaborative effort between the US Army ARDEC and ARL for the collection of mid-wave and long-wave infrared imagery using hyperspectral, polarimetric, and broadband sensors. The objective of the program is to collect a comprehensive database of the different modalities over the course of 1 to 2 years to capture sensor performance over a wide variety of adverse weather conditions, diurnal, and seasonal changes inherent to Picatinny's northern New Jersey location. Using the Precision Armament Laboratory (PAL) tower at Picatinny Arsenal, the sensors will autonomously collect the desired data around the clock at different ranges where surrogate 2S3 Self-Propelled Howitzer targets are positioned at different viewing perspectives at 549 and 1280m from the sensor location. The collected database will allow for: 1) Understand of signature variability under the different weather conditions; 2) Development of robust algorithms; 3) Development of new sensors; 4) Evaluation of hyperspectral and polarimetric technologies; and 5) Evaluation of fusing the different sensor modalities. In this paper, we will present the SPICE data collection objectives, the ongoing effort, the sensors that are currently deployed, and how this work will assist researches on the development and evaluation of sensors, algorithms, and fusion applications.

  11. Bacterial Population Genetics in a Forensic Context

    SciTech Connect

    Velsko, S P

    2009-11-02

    This report addresses the recent Department of Homeland Security (DHS) call for a Phase I study to (1) assess gaps in the forensically relevant knowledge about the population genetics of eight bacterial agents of concern, (2) formulate a technical roadmap to address those gaps, and (3) identify new bioinformatics tools that would be necessary to analyze and interpret population genetic data in a forensic context. The eight organisms that were studied are B. anthracis, Y. pestis, F. tularensis, Brucella spp., E. coli O157/H7, Burkholderia mallei, Burkholderia pseudomallei, and C. botulinum. Our study focused on the use of bacterial population genetics by forensic investigators to test hypotheses about the possible provenance of an agent that was used in a crime or act of terrorism. Just as human population genetics underpins the calculations of match probabilities for human DNA evidence, bacterial population genetics determines the level of support that microbial DNA evidence provides for or against certain well-defined hypotheses about the origins of an infecting strain. Our key findings are: (1) Bacterial population genetics is critical for answering certain types of questions in a probabilistic manner, akin (but not identical) to 'match probabilities' in DNA forensics. (2) A basic theoretical framework for calculating likelihood ratios or posterior probabilities for forensic hypotheses based on microbial genetic comparisons has been formulated. This 'inference-on-networks' framework has deep but simple connections to the population genetics of mtDNA and Y-STRs in human DNA forensics. (3) The 'phylogeographic' approach to identifying microbial sources is not an adequate basis for understanding bacterial population genetics in a forensic context, and has limited utility, even for generating 'leads' with respect to strain origin. (4) A collection of genotyped isolates obtained opportunistically from international locations augmented by phylogenetic representations

  12. Negotiating Collective and Individual Agency

    PubMed Central

    Paul, Mandira; Essén, Birgitta; Sariola, Salla; Iyengar, Sharad; Soni, Sunita; Klingberg Allvin, Marie

    2016-01-01

    The societal changes in India and the available variety of reproductive health services call for evidence to inform health systems how to satisfy young women’s reproductive health needs. Inspired by Foucault’s power idiom and Bandura’s agency framework, we explore young women’s opportunities to practice reproductive agency in the context of collective social expectations. We carried out in-depth interviews with 19 young women in rural Rajasthan. Our findings highlight how changes in notions of agency across generations enable young women’s reproductive intentions and desires, and call for effective means of reproductive control. However, the taboo around sex without the intention to reproduce made contraceptive use unfeasible. Instead, abortions were the preferred method for reproductive control. In conclusion, safe abortion is key, along with the need to address the taboo around sex to enable use of “modern” contraception. This approach could prevent unintended pregnancies and expand young women’s agency. PMID:26531879

  13. Collective decisions among bacterial viruses

    NASA Astrophysics Data System (ADS)

    Joh, Richard; Mileyko, Yuriy; Voit, Eberhard; Weitz, Joshua

    2010-03-01

    For many temperate bacteriophages, the decision of whether to kill hosts or enter a latent state depends on the multiplicity of infection. In this talk, I present a quantitative model of gene regulatory dynamics to describe how phages make collective decisions within host cells. Unlike most previous studies, the copy number of viral genomes is treated as a variable. In the absence of feedback loops, viral mRNA transcription is expected to be proportional to the viral copy number. However, when there are nonlinear feedback loops in viral gene regulation, our model shows that gene expression patterns are sensitive to changes in viral copy number and there can be a domain of copy number where the system becomes bistable. Hence, the viral copy number is a key control parameter determining host cell fates. This suggests that bacterial viruses can respond adaptively to changes in population dynamics, and can make alternative decisions as a bet-hedging strategy. Finally, I present a stochastic version of viral gene regulation and discuss speed-accuracy trade-offs in the context of cell fate determination by viruses.

  14. The extinction context enables extinction performance after a change in context

    PubMed Central

    Nelson, James Byron; Gregory, Pamela; Sanjuan, Maria del Carmen

    2012-01-01

    One experiment with human participants determined the extent to which recovery of extinguished responding with a context switch was due to a failure to retrieve contextually-controlled learning, or some other process such as participants learning that context changes signal reversals in the meaning of stimulus – outcome relationships. In a video game, participants learned to suppress mouse clicking in the presence of a stimulus that predicted an attack. Then, that stimulus underwent extinction in a different context (environment within the game). Following extinction, suppression was recovered and then extinguished again during testing in the conditioning context. In a final test, participants that were tested in the context where extinction first took place showed less of a recovery than those tested in a neutral context, but they showed a recovery of suppression nevertheless. A change in context tended to cause a change in the meaning of the stimulus, leading to recovery in both the neutral and extinction contexts. The extinction context attenuated that recovery, perhaps by enabling retrieval of the learning that took place in extinction. Recovery outside an extinction context is due to a failure of the context to enable the learning acquired during extinction, but only in part. PMID:22521549

  15. Massive preexposure and preexposure in multiple contexts attenuate the context specificity of latent inhibition.

    PubMed

    Wheeler, Daniel S; Chang, Raymond C; Miller, Ralph R

    2003-11-01

    Latent inhibition, which refers to attenuated responding to a conditioned stimulus (CS) after CS-unconditioned stimulus (CS-US) pairings as a result of CS-alone presentations prior to the pairings, is often attenuated if preexposure and conditioning occur in different contexts (i.e., it is context specific). Here we report two conditioned lick suppression experiments, using rat subjects, that examined whether manipulations known to attenuate the context specificity of extinction could also eliminate the context specificity of latent inhibition. Context specificity of latent inhibition was eliminated when the CS was preexposed in multiple contexts (Experiment 1) and when the CS was massively pre-exposed in the training context alone (Experiment 2). These results and their practical implications are discussed in the framework of contemporary theories of latent inhibition.

  16. The Archival and Library Viewpoints of a Collection in a Digital Environment: Is There Any Room for Compromise?

    ERIC Educational Resources Information Center

    Coleman, Sterling, Jr.

    2004-01-01

    This article explores the archivists' and librarians' definition of a collection, and how they respectively arrange their collections in the context of collection development and collection management issues in a digital library. It centers on possible cooperative solutions and highlights, as a case study, the efforts of the Auburn University…

  17. Theory of Collective Intelligence

    NASA Technical Reports Server (NTRS)

    Wolpert, David H.

    2003-01-01

    In this chapter an analysis of the behavior of an arbitrary (perhaps massive) collective of computational processes in terms of an associated "world" utility function is presented We concentrate on the situation where each process in the collective can be viewed as though it were striving to maximize its own private utility function. For such situations the central design issue is how to initialize/update the collective's structure, and in particular the private utility functions, so as to induce the overall collective to behave in a way that has large values of the world utility. Traditional "team game" approaches to this problem simply set each private utility function equal to the world utility function. The "Collective Intelligence" (COIN) framework is a semi-formal set of heuristics that recently have been used to construct private utility. functions that in many experiments have resulted in world utility values up to orders of magnitude superior to that ensuing from use of the team game utility. In this paper we introduce a formal mathematics for analyzing and designing collectives. We also use this mathematics to suggest new private utilities that should outperform the COIN heuristics in certain kinds of domains. In accompanying work we use that mathematics to explain previous experimental results concerning the superiority of COIN heuristics. In that accompanying work we also use the mathematics to make numerical predictions, some of which we then test. In this way these two papers establish the study of collectives as a proper science, involving theory, explanation of old experiments, prediction concerning new experiments, and engineering insights.

  18. Mechanosensory Interactions Drive Collective Behaviour in Drosophila

    PubMed Central

    Ramdya, Pavan; Lichocki, Pawel; Cruchet, Steeve; Frisch, Lukas; Tse, Winnie; Floreano, Dario; Benton, Richard

    2014-01-01

    Collective behaviour enhances environmental sensing and decision-making in groups of animals1,2. Experimental and theoretical investigations of schooling fish, flocking birds and human crowds have demonstrated that simple interactions between individuals can explain emergent group dynamics3,4. These findings imply the existence of neural circuits that support distributed behaviours, but the molecular and cellular identities of relevant sensory pathways are unknown. Here we show that Drosophila melanogaster exhibits collective responses to an aversive odour: individual flies weakly avoid the stimulus, but groups show enhanced escape reactions. Using high-resolution behavioural tracking, computational simulations, genetic perturbations, neural silencing and optogenetic activation we demonstrate that this collective odour avoidance arises from cascades of appendage touch interactions between pairs of flies. Inter-fly touch sensing and collective behaviour require the activity of distal leg mechanosensory sensilla neurons and the mechanosensory channel NOMPC5,6. Remarkably, through these inter-fly encounters, wild-type flies can elicit avoidance behaviour in mutant animals that cannot sense the odour – a basic form of communication. Our data highlight the unexpected importance of social context in the sensory responses of a solitary species and open the door to a neural circuit level understanding of collective behaviour in animal groups. PMID:25533959

  19. Physics Learning through a Telecommunications Context.

    ERIC Educational Resources Information Center

    Edwards, Christopher

    2000-01-01

    Describes the Physics Phones Home unit which is context-led and developed by the Supported Learning in Physics Projects. Teaches introductory magnetism; electric, magnetic and gravitational fields; and electricity and circular motion. (YDS)

  20. The Texts and Contexts of Writing.

    ERIC Educational Resources Information Center

    Lotto, Edward

    1988-01-01

    Uses case studies of intensive writing courses in government, history, and computer science to explain the differences between the disciplinary contexts for writing, and to help tutors in their work with students from those disciplines. (RS)

  1. Theorizing Social Context: Rethinking Behavioral Theory

    PubMed Central

    Burke, Nancy J.; Joseph, Galen; Pasick, Rena J.; Barker, Judith C.

    2013-01-01

    Major behavioral theories focus on proximal influences on behavior that are considered to be predominantly cognitive characteristics of the individual largely uninfluenced by social context. Social ecological models integrate multiple levels of influence on health behavior and are noted for emphasizing the interdependence of environmental settings and life domains. This theory-based article explains how social context is conceptualized in the social sciences and how the social science conceptualization differs from and can broaden the analytic approach to health behavior. The authors use qualitative data from the “Behavioral Constructs and Culture in Cancer Screening” study to illustrate our conceptualization of social context. We conclude that the incorporation into health behavior theory of a multidimensional socio-culturally oriented, theoretical approach to social context is critical to understand and redress health disparities in multicultural societies like that in the United States. PMID:19805791

  2. Formative Evaluation in the Performance Context.

    ERIC Educational Resources Information Center

    Dick, Walter; King, Debby

    1994-01-01

    Reviews the traditional formative evaluation model used by instructional designers; summarizes Kirkpatrick's model of evaluation; proposes the integration of part of Kirkpatrick's model with traditional formative evaluation; and discusses performance-context formative evaluation. (three references) (LRW)

  3. Context Matters in Child and Family Policy

    PubMed Central

    Dodge, Kenneth A.

    2010-01-01

    The traditional model of translation from basic laboratory science to efficacy trials to effectiveness trials to community dissemination has flaws that arise from false assumptions that context changes little or matters little. One of the most important findings in developmental science is that context matters, but this fact is not sufficiently taken into account in many translation efforts. Studies reported in this special issue highlight both the potential of systematic interventions in parenting, peer relations, and social-cognitive skills training, and the problems that will be encountered in trying to bring these interventions to a community context. It is advocated that developmental scientists start from within the community context itself so that translation to policy is only a small step. It is also advocated that this research be conducted through rigorous community randomized controlled trials. PMID:21291450

  4. Polarimetric imagery collection experiment

    NASA Astrophysics Data System (ADS)

    Romano, Joao M.; Felton, Melvin; Chenault, David; Sohr, Brian

    2010-04-01

    The Spectral and Polarimetric Imagery Collection Experiment (SPICE) is a collaborative effort between the US Army ARDEC and ARL that is focused on the collection of mid-wave and long-wave infrared imagery using hyperspectral, polarimetric, and broadband sensors. The objective of the program is to collect a comprehensive database of the different modalities over the course of 1 to 2 years to capture sensor performance over a wide variety of weather conditions, diurnal, and seasonal changes inherent to Picatinny's northern New Jersey location. Using the Precision Armament Laboratory (PAL) tower at Picatinny Arsenal, the sensors will autonomously collect the desired data around the clock at different ranges where surrogate 2S3 Self-Propelled Howitzer targets are positioned at different viewing perspectives in an open field. The database will allow for: 1) Understanding of signature variability under adverse weather conditions; 2) Development of robust algorithms; 3) Development of new sensors; 4) Evaluation of polarimetric technology; and 5) Evaluation of fusing the different sensor modalities. In this paper, we will present the SPICE data collection objectives, the ongoing effort, the sensors that are currently deployed, and how this work will assist researches on the development and evaluation of sensors, algorithms, and fusion applications.

  5. Ubiquitous Geo-Sensing for Context-Aware Analysis: Exploring Relationships between Environmental and Human Dynamics

    PubMed Central

    Sagl, Günther; Blaschke, Thomas; Beinat, Euro; Resch, Bernd

    2012-01-01

    Ubiquitous geo-sensing enables context-aware analyses of physical and social phenomena, i.e., analyzing one phenomenon in the context of another. Although such context-aware analysis can potentially enable a more holistic understanding of spatio-temporal processes, it is rarely documented in the scientific literature yet. In this paper we analyzed the collective human behavior in the context of the weather. We therefore explored the complex relationships between these two spatio-temporal phenomena to provide novel insights into the dynamics of urban systems. Aggregated mobile phone data, which served as a proxy for collective human behavior, was linked with the weather data from climate stations in the case study area, the city of Udine, Northern Italy. To identify and characterize potential patterns within the weather-human relationships, we developed a hybrid approach which integrates several spatio-temporal statistical analysis methods. Thereby we show that explanatory factor analysis, when applied to a number of meteorological variables, can be used to differentiate between normal and adverse weather conditions. Further, we measured the strength of the relationship between the ‘global’ adverse weather conditions and the spatially explicit effective variations in user-generated mobile network traffic for three distinct periods using the Maximal Information Coefficient (MIC). The analyses result in three spatially referenced maps of MICs which reveal interesting insights into collective human dynamics in the context of weather, but also initiate several new scientific challenges. PMID:23012571

  6. The functions of contexts in associative learning.

    PubMed

    Urcelay, Gonzalo P; Miller, Ralph R

    2014-05-01

    Although contexts play many roles during training and also during testing, over the last four decades theories of learning have predominantly focused on one or the other of the two families of functions served by contexts. In this selective review, we summarize recent data concerning these two functions and their interrelationship. The first function is similar to that of discrete cues, and allows contexts to elicit conditioned responses and compete with discrete events for behavioral control. The second function is modulatory, and similar to that of discrete occasion setters in that in this role contexts do not elicit conditioned responses by themselves, but rather modulate instrumental responding or responding to Pavlovian cues. We first present evidence for these two functions, and then suggest that the spacing of trials, amount of training, and contiguity are three determinants of the degree to which the context will play each function. We also conclude that these two functions are not mutually exclusive, and that future research would benefit from identifying the conditions under which their functions dominate behavioral control. We close by discussing some misconceptions concerning contexts. This article is part of a Special Issue entitled: SQAB 2013: Contextual Con.

  7. Renewal, resurgence, and alternative reinforcement context.

    PubMed

    Sweeney, Mary M; Shahan, Timothy A

    2015-07-01

    Resurgence, relapse induced by the removal of alternative reinforcement, and renewal, relapse induced by a change in contextual stimuli, are typically studied separately in operant conditioning paradigms. In analogous treatments of operant problem behavior, aspects of both relapse phenomena can operate simultaneously. Therefore, the purpose of this study was to examine a novel method for studying resurgence and renewal in the same experimental preparation. An alternative source of reinforcement was available during extinction for one group of rats (a typical resurgence preparation). Another group experienced an operant renewal preparation in which the extinction context was distinguished via olfactory and visual stimuli. A third group experienced alternative reinforcement delivery in the new context, a novel combination of typical resurgence and renewal preparations. Removal of alternative reinforcement and/or a change in context induced relapse relative to an extinction-only control group. When alternative reinforcement was delivered in a novel context, the alternative response was less persistent relative to when extinction of the alternative response took place in the context in which it was trained. This methodology might be used to illustrate shared (or distinct) mechanisms of resurgence and renewal, and to determine how delivering alternative reinforcement in another context may affect persistence and relapse.

  8. The functions of contexts in associative learning

    PubMed Central

    Urcelay, Gonzalo P.; Miller, Ralph R.

    2014-01-01

    Although contexts play many roles during training and also during testing, over the last four decades theories of learning have predominantly focused on one or the other of two families of functions served by contexts. In this selective review, we summarize recent data concerning these two functions and their interrelationship. The first function is similar to that of discrete cues, and allows contexts to elicit conditioned responses and compete with discrete events for behavioral control. The second function is modulatory, and similar to that of discrete occasion setters in that in this role contexts do not elicit conditioned responses by themselves, but rather modulate instrumental responding or responding to Pavlovian cues. We first present evidence for these two functions, and then suggest that the spacing of trials, amount of training, and contiguity are three determinants of the degree to which the context will play each function. We also conclude that these two functions are not mutually exclusive, and that future research would benefit from identifying the conditions under which their functions dominate behavioral control. We close by discussing some misconceptions concerning contexts. PMID:24614400

  9. Disentangling Metaphor from Context: An ERP Study

    PubMed Central

    Bambini, Valentina; Bertini, Chiara; Schaeken, Walter; Stella, Alessandra; Di Russo, Francesco

    2016-01-01

    A large body of electrophysiological literature showed that metaphor comprehension elicits two different event-related brain potential responses, namely the so-called N400 and P600 components. Yet most of these studies test metaphor in isolation while in natural conversation metaphors do not come out of the blue but embedded in linguistic and extra-linguistic context. This study aimed at assessing the role of context in the metaphor comprehension process. We recorded EEG activity while participants were presented with metaphors and equivalent literal expressions in a minimal context (Experiment 1) and in a supportive context where the word expressing the ground between the metaphor's topic and vehicle was made explicit (Experiment 2). The N400 effect was visible only in minimal context, whereas the P600 was visible both in the absence and in the presence of contextual cues. These findings suggest that the N400 observed for metaphor is related to contextual aspects, possibly indexing contextual expectations on upcoming words that guide lexical access and retrieval, while the P600 seems to reflect truly pragmatic interpretative processes needed to make sense of a metaphor and derive the speaker's meaning, also in the presence of contextual cues. In sum, previous information in the linguistic context biases toward a metaphorical interpretation but does not suppress interpretative pragmatic mechanisms to establish the intended meaning. PMID:27199799

  10. Disentangling Metaphor from Context: An ERP Study.

    PubMed

    Bambini, Valentina; Bertini, Chiara; Schaeken, Walter; Stella, Alessandra; Di Russo, Francesco

    2016-01-01

    A large body of electrophysiological literature showed that metaphor comprehension elicits two different event-related brain potential responses, namely the so-called N400 and P600 components. Yet most of these studies test metaphor in isolation while in natural conversation metaphors do not come out of the blue but embedded in linguistic and extra-linguistic context. This study aimed at assessing the role of context in the metaphor comprehension process. We recorded EEG activity while participants were presented with metaphors and equivalent literal expressions in a minimal context (Experiment 1) and in a supportive context where the word expressing the ground between the metaphor's topic and vehicle was made explicit (Experiment 2). The N400 effect was visible only in minimal context, whereas the P600 was visible both in the absence and in the presence of contextual cues. These findings suggest that the N400 observed for metaphor is related to contextual aspects, possibly indexing contextual expectations on upcoming words that guide lexical access and retrieval, while the P600 seems to reflect truly pragmatic interpretative processes needed to make sense of a metaphor and derive the speaker's meaning, also in the presence of contextual cues. In sum, previous information in the linguistic context biases toward a metaphorical interpretation but does not suppress interpretative pragmatic mechanisms to establish the intended meaning.

  11. Curating Virtual Data Collections

    NASA Technical Reports Server (NTRS)

    Lynnes, Chris; Leon, Amanda; Ramapriyan, Hampapuram; Tsontos, Vardis; Shie, Chung-Lin; Liu, Zhong

    2015-01-01

    NASAs Earth Observing System Data and Information System (EOSDIS) contains a rich set of datasets and related services throughout its many elements. As a result, locating all the EOSDIS data and related resources relevant to particular science theme can be daunting. This is largely because EOSDIS data's organizing principle is affected more by the way they are produced than around the expected end use. Virtual collections oriented around science themes can overcome this by presenting collections of data and related resources that are organized around the user's interest, not around the way the data were produced. Virtual collections consist of annotated web addresses (URLs) that point to data and related resource addresses, thus avoiding the need to copy all of the relevant data to a single place. These URL addresses can be consumed by a variety of clients, ranging from basic URL downloaders (wget, curl) and web browsers to sophisticated data analysis programs such as the Integrated Data Viewer.

  12. Dibaryons from Exceptional Collections

    NASA Astrophysics Data System (ADS)

    Herzog, Christopher P.; Walcher, Johannes

    2003-09-01

    We discuss aspects of the dictionary between brane configurations in del Pezzo geometries and dibaryons in the dual superconformal quiver gauge theories. The basis of fractional branes defining the quiver theory at the singularity has a K-theoretic dual exceptional collection of bundles which can be used to read off the spectrum of dibaryons in the weakly curved dual geometry. Our prescription identifies the R-charge R and all baryonic U(1) charges QI with divisors in the del Pezzo surface without any Weyl group ambiguity. As one application of the correspondence, we identify the cubic anomaly trRQIQJ as an intersection product for dibaryon charges in large-N superconformal gauge theories. Examples can be given for all del Pezzo surfaces using three- and four-block exceptional collections. Markov-type equations enforce consistency among anomaly equations for three-block collections.

  13. The Geneva brain collection

    PubMed Central

    Kövari, Enikö; Hof, Patrick R.; Bouras, Constantin

    2011-01-01

    The University of Geneva brain collection was founded at the beginning of the 20th century. Today, it consists of 10,154 formaldehyde- or buffered formaldehyde–fixed brains obtained from the autopsies of the Department of Psychiatry and, since 1971, from the Department of Geriatrics as well. More than 100,000 paraffin-embedded blocks and 200,000 histological slides have also been collected since 1901. From the time of its creation, this collection has served as an important resource for pathological studies and clinicopathological correlations, primarily in the field of dementing illnesses and brain aging research. These materials have permitted a number of original neuropathological observations, such as the classification of Pick’s disease by Constantinidis, or the description of dyshoric angiopathy and laminar sclerosis by Morel. The large number of cases, including some very rare conditions, provides a unique resource and an opportunity for worldwide collaborations. PMID:21599692

  14. A Collective Bargaining Contract Analyzer for Community Colleges.

    ERIC Educational Resources Information Center

    Lovell, Ned B.; And Others

    This monograph provides comparative data to assist community colleges in analyzing, planning, and negotiating collective bargaining agreements within the context of a comprehensive Contract Item Analysis (CIA) model. In the monograph, the CIA model is applied to agreements reached in the Illinois Community College System (ICCS), although it…

  15. Talks with Teachers of Young Children: A Collection.

    ERIC Educational Resources Information Center

    Katz, Lilian G.

    Expanding on previous collections, this book compiles 16 essays on pedagogical and child development issues stimulated by interaction with teachers, child caregivers, and early childhood teacher educators during the preceding 20 years. The essays were written in response and reaction to particular educational events or contexts that were…

  16. Exploring Trainers' Engaging Instructional Practices: A Collective Case Study

    ERIC Educational Resources Information Center

    Arghode, Vishal; Wang, Jia

    2016-01-01

    Purpose: This study aims to explore the phenomenon of training engagement from the trainers' perspective. Specifically, two questions guided this inquiry. First, how do trainers define engagement in the training context? and What strategies do trainers use to engage trainees? Design/methodology/approach: The collective case study approach was…

  17. Exclusivity of Collective Bargaining Arbitration in Canadian Academia.

    ERIC Educational Resources Information Center

    Khan, A. N.

    1990-01-01

    Examines the labor relations context and the labor law affecting school personnel in Canada. Discusses a Manitoba court ruling that plaintiff was restricted to the provisions of the legislation and of the collective agreement as applied to him; therefore, the court declined to hear his case. (41 references) (MLF)

  18. Collective (Team) Learning Process Models: A Conceptual Review

    ERIC Educational Resources Information Center

    Knapp, Randall

    2010-01-01

    Teams have become a key resource for learning and accomplishing work in organizations. The development of collective learning in specific contexts is not well understood, yet has become critical to organizational success. The purpose of this conceptual review is to inform human resource development (HRD) practice about specific team behaviors and…

  19. Fostering Collective and Individual Learning through Knowledge Building

    ERIC Educational Resources Information Center

    Zhao, Ke; Chan, Carol K. K.

    2014-01-01

    The purpose of this study was to design and examine a computer-supported knowledge-building environment and to investigate both collective knowledge-building dynamics and individual learning in the context of a tertiary education course in mainland China. The participants were 102 students in four intact Year-one tertiary business classes. Two…

  20. Communicating with Faculty about the Collection: Citation Analysis and Beyond.

    ERIC Educational Resources Information Center

    McKimmie, T.

    The ownership/access debate is considered in the context of communication with library users. As part of a dialogue regarding library resources, a citation analysis was undertaken to assist in describing the collection at the New Mexico State University (NMSU) library to faculty researchers and other library users. References cited in faculty…

  1. The Role and Role Context of the Lebanese School Principal: Toward a Culturally Grounded Understanding of the Principalship

    ERIC Educational Resources Information Center

    Akkary, Rima Karami

    2014-01-01

    This study provides empirical data about the role and work context of the school principal in the Lebanon. The study applied grounded theory methods in collecting and analysing the data. The data were collected through a series of open-ended interviews with 53 secondary school principals, and focus group interviews with 8 principals from public as…

  2. Agriculture as an Upholder of Cultural Heritage? Conceptualizations and Value Judgements--A Norwegian Perspective in International Context

    ERIC Educational Resources Information Center

    Daugstad, Karoline; Ronningen, Katrina; Skar, Birgitte

    2006-01-01

    The multifunctional role of agriculture as a producer of collective goods in addition to food and fibre, has been stressed within the context of negotiations on the liberalization of the world market for food (WTO) and in general in discussions concerning restructuring of the agricultural sector. One of these collective goods, cultural heritage,…

  3. Quantifying collective effervescence

    PubMed Central

    Konvalinka, Ivana; Bulbulia, Joseph; Roepstorff, Andreas

    2011-01-01

    Collective rituals are ubiquitous and resilient features of all known human cultures. They are also functionally opaque, costly, and sometimes dangerous. Social scientists have speculated that collective rituals generate benefits in excess of their costs by reinforcing social bonding and group solidarity, yet quantitative evidence for these conjectures is scarce. Our recent study measured the physiological effects of a highly arousing Spanish fire-walking ritual, revealing shared patterns in heart-rate dynamics between participants and related spectators. We briefly describe our results, and consider their implications. PMID:22446541

  4. Portable data collection device

    DOEpatents

    French, Patrick D.

    1996-01-01

    The present invention provides a portable data collection device that has a variety of sensors that are interchangeable with a variety of input ports in the device. The various sensors include a data identification feature that provides information to the device regarding the type of physical data produced by each sensor and therefore the type of sensor itself. The data identification feature enables the device to locate the input port where the sensor is connected and self adjust when a sensor is removed or replaced. The device is able to collect physical data, whether or not a function of a time.

  5. Portable data collection device

    DOEpatents

    French, P.D.

    1996-06-11

    The present invention provides a portable data collection device that has a variety of sensors that are interchangeable with a variety of input ports in the device. The various sensors include a data identification feature that provides information to the device regarding the type of physical data produced by each sensor and therefore the type of sensor itself. The data identification feature enables the device to locate the input port where the sensor is connected and self adjust when a sensor is removed or replaced. The device is able to collect physical data, whether or not a function of a time. 7 figs.

  6. Using observation to collect data in emergency research.

    PubMed

    Fry, Margaret; Curtis, Kate; Considine, Julie; Shaban, Ramon Z

    2017-02-01

    Research questions require specific data collection techniques to appropriately explore and understand the phenomena of interest. Observation as a term features commonly in the literature as a way to describe both the design of a study and methods deployed within procedures. Observation as a data collection method is a mode of inquiry to systematically collect information about different settings and groups. However, the objective of observation in data collection is to better understand the phenomena of interest situated in context. Specifically, observation data collection can improve understanding of practice, processes, knowledge, beliefs, and attitudes embedded in clinical work and social interactions. This pragmatic paper will assist emergency nurses and other clinicians to understand how observation can be used as a data collection method within clinical practice.

  7. The Effects of Using Peer and Teacher Feedback into Saudi Writing Context

    ERIC Educational Resources Information Center

    Alhaisoni, Eid; Alzuoud, Khalid

    2012-01-01

    This paper aims to investigate the efficacy of two commonly used techniques of feedback in teaching writing: teachers' feedback and peers' feedback in the Saudi educational context. The study was comprised of 132 Saudi EFL students enrolled at the Department of English in the University of Hai'l. The data collection was carried out through a…

  8. The Care and Education of Young Children: Expanding Contexts, Sharpening Focus.

    ERIC Educational Resources Information Center

    Rust, Frances O'Connell, Ed.; Willliams, Leslie R., Ed.

    This collection of essays by child advocates explores three interconnected facets of the child care and education field: the broad sociocultural contexts influencing the development of young children and their families, the evolution of specific settings or programs where care and education occur, and the emerging consciousness of early childhood…

  9. The Eye of the Hurricane: Autoethnography in the Southern Brazilian School Context

    ERIC Educational Resources Information Center

    Bossle, Fabiano; Molina Neto, Vicente; Molina, Rosane Kreusburg

    2014-01-01

    The article systematizes the results of an autoethnography that aimed at understanding the difficulties of the collective work of teachers, their culture and their experience in the context of a municipal public school in Porto Alegre, Brazil. The autoreflexive exercise showed that urban violence leaves profound marks on the culture of the local…

  10. College Students' Conceptions of Context-Aware Ubiquitous Learning: A Phenomenographic Analysis

    ERIC Educational Resources Information Center

    Tsai, Pei-Shan; Tsai, Chin-Chung; Hwang, Gwo-Haur

    2011-01-01

    The purpose of this study was to explore students' conceptions of context-aware ubiquitous learning (u-learning). The students participated in a u-learning exercise using PDAs equipped with RFID readers. The data were collected from individual interviews with each of the students by a trained researcher, and the responses of the interviewees were…

  11. Epistemic Beliefs about Justification Employed by Physics Students and Faculty in Two Different Problem Contexts

    ERIC Educational Resources Information Center

    Mercan, Fatih Caglayan

    2012-01-01

    This study examines the epistemic beliefs about justification employed by physics undergraduate and graduate students and faculty in the context of solving a standard classical physics problem and a frontier physics problem. Data were collected by a think-aloud problem solving session followed by a semi-structured interview conducted with 50…

  12. Teacher Leadership Enactment in Professional Learning Community Contexts: Towards a Better Understanding of the Phenomenon

    ERIC Educational Resources Information Center

    Hairon, Salleh; Goh, Jonathan Wee Pin; Chua, Catherine Siew Kheng

    2015-01-01

    Professional learning communities (PLCs) have gained considerable attention in education. However, PLCs are dependent on how group members collectively work and learn towards shared goals on improving teaching and learning. This would require leadership to support meaningful and productive interactions within PLC contexts, and hence, the…

  13. Using CALL in a Formal Learning Context to Develop Oral Language Awareness in ESL: An Assessment

    ERIC Educational Resources Information Center

    Vincent-Durroux, Laurence; Poussard, Cecile; Lavaur, Jean-Marc; Aparicio, Xavier

    2011-01-01

    French learners at university meet difficulties in the comprehension of oral English. Being in a formal context of language learning, they need to develop language awareness to compensate for insufficient exposure to the English language. To meet the students' needs, data was collected in order to pinpoint the main errors made by French learners…

  14. Patterns of Change in Willingness to Communicate in Public Speaking Contexts: A Latent Growth Modeling Analysis

    ERIC Educational Resources Information Center

    Hodis, Georgeta M.; Bardhan, Nilanjana R.; Hodis, Flaviu A.

    2010-01-01

    This study offers a comprehensive analysis of change in willingness to communicate (WTC) in public speaking contexts (i.e., PS-WTC). The proposed conceptualization of change was tested using longitudinal data collected from a sample of 706 undergraduate students enrolled in an introductory communication course in a US university. Results of latent…

  15. Oral Fluency, Accuracy, and Complexity in Formal Instruction and Study Abroad Learning Contexts

    ERIC Educational Resources Information Center

    Mora, Joan C.; Valls-Ferrer, Margalida

    2012-01-01

    This study investigates the differential effects of two learning contexts, formal instruction (FI) at home and a study abroad period (SA), on the oral production skills of advanced-level Catalan-Spanish undergraduate learners of English. Speech samples elicited through an interview at three data collection times over a 2-year period were…

  16. What Have We Learned about the Social Context-Student Engagement Link?

    ERIC Educational Resources Information Center

    Boekaerts, Monique

    2011-01-01

    The author explores how each author contributes to our understanding of the social context--self-regulation link. She also describes how the articles collectively enhance our insights into the social embeddedness of regulation strategies in the classroom and lists some of the challenges that remain.

  17. Lessons to Be Learned From Research on Peace Education in the Context of Intractable Conflict

    ERIC Educational Resources Information Center

    Kupermintz, Haggai; Salomon, Gavriel

    2005-01-01

    Recent research on peace education entails important practical lessons about educational work in regions of intractable conflict. Peace education in this context must deal with collective narratives and deeply rooted historical memories and societal beliefs. Research findings from a series of studies with Israeli and Palestinian students and…

  18. Struggling with Involuntary Expressive Behaviours: Chinese Doctors' Professional Learning in Working Contexts

    ERIC Educational Resources Information Center

    Ma, Songge

    2012-01-01

    Purpose: This paper aims to explore what Chinese doctors have learned in authentic medical practice, what they want to learn, and the dynamics behind their professional learning in working contexts. Design/methodology/approach: The paper uses Narrative Inquiry, qualitative data which were collected by open-ended face-to-face interviews and…

  19. Use of Social Media in Different Contexts of Information Seeking: Effects of Sex and Problemsolving Style

    ERIC Educational Resources Information Center

    Kim, Kyung­-Sun; Sin, Sei­-Ching Joanna

    2015-01-01

    Introduction: Social media are increasingly popular and emerging as important information sources. The study investigates how users' sex and problem-solving style affect their use and evaluation of social media in two contexts. Method: A Web survey including the problem solving inventory (problem solving inventory) was used to collect data. Over…

  20. Revisiting Transactional Distance Theory in a Context of Web-Based High-School Distance Education

    ERIC Educational Resources Information Center

    Murphy, Elizabeth Anne; Rodriguez-Manzanares, Maria Angeles

    2008-01-01

    The purpose of this paper is to report on a study that provided an opportunity to consider Transactional Distance Theory (TDT) in a current technology context of web-based learning in distance education (DE), high-school classrooms. Data collection relied on semi-structured interviews conducted with 22 e-teachers and managers in Newfoundland and…

  1. Diversified Professionalism of Physical Education Teachers in the Asian Context of Hong Kong

    ERIC Educational Resources Information Center

    Sum, Raymond Kim Wai; Dimmock, Clive

    2014-01-01

    This study investigates the socialization and professional experiences of primary school physical education teachers (PSPETs) in the Asian context of Hong Kong. A qualitative research design is adopted. The researcher used semi-structured interviews, supplemented by documentary sources (diaries) for conducting data collection. Eleven PSPETs…

  2. The Cultural and Political Context of Child Development: Reality and Fantasy.

    ERIC Educational Resources Information Center

    Church, Joseph

    Read on the occasion of the establishment of the Joseph Church collection in psychology and education at the New York Public Library, this anecdotal and allusive paper informally discusses cultural changes affecting Americans' views and practices in the areas of parenting and child development. Reference is made to the present political context.…

  3. Professional Development Policy and Politics across International Contexts: From Mutuality to Measurability?

    ERIC Educational Resources Information Center

    Hardy, Ian; Ronnerman, Karin; Furu, Eli Moksnes; Salo, Petri; Forsman, Liselott

    2010-01-01

    This article reveals how educational policies and policy contexts in Sweden, Norway, Finland and Australia establish the circumstances which enable and constrain individual and collective teacher professional development as praxis. We provide insights into existing partnerships between universities and schools, and, municipalities and the state as…

  4. The Influence of the Social Context on Students In-Class Physical Activity

    ERIC Educational Resources Information Center

    Perlman, Dana

    2013-01-01

    The purpose of this study was to examine the influence of the social context, based within self-determination theory, on student's in-class physical activity. A total of 84 Year 11/12 physical education students were randomly assigned to one of three treatment groups; Autonomy-supportive, Controlling and Balanced. Data were collected using a…

  5. Validation of the Learning Progression-Based Assessment of Modern Genetics in a College Context

    ERIC Educational Resources Information Center

    Todd, Amber; Romine, William L.

    2016-01-01

    Building upon a methodologically diverse research foundation, we adapted and validated the "Learning Progression-based Assessment of Modern Genetics" (LPA-MG) for college students' knowledge of the domain. Toward collecting valid learning progression-based measures in a college majors context, we redeveloped and content validated a…

  6. GOVERNING GENETIC DATABASES: COLLECTION, STORAGE AND USE.

    PubMed

    Gibbons, Susan M C; Kaye, Jane

    2007-01-01

    This paper provides an introduction to a collection of five papers, published as a special symposium journal issue, under the title: "Governing Genetic Databases: Collection, Storage and Use". It begins by setting the scene, to provide a backdrop and context for the papers. It describes the evolving scientific landscape around genetic databases and genomic research, particularly within the biomedical and criminal forensic investigation fields. It notes the lack of any clear, coherent or coordinated legal governance regime, either at the national or international level. It then identifies and reflects on key cross-cutting issues and themes that emerge from the five papers, in particular: terminology and definitions; consent; special concerns around population genetic databases (biobanks) and forensic databases; international harmonisation; data protection; data access; boundary-setting; governance; and issues around balancing individual interests against public good values.

  7. Power differentials in bullying: individuals in a community context.

    PubMed

    Schumann, Lyndall; Craig, Wendy; Rosu, Andrei

    2014-03-01

    Central to the definition of bullying is the abuse of power. Power relationships are inherent in social groups, by virtue of differing size, strength, age, socioeconomic status (SES), or social connectedness of individuals. Beyond the influence of these individual characteristics, environmental factors have the potential to affect the power dynamic in bullying and victimization, but are a relatively unexplored research area. In particular, we know little about how the community-level factors relate to bullying in the adolescent population. The present study is guided by a social ecological perspective to gain a deeper understanding of the individual and built community characteristics (e.g., parks, recreational spaces, buildings that facilitate social interaction and community connectedness) that contribute to the power dynamics related to victimization or bullying in traditional and electronic contexts. Data were collected from 17,777 students in Grades 6 to 10 as part of the 2009/2010 Health Behavior in School-aged Children (HBSC) Survey, from Geographical Information Systems (GIS) data, and from 2006 Canadian Census data. Two nested models were run using HLM with age, gender, ethnicity, SES, social inclusion factors (e.g., collective efficacy), and community resource factors (e.g., access to recreation) as predictors. Characteristics of individuals that placed them at a power disadvantage (being younger, female, and having low SES) were linked to higher rates of victimization. Lower individual collective efficacy was also associated with higher rates of traditional and electronic victimization. Community recreational opportunities were associated with decreased victimization in both contexts. The relative importance of individual and built environmental factors and conceptualization of bullying interactions within a social ecology model are discussed.

  8. A symbolic awareness context identified through a grounded theory study of health visiting.

    PubMed

    Cowley, S

    1991-06-01

    The purpose of the study, which is not yet complete, was one of theory building or conceptualization. This was needed because of a lack of information about how health visitors identify which approach to use within any particular situation. An overview of the method of grounded theory explains how data were collected and analysed. Then, one major aspect of the emerging theory--a symbolic awareness context which seems to surround and influence interactions between health visitors and their clients--is outlined. The analysis suggests that, when the interaction is examined in context, any one question, purpose or topic selected by health visitor or client as a specific focus, forms only a relatively small component part of the whole. Strategies which enhance openness and consonance within the context are detailed. The awareness context has implications for health visiting practice and organization.

  9. 75 FR 20600 - Proposed Data Collections Submitted for Public Comment and Recommendations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-20

    ... HUMAN SERVICES Centers for Disease Control and Prevention Proposed Data Collections Submitted for Public... regarding African American heterosexual men's sexual risk behaviors and the context in which they occur.../AIDS among this target population. Thorough examinations of sexual risk behaviors and the context...

  10. Sao Paulo Map Collections.

    ERIC Educational Resources Information Center

    McLean, G. Robert

    1985-01-01

    Describes geographical, subject, and chronological aspects of 25 cartographic collections housed in university, public, special, state, and semi-state libraries in Sao Paulo, Brazil. Three size categories of map holdings (more than 10,000, 1,000-10,000, less than 1,000) are distinguished. A list of 27 Sao Paulo institutions housing map collections…

  11. Digital Collections Inventory Report.

    ERIC Educational Resources Information Center

    McClung, Patricia A.

    This report is intended to inform and stimulate discussion on digital library programs as well as the potential usefulness, scope, and desired features of future inventories of online digital collections. It describes a joint project by the Commission on Preservation and Access and the Council on Library Resources to determine the extent to which…

  12. Surface reference data collection

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Applications of remote sensing must define relationships between image data and conditions at corresponding points on the ground. Unfortunately, many published remote sensing reports focus on image processing techniques with little detail regarding the methods used for collecting ground truth data....

  13. Authentic Assessment: A Collection.

    ERIC Educational Resources Information Center

    Burke, Kay, Ed.

    The essays in this collection consider the meaning of authentic assessment and the implications of its use. "Section 1: Assessing Assessment" includes the following essays: (1) "The Nation's Report Card Goes Home: Good News and Bad about Trends in Achievement" (Robert L. Linn and Stephen B. Dunbar); (2) "Budgets, Politics, and Testing" (Chris…

  14. Microcomputer Software Collections.

    ERIC Educational Resources Information Center

    Demas, Samuel

    1985-01-01

    Presents overview of special considerations in developing microcomputer software collections, review of standardized cataloging practices, and discussion of problems of selection and acquisition of software. Policies governing loan procedures for microcomputer software which involve four types of copy protection (patent, trade secret, contract,…

  15. Collection Maintenance and Improvement.

    ERIC Educational Resources Information Center

    Byrne, Sherry

    This resource guide provides information about the range of activities that can be implemented to maintain and improve the condition of research collections to ensure that they remain usable as long as possible. After an introduction that describes the major activities and a review of an investigation process that gives an overview of good…

  16. The collective coordinates Jacobian

    NASA Astrophysics Data System (ADS)

    Schwartz, Moshe; Vinograd, Guy

    2002-05-01

    We develop an expansion for the Jacobian of the transformation from particle coordinates to collective coordinates. As a demonstration, we use the lowest order of the expansion in conjunction with a variational principle to obtain the Percus Yevick equation for a monodisperse hard sphere system and the Lebowitz equations for a polydisperse hard sphere system.

  17. RIF and Collective Bargaining.

    ERIC Educational Resources Information Center

    Zirkel, Perry A.

    1994-01-01

    Focuses on the modern case-law intersection between state legislation for school districts that applies to reduction-in-force (RIF) and other state legislation that applies to collective bargaining. One conclusion is that the implementation of RIF is more likely to be negotiable and arbitrable than the reasons for RIF. (96 footnotes) (MLF)

  18. Collection Development Policy.

    ERIC Educational Resources Information Center

    Dole, Wanda V.; And Others

    This document is an overall policy statement for library collection development for the State University of New York at Stony Brook. Part 1 comprises the library mission statement and a list of ongoing objectives. The second part provides some background information about the university environment and campus libraries. It also gives instructions…

  19. Deterritorializing Collective Biography

    ERIC Educational Resources Information Center

    Gannon, Susanne; Walsh, Susan; Byers, Michele; Rajiva, Mythili

    2014-01-01

    This paper proposes a new move in the methodological practice of collective biography, by provoking a shift beyond any remnant attachment to the speaking/writing subject towards her dispersal and displacement via textual interventions that stress multivocality. These include the use of photographs, drama, and various genres of writing. Using a…

  20. Quick Fixes: Collection Development

    ERIC Educational Resources Information Center

    Nabb, Alicia

    2010-01-01

    The Do It Yourself (DIY) section is an essential and well-used part of the public library's collection and must be kept up-to-date to remain valuable, since tools, materials, and building codes are always changing. Current economic decline has increased the topic's popularity as homeowners choose to remodel rather than buy, or attempt to make…

  1. Wastewater Collection Systems.

    PubMed

    Vallabhaneni, Srinivas

    2015-10-01

    This chapter presents a review of the literature published in 2014 on topics relating to wastewater collection systems. It presents advances in noteworthy research and industry experiences selected from major literature sources. This review is divided into the following sections: sewer system planning; sewer condition assessment/rehabilitation; pump stations and system design; operation and maintenance; and regulatory issues/ integrated planning.

  2. The Fall Collection.

    ERIC Educational Resources Information Center

    VanDeman, Barry A.

    1984-01-01

    Presents ideas for collecting objects on the school grounds or in the surrounding neighborhood. Objects include feathers/fur, leaves, galls, seeds, shells, spiderwebs, and litter. Also presents procedures for making impressions of bark, leaves, fossils, flora, and shadows. All activities can be adopted for students in kindergarten through grade…

  3. Collection Management, 1986.

    ERIC Educational Resources Information Center

    Wortman, William A.

    1987-01-01

    The 1986 literature on collection management is reviewed under six major headings: (1) general overview; (2) materials; (3) kinds of users and libraries; (4) evaluation and cooperation; (5) selection, acquisitions, and allocation; and (6) access, weeding, and preservation. A list of 251 references is provided. (MES)

  4. Hippocampal place cells, context, and episodic memory.

    PubMed

    Smith, David M; Mizumori, Sheri J Y

    2006-01-01

    Although most observers agree that the hippocampus has a critical role in learning and memory, there remains considerable debate about the precise functional contribution of the hippocampus to these processes. Two of the most influential accounts hold that the primary function of the hippocampus is to generate cognitive maps and to mediate episodic memory processes. The well-documented spatial firing patterns (place fields) of hippocampal neurons in rodents, along with the spatial learning impairments observed with hippocampal damage support the cognitive mapping hypothesis. The amnesia for personally experienced events seen in humans with hippocampal damage and the data of animal models, which show severe memory deficits associated with hippocampal lesions, support the episodic memory account. Although an extensive literature supports each of these hypotheses, a specific contribution of place cells to episodic memory has not been clearly demonstrated. Recent data from our laboratory, together with previous findings, indicate that hippocampal place fields and neuronal responses to task-relevant stimuli are highly sensitive to the context, even when the contexts are defined by abstract task demands rather than the spatial geometry of the environment. On the basis of these findings, it is proposed that place fields reflect a more general context processing function of the hippocampus. Hippocampal context representations could serve to differentiate contexts and prime the relevant memories and behaviors. Since episodic memories, by definition, include information about the time and place where the episode occurred, contextual information is a necessary prerequisite for any episodic memory. Thus, place fields contribute importantly to episodic memory as part of the needed context representations. Additionally, recent findings indicate that hippocampal neurons differentiate contexts at progressively finer levels of detail, suggesting a hierarchical coding scheme which

  5. Sex differences, context preexposure, and the immediate shock deficit in Pavlovian context conditioning with mice.

    PubMed

    Wiltgen, B J; Sanders, M J; Behne, N S; Fanselow, M S

    2001-02-01

    The acquisition of context fear in rats is affected by variables such as the sex of the animal, the placement to shock interval (PSI), and preexposure to the context. The current experiments assessed the effects of these variables on context conditioning in mice (C57BL/6). In Experiment 1, mice were placed in a chamber and received a single shock 5s, 20 s, 40s, 60s, 180s, or 720s later. Increasing the PSI produced corresponding increases in conditional freezing during the context test. In addition, male mice acquired more context conditioning than female mice did but only at intermediate PSIs. In Experiment 2, preexposure to the context before training alleviated the sex difference found with an intermediate PSI. The results are discussed in terms of configural learning theory and are argued to be contrary to the predictions of scalar expectancy theory.

  6. Context Dependency of Conditioned Aversions to Familiar and Novel Fluids

    ERIC Educational Resources Information Center

    Ishii, Kiyoshi; Iguchi, Yoshio; Sawa, Kosuke

    2006-01-01

    Using a context discrimination procedure and rats as the subjects, the formation of context-dependent aversions to novel and familiar fluids was investigated. Experiment 1 revealed that context dependency could be established to a novel fluid (saccharin) after three cycles of context discrimination training and that the acquired context dependency…

  7. Contextual Control of Fluid Consumption: The Effects of Context Extinction

    ERIC Educational Resources Information Center

    Murphy, M.; Skinner, D.M.

    2005-01-01

    Rats were trained on a conditional discrimination task in which saccharin was paired with LiCl in one context but paired with saline in another context. Rats drank less saccharin in the danger context than in the safe context, and consumption in the home cage was intermediate to consumption in the two training contexts. Rats also avoided the…

  8. The Application of Context Theory in English Teaching of Reading

    ERIC Educational Resources Information Center

    Zhu, Jiang; Han, Lemeng

    2010-01-01

    Context theory is a very important theory in English teaching, especially the teaching of reading. This paper first analyzes the theory of context, including the features of context and some principles in context theory. Then the paper discusses the application of context theory in English teaching of reading, including some problems met in…

  9. The Evolution of the Algorithms for Collective Behavior.

    PubMed

    Gordon, Deborah M

    2016-12-21

    Collective behavior is the outcome of a network of local interactions. Here, I consider collective behavior as the result of algorithms that have evolved to operate in response to a particular environment and physiological context. I discuss how algorithms are shaped by the costs of operating under the constraints that the environment imposes, the extent to which the environment is stable, and the distribution, in space and time, of resources. I suggest that a focus on the dynamics of the environment may provide new hypotheses for elucidating the algorithms that produce the collective behavior of cellular systems.

  10. Dissociation between complete hippocampal context memory formation and context fear acquisition

    PubMed Central

    Leake, Jessica; Zinn, Raphael; Corbit, Laura; Vissel, Bryce

    2017-01-01

    Rodents require a minimal time period to explore a context prior to footshock to display plateau-level context fear at test. To investigate whether this rapid fear plateau reflects complete memory formation within that short time-frame, we used the immediate-early gene product Arc as an indicator of hippocampal context memory formation-related activity. We found that hippocampal Arc expression continued to increase well past the minimal time required for plateau-level fear. This raises the possibility that context fear conditioning occurs more rapidly than complete memory formation. Thus, animals may be able to condition robustly to both complete and incomplete contextual representations. PMID:28298553

  11. Preserving the Context of Science Data

    NASA Astrophysics Data System (ADS)

    Janée, G.; Frew, J.

    2008-12-01

    Preserving any type of digital information requires preserving both the "bits" comprising the information, and sufficient context (metadata) to support interpreting the bits in the future. Unfortunately, this context is often implicit or embedded in organizations (e.g., communities of practice) or artifacts (e.g., computing platforms) that are not as survivable as the information itself. Therefore, digital preservation must explicitly preserve context. Two necessary components of digital scientific information context are formats and provenance. Formats describe the syntax and low-level semantics of digital information objects (e.g., files). The library community has promulgated format registries (e.g, PRONOM, GDFR, digitalpreservation.gov) that allow archival objects to refer to format definitions using standardized persistent identifiers. Format registries maintain this context separately from the information that references it, but make no archival guarantees about the context's survival. Meanwhile, the scientific community has focused on capturing the provenance of scientific information, typically as a formal workflow specification of the processing steps that created the information. Unfortunately, there is as yet no standard for scientific workflows, nor any guarantee that a specification that can reproduce information is sufficient for understanding it. We describe new technologies that may prove a better fit for preserving scientific information context. The National Geospatial Digital Archive (NGDA) data model represents formats as archival objects containing specifications, software implementations, and other documentation. A format registry is simply an archive that happens to hold archival objects representing formats. Both format and provenance relationships are represented by typed references. Any archival object may reference any other object for its interpretation: the referenced object may be a "file format" object or an object containing dataset

  12. Ontological System for Context Artifacts and Resources

    NASA Astrophysics Data System (ADS)

    Huang, T.; Chung, N. T.; Mukherjee, R. M.

    2012-12-01

    The Adaptive Vehicle Make (AVM) program is a portfolio of programs, managed by the Defense Advanced Research Projects Agency (DARPA). It was established to revolutionize how DoD designs, verifies, and manufactures complex defense systems and vehicles. The Component, Context, and Manufacturing Model Library (C2M2L; pronounced "camel") seeks to develop domain-specific models needed to enable design, verification, and fabrication of the Fast Adaptable Next-Generation (FANG) infantry fighting vehicle using in its overall infrastructure. Terrain models are being developed to represent the surface/fluid that an amphibious infantry fighting vehicle would traverse, ranging from paved road surfaces to rocky, mountainous terrain, slope, discrete obstacles, mud, sand snow, and water fording. Context models are being developed to provide additional data for environmental factors, such as: humidity, wind speed, particulate presence and character, solar radiation, cloud cover, precipitation, and more. The Ontological System for Context Artifacts and Resources (OSCAR) designed and developed at the Jet Propulsion Laboratory is semantic web data system that enables context artifacts to be registered and searched according to their meaning, rather than indexed according to their syntactic structure alone (as in the case for traditional search engines). The system leverages heavily on the Semantic Web for Earth and Environmental Terminology (SWEET) ontologies to model physical terrain environment and context model characteristics. In this talk, we focus on the application of the SWEET ontologies and the design of the OSCAR system architecture.

  13. Student reasoning about graphs in different contexts

    NASA Astrophysics Data System (ADS)

    Ivanjek, Lana; Susac, Ana; Planinic, Maja; Andrasevic, Aneta; Milin-Sipus, Zeljka

    2016-06-01

    This study investigates university students' graph interpretation strategies and difficulties in mathematics, physics (kinematics), and contexts other than physics. Eight sets of parallel (isomorphic) mathematics, physics, and other context questions about graphs, which were developed by us, were administered to 385 first-year students at the Faculty of Science, University of Zagreb. Students were asked to provide explanations and/or mathematical procedures with their answers. Students' main strategies and difficulties identified through the analysis of those explanations and procedures are described. Student strategies of graph interpretation were found to be largely context dependent and domain specific. A small fraction of students have used the same strategy in all three domains (mathematics, physics, and other contexts) on most sets of parallel questions. Some students have shown indications of transfer of knowledge in the sense that they used techniques and strategies developed in physics for solving (or attempting to solve) other context problems. In physics, the preferred strategy was the use of formulas, which sometimes seemed to block the use of other, more productive strategies which students displayed in other domains. Students' answers indicated the presence of slope-height confusion and interval-point confusion in all three domains. Students generally better interpreted graph slope than the area under a graph, although the concept of slope still seemed to be quite vague for many. The interpretation of the concept of area under a graph needs more attention in both physics and mathematics teaching.

  14. Computerizing natural history collections.

    PubMed

    Sunderland, Mary E

    2013-09-01

    Computers are ubiquitous in the life sciences and are associated with many of the practical and conceptual changes that characterize biology's twentieth-century transformation. Yet comparatively little has been written about how scientists use computers. Despite this relative lack of scholarly attention, the claim that computers revolutionized the life sciences by making the impossible possible is widespread, and relatively unchallenged. How did the introduction of computers into research programs shape scientific practice? The Museum of Vertebrate Zoology (MVZ) at the University of California, Berkeley provides a tractable way into this under-examined question because it is possible to follow the computerization of data in the context of long-term research programs.

  15. Engaging young children in collective curriculum design

    NASA Astrophysics Data System (ADS)

    Goulart, Maria Inês Mafra; Roth, Wolff-Michael

    2010-09-01

    In this study we investigate how 5-year-old children in Brazil and their teachers collectively design science curriculum. More specifically, we develop an agency|structure dialectic as a framework to describe this collective praxis in which science curriculum may emerge as the result of children-teacher transactions rather than as a result of being predetermined and controlled by the latter. We draw on a cultural-historical approach and on the theory of structure and agency to analyze the events showing the complexity of the activity inside a classroom of very young children by science education standards. Data were collected in the context of a science unit in an early-childhood education program in Belo Horizonte. Our study suggests that (a) throughout the movement of agency|passivity || schema|resources one can observe participative thinking, a form of collective consciousness that arises in and from lived experience; (b) learning is a process in which a group is invested in searching for solutions while they create schemas and rearrange resources to evolve a new structure; and (c) the emergent curriculum is a powerful form of praxis that develops children's participation from early childhood on.

  16. Sports Reference: A Core Collection.

    ERIC Educational Resources Information Center

    Safford, Barbara Ripp

    2003-01-01

    Discusses reasons for including sports books in school library reference collections, explains why they should not be found only in public library collections, and provides six annotated bibliographies of sports books suitable for intermediate or middle school library collections. (LRW)

  17. 76 FR 55742 - Proposed Collection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-08

    ... Internal Revenue Service Proposed Collection AGENCY: Internal Revenue Service (IRS), Treasury. ACTION... to take this opportunity to comment on proposed and/or continuing information collections, as... approved collection. Affected Public: Business or other for-profit organizations. Estimated Number...

  18. Culture collections and biochemistry.

    PubMed

    Cánovas, Manuel; Iborra, José L

    2003-06-01

    This review describes the relationships and links between culture collections, which act as sources of genomes, transcriptomes, proteome, and metabolomes, and fields of research biochemistry that demand their support and help. In addition, the invaluable but not always rewarded efforts of these organizations as a source and conservator of organism diversity is discussed. Biological waste-water treatment, ethanol as a non-finite source of energy, Rhodococcus fascians as the source of a citrus-juice debittering agent, the sporulation of filamentous fungi in liquid medium, and biotransformation with growing and resting cells are processes developed by the authors that demonstrate some of the applications of organisms from culture collections in the general field of biotechnology and related areas, including industrial biochemistry and biocatalytic synthesis.

  19. Collective network routing

    DOEpatents

    Hoenicke, Dirk

    2014-12-02

    Disclosed are a unified method and apparatus to classify, route, and process injected data packets into a network so as to belong to a plurality of logical networks, each implementing a specific flow of data on top of a common physical network. The method allows to locally identify collectives of packets for local processing, such as the computation of the sum, difference, maximum, minimum, or other logical operations among the identified packet collective. Packets are injected together with a class-attribute and an opcode attribute. Network routers, employing the described method, use the packet attributes to look-up the class-specific route information from a local route table, which contains the local incoming and outgoing directions as part of the specifically implemented global data flow of the particular virtual network.

  20. Management challenges of context-aware learning

    NASA Astrophysics Data System (ADS)

    Pankowska, Malgorzata

    2015-02-01

    The work covers different definitions of context and the explanation of the context value for university learning organization and management. The thesis of the paper is as follows: students' focus on sources of context has impact on their knowledge acquisition and determines students' profiles and learning process, within which the teachers support de-contextualization, i.e., generalization of experience and knowledge. The work emphasizes the meaning of mobile devices in university learning process. The paper presents the value of BYOD (bring-your-own-device) strategy at universities and opportunities for m-education. The student survey results are presented to emphasize the value of that strategy. Beyond that, the students' preferences towards open source software and open learning materials are also discussed and evaluated by student survey. Finally, the process of contextualization and de-contextualization is developed for support the learning at university level.

  1. Social contexts of trauma and healing.

    PubMed

    Ajdukovic, Dean

    2004-01-01

    The social contexts in which the mass trauma of thousands of people occur and in which their recovery should progress have qualities that distinguish it in important ways from individualised trauma in which a person is a victim of a violent attack, rape or a traffic accident. Organised violence, such as wars, oppression by dictatorships and massive terrorist attacks are extreme cases in which hundreds or thousands of people are exposed to trauma in a short period of time. As such, it has multiple consequences that extend beyond the affected individuals and the symptoms they suffer. Although the symptoms may be similar, the social contexts in which individual victimisation and exposure to organised violence happen are very different. The social milieu in which the survivors of individual trauma and survivors of mass trauma are embedded is likewise different, with important consequences for recovery. Understanding the social context of the trauma helps create the right social intervention for healing at social and personal levels.

  2. The context-tree kernel for strings.

    PubMed

    Cuturi, Marco; Vert, Jean-Philippe

    2005-10-01

    We propose a new kernel for strings which borrows ideas and techniques from information theory and data compression. This kernel can be used in combination with any kernel method, in particular Support Vector Machines for string classification, with notable applications in proteomics. By using a Bayesian averaging framework with conjugate priors on a class of Markovian models known as probabilistic suffix trees or context-trees, we compute the value of this kernel in linear time and space while only using the information contained in the spectrum of the considered strings. This is ensured through an adaptation of a compression method known as the context-tree weighting algorithm. Encouraging classification results are reported on a standard protein homology detection experiment, showing that the context-tree kernel performs well with respect to other state-of-the-art methods while using no biological prior knowledge.

  3. Context aware adaptive security service model

    NASA Astrophysics Data System (ADS)

    Tunia, Marcin A.

    2015-09-01

    Present systems and devices are usually protected against different threats concerning digital data processing. The protection mechanisms consume resources, which are either highly limited or intensively utilized by many entities. The optimization of these resources usage is advantageous. The resources that are saved performing optimization may be utilized by other mechanisms or may be sufficient for longer time. It is usually assumed that protection has to provide specific quality and attack resistance. By interpreting context situation of business services - users and services themselves, it is possible to adapt security services parameters to countermeasure threats associated with current situation. This approach leads to optimization of used resources and maintains sufficient security level. This paper presents architecture of adaptive security service, which is context-aware and exploits quality of context data issue.

  4. The schizophrenic experience: taken out of context?

    PubMed

    Hemsley, David R

    2005-01-01

    A currently favored cognitive model of the abnormal behaviors and experiences characteristic of schizophrenia suggests that they may be linked to a disturbance in the effects of context. The present article reviews some of the relevant literature, noting the wide range of experimental paradigms that have been employed. This range of paradigms is both a strength and a potential weakness of the literature because it raises complex issues of definition and the need to distinguish the various ways that context may influence behaviors. This influence may be crucially dependent on specific task parameters. Despite this, a number of phenomena can be plausibly related to changes in the way that context operates: delusions, disorganization, hallucinations, and the loss of a sense of personal identity. Potential links with the neural bases of the disorder are indicated.

  5. Wastewater Collection Systems.

    PubMed

    Vallabhaneni, Srinivas

    2016-10-01

    This chapter presents a review of the literature published in 2015 on topics relating to wastewater collection systems. It presents noteworthy advances in research and industry experiences selected from major literature sources. This review is divided into the following sections: sewer system planning; sewer condition assessment/rehabilitation; pump stations/force mains/ system design; operation and maintenance; asset management; and regulatory issues/ integrated planning.

  6. Algebraic Nonlinear Collective Motion

    NASA Astrophysics Data System (ADS)

    Troupe, J.; Rosensteel, G.

    1998-11-01

    Finite-dimensional Lie algebras of vector fields determine geometrical collective models in quantum and classical physics. Every set of vector fields on Euclidean space that generates the Lie algebra sl(3, R) and contains the angular momentum algebra so(3) is determined. The subset of divergence-free sl(3, R) vector fields is proven to be indexed by a real numberΛ. TheΛ=0 solution is the linear representation that corresponds to the Riemann ellipsoidal model. The nonlinear group action on Euclidean space transforms a certain family of deformed droplets among themselves. For positiveΛ, the droplets have a neck that becomes more pronounced asΛincreases; for negativeΛ, the droplets contain a spherical bubble of radius |Λ|1/3. The nonlinear vector field algebra is extended to the nonlinear general collective motion algebra gcm(3) which includes the inertia tensor. The quantum algebraic models of nonlinear nuclear collective motion are given by irreducible unitary representations of the nonlinear gcm(3) Lie algebra. These representations model fissioning isotopes (Λ>0) and bubble and two-fluid nuclei (Λ<0).

  7. STARLINK Software Collection

    NASA Astrophysics Data System (ADS)

    Rankin, Steve; Lawden, Mike; Bly, Martin

    The Starlink Software Collection is a set of software which is managed and distributed by the Starlink Project. Some of the software was written by members of the Project, but some of it comes from outside the Project. This note describes the functions of the individual items in the Collection and provides an overview of the software so that readers can identify the items they need. The software is classified into four main divisions: * Packages -- are large collections of programs for people who want to analyse, convert, and display data. They are subdivided into eleven classes to help you find what you want. * Utilities -- are small programs devoted to a specific purpose. For example, they help you prepare for observations, write documents, and write programs. * Subroutine Libraries -- are for programmers writing astronomical software. They provide facilities such as astronomical calculations, data management and graphics. * Infrastructure -- are items which are mainly of interest to people writing programs within the Starlink Software Environment. They are included for completeness. Each item is described in sufficient detail for you to decide whether or not to investigate it further. If you want to find out more about an item, follow the document references given opposite the item name. If you are using the hypertext version of this document, the most up-to-date document references can be found by following the link from the software item name.

  8. Curating Virtual Data Collections

    NASA Astrophysics Data System (ADS)

    Lynnes, C.; Ramapriyan, H.; Leon, A.; Tsontos, V. M.; Liu, Z.; Shie, C. L.

    2015-12-01

    NASA's Earth Observing System Data and Information System (EOSDIS) contains a rich set of datasets and related services throughout its many elements. As a result, locating all the EOSDIS data and related resources relevant to particular science theme can be daunting. This is largely because EOSDIS data's organizing principle is affected more by the way they are produced than around the expected end use.Virtual collections oriented around science themes can overcome this by presenting collections of data and related resources that are organized around the user's interest, not around the way the data were produced. Science themes can be: Specific applications (uses) of the data, e.g., landslide prediction Geophysical events (e.g., Hurricane Sandy) A specific science research problem Virtual collections consist of annotated web addresses (URLs) that point to data and related resource addresses, thus avoiding the need to copy all of the relevant data to a single place. These URL addresses can be consumed by a variety of clients, ranging from basic URL downloaders (wget, curl) and web browsers to sophisticated data analysis programs such as the Integrated Data Viewer. Eligible resources include anything accessible via URL: data files: data file URLs data subsets: OPeNDAP, webification or Web Coverage Service URLs data visualizations: Web Map Service data search results: OpenSearch Atom response custom analysis workflows: e.g., Giovanni analysis URL

  9. Self-face recognition in social context.

    PubMed

    Sugiura, Motoaki; Sassa, Yuko; Jeong, Hyeonjeong; Wakusawa, Keisuke; Horie, Kaoru; Sato, Shigeru; Kawashima, Ryuta

    2012-06-01

    The concept of "social self" is often described as a representation of the self-reflected in the eyes or minds of others. Although the appearance of one's own face has substantial social significance for humans, neuroimaging studies have failed to link self-face recognition and the likely neural substrate of the social self, the medial prefrontal cortex (MPFC). We assumed that the social self is recruited during self-face recognition under a rich social context where multiple other faces are available for comparison of social values. Using functional magnetic resonance imaging (fMRI), we examined the modulation of neural responses to the faces of the self and of a close friend in a social context. We identified an enhanced response in the ventral MPFC and right occipitoparietal sulcus in the social context specifically for the self-face. Neural response in the right lateral parietal and inferior temporal cortices, previously claimed as self-face-specific, was unaffected for the self-face but unexpectedly enhanced for the friend's face in the social context. Self-face-specific activation in the pars triangularis of the inferior frontal gyrus, and self-face-specific reduction of activation in the left middle temporal gyrus and the right supramarginal gyrus, replicating a previous finding, were not subject to such modulation. Our results thus demonstrated the recruitment of a social self during self-face recognition in the social context. At least three brain networks for self-face-specific activation may be dissociated by different patterns of response-modulation in the social context, suggesting multiple dynamic self-other representations in the human brain.

  10. Global Contexts for Learning: Exploring the Relationship between Low-Context Online Learning and High-Context Learners

    ERIC Educational Resources Information Center

    Westbrook, Timothy Paul

    2014-01-01

    Current research on culture and distance education suggests that cultural variables influence student success online. When online courses are writing-based, they may provide easy information dissemination; however, the low-context medium may restrict the learning experience and class dynamic due to the lack of nonverbal communication. Students who…

  11. Information compression in the context model

    NASA Technical Reports Server (NTRS)

    Gebhardt, Joerg; Kruse, Rudolf; Nauck, Detlef

    1992-01-01

    The Context Model provides a formal framework for the representation, interpretation, and analysis of vague and uncertain data. The clear semantics of the underlying concepts make it feasible to compare well-known approaches to the modeling of imperfect knowledge like that given in Bayes Theory, Shafer's Evidence Theory, the Transferable Belief Model, and Possibility Theory. In this paper we present the basic ideas of the Context Model and show its applicability as an alternative foundation of Possibility Theory and the epistemic view of fuzzy sets.

  12. Appetitive Context Conditioning Proactively, but Transiently, Interferes with Expression of Counterconditioned Context Fear

    ERIC Educational Resources Information Center

    Holmes, Nathan M.; Westbrook, R. Frederick

    2014-01-01

    Four experiments used rats to study appetitive-aversive transfer. Rats trained to eat a palatable food in a distinctive context and shocked in that context ate and did not freeze when tested 1 d later but froze and did not eat when tested 14 d later. These results were associatively mediated (Experiments 1 and 2), observed when rats were or were…

  13. Real World Contexts in PISA Science: Implications for Context-Based Science Education

    ERIC Educational Resources Information Center

    Fensham, Peter J.

    2009-01-01

    The PISA assessment instruments for students' scientific literacy in 2000, 2003, and 2006 have each consisted of units made up of a real world context involving Science and Technology, about which students are asked a number of cognitive and affective questions. This article discusses a number of issues from this use of S&T contexts in PISA…

  14. Analysing Policy in the Context(s) of Practice: A Theoretical Puzzle

    ERIC Educational Resources Information Center

    Grimaldi, Emiliano

    2012-01-01

    This essay contributes to the construction of a critically informed toolbox of diverse concepts for education policy analysis. Focusing on the context(s) of practice of the policy cycle, the article outlines an interpretative framework to grasp policy enactment across different localities, the influences bearing upon those enactments as well as…

  15. "Professional Contexts for Modern Languages": Work Experience and Academic Reflection in a Multilingual Context

    ERIC Educational Resources Information Center

    Gomez-Cash, Olga

    2016-01-01

    In the second year module "Professional Contexts for Modern Languages" at Lancaster University, students take 20-25 hour placements, and using a multimodal forum, they articulate their challenges, development and understanding of the varying contexts in which they are working. In summative assessment, students across languages and types…

  16. The Role of Attention for Context-Context Binding of Intrinsic and Extrinsic Features

    ERIC Educational Resources Information Center

    Boywitt, C. Dennis; Meiser, Thorsten

    2012-01-01

    There is converging evidence that the feeling of conscious recollection is usually accompanied by the bound retrieval of context features of the encoding episode (e.g., Meiser, Sattler, & Weiber, 2008). Recently, however, important limiting conditions have been identified for the binding between context features in memory. For example, focusing on…

  17. Putting Actions in Context: Visual Action Adaptation Aftereffects Are Modulated by Social Contexts

    PubMed Central

    de la Rosa, Stephan; Streuber, Stephan; Giese, Martin; Bülthoff, Heinrich H.; Curio, Cristóbal

    2014-01-01

    The social context in which an action is embedded provides important information for the interpretation of an action. Is this social context integrated during the visual recognition of an action? We used a behavioural visual adaptation paradigm to address this question and measured participants’ perceptual bias of a test action after they were adapted to one of two adaptors (adaptation after-effect). The action adaptation after-effect was measured for the same set of adaptors in two different social contexts. Our results indicate that the size of the adaptation effect varied with social context (social context modulation) although the physical appearance of the adaptors remained unchanged. Three additional experiments provided evidence that the observed social context modulation of the adaptation effect are owed to the adaptation of visual action recognition processes. We found that adaptation is critical for the social context modulation (experiment 2). Moreover, the effect is not mediated by emotional content of the action alone (experiment 3) and visual information about the action seems to be critical for the emergence of action adaptation effects (experiment 4). Taken together these results suggest that processes underlying visual action recognition are sensitive to the social context of an action. PMID:24466123

  18. Academic Success in Context-Based Chemistry: Demonstrating fluid transitions between concepts and context

    NASA Astrophysics Data System (ADS)

    King, Donna Therese; Ritchie, Stephen M.

    2013-05-01

    Curriculum developers and researchers have promoted context-based programmes to arrest waning student interest and participation in the enabling sciences at high school and university. Context-based programmes aim for student connections between scientific discourse and real-world contexts to elevate curricular relevance without diminishing conceptual understanding. This interpretive study explored the learning transactions in one 11th grade context-based chemistry classroom where the context was the local creek. The dialectic of agency/structure was used as a lens to examine how the practices in classroom interactions afforded students the agency for learning. The results suggest that first, fluid transitions were evident in the student-student interactions involving successful students; and second, fluid transitions linking concepts to context were evident in the students' successful reports. The study reveals that the structures of writing and collaborating in groups enabled students' agential and fluent movement between the field of the real-world creek and the field of the formal chemistry classroom. Furthermore, characteristics of academically successful students in context-based chemistry are highlighted. Research, teaching, and future directions for context-based science teaching are discussed.

  19. 77 FR 34461 - Agency Information Collection Activity; Proposed Collection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-11

    ... Internal Revenue Service Agency Information Collection Activity; Proposed Collection AGENCY: Internal... information collections, as required by the Paperwork Reduction Act of 1995, Public Law 104-13 (44 U.S.C. 3506... income under Code section 108. The collection of information is required for a taxpayer to elect...

  20. Inferring Human Activity in Mobile Devices by Computing Multiple Contexts.

    PubMed

    Chen, Ruizhi; Chu, Tianxing; Liu, Keqiang; Liu, Jingbin; Chen, Yuwei

    2015-08-28

    This paper introduces a framework for inferring human activities in mobile devices by computing spatial contexts, temporal contexts, spatiotemporal contexts, and user contexts. A spatial context is a significant location that is defined as a geofence, which can be a node associated with a circle, or a polygon; a temporal context contains time-related information that can be e.g., a local time tag, a time difference between geographical locations, or a timespan; a spatiotemporal context is defined as a dwelling length at a particular spatial context; and a user context includes user-related information that can be the user's mobility contexts, environmental contexts, psychological contexts or social contexts. Using the measurements of the built-in sensors and radio signals in mobile devices, we can snapshot a contextual tuple for every second including aforementioned contexts. Giving a contextual tuple, the framework evaluates the posteriori probability of each candidate activity in real-time using a Naïve Bayes classifier. A large dataset containing 710,436 contextual tuples has been recorded for one week from an experiment carried out at Texas A&M University Corpus Christi with three participants. The test results demonstrate that the multi-context solution significantly outperforms the spatial-context-only solution. A classification accuracy of 61.7% is achieved for the spatial-context-only solution, while 88.8% is achieved for the multi-context solution.