Science.gov

Sample records for privacy-preserving context collection

  1. Privacy-preserving health data collection for preschool children.

    PubMed

    Guan, Shaopeng; Zhang, Yuan; Ji, Yue

    2013-01-01

    With the development of network technology, more and more data are transmitted over the network and privacy issues have become a research focus. In this paper, we study the privacy in health data collection of preschool children and present a new identity-based encryption protocol for privacy protection. The background of the protocol is as follows. A physical examination for preschool children is needed every year out of consideration for the children's health. After the examination, data are transmitted through the Internet to the education authorities for analysis. In the process of data collection, it is unnecessary for the education authorities to know the identities of the children. Based on this, we designed a privacy-preserving protocol, which delinks the children's identities from the examination data. Thus, the privacy of the children is preserved during data collection. We present the protocol in detail and prove the correctness of the protocol. PMID:24285984

  2. Privacy-preserving health data collection for preschool children.

    PubMed

    Guan, Shaopeng; Zhang, Yuan; Ji, Yue

    2013-01-01

    With the development of network technology, more and more data are transmitted over the network and privacy issues have become a research focus. In this paper, we study the privacy in health data collection of preschool children and present a new identity-based encryption protocol for privacy protection. The background of the protocol is as follows. A physical examination for preschool children is needed every year out of consideration for the children's health. After the examination, data are transmitted through the Internet to the education authorities for analysis. In the process of data collection, it is unnecessary for the education authorities to know the identities of the children. Based on this, we designed a privacy-preserving protocol, which delinks the children's identities from the examination data. Thus, the privacy of the children is preserved during data collection. We present the protocol in detail and prove the correctness of the protocol.

  3. Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme

    PubMed Central

    Zhu, Hui; Gao, Lijuan; Li, Hui

    2016-01-01

    With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users’ personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users’ query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users’ queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs. PMID:26840319

  4. Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme.

    PubMed

    Zhu, Hui; Gao, Lijuan; Li, Hui

    2016-01-01

    With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users' personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users' query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users' queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs.

  5. Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme.

    PubMed

    Zhu, Hui; Gao, Lijuan; Li, Hui

    2016-01-01

    With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users' personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users' query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users' queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs. PMID:26840319

  6. Data Collection Framework for Energy Efficient Privacy Preservation in Wireless Sensor Networks Having Many-to-Many Structures

    PubMed Central

    Bahşi, Hayretdin; Levi, Albert

    2010-01-01

    Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-to-many structures evolved due to the need for conveying collected event information to multiple sinks. Privacy preserved data collection models in the literature do not solve the problems of WSN applications in which network has multiple un-trusted sinks with different level of privacy requirements. This study proposes a data collection framework bases on k-anonymity for preventing record disclosure of collected event information in WSNs. Proposed method takes the anonymity requirements of multiple sinks into consideration by providing different levels of privacy for each destination sink. Attributes, which may identify an event owner, are generalized or encrypted in order to meet the different anonymity requirements of sinks at the same anonymized output. If the same output is formed, it can be multicasted to all sinks. The other trivial solution is to produce different anonymized outputs for each sink and send them to related sinks. Multicasting is an energy efficient data sending alternative for some sensor nodes. Since minimization of energy consumption is an important design criteria for WSNs, multicasting the same event information to multiple sinks reduces the energy consumption of overall network. PMID:22163660

  7. Data collection framework for energy efficient privacy preservation in wireless sensor networks having many-to-many structures.

    PubMed

    Bahşi, Hayretdin; Levi, Albert

    2010-01-01

    Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-to-many structures evolved due to the need for conveying collected event information to multiple sinks. Privacy preserved data collection models in the literature do not solve the problems of WSN applications in which network has multiple un-trusted sinks with different level of privacy requirements. This study proposes a data collection framework bases on k-anonymity for preventing record disclosure of collected event information in WSNs. Proposed method takes the anonymity requirements of multiple sinks into consideration by providing different levels of privacy for each destination sink. Attributes, which may identify an event owner, are generalized or encrypted in order to meet the different anonymity requirements of sinks at the same anonymized output. If the same output is formed, it can be multicasted to all sinks. The other trivial solution is to produce different anonymized outputs for each sink and send them to related sinks. Multicasting is an energy efficient data sending alternative for some sensor nodes. Since minimization of energy consumption is an important design criteria for WSNs, multicasting the same event information to multiple sinks reduces the energy consumption of overall network.

  8. Privacy Preservation over Untrusted Mobile Networks

    NASA Astrophysics Data System (ADS)

    Ardagna, Claudio A.; Jajodia, Sushil; Samarati, Pierangela; Stavrou, Angelos

    The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile network operators. These operators are typically assumed to be trusted and to manage the information they collect in a privacy-preserving way. Such information, however, is extremely sensitive and coveted by many companies, which may use it to improve their business. In this context, safeguarding the users’ privacy against the prying eyes of the network operators is an emerging requirement.

  9. Comparing the context and the SitBAC models for privacy preservation in terms of model understanding and synthesis.

    PubMed

    Beimel, Dizza; Peleg, Mor

    2008-11-06

    There is an increasing interest in preserving patients' privacy while accessing Electronic Health Record (EHR) data. Two models that support representation of data-request authorization policies are the Contextual Role-Based Access Control (Context) model [1] and the Situation-Based Access Control (SitBAC) model [2]. We conducted a controlled experiment that compared the two models with respect to model-understanding and model-synthesis.

  10. Target-Based Maintenance of Privacy Preserving Association Rules

    ERIC Educational Resources Information Center

    Ahluwalia, Madhu V.

    2011-01-01

    In the context of association rule mining, the state-of-the-art in privacy preserving data mining provides solutions for categorical and Boolean association rules but not for quantitative association rules. This research fills this gap by describing a method based on discrete wavelet transform (DWT) to protect input data privacy while preserving…

  11. Privacy-preserving restricted boltzmann machine.

    PubMed

    Li, Yu; Zhang, Yuan; Ji, Yue

    2014-01-01

    With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model. PMID:25101139

  12. Privacy-Preserving Restricted Boltzmann Machine

    PubMed Central

    Li, Yu

    2014-01-01

    With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model. PMID:25101139

  13. Privacy preserving RBF kernel support vector machine.

    PubMed

    Li, Haoran; Xiong, Li; Ohno-Machado, Lucila; Jiang, Xiaoqian

    2014-01-01

    Data sharing is challenging but important for healthcare research. Methods for privacy-preserving data dissemination based on the rigorous differential privacy standard have been developed but they did not consider the characteristics of biomedical data and make full use of the available information. This often results in too much noise in the final outputs. We hypothesized that this situation can be alleviated by leveraging a small portion of open-consented data to improve utility without sacrificing privacy. We developed a hybrid privacy-preserving differentially private support vector machine (SVM) model that uses public data and private data together. Our model leverages the RBF kernel and can handle nonlinearly separable cases. Experiments showed that this approach outperforms two baselines: (1) SVMs that only use public data, and (2) differentially private SVMs that are built from private data. Our method demonstrated very close performance metrics compared to nonprivate SVMs trained on the private data. PMID:25013805

  14. Privacy Preserving Publication of Moving Object Data

    NASA Astrophysics Data System (ADS)

    Bonchi, Francesco

    The increasing availability of space-time trajectories left by location-aware devices is expected to enable novel classes of applications where the discovery of consumable, concise, and actionable knowledge is the key step. However, the analysis of mobility data is a critic task by the privacy point of view: in fact, the peculiar nature of location data might enable intrusive inferences in the life of the individuals whose data is analyzed. It is thus important to develop privacy-preserving techniques for the publication and the analysis of mobility data.

  15. The study on privacy preserving data mining for information security

    NASA Astrophysics Data System (ADS)

    Li, Xiaohui

    2012-04-01

    Privacy preserving data mining have a rapid development in a short year. But it still faces many challenges in the future. Firstly, the level of privacy has different definitions in different filed. Therefore, the measure of privacy preserving data mining technology protecting private information is not the same. So, it's an urgent issue to present a unified privacy definition and measure. Secondly, the most of research in privacy preserving data mining is presently confined to the theory study.

  16. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    ERIC Educational Resources Information Center

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  17. Privacy-preserving Kruskal-Wallis test.

    PubMed

    Guo, Suxin; Zhong, Sheng; Zhang, Aidong

    2013-10-01

    Statistical tests are powerful tools for data analysis. Kruskal-Wallis test is a non-parametric statistical test that evaluates whether two or more samples are drawn from the same distribution. It is commonly used in various areas. But sometimes, the use of the method is impeded by privacy issues raised in fields such as biomedical research and clinical data analysis because of the confidential information contained in the data. In this work, we give a privacy-preserving solution for the Kruskal-Wallis test which enables two or more parties to coordinately perform the test on the union of their data without compromising their data privacy. To the best of our knowledge, this is the first work that solves the privacy issues in the use of the Kruskal-Wallis test on distributed data. PMID:23871682

  18. Privacy-preserving Kruskal-Wallis test.

    PubMed

    Guo, Suxin; Zhong, Sheng; Zhang, Aidong

    2013-10-01

    Statistical tests are powerful tools for data analysis. Kruskal-Wallis test is a non-parametric statistical test that evaluates whether two or more samples are drawn from the same distribution. It is commonly used in various areas. But sometimes, the use of the method is impeded by privacy issues raised in fields such as biomedical research and clinical data analysis because of the confidential information contained in the data. In this work, we give a privacy-preserving solution for the Kruskal-Wallis test which enables two or more parties to coordinately perform the test on the union of their data without compromising their data privacy. To the best of our knowledge, this is the first work that solves the privacy issues in the use of the Kruskal-Wallis test on distributed data.

  19. Privacy preserving interactive record linkage (PPIRL)

    PubMed Central

    Kum, Hye-Chung; Krishnamurthy, Ashok; Machanavajjhala, Ashwin; Reiter, Michael K; Ahalt, Stanley

    2014-01-01

    Objective Record linkage to integrate uncoordinated databases is critical in biomedical research using Big Data. Balancing privacy protection against the need for high quality record linkage requires a human–machine hybrid system to safely manage uncertainty in the ever changing streams of chaotic Big Data. Methods In the computer science literature, private record linkage is the most published area. It investigates how to apply a known linkage function safely when linking two tables. However, in practice, the linkage function is rarely known. Thus, there are many data linkage centers whose main role is to be the trusted third party to determine the linkage function manually and link data for research via a master population list for a designated region. Recently, a more flexible computerized third-party linkage platform, Secure Decoupled Linkage (SDLink), has been proposed based on: (1) decoupling data via encryption, (2) obfuscation via chaffing (adding fake data) and universe manipulation; and (3) minimum information disclosure via recoding. Results We synthesize this literature to formalize a new framework for privacy preserving interactive record linkage (PPIRL) with tractable privacy and utility properties and then analyze the literature using this framework. Conclusions Human-based third-party linkage centers for privacy preserving record linkage are the accepted norm internationally. We find that a computer-based third-party platform that can precisely control the information disclosed at the micro level and allow frequent human interaction during the linkage process, is an effective human–machine hybrid system that significantly improves on the linkage center model both in terms of privacy and utility. PMID:24201028

  20. Privacy-preserving matching of similar patients.

    PubMed

    Vatsalan, Dinusha; Christen, Peter

    2016-02-01

    The identification of similar entities represented by records in different databases has drawn considerable attention in many application areas, including in the health domain. One important type of entity matching application that is vital for quality healthcare analytics is the identification of similar patients, known as similar patient matching. A key component of identifying similar records is the calculation of similarity of the values in attributes (fields) between these records. Due to increasing privacy and confidentiality concerns, using the actual attribute values of patient records to identify similar records across different organizations is becoming non-trivial because the attributes in such records often contain highly sensitive information such as personal and medical details of patients. Therefore, the matching needs to be based on masked (encoded) values while being effective and efficient to allow matching of large databases. Bloom filter encoding has widely been used as an efficient masking technique for privacy-preserving matching of string and categorical values. However, no work on Bloom filter-based masking of numerical data, such as integer (e.g. age), floating point (e.g. body mass index), and modulus (numbers wrap around upon reaching a certain value, e.g. date and time), which are commonly required in the health domain, has been presented in the literature. We propose a framework with novel methods for masking numerical data using Bloom filters, thereby facilitating the calculation of similarities between records. We conduct an empirical study on publicly available real-world datasets which shows that our framework provides efficient masking and achieves similar matching accuracy compared to the matching of actual unencoded patient records.

  1. Privacy-preserving matching of similar patients.

    PubMed

    Vatsalan, Dinusha; Christen, Peter

    2016-02-01

    The identification of similar entities represented by records in different databases has drawn considerable attention in many application areas, including in the health domain. One important type of entity matching application that is vital for quality healthcare analytics is the identification of similar patients, known as similar patient matching. A key component of identifying similar records is the calculation of similarity of the values in attributes (fields) between these records. Due to increasing privacy and confidentiality concerns, using the actual attribute values of patient records to identify similar records across different organizations is becoming non-trivial because the attributes in such records often contain highly sensitive information such as personal and medical details of patients. Therefore, the matching needs to be based on masked (encoded) values while being effective and efficient to allow matching of large databases. Bloom filter encoding has widely been used as an efficient masking technique for privacy-preserving matching of string and categorical values. However, no work on Bloom filter-based masking of numerical data, such as integer (e.g. age), floating point (e.g. body mass index), and modulus (numbers wrap around upon reaching a certain value, e.g. date and time), which are commonly required in the health domain, has been presented in the literature. We propose a framework with novel methods for masking numerical data using Bloom filters, thereby facilitating the calculation of similarities between records. We conduct an empirical study on publicly available real-world datasets which shows that our framework provides efficient masking and achieves similar matching accuracy compared to the matching of actual unencoded patient records. PMID:26707453

  2. NES++: number system for encryption based privacy preserving speaker verification

    NASA Astrophysics Data System (ADS)

    Xu, Lei; Feng, Tao; Zhao, Xi; Shi, Weidong

    2014-05-01

    As speech based operation becomes a main hand-free interaction solution between human and mobile devices (i.e., smartphones, Google Glass), privacy preserving speaker verification receives much attention nowadays. Privacy preserving speaker verification can be achieved through many different ways, such as fuzzy vault and encryption. Encryption based solutions are promising as cryptography is based on solid mathematic foundations and the security properties can be easily analyzed in a well established framework. Most current asymmetric encryption schemes work on finite algebraic structures, such as finite group and finite fields. However, the encryption scheme for privacy preserving speaker verification must handle floating point numbers. This gap must be filled to make the overall scheme practical. In this paper, we propose a number system that meets the requirements of both speaker verification and the encryption scheme used in the process. It also supports addition homomorphic property of Pailliers encryption, which is crucial for privacy preserving speaker verification. As asymmetric encryption is expensive, we propose a method of packing several numbers into one plain-text and the computation overhead is greatly reduced. To evaluate the performance of this method, we implement Pailliers encryption scheme over proposed number system and the packing technique. Our findings show that the proposed solution can fulfill the gap between speaker verification and encryption scheme very well, and the packing technique improves the overall performance. Furthermore, our solution is a building block of encryption based privacy preserving speaker verification, the privacy protection and accuracy rate are not affected.

  3. Privacy-preserving microbiome analysis using secure computation

    PubMed Central

    Wagner, Justin; Paulson, Joseph N.; Wang, Xiao; Bhattacharjee, Bobby; Corrada Bravo, Héctor

    2016-01-01

    Motivation: Developing targeted therapeutics and identifying biomarkers relies on large amounts of research participant data. Beyond human DNA, scientists now investigate the DNA of micro-organisms inhabiting the human body. Recent work shows that an individual’s collection of microbial DNA consistently identifies that person and could be used to link a real-world identity to a sensitive attribute in a research dataset. Unfortunately, the current suite of DNA-specific privacy-preserving analysis tools does not meet the requirements for microbiome sequencing studies. Results: To address privacy concerns around microbiome sequencing, we implement metagenomic analyses using secure computation. Our implementation allows comparative analysis over combined data without revealing the feature counts for any individual sample. We focus on three analyses and perform an evaluation on datasets currently used by the microbiome research community. We use our implementation to simulate sharing data between four policy-domains. Additionally, we describe an application of our implementation for patients to combine data that allows drug developers to query against and compensate patients for the analysis. Availability and implementation: The software is freely available for download at: http://cbcb.umd.edu/∼hcorrada/projects/secureseq.html Supplementary information: Supplementary data are available at Bioinformatics online. Contact: hcorrada@umiacs.umd.edu PMID:26873931

  4. A Robust Conditional Privacy-Preserving Authentication Protocol in VANET

    NASA Astrophysics Data System (ADS)

    Jung, Chae Duk; Sur, Chul; Park, Youngho; Rhee, Kyung-Hyune

    Recently, Lu et al. proposed an efficient conditional privacy preservation protocol, named ECPP, based on group signature scheme for secure vehicular communications. However, ECPP dose not provide unlinkability and traceability when multiple RSUs are compromised. In this paper, we make up for the limitations and propose a robust conditional privacy-preserving authentication protocol without loss of efficiency as compared with ECPP. Furthermore, in our protocol, RSUs can issue multiple anonymous certificates to an OBU to alleviate system overheads for validity check of RSUs. In order to achieve these goals, we consider a universal re-encryption scheme as our building block.

  5. A collaborative framework for Distributed Privacy-Preserving Support Vector Machine learning.

    PubMed

    Que, Jialan; Jiang, Xiaoqian; Ohno-Machado, Lucila

    2012-01-01

    A Support Vector Machine (SVM) is a popular tool for decision support. The traditional way to build an SVM model is to estimate parameters based on a centralized repository of data. However, in the field of biomedicine, patient data are sometimes stored in local repositories or institutions where they were collected, and may not be easily shared due to privacy concerns. This creates a substantial barrier for researchers to effectively learn from the distributed data using machine learning tools like SVMs. To overcome this difficulty and promote efficient information exchange without sharing sensitive raw data, we developed a Distributed Privacy Preserving Support Vector Machine (DPP-SVM). The DPP-SVM enables privacy-preserving collaborative learning, in which a trusted server integrates "privacy-insensitive" intermediary results. The globally learned model is guaranteed to be exactly the same as learned from combined data. We also provide a free web-service (http://privacy.ucsd.edu:8080/ppsvm/) for multiple participants to collaborate and complete the SVM-learning task in an efficient and privacy-preserving manner. PMID:23304414

  6. A collaborative framework for Distributed Privacy-Preserving Support Vector Machine learning.

    PubMed

    Que, Jialan; Jiang, Xiaoqian; Ohno-Machado, Lucila

    2012-01-01

    A Support Vector Machine (SVM) is a popular tool for decision support. The traditional way to build an SVM model is to estimate parameters based on a centralized repository of data. However, in the field of biomedicine, patient data are sometimes stored in local repositories or institutions where they were collected, and may not be easily shared due to privacy concerns. This creates a substantial barrier for researchers to effectively learn from the distributed data using machine learning tools like SVMs. To overcome this difficulty and promote efficient information exchange without sharing sensitive raw data, we developed a Distributed Privacy Preserving Support Vector Machine (DPP-SVM). The DPP-SVM enables privacy-preserving collaborative learning, in which a trusted server integrates "privacy-insensitive" intermediary results. The globally learned model is guaranteed to be exactly the same as learned from combined data. We also provide a free web-service (http://privacy.ucsd.edu:8080/ppsvm/) for multiple participants to collaborate and complete the SVM-learning task in an efficient and privacy-preserving manner.

  7. Privacy preserving index for encrypted electronic medical records.

    PubMed

    Chen, Yu-Chi; Horng, Gwoboa; Lin, Yi-Jheng; Chen, Kuo-Chang

    2013-12-01

    With the development of electronic systems, privacy has become an important security issue in real-life. In medical systems, privacy of patients' electronic medical records (EMRs) must be fully protected. However, to combine the efficiency and privacy, privacy preserving index is introduced to preserve the privacy, where the EMR can be efficiently accessed by this patient or specific doctor. In the literature, Goh first proposed a secure index scheme with keyword search over encrypted data based on a well-known primitive, Bloom filter. In this paper, we propose a new privacy preserving index scheme, called position index (P-index), with keyword search over the encrypted data. The proposed index scheme is semantically secure against the adaptive chosen keyword attack, and it also provides flexible space, lower false positive rate, and search privacy. Moreover, it does not rely on pairing, a complicate computation, and thus can search over encrypted electronic medical records from the cloud server efficiently.

  8. Sorted Index Numbers for Privacy Preserving Face Recognition

    NASA Astrophysics Data System (ADS)

    Wang, Yongjin; Hatzinakos, Dimitrios

    2009-12-01

    This paper presents a novel approach for changeable and privacy preserving face recognition. We first introduce a new method of biometric matching using the sorted index numbers (SINs) of feature vectors. Since it is impossible to recover any of the exact values of the original features, the transformation from original features to the SIN vectors is noninvertible. To address the irrevocable nature of biometric signals whilst obtaining stronger privacy protection, a random projection-based method is employed in conjunction with the SIN approach to generate changeable and privacy preserving biometric templates. The effectiveness of the proposed method is demonstrated on a large generic data set, which contains images from several well-known face databases. Extensive experimentation shows that the proposed solution may improve the recognition accuracy.

  9. A Secure and Privacy-Preserving Targeted Ad-System

    NASA Astrophysics Data System (ADS)

    Androulaki, Elli; Bellovin, Steven M.

    Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods violate consumers' privacy, which has engendered resistance to the ads. However, protecting privacy through anonymity seems to encourage click-fraud. In this paper, we define consumer's privacy and present a privacy-preserving, targeted ad system (PPOAd) which is resistant towards click fraud. Our scheme is structured to provide financial incentives to all entities involved.

  10. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.

    PubMed

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  11. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  12. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.

    PubMed

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  13. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    PubMed Central

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  14. A comprehensive review on privacy preserving data mining.

    PubMed

    Aldeen, Yousra Abdul Alsahib S; Salleh, Mazleena; Razzaque, Mohammad Abdur

    2015-01-01

    Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publishing. Ever-escalating internet phishing posed severe threat on widespread propagation of sensitive information over the web. Conversely, the dubious feelings and contentions mediated unwillingness of various information providers towards the reliability protection of data from disclosure often results utter rejection in data sharing or incorrect information sharing. This article provides a panoramic overview on new perspective and systematic interpretation of a list published literatures via their meticulous organization in subcategories. The fundamental notions of the existing privacy preserving data mining methods, their merits, and shortcomings are presented. The current privacy preserving data mining techniques are classified based on distortion, association rule, hide association rule, taxonomy, clustering, associative classification, outsourced data mining, distributed, and k-anonymity, where their notable advantages and disadvantages are emphasized. This careful scrutiny reveals the past development, present research challenges, future trends, the gaps and weaknesses. Further significant enhancements for more robust privacy protection and preservation are affirmed to be mandatory. PMID:26587362

  15. Privacy-preserving record linkage on large real world datasets.

    PubMed

    Randall, Sean M; Ferrante, Anna M; Boyd, James H; Bauer, Jacqueline K; Semmens, James B

    2014-08-01

    Record linkage typically involves the use of dedicated linkage units who are supplied with personally identifying information to determine individuals from within and across datasets. The personally identifying information supplied to linkage units is separated from clinical information prior to release by data custodians. While this substantially reduces the risk of disclosure of sensitive information, some residual risks still exist and remain a concern for some custodians. In this paper we trial a method of record linkage which reduces privacy risk still further on large real world administrative data. The method uses encrypted personal identifying information (bloom filters) in a probability-based linkage framework. The privacy preserving linkage method was tested on ten years of New South Wales (NSW) and Western Australian (WA) hospital admissions data, comprising in total over 26 million records. No difference in linkage quality was found when the results were compared to traditional probabilistic methods using full unencrypted personal identifiers. This presents as a possible means of reducing privacy risks related to record linkage in population level research studies. It is hoped that through adaptations of this method or similar privacy preserving methods, risks related to information disclosure can be reduced so that the benefits of linked research taking place can be fully realised.

  16. A comprehensive review on privacy preserving data mining.

    PubMed

    Aldeen, Yousra Abdul Alsahib S; Salleh, Mazleena; Razzaque, Mohammad Abdur

    2015-01-01

    Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publishing. Ever-escalating internet phishing posed severe threat on widespread propagation of sensitive information over the web. Conversely, the dubious feelings and contentions mediated unwillingness of various information providers towards the reliability protection of data from disclosure often results utter rejection in data sharing or incorrect information sharing. This article provides a panoramic overview on new perspective and systematic interpretation of a list published literatures via their meticulous organization in subcategories. The fundamental notions of the existing privacy preserving data mining methods, their merits, and shortcomings are presented. The current privacy preserving data mining techniques are classified based on distortion, association rule, hide association rule, taxonomy, clustering, associative classification, outsourced data mining, distributed, and k-anonymity, where their notable advantages and disadvantages are emphasized. This careful scrutiny reveals the past development, present research challenges, future trends, the gaps and weaknesses. Further significant enhancements for more robust privacy protection and preservation are affirmed to be mandatory.

  17. Personalized privacy-preserving frequent itemset mining using randomized response.

    PubMed

    Sun, Chongjing; Fu, Yan; Zhou, Junlin; Gao, Hui

    2014-01-01

    Frequent itemset mining is the important first step of association rule mining, which discovers interesting patterns from the massive data. There are increasing concerns about the privacy problem in the frequent itemset mining. Some works have been proposed to handle this kind of problem. In this paper, we introduce a personalized privacy problem, in which different attributes may need different privacy levels protection. To solve this problem, we give a personalized privacy-preserving method by using the randomized response technique. By providing different privacy levels for different attributes, this method can get a higher accuracy on frequent itemset mining than the traditional method providing the same privacy level. Finally, our experimental results show that our method can have better results on the frequent itemset mining while preserving personalized privacy.

  18. Personalized Privacy-Preserving Frequent Itemset Mining Using Randomized Response

    PubMed Central

    Sun, Chongjing; Fu, Yan; Zhou, Junlin; Gao, Hui

    2014-01-01

    Frequent itemset mining is the important first step of association rule mining, which discovers interesting patterns from the massive data. There are increasing concerns about the privacy problem in the frequent itemset mining. Some works have been proposed to handle this kind of problem. In this paper, we introduce a personalized privacy problem, in which different attributes may need different privacy levels protection. To solve this problem, we give a personalized privacy-preserving method by using the randomized response technique. By providing different privacy levels for different attributes, this method can get a higher accuracy on frequent itemset mining than the traditional method providing the same privacy level. Finally, our experimental results show that our method can have better results on the frequent itemset mining while preserving personalized privacy. PMID:25143989

  19. Privacy Preserving Facial and Fingerprint Multi-biometric Authentication

    NASA Astrophysics Data System (ADS)

    Anzaku, Esla Timothy; Sohn, Hosik; Ro, Yong Man

    The cases of identity theft can be mitigated by the adoption of secure authentication methods. Biohashing and its variants, which utilizes secret keys and biometrics, are promising methods for secure authentication; however, their shortcoming is the degraded performance under the assumption that secret keys are compromised. In this paper, we extend the concept of Biohashing to multi-biometrics - facial and fingerprint traits. We chose these traits because they are widely used, howbeit, little research attention has been given to designing privacy preserving multi-biometric systems using them. Instead of just using a single modality (facial or fingerprint), we presented a framework for using both modalities. The improved performance of the proposed method, using face and fingerprint, as against either facial or fingerprint trait used in isolation is evaluated using two chimerical bimodal databases formed from publicly available facial and fingerprint databases.

  20. Enabling Privacy-Preserving GWASs in Heterogeneous Human Populations.

    PubMed

    Simmons, Sean; Sahinalp, Cenk; Berger, Bonnie

    2016-07-01

    The proliferation of large genomic databases offers the potential to perform increasingly larger-scale genome-wide association studies (GWASs). Due to privacy concerns, however, access to these data is limited, greatly reducing their usefulness for research. Here, we introduce a computational framework for performing GWASs that adapts principles of differential privacy-a cryptographic theory that facilitates secure analysis of sensitive data-to both protect private phenotype information (e.g., disease status) and correct for population stratification. This framework enables us to produce privacy-preserving GWAS results based on EIGENSTRAT and linear mixed model (LMM)-based statistics, both of which correct for population stratification. We test our differentially private statistics, PrivSTRAT and PrivLMM, on simulated and real GWAS datasets and find they are able to protect privacy while returning meaningful results. Our framework can be used to securely query private genomic datasets to discover which specific genomic alterations may be associated with a disease, thus increasing the availability of these valuable datasets. PMID:27453444

  1. Privacy-preserving GWAS analysis on federated genomic datasets

    PubMed Central

    2015-01-01

    Background The biomedical community benefits from the increasing availability of genomic data to support meaningful scientific research, e.g., Genome-Wide Association Studies (GWAS). However, high quality GWAS usually requires a large amount of samples, which can grow beyond the capability of a single institution. Federated genomic data analysis holds the promise of enabling cross-institution collaboration for effective GWAS, but it raises concerns about patient privacy and medical information confidentiality (as data are being exchanged across institutional boundaries), which becomes an inhibiting factor for the practical use. Methods We present a privacy-preserving GWAS framework on federated genomic datasets. Our method is to layer the GWAS computations on top of secure multi-party computation (MPC) systems. This approach allows two parties in a distributed system to mutually perform secure GWAS computations, but without exposing their private data outside. Results We demonstrate our technique by implementing a framework for minor allele frequency counting and χ2 statistics calculation, one of typical computations used in GWAS. For efficient prototyping, we use a state-of-the-art MPC framework, i.e., Portable Circuit Format (PCF) [1]. Our experimental results show promise in realizing both efficient and secure cross-institution GWAS computations. PMID:26733045

  2. Digression and Value Concatenation to Enable Privacy-Preserving Regression

    PubMed Central

    Li, Xiao-Bai; Sarkar, Sumit

    2015-01-01

    Regression techniques can be used not only for legitimate data analysis, but also to infer private information about individuals. In this paper, we demonstrate that regression trees, a popular data-analysis and data-mining technique, can be used to effectively reveal individuals’ sensitive data. This problem, which we call a “regression attack,” has not been addressed in the data privacy literature, and existing privacy-preserving techniques are not appropriate in coping with this problem. We propose a new approach to counter regression attacks. To protect against privacy disclosure, our approach introduces a novel measure, called digression, which assesses the sensitive value disclosure risk in the process of building a regression tree model. Specifically, we develop an algorithm that uses the measure for pruning the tree to limit disclosure of sensitive data. We also propose a dynamic value-concatenation method for anonymizing data, which better preserves data utility than a user-defined generalization scheme commonly used in existing approaches. Our approach can be used for anonymizing both numeric and categorical data. An experimental study is conducted using real-world financial, economic and healthcare data. The results of the experiments demonstrate that the proposed approach is very effective in protecting data privacy while preserving data quality for research and analysis. PMID:26752802

  3. Privacy-preserving search for chemical compound databases

    PubMed Central

    2015-01-01

    Background Searching for similar compounds in a database is the most important process for in-silico drug screening. Since a query compound is an important starting point for the new drug, a query holder, who is afraid of the query being monitored by the database server, usually downloads all the records in the database and uses them in a closed network. However, a serious dilemma arises when the database holder also wants to output no information except for the search results, and such a dilemma prevents the use of many important data resources. Results In order to overcome this dilemma, we developed a novel cryptographic protocol that enables database searching while keeping both the query holder's privacy and database holder's privacy. Generally, the application of cryptographic techniques to practical problems is difficult because versatile techniques are computationally expensive while computationally inexpensive techniques can perform only trivial computation tasks. In this study, our protocol is successfully built only from an additive-homomorphic cryptosystem, which allows only addition performed on encrypted values but is computationally efficient compared with versatile techniques such as general purpose multi-party computation. In an experiment searching ChEMBL, which consists of more than 1,200,000 compounds, the proposed method was 36,900 times faster in CPU time and 12,000 times as efficient in communication size compared with general purpose multi-party computation. Conclusion We proposed a novel privacy-preserving protocol for searching chemical compound databases. The proposed method, easily scaling for large-scale databases, may help to accelerate drug discovery research by making full use of unused but valuable data that includes sensitive information. PMID:26678650

  4. Privacy-Preserving Data Aggregation in Two-Tiered Wireless Sensor Networks with Mobile Nodes

    PubMed Central

    Yao, Yonglei; Liu, Jingfa; Xiong, Neal N.

    2014-01-01

    Privacy-preserving data aggregation in wireless sensor networks (WSNs) with mobile nodes is a challenging problem, as an accurate aggregation result should be derived in a privacy-preserving manner, under the condition that nodes are mobile and have no pre-specified keys for cryptographic operations. In this paper, we focus on the SUM aggregation function and propose two privacy-preserving data aggregation protocols for two-tiered sensor networks with mobile nodes: Privacy-preserving Data Aggregation against non-colluded Aggregator and Sink (PDAAS) and Privacy-preserving Data Aggregation against Colluded Aggregator and Sink (PDACAS). Both protocols guarantee that the sink can derive the SUM of all raw sensor data but each sensor's raw data is kept confidential. In PDAAS, two keyed values are used, one shared with the sink and the other shared with the aggregator. PDAAS can protect the privacy of sensed data against external eavesdroppers, compromised sensor nodes, the aggregator or the sink, but fails if the aggregator and the sink collude. In PDACAS, multiple keyed values are used in data perturbation, which are not shared with the aggregator or the sink. PDACAS can protect the privacy of sensor nodes even the aggregator and the sink collude, at the cost of a little more overhead than PDAAS. Thorough analysis and experiments are conducted, which confirm the efficacy and efficiency of both schemes. PMID:25390407

  5. A Neural-Network Clustering-Based Algorithm for Privacy Preserving Data Mining

    NASA Astrophysics Data System (ADS)

    Tsiafoulis, S.; Zorkadis, V. C.; Karras, D. A.

    The increasing use of fast and efficient data mining algorithms in huge collections of personal data, facilitated through the exponential growth of technology, in particular in the field of electronic data storage media and processing power, has raised serious ethical, philosophical and legal issues related to privacy protection. To cope with these concerns, several privacy preserving methodologies have been proposed, classified in two categories, methodologies that aim at protecting the sensitive data and those that aim at protecting the mining results. In our work, we focus on sensitive data protection and compare existing techniques according to their anonymity degree achieved, the information loss suffered and their performance characteristics. The ℓ-diversity principle is combined with k-anonymity concepts, so that background information can not be exploited to successfully attack the privacy of data subjects data refer to. Based on Kohonen Self Organizing Feature Maps (SOMs), we firstly organize data sets in subspaces according to their information theoretical distance to each other, then create the most relevant classes paying special attention to rare sensitive attribute values, and finally generalize attribute values to the minimum extend required so that both the data disclosure probability and the information loss are possibly kept negligible. Furthermore, we propose information theoretical measures for assessing the anonymity degree achieved and empirical tests to demonstrate it.

  6. Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks†

    PubMed Central

    Zhang, Xiaoying; Dong, Lei; Peng, Hui; Chen, Hong; Zhao, Suyun; Li, Cuiping

    2014-01-01

    Wireless sensor networks (WSNs) are indispensable building blocks for the Internet of Things (IoT). With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromised master nodes, but neglects the damage of node collusion. In this paper, we propose a series of collusion-aware privacy-preserving range query protocols in two-tiered WSNs. To the best of our knowledge, this paper is the first to consider collusion attacks for a range query in tiered WSNs while fulfilling the preservation of privacy and integrity. To preserve the privacy of data and queries, we propose a novel encoding scheme to conceal sensitive information. To preserve the integrity of the results, we present a verification scheme using the correlation among data. In addition, two schemes are further presented to improve result accuracy and reduce communication cost. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and privacy of our proposals. PMID:25615731

  7. Collusion-aware privacy-preserving range query in tiered wireless sensor networks.

    PubMed

    Zhang, Xiaoying; Dong, Lei; Peng, Hui; Chen, Hong; Zhao, Suyun; Li, Cuiping

    2014-12-11

    Wireless sensor networks (WSNs) are indispensable building blocks for the Internet of Things (IoT). With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromisedmaster nodes, but neglects the damage of node collusion. In this paper, we propose a series of collusion-aware privacy-preserving range query protocols in two-tiered WSNs. To the best of our knowledge, this paper is the first to consider collusion attacks for a range query in tiered WSNs while fulfilling the preservation of privacy and integrity. To preserve the privacy of data and queries, we propose a novel encoding scheme to conceal sensitive information. To preserve the integrity of the results, we present a verification scheme using the correlation among data. In addition, two schemes are further presented to improve result accuracy and reduce communication cost. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and privacy of our proposals.

  8. Collusion-aware privacy-preserving range query in tiered wireless sensor networks.

    PubMed

    Zhang, Xiaoying; Dong, Lei; Peng, Hui; Chen, Hong; Zhao, Suyun; Li, Cuiping

    2014-01-01

    Wireless sensor networks (WSNs) are indispensable building blocks for the Internet of Things (IoT). With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromisedmaster nodes, but neglects the damage of node collusion. In this paper, we propose a series of collusion-aware privacy-preserving range query protocols in two-tiered WSNs. To the best of our knowledge, this paper is the first to consider collusion attacks for a range query in tiered WSNs while fulfilling the preservation of privacy and integrity. To preserve the privacy of data and queries, we propose a novel encoding scheme to conceal sensitive information. To preserve the integrity of the results, we present a verification scheme using the correlation among data. In addition, two schemes are further presented to improve result accuracy and reduce communication cost. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and privacy of our proposals. PMID:25615731

  9. Privacy-Preserving and Usable Data Publishing and Analysis

    ERIC Educational Resources Information Center

    Shen, Entong

    2013-01-01

    In the current digital world, data is becoming an increasingly valuable resource and the demand for sharing or releasing data has never been higher. Organizations need to make available versions of the data they collected for business or legal reasons and at the same time they are under strong obligation to protect sensitive information about…

  10. Secure and Privacy-Preserving Distributed Information Brokering

    ERIC Educational Resources Information Center

    Li, Fengjun

    2010-01-01

    As enormous structured, semi-structured and unstructured data are collected and archived by organizations in many realms ranging from business to health networks to government agencies, the needs for efficient yet secure inter-organization information sharing naturally arise. Unlike early information sharing approaches that only involve a small…

  11. Differential Privacy Preserving in Big Data Analytics for Connected Health.

    PubMed

    Lin, Chi; Song, Zihao; Song, Houbing; Zhou, Yanhong; Wang, Yi; Wu, Guowei

    2016-04-01

    In Body Area Networks (BANs), big data collected by wearable sensors usually contain sensitive information, which is compulsory to be appropriately protected. Previous methods neglected privacy protection issue, leading to privacy exposure. In this paper, a differential privacy protection scheme for big data in body sensor network is developed. Compared with previous methods, this scheme will provide privacy protection with higher availability and reliability. We introduce the concept of dynamic noise thresholds, which makes our scheme more suitable to process big data. Experimental results demonstrate that, even when the attacker has full background knowledge, the proposed scheme can still provide enough interference to big sensitive data so as to preserve the privacy.

  12. Differential Privacy Preserving in Big Data Analytics for Connected Health.

    PubMed

    Lin, Chi; Song, Zihao; Song, Houbing; Zhou, Yanhong; Wang, Yi; Wu, Guowei

    2016-04-01

    In Body Area Networks (BANs), big data collected by wearable sensors usually contain sensitive information, which is compulsory to be appropriately protected. Previous methods neglected privacy protection issue, leading to privacy exposure. In this paper, a differential privacy protection scheme for big data in body sensor network is developed. Compared with previous methods, this scheme will provide privacy protection with higher availability and reliability. We introduce the concept of dynamic noise thresholds, which makes our scheme more suitable to process big data. Experimental results demonstrate that, even when the attacker has full background knowledge, the proposed scheme can still provide enough interference to big sensitive data so as to preserve the privacy. PMID:26872779

  13. δ-dependency for privacy-preserving XML data publishing.

    PubMed

    Landberg, Anders H; Nguyen, Kinh; Pardede, Eric; Rahayu, J Wenny

    2014-08-01

    An ever increasing amount of medical data such as electronic health records, is being collected, stored, shared and managed in large online health information systems and electronic medical record systems (EMR) (Williams et al., 2001; Virtanen, 2009; Huang and Liou, 2007) [1-3]. From such rich collections, data is often published in the form of census and statistical data sets for the purpose of knowledge sharing and enabling medical research. This brings with it an increasing need for protecting individual people privacy, and it becomes an issue of great importance especially when information about patients is exposed to the public. While the concept of data privacy has been comprehensively studied for relational data, models and algorithms addressing the distinct differences and complex structure of XML data are yet to be explored. Currently, the common compromise method is to convert private XML data into relational data for publication. This ad hoc approach results in significant loss of useful semantic information previously carried in the private XML data. Health data often has very complex structure, which is best expressed in XML. In fact, XML is the standard format for exchanging (e.g. HL7 version 3(1)) and publishing health information. Lack of means to deal directly with data in XML format is inevitably a serious drawback. In this paper we propose a novel privacy protection model for XML, and an algorithm for implementing this model. We provide general rules, both for transforming a private XML schema into a published XML schema, and for mapping private XML data to the new privacy-protected published XML data. In addition, we propose a new privacy property, δ-dependency, which can be applied to both relational and XML data, and that takes into consideration the hierarchical nature of sensitive data (as opposed to "quasi-identifiers"). Lastly, we provide an implementation of our model, algorithm and privacy property, and perform an experimental analysis

  14. δ-dependency for privacy-preserving XML data publishing.

    PubMed

    Landberg, Anders H; Nguyen, Kinh; Pardede, Eric; Rahayu, J Wenny

    2014-08-01

    An ever increasing amount of medical data such as electronic health records, is being collected, stored, shared and managed in large online health information systems and electronic medical record systems (EMR) (Williams et al., 2001; Virtanen, 2009; Huang and Liou, 2007) [1-3]. From such rich collections, data is often published in the form of census and statistical data sets for the purpose of knowledge sharing and enabling medical research. This brings with it an increasing need for protecting individual people privacy, and it becomes an issue of great importance especially when information about patients is exposed to the public. While the concept of data privacy has been comprehensively studied for relational data, models and algorithms addressing the distinct differences and complex structure of XML data are yet to be explored. Currently, the common compromise method is to convert private XML data into relational data for publication. This ad hoc approach results in significant loss of useful semantic information previously carried in the private XML data. Health data often has very complex structure, which is best expressed in XML. In fact, XML is the standard format for exchanging (e.g. HL7 version 3(1)) and publishing health information. Lack of means to deal directly with data in XML format is inevitably a serious drawback. In this paper we propose a novel privacy protection model for XML, and an algorithm for implementing this model. We provide general rules, both for transforming a private XML schema into a published XML schema, and for mapping private XML data to the new privacy-protected published XML data. In addition, we propose a new privacy property, δ-dependency, which can be applied to both relational and XML data, and that takes into consideration the hierarchical nature of sensitive data (as opposed to "quasi-identifiers"). Lastly, we provide an implementation of our model, algorithm and privacy property, and perform an experimental analysis

  15. Analysis of Existing Privacy-Preserving Protocols in Domain Name System

    NASA Astrophysics Data System (ADS)

    Zhao, Fangming; Hori, Yoshiaki; Sakurai, Kouichi

    In a society preoccupied with gradual erosion of electronic privacy, loss of privacy in the current Domain Name System is an important issue worth considering. In this paper, we first review the DNS and some security & privacy threats to make average users begin to concern about the significance of privacy preservation in DNS protocols. Then, by an careful survey of four noise query generation based existing privacy protection approaches, we analyze some benefits and limitations of these proposals in terms of both related performance evaluation results and theoretic proofs. Finally, we point out some problems that still exist for research community's continuing efforts in the future.

  16. A Lightweight Encryption Scheme Combined with Trust Management for Privacy-Preserving in Body Sensor Networks.

    PubMed

    Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N

    2015-12-01

    With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system. PMID:26490148

  17. An innovative privacy preserving technique for incremental datasets on cloud computing.

    PubMed

    Aldeen, Yousra Abdul Alsahib S; Salleh, Mazleena; Aljeroudi, Yazan

    2016-08-01

    Cloud computing (CC) is a magnificent service-based delivery with gigantic computer processing power and data storage across connected communications channels. It imparted overwhelming technological impetus in the internet (web) mediated IT industry, where users can easily share private data for further analysis and mining. Furthermore, user affable CC services enable to deploy sundry applications economically. Meanwhile, simple data sharing impelled various phishing attacks and malware assisted security threats. Some privacy sensitive applications like health services on cloud that are built with several economic and operational benefits necessitate enhanced security. Thus, absolute cyberspace security and mitigation against phishing blitz became mandatory to protect overall data privacy. Typically, diverse applications datasets are anonymized with better privacy to owners without providing all secrecy requirements to the newly added records. Some proposed techniques emphasized this issue by re-anonymizing the datasets from the scratch. The utmost privacy protection over incremental datasets on CC is far from being achieved. Certainly, the distribution of huge datasets volume across multiple storage nodes limits the privacy preservation. In this view, we propose a new anonymization technique to attain better privacy protection with high data utility over distributed and incremental datasets on CC. The proficiency of data privacy preservation and improved confidentiality requirements is demonstrated through performance evaluation. PMID:27369566

  18. An efficient reversible privacy-preserving data mining technology over data streams.

    PubMed

    Lin, Chen-Yi; Kao, Yuan-Hung; Lee, Wei-Bin; Chen, Rong-Chang

    2016-01-01

    With the popularity of smart handheld devices and the emergence of cloud computing, users and companies can save various data, which may contain private data, to the cloud. Topics relating to data security have therefore received much attention. This study focuses on data stream environments and uses the concept of a sliding window to design a reversible privacy-preserving technology to process continuous data in real time, known as a continuous reversible privacy-preserving (CRP) algorithm. Data with CRP algorithm protection can be accurately recovered through a data recovery process. In addition, by using an embedded watermark, the integrity of the data can be verified. The results from the experiments show that, compared to existing algorithms, CRP is better at preserving knowledge and is more effective in terms of reducing information loss and privacy disclosure risk. In addition, it takes far less time for CRP to process continuous data than existing algorithms. As a result, CRP is confirmed as suitable for data stream environments and fulfills the requirements of being lightweight and energy-efficient for smart handheld devices. PMID:27610326

  19. A Privacy Preservation Model for Health-Related Social Networking Sites.

    PubMed

    Li, Jingquan

    2015-07-08

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS.

  20. An efficient reversible privacy-preserving data mining technology over data streams.

    PubMed

    Lin, Chen-Yi; Kao, Yuan-Hung; Lee, Wei-Bin; Chen, Rong-Chang

    2016-01-01

    With the popularity of smart handheld devices and the emergence of cloud computing, users and companies can save various data, which may contain private data, to the cloud. Topics relating to data security have therefore received much attention. This study focuses on data stream environments and uses the concept of a sliding window to design a reversible privacy-preserving technology to process continuous data in real time, known as a continuous reversible privacy-preserving (CRP) algorithm. Data with CRP algorithm protection can be accurately recovered through a data recovery process. In addition, by using an embedded watermark, the integrity of the data can be verified. The results from the experiments show that, compared to existing algorithms, CRP is better at preserving knowledge and is more effective in terms of reducing information loss and privacy disclosure risk. In addition, it takes far less time for CRP to process continuous data than existing algorithms. As a result, CRP is confirmed as suitable for data stream environments and fulfills the requirements of being lightweight and energy-efficient for smart handheld devices.

  1. Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks

    PubMed Central

    Thandava Meganathan, Navamani; Palanichamy, Yogesh

    2015-01-01

    Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, and anonymity are to be ensured during route discovery. These properties can be achieved by implementing group signature and ID-based encryption schemes during route discovery. Due to the characteristics of WMNs, it is more vulnerable to many network layer attacks. Hence, a strong protection is needed to avoid these attacks and this can be achieved by introducing a new Cross-Layer and Subject Logic based Dynamic Reputation (CLSL-DR) mechanism during route discovery. In this paper, we propose a new Privacy preserved and Secured Reliable Routing (PSRR) protocol for WMNs. This protocol incorporates group signature, ID-based encryption schemes, and CLSL-DR mechanism to ensure strong privacy, security, and reliability in WMNs. Simulation results prove this by showing better performance in terms of most of the chosen parameters than the existing protocols. PMID:26484361

  2. Privacy-preserving genomic testing in the clinic: a model using HIV treatment

    PubMed Central

    McLaren, Paul J.; Raisaro, Jean Louis; Aouri, Manel; Rotger, Margalida; Ayday, Erman; Bartha, István; Delgado, Maria B.; Vallet, Yannick; Günthard, Huldrych F.; Cavassini, Matthias; Furrer, Hansjakob; Doco-Lecompte, Thanh; Marzolini, Catia; Schmid, Patrick; Di Benedetto, Caroline; Decosterd, Laurent A.; Fellay, Jacques; Hubaux, Jean-Pierre; Telenti, Amalio

    2016-01-01

    Purpose: The implementation of genomic-based medicine is hindered by unresolved questions regarding data privacy and delivery of interpreted results to health-care practitioners. We used DNA-based prediction of HIV-related outcomes as a model to explore critical issues in clinical genomics. Genet Med 18 8, 814–822. Methods: We genotyped 4,149 markers in HIV-positive individuals. Variants allowed for prediction of 17 traits relevant to HIV medical care, inference of patient ancestry, and imputation of human leukocyte antigen (HLA) types. Genetic data were processed under a privacy-preserving framework using homomorphic encryption, and clinical reports describing potentially actionable results were delivered to health-care providers. Genet Med 18 8, 814–822. Results: A total of 230 patients were included in the study. We demonstrated the feasibility of encrypting a large number of genetic markers, inferring patient ancestry, computing monogenic and polygenic trait risks, and reporting results under privacy-preserving conditions. The average execution time of a multimarker test on encrypted data was 865 ms on a standard computer. The proportion of tests returning potentially actionable genetic results ranged from 0 to 54%. Genet Med 18 8, 814–822. Conclusions: The model of implementation presented herein informs on strategies to deliver genomic test results for clinical care. Data encryption to ensure privacy helps to build patient trust, a key requirement on the road to genomic-based medicine. Genet Med 18 8, 814–822. PMID:26765343

  3. A Lightweight Encryption Scheme Combined with Trust Management for Privacy-Preserving in Body Sensor Networks.

    PubMed

    Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N

    2015-12-01

    With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.

  4. A Privacy Preservation Model for Health-Related Social Networking Sites

    PubMed Central

    2015-01-01

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS. PMID:26155953

  5. An innovative privacy preserving technique for incremental datasets on cloud computing.

    PubMed

    Aldeen, Yousra Abdul Alsahib S; Salleh, Mazleena; Aljeroudi, Yazan

    2016-08-01

    Cloud computing (CC) is a magnificent service-based delivery with gigantic computer processing power and data storage across connected communications channels. It imparted overwhelming technological impetus in the internet (web) mediated IT industry, where users can easily share private data for further analysis and mining. Furthermore, user affable CC services enable to deploy sundry applications economically. Meanwhile, simple data sharing impelled various phishing attacks and malware assisted security threats. Some privacy sensitive applications like health services on cloud that are built with several economic and operational benefits necessitate enhanced security. Thus, absolute cyberspace security and mitigation against phishing blitz became mandatory to protect overall data privacy. Typically, diverse applications datasets are anonymized with better privacy to owners without providing all secrecy requirements to the newly added records. Some proposed techniques emphasized this issue by re-anonymizing the datasets from the scratch. The utmost privacy protection over incremental datasets on CC is far from being achieved. Certainly, the distribution of huge datasets volume across multiple storage nodes limits the privacy preservation. In this view, we propose a new anonymization technique to attain better privacy protection with high data utility over distributed and incremental datasets on CC. The proficiency of data privacy preservation and improved confidentiality requirements is demonstrated through performance evaluation.

  6. EXpectation Propagation LOgistic REgRession (EXPLORER): Distributed Privacy-Preserving Online Model Learning

    PubMed Central

    Wang, Shuang; Jiang, Xiaoqian; Wu, Yuan; Cui, Lijuan; Cheng, Samuel; Ohno-Machado, Lucila

    2013-01-01

    We developed an EXpectation Propagation LOgistic REgRession (EXPLORER) model for distributed privacy-preserving online learning. The proposed framework provides a high level guarantee for protecting sensitive information, since the information exchanged between the server and the client is the encrypted posterior distribution of coefficients. Through experimental results, EXPLORER shows the same performance (e.g., discrimination, calibration, feature selection etc.) as the traditional frequentist Logistic Regression model, but provides more flexibility in model updating. That is, EXPLORER can be updated one point at a time rather than having to retrain the entire data set when new observations are recorded. The proposed EXPLORER supports asynchronized communication, which relieves the participants from coordinating with one another, and prevents service breakdown from the absence of participants or interrupted communications. PMID:23562651

  7. A Framework for Privacy-preserving Classification of Next-generation PHR data.

    PubMed

    Koufi, Vassiliki; Malamateniou, Flora; Prentza, Andriana; Vassilacopoulos, George

    2014-01-01

    Personal Health Records (PHRs), integrated with data from various sources, such as social care data, Electronic Health Record data and genetic information, are envisaged as having a pivotal role in transforming healthcare. These data, lumped under the term 'big data', are usually complex, noisy, heterogeneous, longitudinal and voluminous thus prohibiting their meaningful use by clinicians. Deriving value from these data requires the utilization of innovative data analysis techniques, which, however, may be hindered due to potential security and privacy breaches that may arise from improper release of personal health information. This paper presents a HIPAA-compliant machine learning framework that enables privacy-preserving classification of next-generation PHR data. The predictive models acquired can act as supporting tools to clinical practice by enabling more effective prevention, diagnosis and treatment of new incidents. The proposed framework has a huge potential for complementing medical staff expertise as it outperforms the manual inspection of PHR data while protecting patient privacy. PMID:25000030

  8. A framework for privacy-preserving access to next-generation EHRs.

    PubMed

    Koufi, Vassiliki; Malamateniou, Flora; Tsohou, Aggeliki; Vassilacopoulos, George

    2014-01-01

    Although personalized medicine is optimizing the discovery, development and application of therapeutic advances, its full impact on patient and population healthcare management has yet to be realized. Electronic health Records (EHRs), integrated with data from other sources, such as social care data, Personal Healthcare Record (PHR) data and genetic information, are envisaged as having a pivotal role in realizing this individualized approach to healthcare. Thus, a new generation of EHRs will emerge which, in addition to supporting healthcare professionals in making well-informed clinical decisions, shows potential for novel discovery of associations between disease and genetic, environmental or process measures. However, a broad range of ethical, legal and technical reasons may hinder the realization of future EHRs due to potential security and privacy breaches. This paper presents a HIPAA-compliant framework that enables privacy-preserving access to next-generation EHRs.

  9. A Framework for Privacy-preserving Classification of Next-generation PHR data.

    PubMed

    Koufi, Vassiliki; Malamateniou, Flora; Prentza, Andriana; Vassilacopoulos, George

    2014-01-01

    Personal Health Records (PHRs), integrated with data from various sources, such as social care data, Electronic Health Record data and genetic information, are envisaged as having a pivotal role in transforming healthcare. These data, lumped under the term 'big data', are usually complex, noisy, heterogeneous, longitudinal and voluminous thus prohibiting their meaningful use by clinicians. Deriving value from these data requires the utilization of innovative data analysis techniques, which, however, may be hindered due to potential security and privacy breaches that may arise from improper release of personal health information. This paper presents a HIPAA-compliant machine learning framework that enables privacy-preserving classification of next-generation PHR data. The predictive models acquired can act as supporting tools to clinical practice by enabling more effective prevention, diagnosis and treatment of new incidents. The proposed framework has a huge potential for complementing medical staff expertise as it outperforms the manual inspection of PHR data while protecting patient privacy.

  10. Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials

    NASA Astrophysics Data System (ADS)

    Park, Jun-Cheol

    User privacy preservation is critical to prevent many sophisticated attacks that are based on the user's server access patterns and ID-related information. We propose a password-based user authentication scheme that provides strong privacy protection using one-time credentials. It eliminates the possibility of tracing a user's authentication history and hides the user's ID and password even from servers. In addition, it is resistant against user impersonation even if both a server's verification database and a user's smart card storage are disclosed. We also provide a revocation scheme for a user to promptly invalidate the user's credentials on a server when the user's smart card is compromised. The schemes use lightweight operations only such as computing hashes and bitwise XORs.

  11. A framework for privacy-preserving access to next-generation EHRs.

    PubMed

    Koufi, Vassiliki; Malamateniou, Flora; Tsohou, Aggeliki; Vassilacopoulos, George

    2014-01-01

    Although personalized medicine is optimizing the discovery, development and application of therapeutic advances, its full impact on patient and population healthcare management has yet to be realized. Electronic health Records (EHRs), integrated with data from other sources, such as social care data, Personal Healthcare Record (PHR) data and genetic information, are envisaged as having a pivotal role in realizing this individualized approach to healthcare. Thus, a new generation of EHRs will emerge which, in addition to supporting healthcare professionals in making well-informed clinical decisions, shows potential for novel discovery of associations between disease and genetic, environmental or process measures. However, a broad range of ethical, legal and technical reasons may hinder the realization of future EHRs due to potential security and privacy breaches. This paper presents a HIPAA-compliant framework that enables privacy-preserving access to next-generation EHRs. PMID:25160285

  12. Privacy of Value-Added Context-Aware Service Cloud

    NASA Astrophysics Data System (ADS)

    Huang, Xin; He, Yin; Hou, Yifan; Li, Lisi; Sun, Lan; Zhang, Sina; Jiang, Yang; Zhang, Tingting

    In the cloud computing era, service provider cloud and context service cloud store all your personal context data. This is a positive aspect for value-added context-aware service cloud as it makes that context information collection are easier than was the case previously. However, this computing environment does add a series of threats in relation to privacy protection. Whoever receives the context information is able to deduce the status of the owners and, generally owners are not happy to share this information. In this paper, we propose a privacy preserved framework which can be utilized by value-added context-aware service cloud. Context data and related services access privileges are determined by context-aware role-based access control (CRAC) extended from role-based access control (RAC). Privacy preserved context service protocol (PPCS) is designed to protect user privacy from exposed context information. Additionally, user network and information diffusion is combined to evaluate the privacy protection effect.

  13. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    PubMed

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes. PMID:27337001

  14. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks

    PubMed Central

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant’s profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes. PMID:27337001

  15. Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining

    PubMed Central

    Lin, Chun-Wei; Hong, Tzung-Pei; Hsu, Hung-Chuan

    2014-01-01

    Data mining is traditionally adopted to retrieve and analyze knowledge from large amounts of data. Private or confidential data may be sanitized or suppressed before it is shared or published in public. Privacy preserving data mining (PPDM) has thus become an important issue in recent years. The most general way of PPDM is to sanitize the database to hide the sensitive information. In this paper, a novel hiding-missing-artificial utility (HMAU) algorithm is proposed to hide sensitive itemsets through transaction deletion. The transaction with the maximal ratio of sensitive to nonsensitive one is thus selected to be entirely deleted. Three side effects of hiding failures, missing itemsets, and artificial itemsets are considered to evaluate whether the transactions are required to be deleted for hiding sensitive itemsets. Three weights are also assigned as the importance to three factors, which can be set according to the requirement of users. Experiments are then conducted to show the performance of the proposed algorithm in execution time, number of deleted transactions, and number of side effects. PMID:24982932

  16. TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs.

    PubMed

    Hu, Hao; Lu, Rongxing; Huang, Cheng; Zhang, Zonghua

    2016-01-01

    In this paper, we propose a trust-based vehicular platoon crowdsensing scheme, named TripSense, in VANET. The proposed TripSense scheme introduces a trust-based system to evaluate vehicles' sensing abilities and then selects the more capable vehicles in order to improve sensing results accuracy. In addition, the sensing tasks are accomplished by platoon member vehicles and preprocessed by platoon head vehicles before the data are uploaded to server. Hence, it is less time-consuming and more efficient compared with the way where the data are submitted by individual platoon member vehicles. Hence it is more suitable in ephemeral networks like VANET. Moreover, our proposed TripSense scheme integrates unlinkable pseudo-ID techniques to achieve PM vehicle identity privacy, and employs a privacy-preserving sensing vehicle selection scheme without involving the PM vehicle's trust score to keep its location privacy. Detailed security analysis shows that our proposed TripSense scheme not only achieves desirable privacy requirements but also resists against attacks launched by adversaries. In addition, extensive simulations are conducted to show the correctness and effectiveness of our proposed scheme. PMID:27258287

  17. TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs

    PubMed Central

    Hu, Hao; Lu, Rongxing; Huang, Cheng; Zhang, Zonghua

    2016-01-01

    In this paper, we propose a trust-based vehicular platoon crowdsensing scheme, named TripSense, in VANET. The proposed TripSense scheme introduces a trust-based system to evaluate vehicles’ sensing abilities and then selects the more capable vehicles in order to improve sensing results accuracy. In addition, the sensing tasks are accomplished by platoon member vehicles and preprocessed by platoon head vehicles before the data are uploaded to server. Hence, it is less time-consuming and more efficient compared with the way where the data are submitted by individual platoon member vehicles. Hence it is more suitable in ephemeral networks like VANET. Moreover, our proposed TripSense scheme integrates unlinkable pseudo-ID techniques to achieve PM vehicle identity privacy, and employs a privacy-preserving sensing vehicle selection scheme without involving the PM vehicle’s trust score to keep its location privacy. Detailed security analysis shows that our proposed TripSense scheme not only achieves desirable privacy requirements but also resists against attacks launched by adversaries. In addition, extensive simulations are conducted to show the correctness and effectiveness of our proposed scheme. PMID:27258287

  18. Remote access methods for exploratory data analysis and statistical modelling: Privacy-Preserving Analytics.

    PubMed

    Sparks, Ross; Carter, Chris; Donnelly, John B; O'Keefe, Christine M; Duncan, Jodie; Keighley, Tim; McAullay, Damien

    2008-09-01

    This paper is concerned with the challenge of enabling the use of confidential or private data for research and policy analysis, while protecting confidentiality and privacy by reducing the risk of disclosure of sensitive information. Traditional solutions to the problem of reducing disclosure risk include releasing de-identified data and modifying data before release. In this paper we discuss the alternative approach of using a remote analysis server which does not enable any data release, but instead is designed to deliver useful results of user-specified statistical analyses with a low risk of disclosure. The techniques described in this paper enable a user to conduct a wide range of methods in exploratory data analysis, regression and survival analysis, while at the same time reducing the risk that the user can read or infer any individual record attribute value. We illustrate our methods with examples from biostatistics using publicly available data. We have implemented our techniques into a software demonstrator called Privacy-Preserving Analytics (PPA), via a web-based interface to the R software. We believe that PPA may provide an effective balance between the competing goals of providing useful information and reducing disclosure risk in some situations.

  19. Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way

    NASA Astrophysics Data System (ADS)

    Cui, Yank; Kobara, Kazukuni; Matsuura, Kanta; Imai, Hideki

    As pervasive computing technologies develop fast, the privacy protection becomes a crucial issue and needs to be coped with very carefully. Typically, it is difficult to efficiently identify and manage plenty of the low-cost pervasive devices like Radio Frequency Identification Devices (RFID), without leaking any privacy information. In particular, the attacker may not only eavesdrop the communication in a passive way, but also mount an active attack to ask queries adaptively, which is obviously more dangerous. Towards settling this problem, in this paper, we propose two lightweight authentication protocols which are privacy-preserving against active attack, in an asymmetric way. That asymmetric style with privacy-oriented simplification succeeds to reduce the load of low-cost devices and drastically decrease the computation cost for the management of server. This is because that, unlike the usual management of the identities, our approach does not require any synchronization nor exhaustive search in the database, which enjoys great convenience in case of a large-scale system. The protocols are based on a fast asymmetric encryption with specialized simplification and only one cryptographic hash function, which consequently assigns an easy work to pervasive devices. Besides, our results do not require the strong assumption of the random oracle.

  20. TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs.

    PubMed

    Hu, Hao; Lu, Rongxing; Huang, Cheng; Zhang, Zonghua

    2016-06-01

    In this paper, we propose a trust-based vehicular platoon crowdsensing scheme, named TripSense, in VANET. The proposed TripSense scheme introduces a trust-based system to evaluate vehicles' sensing abilities and then selects the more capable vehicles in order to improve sensing results accuracy. In addition, the sensing tasks are accomplished by platoon member vehicles and preprocessed by platoon head vehicles before the data are uploaded to server. Hence, it is less time-consuming and more efficient compared with the way where the data are submitted by individual platoon member vehicles. Hence it is more suitable in ephemeral networks like VANET. Moreover, our proposed TripSense scheme integrates unlinkable pseudo-ID techniques to achieve PM vehicle identity privacy, and employs a privacy-preserving sensing vehicle selection scheme without involving the PM vehicle's trust score to keep its location privacy. Detailed security analysis shows that our proposed TripSense scheme not only achieves desirable privacy requirements but also resists against attacks launched by adversaries. In addition, extensive simulations are conducted to show the correctness and effectiveness of our proposed scheme.

  1. Privacy preserving data publishing of categorical data through k-anonymity and feature selection.

    PubMed

    Aristodimou, Aristos; Antoniades, Athos; Pattichis, Constantinos S

    2016-03-01

    In healthcare, there is a vast amount of patients' data, which can lead to important discoveries if combined. Due to legal and ethical issues, such data cannot be shared and hence such information is underused. A new area of research has emerged, called privacy preserving data publishing (PPDP), which aims in sharing data in a way that privacy is preserved while the information lost is kept at a minimum. In this Letter, a new anonymisation algorithm for PPDP is proposed, which is based on k-anonymity through pattern-based multidimensional suppression (kPB-MS). The algorithm uses feature selection for reducing the data dimensionality and then combines attribute and record suppression for obtaining k-anonymity. Five datasets from different areas of life sciences [RETINOPATHY, Single Proton Emission Computed Tomography imaging, gene sequencing and drug discovery (two datasets)], were anonymised with kPB-MS. The produced anonymised datasets were evaluated using four different classifiers and in 74% of the test cases, they produced similar or better accuracies than using the full datasets.

  2. Privacy-preserving photo sharing based on a public key infrastructure

    NASA Astrophysics Data System (ADS)

    Yuan, Lin; McNally, David; Küpçü, Alptekin; Ebrahimi, Touradj

    2015-09-01

    A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the best interest of many such services if their users restrict access to their shared pictures, most services keep users' photos unprotected which makes them available to all insiders. This paper presents an architecture for a privacy-preserving photo sharing based on an image scrambling scheme and a public key infrastructure. A secure JPEG scrambling is applied to protect regional visual information in photos. Protected images are still compatible with JPEG coding and therefore can be viewed by any one on any device. However, only those who are granted secret keys will be able to descramble the photos and view their original versions. The proposed architecture applies an attribute-based encryption along with conventional public key cryptography, to achieve secure transmission of secret keys and a fine-grained control over who may view shared photos. In addition, we demonstrate the practical feasibility of the proposed photo sharing architecture with a prototype mobile application, ProShare, which is built based on iOS platform.

  3. A compressive sensing based secure watermark detection and privacy preserving storage framework.

    PubMed

    Qia Wang; Wenjun Zeng; Jun Tian

    2014-03-01

    Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service, such as the cloud. In this paper, we identify a cloud computing application scenario that requires simultaneously performing secure watermark detection and privacy preserving multimedia data storage. We then propose a compressive sensing (CS)-based framework using secure multiparty computation (MPC) protocols to address such a requirement. In our framework, the multimedia data and secret watermark pattern are presented to the cloud for secure watermark detection in a CS domain to protect the privacy. During CS transformation, the privacy of the CS matrix and the watermark pattern is protected by the MPC protocols under the semi-honest security model. We derive the expected watermark detection performance in the CS domain, given the target image, watermark pattern, and the size of the CS matrix (but without the CS matrix itself). The correctness of the derived performance has been validated by our experiments. Our theoretical analysis and experimental results show that secure watermark detection in the CS domain is feasible. Our framework can also be extended to other collaborative secure signal processing and data-mining applications in the cloud.

  4. Exploiting geo-distributed clouds for a e-health monitoring system with minimum service delay and privacy preservation.

    PubMed

    Shen, Qinghua; Liang, Xiaohui; Shen, Xuemin; Lin, Xiaodong; Luo, Henry Y

    2014-03-01

    In this paper, we propose an e-health monitoring system with minimum service delay and privacy preservation by exploiting geo-distributed clouds. In the system, the resource allocation scheme enables the distributed cloud servers to cooperatively assign the servers to the requested users under the load balance condition. Thus, the service delay for users is minimized. In addition, a traffic-shaping algorithm is proposed. The traffic-shaping algorithm converts the user health data traffic to the nonhealth data traffic such that the capability of traffic analysis attacks is largely reduced. Through the numerical analysis, we show the efficiency of the proposed traffic-shaping algorithm in terms of service delay and privacy preservation. Furthermore, through the simulations, we demonstrate that the proposed resource allocation scheme significantly reduces the service delay compared to two other alternatives using jointly the short queue and distributed control law.

  5. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge.

    PubMed

    Yu, Fei; Ji, Zhanglong

    2014-01-01

    In response to the growing interest in genome-wide association study (GWAS) data privacy, the Integrating Data for Analysis, Anonymization and SHaring (iDASH) center organized the iDASH Healthcare Privacy Protection Challenge, with the aim of investigating the effectiveness of applying privacy-preserving methodologies to human genetic data. This paper is based on a submission to the iDASH Healthcare Privacy Protection Challenge. We apply privacy-preserving methods that are adapted from Uhler et al. 2013 and Yu et al. 2014 to the challenge's data and analyze the data utility after the data are perturbed by the privacy-preserving methods. Major contributions of this paper include new interpretation of the χ2 statistic in a GWAS setting and new results about the Hamming distance score, a key component for one of the privacy-preserving methods.

  6. Hiding in Plain Sight: Anonymity and Privacy Preserving Mechanisms for Data Collection and Collaboration

    ERIC Educational Resources Information Center

    Kumar, Rajeev

    2009-01-01

    This dissertation contributes to the society by providing mechanisms that can potentially increase the availability of valuable personal level information without sacrificing the privacy of citizens. We consider two settings by which personal level data can be made available to its users such as researchers, who then may use it for the benefit of…

  7. A security and privacy preserving e-prescription system based on smart cards.

    PubMed

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.

  8. Design and implementation of a privacy preserving electronic health record linkage tool in Chicago

    PubMed Central

    Cashy, John P; Jackson, Kathryn L; Pah, Adam R; Goel, Satyender; Boehnke, Jörn; Humphries, John Eric; Kominers, Scott Duke; Hota, Bala N; Sims, Shannon A; Malin, Bradley A; French, Dustin D; Walunas, Theresa L; Meltzer, David O; Kaleba, Erin O; Jones, Roderick C; Galanter, William L

    2015-01-01

    Objective To design and implement a tool that creates a secure, privacy preserving linkage of electronic health record (EHR) data across multiple sites in a large metropolitan area in the United States (Chicago, IL), for use in clinical research. Methods The authors developed and distributed a software application that performs standardized data cleaning, preprocessing, and hashing of patient identifiers to remove all protected health information. The application creates seeded hash code combinations of patient identifiers using a Health Insurance Portability and Accountability Act compliant SHA-512 algorithm that minimizes re-identification risk. The authors subsequently linked individual records using a central honest broker with an algorithm that assigns weights to hash combinations in order to generate high specificity matches. Results The software application successfully linked and de-duplicated 7 million records across 6 institutions, resulting in a cohort of 5 million unique records. Using a manually reconciled set of 11 292 patients as a gold standard, the software achieved a sensitivity of 96% and a specificity of 100%, with a majority of the missed matches accounted for by patients with both a missing social security number and last name change. Using 3 disease examples, it is demonstrated that the software can reduce duplication of patient records across sites by as much as 28%. Conclusions Software that standardizes the assignment of a unique seeded hash identifier merged through an agreed upon third-party honest broker can enable large-scale secure linkage of EHR data for epidemiologic and public health research. The software algorithm can improve future epidemiologic research by providing more comprehensive data given that patients may make use of multiple healthcare systems. PMID:26104741

  9. A security and privacy preserving e-prescription system based on smart cards.

    PubMed

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations. PMID:22407399

  10. A review on the state-of-the-art privacy-preserving approaches in the e-health clouds.

    PubMed

    Abbas, Assad; Khan, Samee U

    2014-07-01

    Cloud computing is emerging as a new computing paradigm in the healthcare sector besides other business domains. Large numbers of health organizations have started shifting the electronic health information to the cloud environment. Introducing the cloud services in the health sector not only facilitates the exchange of electronic medical records among the hospitals and clinics, but also enables the cloud to act as a medical record storage center. Moreover, shifting to the cloud environment relieves the healthcare organizations of the tedious tasks of infrastructure management and also minimizes development and maintenance costs. Nonetheless, storing the patient health data in the third-party servers also entails serious threats to data privacy. Because of probable disclosure of medical records stored and exchanged in the cloud, the patients' privacy concerns should essentially be considered when designing the security and privacy mechanisms. Various approaches have been used to preserve the privacy of the health information in the cloud environment. This survey aims to encompass the state-of-the-art privacy-preserving approaches employed in the e-Health clouds. Moreover, the privacy-preserving approaches are classified into cryptographic and noncryptographic approaches and taxonomy of the approaches is also presented. Furthermore, the strengths and weaknesses of the presented approaches are reported and some open issues are highlighted.

  11. Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks

    PubMed Central

    Wen, Qiaoyan; Zhang, Yudong; Li, Wenmin

    2014-01-01

    With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients' health information and doctors' diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions. PMID:25126107

  12. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios. PMID:26409546

  13. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  14. Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Privacy Preserving Authentication Model by Features Matching

    PubMed Central

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration. PMID:22550398

  15. Using medical history embedded in biometrics medical card for user identity authentication: privacy preserving authentication model by features matching.

    PubMed

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.

  16. Using medical history embedded in biometrics medical card for user identity authentication: privacy preserving authentication model by features matching.

    PubMed

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration. PMID:22550398

  17. A smart-card-enabled privacy preserving E-prescription system.

    PubMed

    Yang, Yanjiang; Han, Xiaoxi; Bao, Feng; Deng, Robert H

    2004-03-01

    Within the overall context of protection of health care information, privacy of prescription data needs special treatment. First, the involvement of diverse parties, especially nonmedical parties in the process of drug prescription complicates the protection of prescription data. Second, both patients and doctors have privacy stakes in prescription, and their privacy should be equally protected. Third, the following facts determine that prescription should not be processed in a truly anonymous manner: certain involved parties conduct useful research on the basis of aggregation of prescription data that are linkable with respect to either the patients or the doctors; prescription data has to be identifiable in some extreme circumstances, e.g., under the court order for inspection and assign liability. In this paper, we propose an e-prescription system to address issues pertaining to the privacy protection in the process of drug prescription. In our system, patients' smart cards play an important role. For one thing, the smart cards are implemented to be portable repositories carrying up-to-date personal medical records and insurance information, providing doctors instant data access crucial to the process of diagnosis and prescription. For the other, with the secret signing key being stored inside, the smart card enables the patient to sign electronically the prescription pad, declaring his acceptance of the prescription. To make the system more realistic, we identify the needs for a patient to delegate his signing capability to other people so as to protect the privacy of information housed on his card. A strong proxy signature scheme achieving technologically mutual agreements on the delegation is proposed to implement the delegation functionality.

  18. A novel, privacy-preserving cryptographic approach for sharing sequencing data

    PubMed Central

    Cassa, Christopher A; Miller, Rachel A; Mandl, Kenneth D

    2013-01-01

    Objective DNA samples are often processed and sequenced in facilities external to the point of collection. These samples are routinely labeled with patient identifiers or pseudonyms, allowing for potential linkage to identity and private clinical information if intercepted during transmission. We present a cryptographic scheme to securely transmit externally generated sequence data which does not require any patient identifiers, public key infrastructure, or the transmission of passwords. Materials and methods This novel encryption scheme cryptographically protects participant sequence data using a shared secret key that is derived from a unique subset of an individual’s genetic sequence. This scheme requires access to a subset of an individual’s genetic sequence to acquire full access to the transmitted sequence data, which helps to prevent sample mismatch. Results We validate that the proposed encryption scheme is robust to sequencing errors, population uniqueness, and sibling disambiguation, and provides sufficient cryptographic key space. Discussion Access to a set of an individual’s genotypes and a mutually agreed cryptographic seed is needed to unlock the full sequence, which provides additional sample authentication and authorization security. We present modest fixed and marginal costs to implement this transmission architecture. Conclusions It is possible for genomics researchers who sequence participant samples externally to protect the transmission of sequence data using unique features of an individual’s genetic sequence. PMID:23125421

  19. Scalable privacy-preserving data sharing methodology for genome-wide association studies.

    PubMed

    Yu, Fei; Fienberg, Stephen E; Slavković, Aleksandra B; Uhler, Caroline

    2014-08-01

    The protection of privacy of individual-level information in genome-wide association study (GWAS) databases has been a major concern of researchers following the publication of "an attack" on GWAS data by Homer et al. (2008). Traditional statistical methods for confidentiality and privacy protection of statistical databases do not scale well to deal with GWAS data, especially in terms of guarantees regarding protection from linkage to external information. The more recent concept of differential privacy, introduced by the cryptographic community, is an approach that provides a rigorous definition of privacy with meaningful privacy guarantees in the presence of arbitrary external information, although the guarantees may come at a serious price in terms of data utility. Building on such notions, Uhler et al. (2013) proposed new methods to release aggregate GWAS data without compromising an individual's privacy. We extend the methods developed in Uhler et al. (2013) for releasing differentially-private χ(2)-statistics by allowing for arbitrary number of cases and controls, and for releasing differentially-private allelic test statistics. We also provide a new interpretation by assuming the controls' data are known, which is a realistic assumption because some GWAS use publicly available data as controls. We assess the performance of the proposed methods through a risk-utility analysis on a real data set consisting of DNA samples collected by the Wellcome Trust Case Control Consortium and compare the methods with the differentially-private release mechanism proposed by Johnson and Shmatikov (2013).

  20. Efficient privacy-preserving string search and an application in genomics

    PubMed Central

    Shimizu, Kana; Nuida, Koji; Rätsch, Gunnar

    2016-01-01

    Motivation: Personal genomes carry inherent privacy risks and protecting privacy poses major social and technological challenges. We consider the case where a user searches for genetic information (e.g. an allele) on a server that stores a large genomic database and aims to receive allele-associated information. The user would like to keep the query and result private and the server the database. Approach: We propose a novel approach that combines efficient string data structures such as the Burrows–Wheeler transform with cryptographic techniques based on additive homomorphic encryption. We assume that the sequence data is searchable in efficient iterative query operations over a large indexed dictionary, for instance, from large genome collections and employing the (positional) Burrows–Wheeler transform. We use a technique called oblivious transfer that is based on additive homomorphic encryption to conceal the sequence query and the genomic region of interest in positional queries. Results: We designed and implemented an efficient algorithm for searching sequences of SNPs in large genome databases. During search, the user can only identify the longest match while the server does not learn which sequence of SNPs the user queried. In an experiment based on 2184 aligned haploid genomes from the 1000 Genomes Project, our algorithm was able to perform typical queries within ≈ 4.6 s and ≈ 10.8 s for client and server side, respectively, on laptop computers. The presented algorithm is at least one order of magnitude faster than an exhaustive baseline algorithm. Availability and implementation: https://github.com/iskana/PBWT-sec and https://github.com/ratschlab/PBWT-sec. Contacts: shimizu-kana@aist.go.jp or Gunnar.Ratsch@ratschlab.org Supplementary information: Supplementary data are available at Bioinformatics online. PMID:27153731

  1. Privacy preserving, real-time and location secured biometrics for mCommerce authentication

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Al-Assam, Hisham; Jassim, Sabah; Lami, Ihsan A.

    2011-06-01

    Secure wireless connectivity between mobile devices and financial/commercial establishments is mature, and so is the security of remote authentication for mCommerce. However, the current techniques are open for hacking, false misrepresentation, replay and other attacks. This is because of the lack of real-time and current-precise-location in the authentication process. This paper proposes a new technique that includes freshly-generated real-time personal biometric data of the client and present-position of the mobile device used by the client to perform the mCommerce so to form a real-time biometric representation to authenticate any remote transaction. A fresh GPS fix generates the "time and location" to stamp the biometric data freshly captured to produce a single, real-time biometric representation on the mobile device. A trusted Certification Authority (CA) acts as an independent authenticator of such client's claimed realtime location and his/her provided fresh biometric data. Thus eliminates the necessity of user enrolment with many mCommerce services and application providers. This CA can also "independently from the client" and "at that instant of time" collect the client's mobile device "time and location" from the cellular network operator so to compare with the received information, together with the client's stored biometric information. Finally, to preserve the client's location privacy and to eliminate the possibility of cross-application client tracking, this paper proposes shielding the real location of the mobile device used prior to submission to the CA or authenticators.

  2. Resilience, Community, and Resilient Communities: Conditioning Contexts and Collective Action

    ERIC Educational Resources Information Center

    Chaskin, Robert J.

    2008-01-01

    This article explores the idea of community as it relates to the concept of resilience. It focuses on community both as context (local environments providing a set of risk and protective factors that have an influence on the well-being of community members) and as collective actors that can exhibit resilience in themselves by organizing and acting…

  3. The Likoma Network Study: Context, data collection, and initial results

    PubMed Central

    Helleringer, Stéphane; Kohler, Hans-Peter; Chimbiri, Agnes; Chatonda, Praise; Mkandawire, James

    2009-01-01

    The extent and structure of sexual networks have important consequences for the spread of sexually transmitted diseases such as HIV. However, very few datasets currently exist that allow a detailed investigation of sexual networks in sub-Saharan African settings where HIV epidemics have become generalized. In this paper, we describe the context and methods of the Likoma Network Study (LNS), one of the few studies that have collected extensive information on sexual networks in sub-Saharan Africa. We start by reviewing theoretical arguments and empirical studies emphasizing the importance of network structures in the epidemiology of HIV and other sexually transmitted infections (STI). The island setting of this study is described, and we argue that the choice of an island as a research site limited potential biases that may make the collection of sexual network data difficult. We then document our empirical strategy for the collection of sexual network data and the subsequent identification of sexual network partners. A description of the protocol for the collection of biomarker data (HIV infection) is provided. Finally, we present initial results relating to the socioeconomic context of the island, the size and composition of sexual networks, the quality of the sexual network data, the determinants of successful contact tracing during the LNS, and the prevalence of HIV in the study population. PMID:20179777

  4. Privacy-preserving telecardiology sensor networks: toward a low-cost portable wireless hardware/software codesign.

    PubMed

    Hu, Fei; Jiang, Meng; Wagner, Mark; Dong, De-Cun

    2007-11-01

    Recently, a remote-sensing platform based on wireless interconnection of tiny ECG sensors called Telecardiology Sensor Networks (TSN) provided a promising approach to perform low-cost real-time cardiac patient monitoring at any time in community areas (such as elder nursing homes or hospitals). The contribution of this research is the design of a practical TSN hardware/software platform for a typical U.S. healthcare community scenario (such as large nursing homes with many elder patients) to perform real-time healthcare data collections. On the other hand, due to the radio broadcasting nature of MANET, a TSN has the risk of losing the privacy of patients' data. Medical privacy has been highly emphasized by U.S. Department of Health and Human Services. This research also designs a medical security scheme with low communication overhead to achieve confidential electrocardiogram data transmission in wireless medium.

  5. Distributed Mentoring: Designing Contexts for Collective Support of Teacher Learning

    ERIC Educational Resources Information Center

    Khasnabis, Debi; Reischl, Catherine H.; Stull, Melissa; Boerst, Timothy

    2013-01-01

    There is an alternative to conventional teacher mentorship. The authors describe and analyze a promising model of mentorship where multiple mentees and mentors, each with varying levels of experience, engage collaboratively in the study of teaching practice. They have found that well-designed contexts in which beginning and experienced teachers…

  6. Collective Decision Making in the Social Context of Science.

    ERIC Educational Resources Information Center

    Aikenhead, Glen S.

    1985-01-01

    Addresses the meaning of decision making on societal issues related to science/technology and explores practical implications for secondary science teaching. Cases on marijuana, abortion, and public inquiries are included together with discussion of collective decision making at the global, strategic, personal, and scientific community levels. A…

  7. Living and Dormant Collective Memories as Contexts of History Learning

    ERIC Educational Resources Information Center

    Goldberg, Tsafrir; Schwarz, Baruch B.; Porat, Dan

    2008-01-01

    This article investigates the effect of the vitality of historical issues in collective memory on students' history learning processes and products. Forty 12th grade students of different ethnic background participated in two historical problem-solving learning tasks. The historical issues were found to differ in their vitality in collective…

  8. Building Digital Collections in the Algerian Context: Assets and Prospects.

    ERIC Educational Resources Information Center

    Bakelli, Yahia

    2002-01-01

    Analyzes access behavior of Algerian users of information and documentation, focusing on the imbalance between user demand and quality of library access. Topics include Internet connectivity problems; national bibliographic catalogs and databases; creating digital collections to improve access, especially scientific information; and advantages of…

  9. Collective secondary cremation in a pit grave: a unique funerary context in Portuguese Chalcolithic burial practices.

    PubMed

    Silva, A M; Leandro, I; Pereira, D; Costa, C; Valera, A C

    2015-02-01

    Perdigões is a large site with a set of ditched enclosures located at Reguengos de Monsaraz, Alentejo, South Portugal. Recently at the central area of this site burnt human remains were found in a pit (#16). This structure had inside human remains, animal bones (namely pig, sheep or goat, cattle, dog, deer and rabbit), shards, ivory idols and arrowheads. All have been subjected to fire and later deposited in that pit, resulting in a secondary disposal of human bones. The recovered fragmented human bones (4845.18 g) correspond to a minimal number of 9 individuals: 6 adults and 3 sub-adults. The aim of this work is to document and interpret this funerary context based on the study of the recovered human remains. For that purpose, observations of all alterations due to fire, such as colour change and type of bone distortion, as well as anthropological data were collected. The data obtained suggest that these human remains were probably intentionally cremated, carefully collected and finally deposited in this pit. The cremation was conducted on probably complete corpses, some of them still fairly fresh and fleshed, as some bones presented thumbnail fractures. The collective cremation of the pit 16 represents an unprecedented funerary context for Portuguese, and Iberian Peninsula, Chalcolithic burial practices. Moreover, it is an example of the increasing diversity of mortuary practices of Chalcolithic human populations described in present Portuguese territory, as well as, in the Iberian Peninsula.

  10. Collective secondary cremation in a pit grave: a unique funerary context in Portuguese Chalcolithic burial practices.

    PubMed

    Silva, A M; Leandro, I; Pereira, D; Costa, C; Valera, A C

    2015-02-01

    Perdigões is a large site with a set of ditched enclosures located at Reguengos de Monsaraz, Alentejo, South Portugal. Recently at the central area of this site burnt human remains were found in a pit (#16). This structure had inside human remains, animal bones (namely pig, sheep or goat, cattle, dog, deer and rabbit), shards, ivory idols and arrowheads. All have been subjected to fire and later deposited in that pit, resulting in a secondary disposal of human bones. The recovered fragmented human bones (4845.18 g) correspond to a minimal number of 9 individuals: 6 adults and 3 sub-adults. The aim of this work is to document and interpret this funerary context based on the study of the recovered human remains. For that purpose, observations of all alterations due to fire, such as colour change and type of bone distortion, as well as anthropological data were collected. The data obtained suggest that these human remains were probably intentionally cremated, carefully collected and finally deposited in this pit. The cremation was conducted on probably complete corpses, some of them still fairly fresh and fleshed, as some bones presented thumbnail fractures. The collective cremation of the pit 16 represents an unprecedented funerary context for Portuguese, and Iberian Peninsula, Chalcolithic burial practices. Moreover, it is an example of the increasing diversity of mortuary practices of Chalcolithic human populations described in present Portuguese territory, as well as, in the Iberian Peninsula. PMID:25500530

  11. [The Nice CHU biobank experience to collect patients' informed consent for research context (2004-2009)].

    PubMed

    Hofman, Véronique; Bonnetaud, Christelle; Gaziello, Marie Clotilde; Ilie, Marius; Lassalle, Sandra; Butori, Catherine; Lerda, Nathalie; Selva, Eric; Gavric-Tanga, Virginie; Castillo, Laurent; Guevara, Nicolas; Santini, José; Pop, Daniel; Vénissac, Nicolas; Mouroux, Jérôme; Chabannon, Christian; Hofman, Paul

    2010-10-01

    nine cases only. The percentage of consents varies slightly according to the collection involved and is stable from 2004 to 2009. Overall, our procedure is quite efficient at obtaining informed consents from a majority of patients for whom the tumour bank stores biological samples. This situation provides optimal conditions for the use of collected samples in the context of national and international research projects.

  12. Privacy-Preserving Location-Based Services

    ERIC Educational Resources Information Center

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  13. Privacy-Preserving Security for Vehicular Communications

    ERIC Educational Resources Information Center

    Weerasinghe, Hesiri Dhammika

    2011-01-01

    Because of the large number of deaths, severe injuries and huge financial loss due to auto accidents and poor traffic management, road safety and traffic management have become very important areas of interest among research community. As a result, Vehicular Ad-hoc Network (VANET) becomes a promising technology to improve road safety and quality…

  14. Privacy Preserving PCA on Distributed Bioinformatics Datasets

    ERIC Educational Resources Information Center

    Li, Xin

    2011-01-01

    In recent years, new bioinformatics technologies, such as gene expression microarray, genome-wide association study, proteomics, and metabolomics, have been widely used to simultaneously identify a huge number of human genomic/genetic biomarkers, generate a tremendously large amount of data, and dramatically increase the knowledge on human…

  15. Towards Practical Privacy-Preserving Internet Services

    ERIC Educational Resources Information Center

    Wang, Shiyuan

    2012-01-01

    Today's Internet offers people a vast selection of data centric services, such as online query services, the cloud, and location-based services, etc. These internet services bring people a lot of convenience, but at the same time raise privacy concerns, e.g., sensitive information revealed by the queries, sensitive data being stored and…

  16. Randomization Based Privacy Preserving Categorical Data Analysis

    ERIC Educational Resources Information Center

    Guo, Ling

    2010-01-01

    The success of data mining relies on the availability of high quality data. To ensure quality data mining, effective information sharing between organizations becomes a vital requirement in today's society. Since data mining often involves sensitive information of individuals, the public has expressed a deep concern about their privacy.…

  17. Collective Capacity Building of Academic Leaders: A University Model of Leadership and Learning in Context

    ERIC Educational Resources Information Center

    Debowski, Shelda; Blake, Vivienne

    2007-01-01

    Academic leaders face particular challenges when they assume formal leadership roles in higher education. For the most part, they have had little prior engagement with the political, economic and strategic context of their institution and limited leadership networks on which to draw. The University of Western Australia has trialled a number of…

  18. Campus Educational Contexts and Civic Participation: Organizational Links to Collective Action

    ERIC Educational Resources Information Center

    Barnhardt, Cassie L.

    2015-01-01

    Proponents of civic engagement extol the virtues of the college experience for enhancing students' capacities for democratic participation, yet few studies have examined the organizational contexts of such actions. This article applies theory regarding social movements in organizations to highlight the relationship between campus curricular…

  19. Performance of the ERTS data collection system in a total system context

    NASA Technical Reports Server (NTRS)

    Paulson, R. W. (Principal Investigator)

    1973-01-01

    The author has identified the following significant results. Approximately 70 percent of the DCP's being installed by Department of the Interior investigators have been successfully operated. These include DCP's operating in Iceland, Central America, Hawaii, and the Continental United States. The Data Collection System specifications are being met for frequency of data collection.

  20. Introducing the notion of social context of collective trauma to ESTSS

    PubMed Central

    Ajduković, Dean

    2013-01-01

    Living amidst war and mass suffering while grasping the opportunity for professional growth, intertwined into my life perspective. Along the years, ESTSS provided a backdrop for my contacts with mental health colleagues from whom I learned, and among whom many became my friends. These rich experiences guided me towards promoting awareness within ESTSS of the importance of social context in which healing of traumatized populations is expected to progress. Each incident of organized violence leaves behind new scores of traumatized individuals and family members, among whom many will need support that may stretch their resources beyond reasonable limits. We need to acknowledge the hindering effects of living in such a social context and that many people that we meet as professionals may carry the burden of unresolved trauma, which should not go by unattended. PMID:23755326

  1. Collective self-esteem: role of social context among Asian-American college students.

    PubMed

    Kim, Eunha; Lee, Donghyuck

    2011-12-01

    The present study explored several layers of individual and contextual variables as related to collective self-esteem among 304 Asian-American college students. The findings suggested that variables, such as immigration generation status and cultural identification, were significantly associated with Private collective self-esteem (personal evaluation of one's ethnic group), while contextual variables, including number of same-ethnicity peers and community ethnic composition, were associated with Public collective self-esteem (judgment of how other people evaluate one's ethnic group). In addition to these variables, age and fluency of heritage language were positively related to Membership esteem (how worthy one feels as a member of one's ethnic group). For the Importance of identity (the importance of ethnic group membership to one's self-concept), cultural identification, number of same-ethnicity peers, and perceived campus climate were statistically significant. The implication of the present findings for future research is discussed.

  2. Teachers' Collective Efficacy, Job Satisfaction, and Job Stress in Cross-Cultural Context

    ERIC Educational Resources Information Center

    Klassen, Robert M.; Usher, Ellen L.; Bong, Mimi

    2010-01-01

    This study examines how teachers' collective efficacy (TCE), job stress, and the cultural dimension of collectivism are associated with job satisfaction for 500 teachers from Canada, Korea (South Korea or Republic of Korea), and the United States. Multigroup path analysis revealed that TCE predicted job satisfaction across settings. Job stress was…

  3. Preparing Teachers for Diverse Contexts: A Collective Case Study of Critical Reflection

    ERIC Educational Resources Information Center

    Ramirez, Laurie A.

    2009-01-01

    This collective case study focused on 4 novice teachers' reflections on diversity in their classrooms and schools. The 4 participants were followed throughout their final year of an undergraduate, secondary teacher education program and into their 1st year of teaching in public secondary schools. This research was an effort to engage…

  4. Privacy and anonymity challenges when collecting data for public health purposes.

    PubMed

    El Emam, Khaled; Moher, Ester

    2013-03-01

    Two contemporary problems face public health professionals in collecting data from health care providers: the de-identification of geospatial information in a manner that still allows meaningful analysis, and ensuring that provider performance data (e.g., infection or screening rates) is complete and accurate. In this paper, we discuss new methods for de-identifying geographic information that will allow useful de-identified data to be disclosed to public health. In addition, we propose privacy preserving mechanisms that will likely encourage providers to disclose complete and accurate data. However, this must be accompanied by steps to grow trust between the providers and public health.

  5. Emotional reactions to success and failure of collective action as predictors of future action intentions: a longitudinal investigation in the context of student protests in Germany.

    PubMed

    Tausch, Nicole; Becker, Julia C

    2013-09-01

    This research examined how emotional responses to success and failure of collective action relate to willingness to engage in collective action in the future. It was hypothesized that both pride (in relation to a success) and anger (in response to failure) would motivate future collective action. Findings are reported from a two-wave longitudinal study (N= 98) in the context of student protests against tuition fees in Germany, which was conducted before and after collective action had resulted in both a success and a failure. While anger positively predicted action intentions, over and above baseline action intentions, pride exerted a significant indirect effect on action intentions via increased efficacy perceptions, over and above baseline efficacy and action intentions. Politicized identification positively predicted the intensity of both pride and anger and baseline group efficacy positively predicted the intensity of anger. The theoretical and practical implications of these findings are discussed. PMID:22694314

  6. Navigating the Tides of Change: Revisiting the Notion of Reflexivity in the Context of Social Learning for Transboundary Collective Experimentation

    ERIC Educational Resources Information Center

    Bastrup-Birk, Henriette; Wildemeersch, Danny

    2011-01-01

    Social learning theory in the context of multi-actor engagement tends to relate reflexivity primarily to critical questioning of theories-in-use. We argue that viewing suspensive dialogue and imaginative envisioning as additional stages of reflexivity will serve at least three purposes: prevent over-emphasis on instrumental rationality focusing on…

  7. Privacy preserving processing of genomic data: A survey.

    PubMed

    Akgün, Mete; Bayrak, A Osman; Ozer, Bugra; Sağıroğlu, M Şamil

    2015-08-01

    Recently, the rapid advance in genome sequencing technology has led to production of huge amount of sensitive genomic data. However, a serious privacy challenge is confronted with increasing number of genetic tests as genomic data is the ultimate source of identity for humans. Lately, privacy threats and possible solutions regarding the undesired access to genomic data are discussed, however it is challenging to apply proposed solutions to real life problems due to the complex nature of security definitions. In this review, we have categorized pre-existing problems and corresponding solutions in more understandable and convenient way. Additionally, we have also included open privacy problems coming with each genomic data processing procedure. We believe our classification of genome associated privacy problems will pave the way for linking of real-life problems with previously proposed methods.

  8. A Randomized Response Model For Privacy Preserving Smart Metering

    PubMed Central

    Cui, Lijuan; Que, Jialan; Choi, Dae-Hyun; Jiang, Xiaoqian; Cheng, Samuel; Xie, Le

    2012-01-01

    The adoption of smart meters may bring new privacy concerns to the general public. Given the fact that metering data of individual homes/factories is accumulated every 15 minutes, it is possible to infer the pattern of electricity consumption of individual users. In order to protect the privacy of users in a completely de-centralized setting (i.e., individuals do not communicate with one another), we propose a novel protocol, which allows individual meters to report the true electricity consumption reading with a pre-determinted probability. Load serving entities (LSE) can reconstruct the total electricity consumption of a region or a district through inference algorithm, but their ability of identifying individual users’ energy consumption pattern is significantly reduced. Using simulated data, we verify the feasibility of the proposed method and demonstrate performance advantages over existing approaches. PMID:23243488

  9. A Randomized Response Model For Privacy Preserving Smart Metering.

    PubMed

    Wang, Shuang; Cui, Lijuan; Que, Jialan; Choi, Dae-Hyun; Jiang, Xiaoqian; Cheng, Samuel; Xie, Le

    2012-09-01

    The adoption of smart meters may bring new privacy concerns to the general public. Given the fact that metering data of individual homes/factories is accumulated every 15 minutes, it is possible to infer the pattern of electricity consumption of individual users. In order to protect the privacy of users in a completely de-centralized setting (i.e., individuals do not communicate with one another), we propose a novel protocol, which allows individual meters to report the true electricity consumption reading with a pre-determinted probability. Load serving entities (LSE) can reconstruct the total electricity consumption of a region or a district through inference algorithm, but their ability of identifying individual users' energy consumption pattern is significantly reduced. Using simulated data, we verify the feasibility of the proposed method and demonstrate performance advantages over existing approaches.

  10. A Randomized Response Model For Privacy Preserving Smart Metering.

    PubMed

    Wang, Shuang; Cui, Lijuan; Que, Jialan; Choi, Dae-Hyun; Jiang, Xiaoqian; Cheng, Samuel; Xie, Le

    2012-09-01

    The adoption of smart meters may bring new privacy concerns to the general public. Given the fact that metering data of individual homes/factories is accumulated every 15 minutes, it is possible to infer the pattern of electricity consumption of individual users. In order to protect the privacy of users in a completely de-centralized setting (i.e., individuals do not communicate with one another), we propose a novel protocol, which allows individual meters to report the true electricity consumption reading with a pre-determinted probability. Load serving entities (LSE) can reconstruct the total electricity consumption of a region or a district through inference algorithm, but their ability of identifying individual users' energy consumption pattern is significantly reduced. Using simulated data, we verify the feasibility of the proposed method and demonstrate performance advantages over existing approaches. PMID:23243488

  11. Medical records. Enhancing privacy, preserving the common good.

    PubMed

    Etzioni, A

    1999-01-01

    Personal medical information is now bought and sold on the open market. Companies use it to make hiring and firing decisions and to identify customers for new products. The justification for providing such access to medical information is that doing so benefits the public by securing public safety, controlling costs, and supporting medical research. And individuals have supposedly consented to it. But we can achieve the common goods while better protecting privacy by making institutional changes in the way information is maintained and protected. PMID:10321335

  12. Performance-Oriented Privacy-Preserving Data Integration

    SciTech Connect

    Pon, R K; Critchlow, T

    2004-09-15

    Current solutions to integrating private data with public data have provided useful privacy metrics, such as relative information gain, that can be used to evaluate alternative approaches. Unfortunately, they have not addressed critical performance issues, especially when the public database is very large. The use of hashes and noise yields better performance than existing techniques while still making it difficult for unauthorized entities to distinguish which data items truly exist in the private database. As we show here, leveraging the uncertainty introduced by collisions caused by hashing and the injection of noise, we present a technique for performing a relational join operation between a massive public table and a relatively smaller private one.

  13. Facilitating Trust in Privacy-Preserving E-Learning Environments

    ERIC Educational Resources Information Center

    Anwar, M.; Greer, J.

    2012-01-01

    This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants,…

  14. Caliper Context Annotation Library

    SciTech Connect

    2015-09-30

    To understand the performance of parallel programs, developers need to be able to relate performance measurement data with context information, such as the call path / line numbers or iteration numbers where measurements were taken. Caliper provides a generic way to specify and collect multi-dimensional context information across the software stack, and provide ti to third-party measurement tools or write it into a file or database in the form of context streams.

  15. The history of botany in Moscow and Russia in the 18th and early 19th centuries in the context of the Linnaean Collection at Moscow University (MW).

    PubMed

    Sokoloff, Dmitry D; Balandin, Sergey A; Gubanov, Ivan A; Jarvis, Charles E; Majorov, Sergey R; Simonov, Sergey S

    2002-01-01

    The Herbarium of Moscow State University, Russia, possesses a relatively small (63 specimens), but historically interesting, collection of herbarium specimens linked with Carl Linnaeus (1707-1778). Some of these originally formed part of Linnaeus' own herbarium while others, although never his property, were nevertheless studied by him and may be original material for the typification of his plant names. This paper discusses the broad historical background to the gathering of these specimens, their study by Linnaeus and their subsequent fate. Specimens linked with Linnaeus have been encountered in each of the four largest historical collections of the Herbarium of Moscow State University, i. e., in the herbaria of J. F. Ehrhart, G. F. Hoffmann, C. B. von Trinius and C. L. Goldbach. Ehrhart's General Herbarium contains 31 sheets, which were more or less certainly collected or studied by Linnaeus. Ehrhart, a pupil of Linnaeus, received some specimens directly from the latter, while others came to him from Linnaeus filius, A. Dahl, and P. J. Bergius. Ehrhart's collections were purchased by G. F. Hoffmann, later, the first head of the Department of Botany at Moscow University, who took them to Russia. Hoffmann's General Herbarium contains three specimens that may be connected with Linnaeus. They were received from C. P. Thunberg, J. A. Murray, and an unknown person, respectively. At least five specimens from Trinius' collection, although certainly never seen by Linnaeus, are probable duplicates of material that was studied by him. Some of them are almost certainly iso-lectotypes of Linnaean names. Finally, 24 specimens linked with Linnaeus were found in Goldbach's herbarium. The majority of them were collected in the Lower Volga Region by J. Lerche and during the Second Kamchatka Expedition (Great Northern Expedition) by J. G. Gmelin and G. W. Steller.

  16. Collective inquiry in the context of school-wide reform: Exploring science curriculum and instruction through team-based professional development

    NASA Astrophysics Data System (ADS)

    Eddy Spicer, David Henning

    Teacher collaboration and joint reflective inquiry have been viewed as central elements of progressive educational reform for more than two decades. More recently, researchers, policy-makers, and practitioners have heralded "blended" or "hybrid" approaches that combine online and on-site environments for collaborative learning as especially promising for "scaling up" instructional improvement. Yet, relatively little is known about how teachers working together navigate organizational and interpersonal constraints to develop and sustain conditions essential to collective inquiry. This in-depth study of meaning making about curriculum and instruction among a group of 11 physics teachers in a public, urban secondary school in the U.S. is an effort to explore collective inquiry as a resource for teacher learning and innovations in teaching practice. Through extended observations, multiple interviews, and close analyses of interaction, the study followed teachers for 7 months as they worked together across 3 settings organized in fundamentally different ways to promote joint inquiry into teaching practice. The explanatory framework of the study rests on the mutually-reinforcing conceptual underpinnings of sociocultural theory and systemic functional linguistics to establish connections between micro-social interactions and macro-social processes. Drawing on systemic functional linguistics, the study explores interpersonal meaning making through close analyses of speech function and speech role in 6 extended sequences of generative interaction. Concepts from activity theory elucidate those features of settings and school that directly impinged on or advanced teachers' collaborative work. Findings run counter to prevailing congenial views of teacher collegiality by identifying ways in which collective inquiry is inherently unstable. That instability makes itself apparent at two levels: (a) the dynamics of authority within the group, and (b) middle-level features of

  17. The Context of Context Effects.

    ERIC Educational Resources Information Center

    Brennan, Robert L.

    1992-01-01

    A conceptual framework and heuristic model for considering the existence, magnitude, and consequences of context effects are presented through an extension of some generalizability theory concepts. Context effects are often misunderstood, and current measurement models have serious limitations for examining them. Their importance needs to be…

  18. Open Content in Open Context

    ERIC Educational Resources Information Center

    Kansa, Sarah Whitcher; Kansa, Eric C.

    2007-01-01

    This article presents the challenges and rewards of sharing research content through a discussion of Open Context, a new open access data publication system for field sciences and museum collections. Open Context is the first data repository of its kind, allowing self-publication of research data, community commentary through tagging, and clear…

  19. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    PubMed

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-01-01

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300

  20. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    PubMed

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.

  1. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    PubMed

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS. PMID:25298362

  2. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes. PMID:25750176

  3. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system

    NASA Astrophysics Data System (ADS)

    Karabat, Cagatay; Kiraz, Mehmet Sabir; Erdogan, Hakan; Savas, Erkay

    2015-12-01

    In this paper, we introduce a new biometric verification and template protection system which we call THRIVE. The system includes novel enrollment and authentication protocols based on threshold homomorphic encryption where a private key is shared between a user and a verifier. In the THRIVE system, only encrypted binary biometric templates are stored in a database and verification is performed via homomorphically randomized templates, thus, original templates are never revealed during authentication. Due to the underlying threshold homomorphic encryption scheme, a malicious database owner cannot perform full decryption on encrypted templates of the users in the database. In addition, security of the THRIVE system is enhanced using a two-factor authentication scheme involving user's private key and biometric data. Using simulation-based techniques, the proposed system is proven secure in the malicious model. The proposed system is suitable for applications where the user does not want to reveal her biometrics to the verifier in plain form, but needs to prove her identity by using biometrics. The system can be used with any biometric modality where a feature extraction method yields a fixed size binary template and a query template is verified when its Hamming distance to the database template is less than a threshold. The overall connection time for the proposed THRIVE system is estimated to be 336 ms on average for 256-bit biometric templates on a desktop PC running with quad core 3.2 GHz CPUs at 10 Mbit/s up/down link connection speed. Consequently, the proposed system can be efficiently used in real-life applications.

  4. Quantifying the costs and benefits of privacy-preserving health data publishing.

    PubMed

    Khokhar, Rashid Hussain; Chen, Rui; Fung, Benjamin C M; Lui, Siu Man

    2014-08-01

    Cost-benefit analysis is a prerequisite for making good business decisions. In the business environment, companies intend to make profit from maximizing information utility of published data while having an obligation to protect individual privacy. In this paper, we quantify the trade-off between privacy and data utility in health data publishing in terms of monetary value. We propose an analytical cost model that can help health information custodians (HICs) make better decisions about sharing person-specific health data with other parties. We examine relevant cost factors associated with the value of anonymized data and the possible damage cost due to potential privacy breaches. Our model guides an HIC to find the optimal value of publishing health data and could be utilized for both perturbative and non-perturbative anonymization techniques. We show that our approach can identify the optimal value for different privacy models, including K-anonymity, LKC-privacy, and ∊-differential privacy, under various anonymization algorithms and privacy parameters through extensive experiments on real-life data.

  5. Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity

    NASA Astrophysics Data System (ADS)

    Cheon, Jung Hee; Jarecki, Stanislaw; Seo, Jae Hong

    Secure computation of the set intersection functionality allows n parties to find the intersection between their datasets without revealing anything else about them. An efficient protocol for such a task could have multiple potential applications in commerce, health care, and security. However, all currently known secure set intersection protocols for n>2 parties have computational costs that are quadratic in the (maximum) number of entries in the dataset contributed by each party, making secure computation of the set intersection only practical for small datasets. In this paper, we describe the first multi-party protocol for securely computing the set intersection functionality with both the communication and the computation costs that are quasi-linear in the size of the datasets. For a fixed security parameter, our protocols require O(n2k) bits of communication and Õ(n2k) group multiplications per player in the malicious adversary setting, where k is the size of each dataset. Our protocol follows the basic idea of the protocol proposed by Kissner and Song, but we gain efficiency by using different representations of the polynomials associated with users' datasets and careful employment of algorithms that interpolate or evaluate polynomials on multiple points more efficiently. Moreover, the proposed protocol is robust. This means that the protocol outputs the desired result even if some corrupted players leave during the execution of the protocol.

  6. Privacy-preserving screen capture: towards closing the loop for health IT usability.

    PubMed

    Cooley, Joseph; Smith, Sean

    2013-08-01

    As information technology permeates healthcare (particularly provider-facing systems), maximizing system effectiveness requires the ability to document and analyze tricky or troublesome usage scenarios. However, real-world health IT systems are typically replete with privacy-sensitive data regarding patients, diagnoses, clinicians, and EMR user interface details; instrumentation for screen capture (capturing and recording the scenario depicted on the screen) needs to respect these privacy constraints. Furthermore, real-world health IT systems are typically composed of modules from many sources, mission-critical and often closed-source; any instrumentation for screen capture can rely neither on access to structured output nor access to software internals. In this paper, we present a tool to help solve this problem: a system that combines keyboard video mouse (KVM) capture with automatic text redaction (and interactively selectable unredaction) to produce precise technical content that can enrich stakeholder communications and improve end-user influence on system evolution. KVM-based capture makes our system both application-independent and OS-independent because it eliminates software-interface dependencies on capture targets. Using a corpus of EMR screenshots, we present empirical measurements of redaction effectiveness and processing latency to demonstrate system performances. We discuss how these techniques can translate into instrumentation systems that improve real-world health IT deployments. PMID:23770042

  7. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    PubMed Central

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-01-01

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300

  8. Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption

    PubMed Central

    2015-01-01

    Objective Developed sequencing techniques are yielding large-scale genomic data at low cost. A genome-wide association study (GWAS) targeting genetic variations that are significantly associated with a particular disease offers great potential for medical improvement. However, subjects who volunteer their genomic data expose themselves to the risk of privacy invasion; these privacy concerns prevent efficient genomic data sharing. Our goal is to presents a cryptographic solution to this problem. Methods To maintain the privacy of subjects, we propose encryption of all genotype and phenotype data. To allow the cloud to perform meaningful computation in relation to the encrypted data, we use a fully homomorphic encryption scheme. Noting that we can evaluate typical statistics for GWAS from a frequency table, our solution evaluates frequency tables with encrypted genomic and clinical data as input. We propose to use a packing technique for efficient evaluation of these frequency tables. Results Our solution supports evaluation of the D′ measure of linkage disequilibrium, the Hardy-Weinberg Equilibrium, the χ2 test, etc. In this paper, we take χ2 test and linkage disequilibrium as examples and demonstrate how we can conduct these algorithms securely and efficiently in an outsourcing setting. We demonstrate with experimentation that secure outsourcing computation of one χ2 test with 10, 000 subjects requires about 35 ms and evaluation of one linkage disequilibrium with 10, 000 subjects requires about 80 ms. Conclusions With appropriate encoding and packing technique, cryptographic solutions based on fully homomorphic encryption for secure computations of GWAS can be practical. PMID:26732892

  9. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency. PMID:26084587

  10. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.

  11. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    PubMed

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-09-03

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  12. Quantifying the costs and benefits of privacy-preserving health data publishing.

    PubMed

    Khokhar, Rashid Hussain; Chen, Rui; Fung, Benjamin C M; Lui, Siu Man

    2014-08-01

    Cost-benefit analysis is a prerequisite for making good business decisions. In the business environment, companies intend to make profit from maximizing information utility of published data while having an obligation to protect individual privacy. In this paper, we quantify the trade-off between privacy and data utility in health data publishing in terms of monetary value. We propose an analytical cost model that can help health information custodians (HICs) make better decisions about sharing person-specific health data with other parties. We examine relevant cost factors associated with the value of anonymized data and the possible damage cost due to potential privacy breaches. Our model guides an HIC to find the optimal value of publishing health data and could be utilized for both perturbative and non-perturbative anonymization techniques. We show that our approach can identify the optimal value for different privacy models, including K-anonymity, LKC-privacy, and ∊-differential privacy, under various anonymization algorithms and privacy parameters through extensive experiments on real-life data. PMID:24768775

  13. Managing University Research Microdata Collections

    ERIC Educational Resources Information Center

    Woolfrey, Lynn; Fry, Jane

    2015-01-01

    This article examines the management of microdata collections in a university context. It is a cross-country analysis: Collection management at data services in Canada and South Africa are considered. The case studies are of two university sub-contexts: One collection is located in a library; the other at a Faculty-based Data Service. Stages in…

  14. Context and Pavlovian conditioning.

    PubMed

    Landeira-Fernandez, J

    1996-02-01

    Procedurally, learning has to occur in a context. Several lines of evidence suggest that contextual stimuli actively affect learning and expression of the conditional response. The experimental context can become associated with the unconditional stimulus (US), especially when the US is presented in a context in the absence of a discrete conditional stimulus (CS). Moreover, context can modulate CS-US associations. Finally, it appears that context can become associated with the CS when it is presented before the CS-US training. The purpose of the present paper is to review some of the relevant literature that considers the context as an important feature of Pavlovian conditioning and to discuss some of the main learning theories that incorporate the context into their theoretical framework. The paper starts by mentioning historical positions that considered context an important variable in conditioning and then describes how the approach to contextual conditioning changed with the modern study of Pavlovian conditioning. Various forms of measurement of context conditioning are presented and the associative strength attached to context in several experimental paradigms is examined. The possible functions that context may acquire during conditioning are pointed out and related to major learning theories. Moreover, the effect of certain neurological manipulations on context conditioning is presented and these results are discussed in terms of possible functions that the context might acquire during Pavlovian conditioning. It is concluded that contextual stimuli acquire different functions during normal conditioning. A procedure in which animals are exposed to an aversive US immediately after they are placed in the experimental context is suggested as a useful control for the study of context conditioning.

  15. Imagining Another Context during Encoding Offsets Context-Dependent Forgetting

    ERIC Educational Resources Information Center

    Masicampo, E. J.; Sahakyan, Lili

    2014-01-01

    We tested whether imagining another context during encoding would offset context-dependent forgetting. All participants studied a list of words in Context A. Participants who remained in Context A during the test recalled more than participants who were tested in another context (Context B), demonstrating the standard context-dependent forgetting…

  16. Collection Development.

    ERIC Educational Resources Information Center

    School Libraries in Canada, 2002

    2002-01-01

    Includes 21 articles that discuss collection development in Canadian school libraries. Topics include digital collections in school library media centers; print and electronic library resources; library collections; collaborative projects; print-disabled students; informing administrators of the importance of collection development; censorship;…

  17. Privacy-Preserving Discovery of Topic-Based Events from Social Sensor Signals: An Experimental Study on Twitter

    PubMed Central

    Nguyen, Duc T.; Jung, Jai E.

    2014-01-01

    Social network services (e.g., Twitter and Facebook) can be regarded as social sensors which can capture a number of events in the society. Particularly, in terms of time and space, various smart devices have improved the accessibility to the social network services. In this paper, we present a social software platform to detect a number of meaningful events from information diffusion patterns on such social network services. The most important feature is to process the social sensor signal for understanding social events and to support users to share relevant information along the social links. The platform has been applied to fetch and cluster tweets from Twitter into relevant categories to reveal hot topics. PMID:24955388

  18. Possibilistic context identification for SAS imagery

    NASA Astrophysics Data System (ADS)

    Du, Xiaoxiao; Zare, Alina; Cobb, J. T.

    2015-05-01

    This paper proposes a possibilistic context identification approach for synthetic aperture sonar (SAS) imagery. SAS seabed imagery can display a variety of textures that can be used to identify seabed types such as sea grass, sand ripple and hard-packed sand, etc. Target objects in SAS imagery often have varying characteristics and features due to changing environmental context. Therefore, methods that can identify the seabed environment can be used to assist in target classification and detection in an environmentally adaptive or context-dependent approach. In this paper, a possibilistic context identification approach is used to identify the seabed contexts. Alternative methods, such as crisp, fuzzy or probabilistic methods, would force one type of context on every sample in the imagery, ignoring the possibility that the test imagery may include an environmental context that has not yet appeared in the training process. The proposed possibilistic approach has an advantage in that it can both identify known contexts as well as identify when an unknown context has been encountered. Experiments are conducted on a collection of SAS imagery that display a variety of environmental features.

  19. Context: a central concept.

    PubMed

    Fantino, E

    2001-05-01

    Seminal research in several areas has underscored the central role played by context in the control of behavior. Landmark studies in classical conditioning (with both conditioned suppression and autoshaping procedures) and in conditioned reinforcement (using the observing paradigm) are reviewed. The role of context also proved central in the study of choice (including the matching law and delay-reduction theory). This latter work contributed to the development of experimental analogs to foraging behavior. Research on foraging has also highlighted the importance of context and has led to some counterintuitive predictions that are mediated by context.

  20. Collective neutrino oscillations in supernovae

    SciTech Connect

    Duan, Huaiyu

    2014-06-24

    In a dense neutrino medium neutrinos can experience collective flavor transformation through the neutrino-neutrino forward scattering. In this talk we present some basic features of collective neutrino flavor transformation in the context in core-collapse supernovae. We also give some qualitative arguments for why and when this interesting phenomenon may occur and how it may affect supernova nucleosynthesis.

  1. Developing Collections to Empower Learners

    ERIC Educational Resources Information Center

    Kimmel, Sue C.

    2014-01-01

    "Developing Collections to Empower Learners" examines collection development in the context of today's shifts toward digital resources while emphasizing the foundational beliefs of the school library profession. Writer Sue Kimmel includes practical advice about needs assessment, planning, selection, acquisitions, evaluation, and…

  2. User Situational Context: An Essential Challenge to Context Awareness

    ERIC Educational Resources Information Center

    Mowafi, Yaser Abdallah

    2009-01-01

    Existing research on context and context awareness has broadly focused on the technical aspects of context acquisition and interpretation of users' surroundings, also called physical or sensor-based context. Such an approach has lacked from reconciling the perception of real-world context exhibited by humans, also known as user context, and…

  3. Nanotechnology and Social Context

    ERIC Educational Resources Information Center

    Sandler, Ronald

    2007-01-01

    The central claims defended in this article are the following: (a) The social and ethical challenges of nanotechnology can be fully identified only if both the characteristic features of nanotechnologies and the social contexts into which they are emerging are considered. (b) When this is done, a host of significant social context issues, or…

  4. Contexts as Shared Commitments.

    PubMed

    García-Carpintero, Manuel

    2015-01-01

    Contemporary semantics assumes two influential notions of context: one coming from Kaplan (1989), on which contexts are sets of predetermined parameters, and another originating in Stalnaker (1978), on which contexts are sets of propositions that are "common ground." The latter is deservedly more popular, given its flexibility in accounting for context-dependent aspects of language beyond manifest indexicals, such as epistemic modals, predicates of taste, and so on and so forth; in fact, properly dealing with demonstratives (perhaps ultimately all indexicals) requires that further flexibility. Even if we acknowledge Lewis (1980)'s point that, in a sense, Kaplanian contexts already include common ground contexts, it is better to be clear and explicit about what contexts constitutively are. Now, Stalnaker (1978, 2002, 2014) defines context-as-common-ground as a set of propositions, but recent work shows that this is not an accurate conception. The paper explains why, and provides an alternative. The main reason is that several phenomena (presuppositional treatments of pejoratives and predicates of taste, forces other than assertion) require that the common ground includes non-doxastic attitudes such as appraisals, emotions, etc. Hence the common ground should not be taken to include merely contents (propositions), but those together with attitudes concerning them: shared commitments, as I will defend.

  5. Incest in Context.

    ERIC Educational Resources Information Center

    Taubman, Stan

    1984-01-01

    Presents a comprehensive view of the societal, cultural, familial, and personality factors that form the context of people at risk for incest and associated problems. Summarizes the consequences and the causal context of incest and describes an ecosystems approach to intervention. (Author/LLL)

  6. Contexts as Shared Commitments

    PubMed Central

    García-Carpintero, Manuel

    2015-01-01

    Contemporary semantics assumes two influential notions of context: one coming from Kaplan (1989), on which contexts are sets of predetermined parameters, and another originating in Stalnaker (1978), on which contexts are sets of propositions that are “common ground.” The latter is deservedly more popular, given its flexibility in accounting for context-dependent aspects of language beyond manifest indexicals, such as epistemic modals, predicates of taste, and so on and so forth; in fact, properly dealing with demonstratives (perhaps ultimately all indexicals) requires that further flexibility. Even if we acknowledge Lewis (1980)'s point that, in a sense, Kaplanian contexts already include common ground contexts, it is better to be clear and explicit about what contexts constitutively are. Now, Stalnaker (1978, 2002, 2014) defines context-as-common-ground as a set of propositions, but recent work shows that this is not an accurate conception. The paper explains why, and provides an alternative. The main reason is that several phenomena (presuppositional treatments of pejoratives and predicates of taste, forces other than assertion) require that the common ground includes non-doxastic attitudes such as appraisals, emotions, etc. Hence the common ground should not be taken to include merely contents (propositions), but those together with attitudes concerning them: shared commitments, as I will defend. PMID:26733087

  7. Quantificational logic of context

    SciTech Connect

    Buvac, Sasa

    1996-12-31

    In this paper we extend the Propositional Logic of Context, to the quantificational (predicate calculus) case. This extension is important in the declarative representation of knowledge for two reasons. Firstly, since contexts are objects in the semantics which can be denoted by terms in the language and which can be quantified over, the extension enables us to express arbitrary first-order properties of contexts. Secondly, since the extended language is no longer only propositional, we can express that an arbitrary predicate calculus formula is true in a context. The paper describes the syntax and the semantics of a quantificational language of context, gives a Hilbert style formal system, and outlines a proof of the system`s completeness.

  8. Collecting apparatus

    DOEpatents

    Duncan, Charles P.

    1983-01-01

    An improved collecting apparatus for small aquatic or airborne organisms such as plankton, larval fish, insects, etc. The improvement constitutes an apertured removal container within which is retained a collecting bag, and which is secured at the apex of a conical collecting net. Such collectors are towed behind a vessel or vehicle with the open end of the conical net facing forward for trapping the aquatic or airborne organisms within the collecting bag, while allowing the water or air to pass through the apertures in the container. The container is readily removable from the collecting net whereby the collecting bag can be quickly removed and replaced for further sample collection. The collecting bag is provided with means for preventing the bag from being pulled into the container by the water or air flowing therethrough.

  9. Memories in context.

    PubMed

    Pomi Brea, A; Mizraji, E

    1999-06-01

    Context-dependent associative memories are models that allow the retrieval of different vectorial responses given a same vectorial stimulus, depending on the context presented to the memory. The contextualization is obtained by doing the Kronecker product between two vectorial entries to the associative memory: the key stimulus and the context. These memories are able to display a wide variety of behaviors that range from all the basic operations of the logical calculus (including fuzzy logics) to the selective extraction of features from complex vectorial patterns. In the present contribution, we show that a context-dependent memory matrix stores a large amount of possible virtual associative memories, that awaken in the presence of a context. We show how the vectorial context allows a memory matrix to be representable in terms of its singular-value decomposition. We describe a neural interpretation of the model in which the Kronecker product is performed on the same neurons that sustain the memory. We explored, with numerical experiments, the reliability of chains of contextualized associations. In some cases, random disconnection produces the emergence of oscillatory behaviors of the system. Our results show that associative chains retain their performances for relatively large dimensions. Finally, we analyze the properties of some modules of context-dependent autoassociative memories inserted in recursive nets: the perceptual autoorganization in the presence of ambiguous inputs (e.g. the disambiguation of the Necker's cube figure), the construction of intersection filters, and the feature extraction capabilities.

  10. Measuring School Contexts

    PubMed Central

    Muller, Chandra L.

    2016-01-01

    This article describes issues in measuring school contexts with an eye toward understanding students’ experiences and outcomes. I begin with an overview of the conceptual underpinnings related to measuring contexts, briefly describe the initiatives at the National Center for Education Statistics to measure school contexts, and identify possible gaps in those initiatives that if filled could provide valuable new data for researchers. Next, I discuss new approaches and opportunities for measurement, and special considerations related to diverse populations and youth development. I conclude with recommendations for future priorities. PMID:27158640

  11. Collection Mapping and Collection Development.

    ERIC Educational Resources Information Center

    Murray, William; And Others

    1985-01-01

    Describes the use of collection mapping to assess media collections of Aurora, Colorado, Public Schools. Case studies of elementary, middle, and high school media centers describe materials selection and weeding and identify philosophies that library collections should support school curriculum, and teacher-library media specialist cooperation in…

  12. Putting concepts into context.

    PubMed

    Yee, Eiling; Thompson-Schill, Sharon L

    2016-08-01

    At first glance, conceptual representations (e.g., our internal notion of the object "lemon") seem static; we have the impression that there is something that the concept lemon "means" (a sour, yellow, football-shaped citrus fruit) and that this meaning does not vary. Research in semantic memory has traditionally taken this "static" perspective. Consequently, only effects demonstrated across a variety of contexts have typically been considered informative regarding the architecture of the semantic system. In this review, we take the opposite approach: We review instances of context-dependent conceptual activation at many different timescales-from long-term experience, to recent experience, to the current task goals, to the unfolding process of conceptual activation itself-and suggest that the pervasive effects of context across all of these timescales indicate that rather than being static, conceptual representations are constantly changing and are inextricably linked to their contexts. PMID:27282993

  13. Meanings of Reconciliation in the School Context

    ERIC Educational Resources Information Center

    Burridge, Nina

    2006-01-01

    This paper draws on findings from a major research project conducted between 1998 and 2000 on meanings of reconciliation in the school education sector. Using data collected from surveys and drawing from the community context in which schools exist, it explores and analyses meanings of reconciliation within school communities when the discourse of…

  14. English in the Ecuadorian Commercial Context.

    ERIC Educational Resources Information Center

    Alm, Cecilia Ovesdotter

    2003-01-01

    Presents a study completed in Quito, Ecuador that investigates the attitudinal perceptions toward English in advertising in the Ecuadorian commercial context. Findings are the result of four data collection procedures; a questionnaire administered to advertising experts, an analysis of business names in ten shopping centers, an analysis of…

  15. Loneliness in Chinese Children across Contexts

    ERIC Educational Resources Information Center

    Chen, Xinyin; Wang, Li; Li, Dan; Liu, Junsheng

    2014-01-01

    This study examined loneliness and its associations with social functioning in children across different historical times and contexts in China. We collected data from urban and rural groups of school-age children (N = 2,588; M age = 10 years) using self-reports and peer assessments. The results indicated that children in 2002 and 2005 urban…

  16. Context-preserving, dynamic word cloud visualization.

    PubMed

    Weiwei Cui; Yingcai Wu; Shixia Liu; Furu Wei; Zhou, Michelle X; Huamin Qu

    2010-01-01

    The proposed method uses context-preserving, dynamic word clouds to illustrate content evolution. It generates a sequence of word clouds in which related words are grouped together. This sequence is then coupled with a trend chart that summarizes content changes so that users can better explore large collections of documents.

  17. Beauty in the Context of Particular Lives

    ERIC Educational Resources Information Center

    Rautio, Pauliina

    2010-01-01

    This paper is based on empirical research by the author into the everyday lives of people living in a small village. Everyday life is approached as a subjective process in time and space, experienced by particular people in a particular environmental and social context. The data of this research has been collected through correspondence in which…

  18. A Context Vector Model for Information Retrieval.

    ERIC Educational Resources Information Center

    Billhardt, Holger; Borrajo, Daniel; Maojo, Victor

    2002-01-01

    Presents an indexing and information retrieval method that, based on the vector space model, incorporates term dependencies and thus obtains semantically richer representations of documents. Highlights include term context vectors; techniques for estimating the dependencies among terms; term weights; experimental results on four text collections;…

  19. Context based semantics for multimodal retrieval

    NASA Astrophysics Data System (ADS)

    Dumitrescu, Alexandra; Santini, Simone

    2009-01-01

    This paper proposes an alternative to formal annotation for the representation of semantics, and presents an extension to it capable of handling multimedia (text and images) documents. The article argues that meaning is not a property of a document, but an outcome of a contextualized and situated process of interpretation. The consequence of this position is that one should not quite try to represent the meaning of a document (the way formal annotation does), but the context of the activity of which search is part. We present some general considerations on the representation and use of the context, and a simple example of a technique to encode the context represented by the documents collected in the computer in which one is working, and to use them to direct search. We show preliminary results showing that even this rather simpleminded context representation can lead to considerable improvements with respect to commercial search engines both for text and images.

  20. Collecting Rocks.

    ERIC Educational Resources Information Center

    Barker, Rachel M.

    One of a series of general interest publications on science topics, the booklet provides those interested in rock collecting with a nontechnical introduction to the subject. Following a section examining the nature and formation of igneous, sedimentary, and metamorphic rocks, the booklet gives suggestions for starting a rock collection and using…

  1. Collective Enumeration

    ERIC Educational Resources Information Center

    Bahrami, Bahador; Didino, Daniele; Frith, Chris; Butterworth, Brian; Rees, Geraint

    2013-01-01

    Many joint decisions in everyday life (e.g., Which bar is less crowded?) depend on approximate enumeration, but very little is known about the psychological characteristics of counting together. Here we systematically investigated collective approximate enumeration. Pairs of participants made individual and collective enumeration judgments in a…

  2. Jay's Collectibles

    ERIC Educational Resources Information Center

    Cappel, James J.; Gillman, Jason R., Jr.

    2011-01-01

    There is growing interest in collectibles of many types, as indicated by the popularity of television programs such as the History Channel's "Pawn Stars" and "American Pickers" and the Public Broadcasting Service's "Antiques Road Show." The availability of online auction sites such as eBay has enabled many people to collect items of interest as a…

  3. Context-dependent generalization

    PubMed Central

    Taylor, Jordan A.; Ivry, Richard B.

    2013-01-01

    The pattern of generalization following motor learning can provide a probe on the neural mechanisms underlying learning. For example, the breadth of generalization to untrained regions of space after visuomotor adaptation to targets in a restricted region of space has been attributed to the directional tuning properties of neurons in the motor system. Building on this idea, the effect of different types of perturbations on generalization (e.g., rotation vs. visual translation) have been attributed to the selection of differentially tuned populations. Overlooked in this discussion is consideration of how the context of the training environment may constrain generalization. Here, we explore the role of context by having participants learn a visuomotor rotation or a translational shift in two different contexts, one in which the array of targets were presented in a circular arrangement and the other in which they were presented in a rectilinear arrangement. The perturbation and environments were either consistent (e.g., rotation with circular arrangement) or inconsistent (e.g., rotation with rectilinear arrangement). The pattern of generalization across the workspace was much more dependent on the context of the environment than on the perturbation, with broad generalization for the rectilinear arrangement for both types of perturbations. Moreover, the generalization pattern for this context was evident, even when the perturbation was introduced in a gradual manner, precluding the use of an explicit strategy. We describe how current models of generalization might be modified to incorporate these results, building on the idea that context provides a strong bias for how the motor system infers the nature of the visuomotor perturbation and, in turn, how this information influences the pattern of generalization. PMID:23653603

  4. Culture collections.

    PubMed

    Smith, David

    2012-01-01

    Culture collections no matter their size, form, or institutional objectives play a role in underpinning microbiology, supplying the resources for study, innovation, and discovery. Their basic roles include providing a mechanism for ex situ conservation of organisms; they are repositories for strains subject to publication, taking in safe, confidential, and patent deposits from researchers. They supply strains for use; therefore, the microorganisms provided must be authentic and preserved well, and any associated information must be valid and sufficient to facilitate the confirmation of their identity and to facilitate their use. The organisms must be collected in compliance with international conventions, international and national legislation and distributed to users indicating clearly the terms and conditions under which they are received and can be used. Collections are harmonizing approaches and characterizing strains to meet user needs. No one single collection can carry out this task alone, and therefore, it is important that output and strategy are coordinated to ensure culture collections deliver the basic resources and services microbiological innovation requires. This chapter describes the types of collection and how they can implement quality management systems and operate to deliver their basic functions. The links to information sources given not only provide support for the practitioners within collections but also provide guidance to users on accessing the huge resource available and how they can help ensure microbiology has the resources and a solid platform for future development.

  5. Micrometeorite Collecting

    ERIC Educational Resources Information Center

    Toubes, Joe; Hoff, Darrel

    1974-01-01

    Describes how to collect micrometeorites and suggests a number of related activities such as determining the number of meteors entering the atmosphere and determining the composition of the micrometeorites. (BR)

  6. Technology in Context

    ERIC Educational Resources Information Center

    Jeans, Nick; Manches, Andrew; Stokes, Eleanor; Balmer, Kim

    2011-01-01

    People frequently hear competing media and research claims about the educational value of new technologies. But too often it is not clear how, if at all, these technologies are supporting learning. And there is not enough attention paid to the challenges of trying to introduce these technologies successfully into an educational context. To what…

  7. Community Contexts for Mentoring

    ERIC Educational Resources Information Center

    Hamilton, Stephen F.; Hamilton, Mary Agnes; Hirsch, Barton J.; Hughes, Jan; King, Jacqueline; Maton, Kenneth

    2006-01-01

    Mentoring programs attempt to foster a relationship that is too often missing from the lives of disadvantaged children and youth. However, in view of both the power and the limitations of mentoring programs, it is important to understand how mentoring occurs naturally. Assuming an ecological perspective, we examine mentoring in four contexts:…

  8. Rural as Context.

    ERIC Educational Resources Information Center

    Howley, Craig B.; Howley, Aimee A.

    This essay explains two ways in which "the rural" serves as context. The common way interprets the rural lifeworld as an impediment to certain projects and goals, thus framing "the rural" as a subjugated and diminished reality. The other way is called "the rural circumstance" in order to situate the rural lifeworld as a center of attention, not as…

  9. Context, Learning, and Extinction

    ERIC Educational Resources Information Center

    Gershman, Samuel J.; Blei, David M.; Niv, Yael

    2010-01-01

    A. Redish et al. (2007) proposed a reinforcement learning model of context-dependent learning and extinction in conditioning experiments, using the idea of "state classification" to categorize new observations into states. In the current article, the authors propose an interpretation of this idea in terms of normative statistical inference. They…

  10. From Context to Core

    ERIC Educational Resources Information Center

    Campus Technology, 2008

    2008-01-01

    At Campus Technology 2008, Arizona State University Technology Officer Adrian Sannier mesmerized audiences with his mandate to become more efficient by doing only the "core" tech stuff--and getting someone else to slog through the context. This article presents an excerpt from Sannier's hour-long keynote address at Campus Technology '08. Sannier…

  11. Generation and Context Memory

    ERIC Educational Resources Information Center

    Mulligan, Neil W.; Lozito, Jeffrey P.; Rosner, Zachary A.

    2006-01-01

    Generation enhances memory for occurrence but may not enhance other aspects of memory. The present study further delineates the negative generation effect in context memory reported in N. W. Mulligan (2004). First, the negative generation effect occurred for perceptual attributes of the target item (its color and font) but not for extratarget…

  12. Putting tumours in context

    SciTech Connect

    Bissell, Mina J.; Radisky, Derek

    2001-10-01

    The interactions between cancer cells and their micro- and macroenvironment create a context that promotes tumor growth and protects it from immune attack. The functional association of cancer cells with their surrounding tissues forms a new 'organ' that changes as malignancy progresses. Investigation of this process might provide new insights into the mechanisms of tumorigenesis and could also lead to new therapeutic targets. Under normal conditions, ORGANS are made up of TISSUES that exchange information with other cell types via cell-cell contact, cytokines and the EXTRACELLULAR MATRIX (ECM). The ECM, which is produced by collaboration between STROMAL fibroblasts and EPITHELIAL cells, provides structural scaffolding for cells, as well as contextual information. The endothelial vasculature provides nutrients and oxygen, and cells of the immune system combat pathogens and remove apoptotic cells. Epithelial cells associate into intact, polarized sheets. These tissues communicate through a complex network of interactions: physically, through direct contact or through the intervening ECM, and biochemically, through both soluble and insoluble signalling molecules. In combination, these interactions provide the information that is necessary to maintain cellular differentiation and to create complex tissue structures. Occasionally, the intercellular signals that define the normal context become disrupted. Alterations in epithelial tissues can lead to movement of epithelial sheets and proliferation - for example, after activation of mesenchymal fibroblasts due to wounding.Normally, these conditions are temporary and reversible, but when inflammation is sustained, an escalating feedback loop ensues.Under persistent inflammatory conditions, continual upregulation of enzymes such as matrix metalloproteinases (MMPs) by stromal fibroblasts can disrupt the ECM, and invading immune cells can overproduce factors that promote abnormal proliferation. As this process progresses

  13. The Cultural Context of Learning in International Joint Ventures.

    ERIC Educational Resources Information Center

    Liu, Shimin; Vince, Russ

    1999-01-01

    A study of Chinese-Western joint business ventures showed that cultural context and different modes of managing and organizing must be considered. Successful joint ventures involve a process of collective, two-way learning. (SK)

  14. Blood Collection

    NASA Technical Reports Server (NTRS)

    1999-01-01

    The method that is used for the collection, storage and real-time analysis of blood and other bodily fluids has been licensed to DBCD, Inc. by NASA. The result of this patent licensing agreement has been the development of a commercial product that can provide serum or plasma from whole blood volumes of 20 microliters to 4 milliliters. The device has a fibrous filter with a pore size of less than about 3 microns, and is coated with a mixture of mannitol and plasma fraction protein. The coating causes the cellular fraction to be trapped by the small pores, leaving the cellular fraction intact on the fibrous filter while the acellular fraction passes through the filter for collection in unaltered form from the serum sample collection chamber. The method used by this product is useful to NASA for blood analysis on manned space missions.

  15. Context based gait recognition

    NASA Astrophysics Data System (ADS)

    Bazazian, Shermin; Gavrilova, Marina

    2012-06-01

    Gait recognition has recently become a popular topic in the field of biometrics. However, the main hurdle is the insufficient recognition rate in the presence of low quality samples. The main focus of this paper is to investigate how the performance of a gait recognition system can be improved using additional information about behavioral patterns of users and the context in which samples have been taken. The obtained results show combining the context information with biometric data improves the performance of the system at a very low cost. The amount of improvement depends on the distinctiveness of the behavioral patterns and the quality of the gait samples. Using the appropriate distinctive behavioral models it is possible to achieve a 100% recognition rate.

  16. Image Acquisition Context

    PubMed Central

    Bidgood, W. Dean; Bray, Bruce; Brown, Nicolas; Mori, Angelo Rossi; Spackman, Kent A.; Golichowski, Alan; Jones, Robert H.; Korman, Louis; Dove, Brent; Hildebrand, Lloyd; Berg, Michael

    1999-01-01

    Objective: To support clinically relevant indexing of biomedical images and image-related information based on the attributes of image acquisition procedures and the judgments (observations) expressed by observers in the process of image interpretation. Design: The authors introduce the notion of “image acquisition context,” the set of attributes that describe image acquisition procedures, and present a standards-based strategy for utilizing the attributes of image acquisition context as indexing and retrieval keys for digital image libraries. Methods: The authors' indexing strategy is based on an interdependent message/terminology architecture that combines the Digital Imaging and Communication in Medicine (DICOM) standard, the SNOMED (Systematized Nomenclature of Human and Veterinary Medicine) vocabulary, and the SNOMED DICOM microglossary. The SNOMED DICOM microglossary provides context-dependent mapping of terminology to DICOM data elements. Results: The capability of embedding standard coded descriptors in DICOM image headers and image-interpretation reports improves the potential for selective retrieval of image-related information. This favorably affects information management in digital libraries. PMID:9925229

  17. User Experience Evaluation in the Mobile Context

    NASA Astrophysics Data System (ADS)

    Obrist, Marianna; Meschtscherjakov, Alexander; Tscheligi, Manfred

    Multimedia services on mobile devices are becoming increasingly popular. Whereas the mobile phone is the most likely platform for mobile TV, PDAs, portable game consoles, and music players are attractive alternatives. Mobile TV consumption on mobile phones allows new kinds of user experiences, but it also puts designers and researchers in front of new challenges. On the one hand, designers have to take these novel experience potentials into account. On the other hand, the right methods to collect user feedback to further improve services for the mobile context have to be applied. In this chapter the importance of user experience research for mobile TV within the mobile context is highlighted. We present how different experience levels can be evaluated taking different mobile context categories into account. In particular, we discuss the Experience Sampling Method (ESM), which seems to be a fruitful approach for investigating user TV experiences.

  18. Collecting Artifacts

    ERIC Educational Resources Information Center

    Coffey, Natalie

    2004-01-01

    Fresh out of college, the author had only a handful of items worthy of displaying, which included some fossils she had collected in her paleontology class. She had binders filled with great science information, but kids want to see "real" science, not paper science. Then it came to her: she could fill the shelves with science artifacts with the…

  19. Wastewater Collection.

    ERIC Educational Resources Information Center

    Chatterjee, Samar; And Others

    1978-01-01

    Presents a literature review of wastewater collection systems and components. This review covers: (1) planning, (2) construction; (3) sewer system evaluation; (4) maintenance; (5) rehabilitation; (6) overview prevention; and (7) wastewater pumping. A list of 111 references is also presented. (HM)

  20. Collection Security.

    ERIC Educational Resources Information Center

    Boss, Richard W.

    1984-01-01

    Presents a systematic approach to the problem of security of library collections and facilities from theft and vandalism. Highlights include responses to losses, defining security needs, typical weaknesses of facilities, policies and procedures that weaken a library's security, conducting a security audit, cost of security, cost-effectiveness, and…

  1. Collective instabilities

    SciTech Connect

    K.Y. Ng

    2003-08-25

    The lecture covers mainly Sections 2.VIII and 3.VII of the book ''Accelerator Physics'' by S.Y. Lee, plus mode-coupling instabilities and chromaticity-driven head-tail instability. Besides giving more detailed derivation of many equations, simple interpretations of many collective instabilities are included with the intention that the phenomena can be understood more easily without going into too much mathematics. The notations of Lee's book as well as the e{sup jwt} convention are followed.

  2. Context-dependent hierarchies in pigeons.

    PubMed

    Nagy, Máté; Vásárhelyi, Gábor; Pettit, Benjamin; Roberts-Mariani, Isabella; Vicsek, Tamás; Biro, Dora

    2013-08-01

    Hierarchical organization is widespread in the societies of humans and other animals, both in social structure and in decision-making contexts. In the case of collective motion, the majority of case studies report that dominant individuals lead group movements, in agreement with the common conflation of the terms "dominance" and "leadership." From a theoretical perspective, if social relationships influence interactions during collective motion, then social structure could also affect leadership in large, swarm-like groups, such as fish shoals and bird flocks. Here we use computer-vision-based methods and miniature GPS tracking to study, respectively, social dominance and in-flight leader-follower relations in pigeons. In both types of behavior we find hierarchically structured networks of directed interactions. However, instead of being conflated, dominance and leadership hierarchies are completely independent of each other. Although dominance is an important aspect of variation among pigeons, correlated with aggression and access to food, our results imply that the stable leadership hierarchies in the air must be based on a different set of individual competences. In addition to confirming the existence of independent and context-specific hierarchies in pigeons, we succeed in setting out a robust, scalable method for the automated analysis of dominance relationships, and thus of social structure, applicable to many species. Our results, as well as our methods, will help to incorporate the broader context of animal social organization into the study of collective behavior. PMID:23878247

  3. TGFβ signalling in context

    PubMed Central

    Massagué, Joan

    2014-01-01

    The basic elements of the transforming growth factor-β (TGFβ) pathway were revealed more than a decade ago. Since then, the concept of how the TGFβ signal travels from the membrane to the nucleus has been enriched with additional findings, and its multifunctional nature and medical relevance have relentlessly come to light. However, an old mystery has endured: how does the context determine the cellular response to TGFβ? Solving this question is key to understanding TGFβ biology and its many malfunctions. Recent progress is pointing at answers. PMID:22992590

  4. Mindfulness in cultural context.

    PubMed

    Kirmayer, Laurence J

    2015-08-01

    Mindfulness meditation and other techniques drawn from Buddhism have increasingly been integrated into forms of psychotherapeutic intervention. In much of this work, mindfulness is understood as a mode of awareness that is present-centered and nonevaluative. This form of awareness is assumed to have intrinsic value in promoting positive mental health and adaptation by interrupting discursive thoughts that give rise to suffering. However, in the societies where it originated, mindfulness meditation is part of a larger system of Buddhist belief and practice with strong ethical and moral dimensions. Extracting techniques like mindfulness meditation from the social contexts in which they originate may change the nature and effects of the practice. The papers in this issue of Transcultural Psychiatry explore the implications of a cultural and contextual view of mindfulness for continued dialogue between Buddhist thought and psychiatry. This introductory essay considers the meanings of mindfulness meditation in cultural context and the uses of mindfulness as a therapeutic intervention in contemporary psychiatry and psychology.

  5. Mindfulness in cultural context.

    PubMed

    Kirmayer, Laurence J

    2015-08-01

    Mindfulness meditation and other techniques drawn from Buddhism have increasingly been integrated into forms of psychotherapeutic intervention. In much of this work, mindfulness is understood as a mode of awareness that is present-centered and nonevaluative. This form of awareness is assumed to have intrinsic value in promoting positive mental health and adaptation by interrupting discursive thoughts that give rise to suffering. However, in the societies where it originated, mindfulness meditation is part of a larger system of Buddhist belief and practice with strong ethical and moral dimensions. Extracting techniques like mindfulness meditation from the social contexts in which they originate may change the nature and effects of the practice. The papers in this issue of Transcultural Psychiatry explore the implications of a cultural and contextual view of mindfulness for continued dialogue between Buddhist thought and psychiatry. This introductory essay considers the meanings of mindfulness meditation in cultural context and the uses of mindfulness as a therapeutic intervention in contemporary psychiatry and psychology. PMID:26264787

  6. The HFEA in context.

    PubMed

    Franklin, Sarah

    2013-04-01

    While the regulatory role of the HFEA, its independence and its shortcomings are debated in the context of a fiscal economic crisis, the larger sociological importance of the Authority may be overlooked. Harder to calculate than its annual budget and more elusive than its technical remit as a licensing body, the cultural value of the HFEA as a historical and symbolic entity that was born out of a pioneering debate unique to the UK must be included in a discussion of its future role. Against its perceived shortcomings as an expensive and outdated quango is the importance of the Authority as a public instrument for enhancing the future of translational bioscience. From this point of view, the HFEA is crucial not only to ensuring the successful realization of a domestic bioscience agenda but also to protecting the international reputation of UK Plc as a best-practice model of publicly supported bioinnovation.

  7. Correlation, coherence and context

    NASA Astrophysics Data System (ADS)

    Eberly, J. H.

    2016-08-01

    The modern theory of coherence is based on correlation functions. A generic example could be written < {{V}\\ast}≤ft({{t}1}\\right)V≤ft({{t}2}\\right)> , denoting an average of products of the values of a signal V(t) at two specified times. Here we infer that t is a degree of freedom that the signal depends on. Typically, physical variables depend on more than one degree of freedom, and recognition of this has prompted attention to some interesting questions for the correlation functions and the several coherences that can be attributed to the same optical field. We examine some of the questions arising from the standpoint of experimental contexts. Degree of polarizability and degree of entanglement (classical non-separability) can serve as starting points for quantitative assignments.

  8. The HFEA in context.

    PubMed

    Franklin, Sarah

    2013-04-01

    While the regulatory role of the HFEA, its independence and its shortcomings are debated in the context of a fiscal economic crisis, the larger sociological importance of the Authority may be overlooked. Harder to calculate than its annual budget and more elusive than its technical remit as a licensing body, the cultural value of the HFEA as a historical and symbolic entity that was born out of a pioneering debate unique to the UK must be included in a discussion of its future role. Against its perceived shortcomings as an expensive and outdated quango is the importance of the Authority as a public instrument for enhancing the future of translational bioscience. From this point of view, the HFEA is crucial not only to ensuring the successful realization of a domestic bioscience agenda but also to protecting the international reputation of UK Plc as a best-practice model of publicly supported bioinnovation. PMID:23415996

  9. Context Memory in Alzheimer's Disease

    PubMed Central

    El Haj, Mohamad; Kessels, Roy P.C.

    2013-01-01

    Background Alzheimer's disease (AD) is a neurodegenerative disease characterized by a gradual loss of memory. Specifically, context aspects of memory are impaired in AD. Our review sheds light on the neurocognitive mechanisms of this memory component that forms the core of episodic memory function. Summary Context recall, an element of episodic memory, refers to remembering the context in which an event has occurred, such as from whom or to whom information has been transmitted. Key Messages Our review raises crucial questions. For example, (1) which context element is more prone to being forgotten in the disease? (2) How do AD patients fail to bind context features together? (3) May distinctiveness heuristic or decisions based on metacognitive expectations improve context retrieval in these patients? (4) How does cueing at retrieval enhance reinstating of encoding context in AD? By addressing these questions, our work contributes to the understanding of the memory deficits in AD. PMID:24403906

  10. The Challenging Academic Development (CAD) Collective

    ERIC Educational Resources Information Center

    Peseta, Tai

    2005-01-01

    This article discusses the Challenging Academic Development (CAD) Collective and describes how it came out of a symposium called "Liminality, identity, and hybridity: On the promise of new conceptual frameworks for theorising academic/faculty development." The CAD Collective is and represents a space where people can open up their contexts and…

  11. Context-specific control and context selection in conflict tasks.

    PubMed

    Schouppe, Nathalie; Ridderinkhof, K Richard; Verguts, Tom; Notebaert, Wim

    2014-02-01

    This study investigated whether participants prefer contexts with relatively little cognitive conflict and whether this preference is related to context-specific control. A conflict selection task was administered in which participants had to choose between two categories that contained different levels of conflict. One category was associated with 80% congruent Stroop trials and 20% incongruent Stroop trials, while the other category was associated with only 20% congruent Stroop trials and 80% incongruent Stroop trials. As predicted, participants selected the low-conflict category more frequently, indicating that participants avoid contexts with high-conflict likelihood. Furthermore, we predicted a correlation between this preference for the low-conflict category and the control implementation associated with the categories (i.e., context-specific proportion congruency effect, CSPC effect). Results however did not show such a correlation, thereby failing to support a relationship between context control and context selection.

  12. Context effects on choice.

    PubMed

    Goldshmidt, J N; Lattal, K M; Fantino, E

    1998-11-01

    Four pigeons responded on a concurrent-chains schedule in four experiments that examined whether the effectiveness of a stimulus as a conditioned reinforcer is best described by a global approach, as measured by the average interreinforcement interval, or by a local contextual approach, as measured by the onset of the stimulus preceding the conditioned reinforcer. The interreinforcement interval was manipulated by the inclusion of an intertrial interval, which increased the overall time to reinforcement but did not change the local contingencies on a given trial A global analysis predicted choice for the richer alternative to decrease with the inclusion of an intertrial interval, whereas a local analysis predicted no change in preference. Experiment 1 examined sensitivity to intertrial intervals when each was signaled by the same houselight that operated throughout the session. In Experiment 2, the intertrial interval always was signaled by the stimulus correlated with the richer terminal link. In Experiment 3, the intertrial interval was signaled by the keylights correlated with the initial links and two novel houselights. Experiment 4 provided free food pseudorandomly during the intertrial interval. In all experiments, subjects' preferences were consistent with a local analysis of choice in concurrent chains. These results are discussed in terms of delay-reduction theory, which traditionally has failed to distinguish global and local contexts.

  13. Context effects on choice.

    PubMed Central

    Goldshmidt, J N; Lattal, K M; Fantino, E

    1998-01-01

    Four pigeons responded on a concurrent-chains schedule in four experiments that examined whether the effectiveness of a stimulus as a conditioned reinforcer is best described by a global approach, as measured by the average interreinforcement interval, or by a local contextual approach, as measured by the onset of the stimulus preceding the conditioned reinforcer. The interreinforcement interval was manipulated by the inclusion of an intertrial interval, which increased the overall time to reinforcement but did not change the local contingencies on a given trial A global analysis predicted choice for the richer alternative to decrease with the inclusion of an intertrial interval, whereas a local analysis predicted no change in preference. Experiment 1 examined sensitivity to intertrial intervals when each was signaled by the same houselight that operated throughout the session. In Experiment 2, the intertrial interval always was signaled by the stimulus correlated with the richer terminal link. In Experiment 3, the intertrial interval was signaled by the keylights correlated with the initial links and two novel houselights. Experiment 4 provided free food pseudorandomly during the intertrial interval. In all experiments, subjects' preferences were consistent with a local analysis of choice in concurrent chains. These results are discussed in terms of delay-reduction theory, which traditionally has failed to distinguish global and local contexts. PMID:9821681

  14. Distributed Control with Collective Intelligence

    NASA Technical Reports Server (NTRS)

    Wolpert, David H.; Wheeler, Kevin R.; Tumer, Kagan

    1998-01-01

    We consider systems of interacting reinforcement learning (RL) algorithms that do not work at cross purposes , in that their collective behavior maximizes a global utility function. We call such systems COllective INtelligences (COINs). We present the theory of designing COINs. Then we present experiments validating that theory in the context of two distributed control problems: We show that COINs perform near-optimally in a difficult variant of Arthur's bar problem [Arthur] (and in particular avoid the tragedy of the commons for that problem), and we also illustrate optimal performance in the master-slave problem.

  15. Cognitive context detection using pupillary measurements

    NASA Astrophysics Data System (ADS)

    Mannaru, Pujitha; Balasingam, Balakumar; Pattipati, Krishna; Sibley, Ciara; Coyne, Joseph

    2016-05-01

    In this paper, we demonstrate the use of pupillary measurements as indices of cognitive workload. We analyze the pupillary data of twenty individuals engaged in a simulated Unmanned Aerial System (UAS) operation in order to understand and characterize the behavior of pupil dilation under varying task load (i.e., workload) levels. We present three metrics that can be employed as real-time indices of cognitive workload. In addition, we develop a predictive system utilizing the pupillary metrics to demonstrate cognitive context detection within simulated supervisory control of UAS. Further, we use pupillary data collected concurrently from the left and right eye and present comparative results of the use of separate vs. combined pupillary data for detecting cognitive context.

  16. Disagreeing in context

    PubMed Central

    Marques, Teresa

    2015-01-01

    This paper argues for contextualism about predicates of personal taste and evaluative predicates in general, and offers a proposal of how apparently resilient disagreements are to be explained. The present proposal is complementary to others that have been made in the recent literature. Several authors, for instance (López de Sa, 2008; Sundell, 2011; Huvenes, 2012; Marques and García-Carpintero, 2014; Marques, 2014a), have recently defended semantic contextualism for those kinds of predicates from the accusation that it faces the problem of lost disagreement. These authors have proposed that a proper account of the resilient disagreement in the cases studied is to be achieved by an appeal to pragmatic processes, and to conflicting non-doxastic attitudes. It is argued here that the existing contextualist solutions are incomplete as they stand, and are subject to objections because of this. A supplementation of contextualism is offered, together with an explanation of why failed presuppositions of commonality (López de Sa), disputes over the appropriateness of a contextually salient standard (Sundell), and differences in non-doxastic attitudes (Sundell, Huvenes, Marques, and García-Carpintero) give rise to conflicts. This paper claims that conflicts of attitudes are the reason why people still have impressions of disagreement in spite of failed commonality presuppositions, that those conflicts drive metalinguistic disputes over the selection of appropriate standards, and hence conflicting non-doxastic attitudes demand an explanation that is independent of those context dependent pragmatic processes. The paper further argues that the missing explanation is 2-fold: first, disagreement prevails where the properties expressed by taste and value predicates are response-dependent properties, and, secondly, it prevails where those response-dependent properties are involved in evolved systems of coordination that respond to evolutionarily recurrent situations. PMID

  17. Disagreeing in context.

    PubMed

    Marques, Teresa

    2015-01-01

    This paper argues for contextualism about predicates of personal taste and evaluative predicates in general, and offers a proposal of how apparently resilient disagreements are to be explained. The present proposal is complementary to others that have been made in the recent literature. Several authors, for instance (López de Sa, 2008; Sundell, 2011; Huvenes, 2012; Marques and García-Carpintero, 2014; Marques, 2014a), have recently defended semantic contextualism for those kinds of predicates from the accusation that it faces the problem of lost disagreement. These authors have proposed that a proper account of the resilient disagreement in the cases studied is to be achieved by an appeal to pragmatic processes, and to conflicting non-doxastic attitudes. It is argued here that the existing contextualist solutions are incomplete as they stand, and are subject to objections because of this. A supplementation of contextualism is offered, together with an explanation of why failed presuppositions of commonality (López de Sa), disputes over the appropriateness of a contextually salient standard (Sundell), and differences in non-doxastic attitudes (Sundell, Huvenes, Marques, and García-Carpintero) give rise to conflicts. This paper claims that conflicts of attitudes are the reason why people still have impressions of disagreement in spite of failed commonality presuppositions, that those conflicts drive metalinguistic disputes over the selection of appropriate standards, and hence conflicting non-doxastic attitudes demand an explanation that is independent of those context dependent pragmatic processes. The paper further argues that the missing explanation is 2-fold: first, disagreement prevails where the properties expressed by taste and value predicates are response-dependent properties, and, secondly, it prevails where those response-dependent properties are involved in evolved systems of coordination that respond to evolutionarily recurrent situations. PMID

  18. Context-Free Categorical Grammars

    NASA Astrophysics Data System (ADS)

    Bauderon, Michel; Chen, Rui; Ly, Olivier

    We define generic categorical notions of rewriting and grammar, using two basic operations, pullback and pushout, and show that these categorical grammars are intrinsically context-free in the sense of Courcelle. We then specialise to various settings, including classical word grammars, hyperedge replacement grammars or node-replacement grammars. We show that some languages which are classical counter-example to context-freeness become context-free within this new framework.

  19. Integrating Risk Context into Risk Assessments: The Risk Context Scale

    ERIC Educational Resources Information Center

    Kroner, Daryl G.; Gray, Andrew L.; Goodrich, Ben

    2013-01-01

    The context in which offenders are released is an important component of conducting risk assessments. A sample of 257 supervised male parolees were followed in the community ("M" = 870 days) after an initial risk assessment. Drawing on community-based information, the purpose of this study was to evaluate the recently developed Risk Context Scale.…

  20. The Context Oriented Training Method.

    ERIC Educational Resources Information Center

    Cavrini, Andrea

    The Context Oriented Training (COT) method is introduced and explored in this paper. COT is a means of improving the training process, beginning with the observation and analysis of current corporate experiences in the field. The learning context lies between the development of professional competencies in training and the operational side in the…

  1. Context-Enabled Business Intelligence

    SciTech Connect

    Troy Hiltbrand

    2012-04-01

    To truly understand context and apply it in business intelligence, it is vital to understand what context is and how it can be applied in addressing organizational needs. Context describes the facets of the environment that impact the way that end users interact with the system. Context includes aspects of location, chronology, access method, demographics, social influence/ relationships, end-user attitude/ emotional state, behavior/ past behavior, and presence. To be successful in making Business Intelligence content enabled, it is important to be able to capture the context of use user. With advances in technology, there are a number of ways in which this user based information can be gathered and exposed to enhance the overall end user experience.

  2. 77 FR 20686 - 60-Day Notice of Proposed Information Collections: Two DDTC Brokering Collections

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-05

    ... comment on December 19, 2011 (see 76 FR 78578). On that occasion, public comment was sought in the context... Collection. Originating Office: Bureau of Political-Military Affairs, Directorate of Defense Trade Controls... Currently Approved Collection. Originating Office: Bureau of Political-Military Affairs, Directorate...

  3. Program Management Collection. "LINCS" Resource Collection News

    ERIC Educational Resources Information Center

    Literacy Information and Communication System, 2011

    2011-01-01

    This edition of "'LINCS' Resource Collection News" features the Program Management Collection, which covers the topics of Assessment, Learning Disabilities, and Program Improvement. Each month Collections News features one of the three "LINCS" (Literacy Information and Communication System) Resource Collections--Basic Skills, Program Management,…

  4. Workforce Competitiveness Collection. "LINCS" Resource Collection News

    ERIC Educational Resources Information Center

    Literacy Information and Communication System, 2011

    2011-01-01

    This edition of "'LINCS' Resource Collection News" features the Workforce Competitiveness Collection, covering the topics of workforce education, English language acquisition, and technology. Each month Collections News features one of the three "LINCS" (Literacy Information and Communication System) Resource Collections--Basic Skills, Program…

  5. Schooling Closer to Home: Desegregation Policy and Neighborhood Contexts

    ERIC Educational Resources Information Center

    Goldring, Ellen; Cohen-Vogel, Lora; Smrekar, Claire; Taylor, Cynthia

    2006-01-01

    This article uses census data, information collected by health and police departments, and GIS mapping software to analyze the neighborhood contexts surrounding schools in one Southern school district. When courts lifted Nashville's desegregation order in 1999, the district agreed to implement a new student assignment plan geared toward…

  6. Social Context in School: Its Relation to Adolescents' Depressive Mood

    ERIC Educational Resources Information Center

    Boulard, Aurore; Quertemont, Etienne; Gauthier, Jean-Marie; Born, Michel

    2012-01-01

    This study examined the impact of various school-related factors on adolescents' depressive mood, including prosocial behavior, verbal aggression, and relationships with teachers. The data used in this study were collected in the context of a larger survey on victimization in secondary schools from the French Community of Belgium. Participants…

  7. Interactional Renegotiations of Educational Discourses in Recreational Learning Contexts

    ERIC Educational Resources Information Center

    Madsen, Lian Malai

    2011-01-01

    In this paper I focus on sequences of interaction among youth where the participants engage in classroom related activities (such as spelling, discussion of essays, etc.). My paper is based on interactional and ethnographic data collected among youth in two different leisure contexts. I discuss how the participants by employment of various…

  8. Learning in Authentic Contexts: Projects Integrating Spatial Technologies and Fieldwork

    ERIC Educational Resources Information Center

    Huang, Kuo-Hung

    2011-01-01

    In recent years, professional practice has been an issue of concern in higher education. The purpose of this study is to design students' projects to facilitate collaborative learning in authentic contexts. Ten students majoring in Management Information Systems conducted fieldwork with spatial technologies to collect data and provided information…

  9. ESL Readers' Comprehension Performance: The Chinese Secondary Context

    ERIC Educational Resources Information Center

    Chau, Juliana; Wu, Winnie; Chen, Julia; Lughmani, Shari

    2012-01-01

    Recent research in reading comprehension in Western settings has focused on collecting evidence from reading tests that would measure relevant ESL reading constructs to inform reading instruction and assessment. Similar studies in non-Western contexts, however, remain under-reported. This study involved 958 senior secondary Hong Kong (Chinese)…

  10. Reinventing Urban Education. Multiculturalism and the Social Context of Schooling.

    ERIC Educational Resources Information Center

    Rivera-Batiz, Francisco L., Ed.

    The papers in this collection describe how education is being reinvented in urban school systems in the United States. Selections discuss the urban landscape, the social context of schooling, and the theory and practice of multiculturalism. Papers include: (1) "Introduction: Reinventing Urban Education" (Francisco L. Rivera-Batiz); (2) "The…

  11. Collective Bargaining in Higher Education. The State of the Art.

    ERIC Educational Resources Information Center

    Julius, Daniel J., Ed.

    American higher education collective bargaining is addressed in 21 essays by administrators and academicians who are actively engaged in the process. Titles and authors are as follows: "The Context of Collective Bargaining in American Colleges and Universities" (Kenneth P. Mortimer); "Collective Bargaining in the Multi-Campus System" (Richard E.…

  12. Special Collections, Primary Resources, and Information Literacy Pedagogy

    ERIC Educational Resources Information Center

    Hubbard, Melissa A.; Lotts, Megan

    2013-01-01

    This article reports on collaboration between an information literacy (IL) instructor and a special collections librarian to create a hands-on special collections experience for entry-level IL students within the context of a credit-bearing class. Data collected during this experience found that exposing students to these materials can increase…

  13. Context Switch Effects and Context Experience in Rats' Conditioned Taste Aversion

    ERIC Educational Resources Information Center

    Leon, Samuel P.; Callejas-Aguilera, Jose E.; Rosas, Juan M.

    2012-01-01

    Context specificity of rats' conditioned taste aversion as a function of context experience was assessed in two experiments. Rats received a single pairing between a flavor X and a LiCl injection in a distinctive context (context A) being subsequently tested either in the same context or in a different but equally familiar context (context B).…

  14. Conceptions of Assessment When the Teaching Context and Learner Population Matter: Compulsory School versus Non-Compulsory Adult Education Contexts

    ERIC Educational Resources Information Center

    Remesal, Ana; Brown, Gavin T. L.

    2015-01-01

    This paper presents results of a study on teachers' conceptions of assessment carried out on a sample of 493 teachers of Spanish as foreign language from all over the world. At the moment of data collection, the participants were members of an international online teacher community and were teaching at different professional contexts: basic…

  15. Collections Management, Collections Maintenance, and Conservation.

    ERIC Educational Resources Information Center

    American Association of Museums, Washington, DC.

    This national survey of the state of the nation's museum collections investigates collection care policies and practices, conservation issues, and private sector and federal support for museum needs. It consists of two major projects and four additional information gathering projects. The Museum Collection Survey is designed to examine all major…

  16. Student Loan Programs: Management and Collection.

    ERIC Educational Resources Information Center

    Dorian, James C.; Ward, Diane M.

    This guide to undergraduate and graduate student loan programs focuses primarily on program administration and management in the context of student loan repayment and collection. By incorporating regulatory requirements with practical suggestions on managing student loan programs, the book provides a framework and a guide for those who are…

  17. 78 FR 67847 - Debt Collection (Regulation F)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-12

    ... application in the context of debt collection. Trade Regulation Rule: Credit Practices, 49 FR 7740 (Mar. 1..., 50 FR 16696 (Apr. 29, 1985) (Board); Consumer Protections; Unfair or Deceptive Credit Practices, 50 FR 19325 (May 8, 1985) (FHLBB); Federal Credit Union; Prohibited Lending Practices, 52 FR 35060...

  18. Proximate Sources of Collective Teacher Efficacy

    ERIC Educational Resources Information Center

    Adams, Curt M.; Forsyth, Patrick B.

    2006-01-01

    Purpose: Recent scholarship has augmented Bandura's theory underlying efficacy formation by pointing to more proximate sources of efficacy information involved in forming collective teacher efficacy. These proximate sources of efficacy information theoretically shape a teacher's perception of the teaching context, operationalizing the difficulty…

  19. Estimating changing contexts in schizophrenia.

    PubMed

    Kaplan, Claire M; Saha, Debjani; Molina, Juan L; Hockeimer, William D; Postell, Elizabeth M; Apud, Jose A; Weinberger, Daniel R; Tan, Hao Yang

    2016-07-01

    SEE STEPHAN ET AL DOI101093/AWW120 FOR A SCIENTIFIC COMMENTARY ON THIS WORK: Real world information is often abstract, dynamic and imprecise. Deciding if changes represent random fluctuations, or alterations in underlying contexts involve challenging probability estimations. Dysfunction may contribute to erroneous beliefs, such as delusions. Here we examined brain function during inferences about context change from noisy information. We examined cortical-subcortical circuitry engaging anterior and dorsolateral prefrontal cortex, and midbrain. We hypothesized that schizophrenia-related deficits in prefrontal function might overestimate context change probabilities, and that this more chaotic worldview may subsequently gain familiarity and be over-reinforced, with implications for delusions. We then examined these opposing information processing biases against less expected versus familiar information patterns in relation to genetic risk for schizophrenia in unaffected siblings. In one experiment, 17 patients with schizophrenia and 24 normal control subjects were presented in 3 T magnetic resonance imaging with numerical information varying noisily about a context integer, which occasionally shifted up or down. Subjects were to indicate when the inferred numerical context had changed. We fitted Bayesian models to estimate probabilities associated with change inferences. Dynamic causal models examined cortical-subcortical circuitry interactions at context change inference, and at subsequent reduced uncertainty. In a second experiment, genetic risk for schizophrenia associated with similar cortical-subcortical findings were explored in an independent sample of 36 normal control subjects and 35 unaffected siblings during processing of intuitive number sequences along the number line, or during the inverse, less familiar, sequence. In the first experiment, reduced Bayesian models fitting subject behaviour suggest that patients with schizophrenia overestimated context

  20. Collection Directions: The Evolution of Library Collections and Collecting

    ERIC Educational Resources Information Center

    Dempsey, Lorcan; Malpas, Constance; Lavoie, Brian

    2014-01-01

    This article takes a broad view of the evolution of collecting behaviors in a network environment and suggests some future directions based on various simple models. The authors look at the changing dynamics of print collections, at the greater engagement with research and learning behaviors, and at trends in scholarly communication. The goal is…

  1. The social context of well-being.

    PubMed

    Helliwell, John F; Putnam, Robert D

    2004-09-29

    Large samples of data from the World Values Survey, the US Benchmark Survey and a comparable Canadian survey are used to estimate equations designed to explore the social context of subjective evaluations of well-being, of happiness, and of health. Social capital, as measured by the strength of family, neighbourhood, religious and community ties, is found to support both physical health and subjective well-being. Our new evidence confirms that social capital is strongly linked to subjective well-being through many independent channels and in several different forms. Marriage and family, ties to friends and neighbours, workplace ties, civic engagement (both individually and collectively), trustworthiness and trust: all appear independently and robustly related to happiness and life satisfaction, both directly and through their impact on health.

  2. Loneliness in Chinese children across contexts.

    PubMed

    Chen, Xinyin; Wang, Li; Li, Dan; Liu, Junsheng

    2014-10-01

    This study examined loneliness and its associations with social functioning in children across different historical times and contexts in China. We collected data from urban and rural groups of school-age children (N = 2,588; M age = 10 years) using self-reports and peer assessments. The results indicated that children in 2002 and 2005 urban groups had lower scores on loneliness than did children in 1992 and 1998 urban groups, suggesting that as urban China became a more modernized, self-oriented society, children tended to report lower levels of loneliness. Consistent with this trend, urban children reported lower levels of loneliness than did their rural counterparts in recent years. The analysis of associations between social functioning and loneliness revealed that across groups, sociability was negatively associated with loneliness, and aggression was positively associated with loneliness. The association between shyness and loneliness differed among the groups; it was negative in the 1992 urban group, positive in the 2002 and 2005 urban groups, and nonsignificant in the 1998 urban and 2007 rural groups. The different associations suggest that whether shy children feel lonely might depend on context. PMID:25181650

  3. Loneliness in Chinese children across contexts.

    PubMed

    Chen, Xinyin; Wang, Li; Li, Dan; Liu, Junsheng

    2014-10-01

    This study examined loneliness and its associations with social functioning in children across different historical times and contexts in China. We collected data from urban and rural groups of school-age children (N = 2,588; M age = 10 years) using self-reports and peer assessments. The results indicated that children in 2002 and 2005 urban groups had lower scores on loneliness than did children in 1992 and 1998 urban groups, suggesting that as urban China became a more modernized, self-oriented society, children tended to report lower levels of loneliness. Consistent with this trend, urban children reported lower levels of loneliness than did their rural counterparts in recent years. The analysis of associations between social functioning and loneliness revealed that across groups, sociability was negatively associated with loneliness, and aggression was positively associated with loneliness. The association between shyness and loneliness differed among the groups; it was negative in the 1992 urban group, positive in the 2002 and 2005 urban groups, and nonsignificant in the 1998 urban and 2007 rural groups. The different associations suggest that whether shy children feel lonely might depend on context.

  4. Classification of Tumor Histology via Morphometric Context *

    PubMed Central

    Chang, Hang; Borowsky, Alexander; Spellman, Paul; Parvin, Bahram

    2013-01-01

    Image-based classification of tissue histology, in terms of different components (e.g., normal signature, categories of aberrant signatures), provides a series of indices for tumor composition. Subsequently, aggregation of these indices in each whole slide image (WSI) from a large cohort can provide predictive models of clinical outcome. However, the performance of the existing techniques is hindered as a result of large technical and biological variations that are always present in a large cohort. In this paper, we propose two algorithms for classification of tissue histology based on robust representations of morphometric context, which are built upon nuclear level morphometric features at various locations and scales within the spatial pyramid matching (SPM) framework. These methods have been evaluated on two distinct datasets of different tumor types collected from The Cancer Genome Atlas (TCGA), and the experimental results indicate that our methods are (i) extensible to different tumor types; (ii) robust in the presence of wide technical and biological variations; (iii) invariant to different nuclear segmentation strategies; and (iv) scalable with varying training sample size. In addition, our experiments suggest that enforcing sparsity, during the construction of morphometric context, further improves the performance of the system. PMID:24319324

  5. Motivational Interviewing in Relational Context

    ERIC Educational Resources Information Center

    Miller, William R.; Rose, Gary S.

    2010-01-01

    Responds to M. Stanton's comments on the current author's original article. One of the puzzles of motivational interviewing is why it works at all. How can it be that an individual interview or two yields change in a long-standing problem behavior even without any effort to alter social context? The time involved is such a tiny part of the…

  6. Creating a Context for Chemistry.

    ERIC Educational Resources Information Center

    Schwartz, A. Truman

    1999-01-01

    Summarizes the origin, development, content, pedagogy, evaluation, and influence of a textbook for non-science majors entitled "Chemistry in Context: Applying Chemistry to Society." Considers the text's potential implications for other disciplines and for the instruction of science majors. (Author/WRM)

  7. Health Behavior in Ecological Context

    ERIC Educational Resources Information Center

    Simons-Morton, Bruce

    2013-01-01

    Health is best understood within an ecological context. Accordingly, health promotion involves processes that foster supportive environments and healthful behavior. Thus, effective health promotion programs are typically multilevel, focusing not only on the population at risk but also on the environmental conditions that contribute so importantly…

  8. Abortion, infanticide and moral context.

    PubMed

    Porter, Lindsey

    2013-05-01

    In 'After-birth abortion: why should the baby live?', Giubilini and Minerva argue that infanticide should be permitted for the same reasons as abortion. In particular, they argue that infanticide should be permitted even for reasons that do not primarily serve the interests (or would-be best interests) of the newborn. They claim that abortion is permissible for reasons that do not primarily serve the interests (or would-be interests) of the fetus because fetuses lack a right to life. They argue that newborns also lack a right to life, and they conclude that therefore, the same reasons that justify abortion can justify infanticide. This conclusion does not follow. The lack of a right to life is not decisive. Furthermore, the justificatory power of a given reason is a function of moral context. Generalisations about reasons across dissimilar moral contexts are invalid. However, a similar conclusion does follow-that fetus-killing and newborn-killing are morally identical in identical moral contexts-but this conclusion is trivial, since fetuses and newborns are never in identical moral contexts.

  9. Abortion, infanticide and moral context.

    PubMed

    Porter, Lindsey

    2013-05-01

    In 'After-birth abortion: why should the baby live?', Giubilini and Minerva argue that infanticide should be permitted for the same reasons as abortion. In particular, they argue that infanticide should be permitted even for reasons that do not primarily serve the interests (or would-be best interests) of the newborn. They claim that abortion is permissible for reasons that do not primarily serve the interests (or would-be interests) of the fetus because fetuses lack a right to life. They argue that newborns also lack a right to life, and they conclude that therefore, the same reasons that justify abortion can justify infanticide. This conclusion does not follow. The lack of a right to life is not decisive. Furthermore, the justificatory power of a given reason is a function of moral context. Generalisations about reasons across dissimilar moral contexts are invalid. However, a similar conclusion does follow-that fetus-killing and newborn-killing are morally identical in identical moral contexts-but this conclusion is trivial, since fetuses and newborns are never in identical moral contexts. PMID:23637451

  10. School Grading and Institutional Contexts

    ERIC Educational Resources Information Center

    Dardanoni, Valentino; Modica, Salvatore; Pennisi, Aline

    2011-01-01

    We study how the relationship between students' cognitive ability and their school grades depends on institutional contexts. In a simple abstract model, we show that unless competence standards are set at above-school level or the variation of competence across schools is low, students' competence valuation will be heterogeneous, with weaker…

  11. Context Orientated Teaching in Praxis

    ERIC Educational Resources Information Center

    Nikos, Klaoudatos; Stavros, Papastavridis

    2004-01-01

    In this paper, we describe the skeleton of two teaching units, based on a Model for teaching mathematics, Context Orientated Teaching (COT). The first teaching unit concerns the proof of a mathematical proposition, while the second one concerns the solution of an open problem. Both are taught in the 10th grade, under the specific conditions of the…

  12. Digital Citizenship within Global Contexts

    ERIC Educational Resources Information Center

    Searson, Michael; Hancock, Marsali; Soheil, Nusrat; Shepherd, Gregory

    2015-01-01

    EduSummIT 2013 featured a working group that examined digital citizenship within a global context. Group members recognized that, given today's international, regional, political, and social dynamics, the notion of "global" might be more aspirational than practical. The development of informed policies and practices serving and involving…

  13. Contexts of Social Studies Education.

    ERIC Educational Resources Information Center

    Lunstrum, John P.

    1990-01-01

    Examines the "Handbook of Research on Social Studies Teaching and Learning's" section on context effect. Reviews influences that shape social studies, including research, student groups, family environment, mass media (especially television), testing, curriculum mandates, and local-to-national community pressures. (CH)

  14. Genre: Language, Context, and Literacy.

    ERIC Educational Resources Information Center

    Hyland, Ken

    2002-01-01

    Focuses on genre and its application in language teaching and learning. Suggests genre approaches have had an impact on how we understand discourse and transform literacy education in different contexts around the world. Describes studies on generic integrity and variation, and the ways that genres are seen as similar and different in terms of…

  15. Towards Context Sensitive Information Inference.

    ERIC Educational Resources Information Center

    Song, D.; Bruza, P. D.

    2003-01-01

    Discusses information inference from a psychologistic stance and proposes an information inference mechanism that makes inferences via computations of information flow through an approximation of a conceptual space. Highlights include cognitive economics of information processing; context sensitivity; and query models for information retrieval.…

  16. Teaching Context in Information Security

    ERIC Educational Resources Information Center

    Bishop, Matt

    2006-01-01

    This article investigates teaching the application of technical ideas by non-technical means, especially by using puzzles to engage students. After discussing the need to teach students to evaluate contexts in which decisions about computer security must be made, we suggest questions and scenarios drawn from political science, history, as well as…

  17. Effects of similarity on environmental context cueing.

    PubMed

    Smith, Steven M; Handy, Justin D; Angello, Genna; Manzano, Isabel

    2014-01-01

    Three experiments examined the prediction that context cues which are similar to study contexts can facilitate episodic recall, even if those cues are never seen before the recall test. Environmental context cueing effects have typically produced such small effect sizes that influences of moderating factors, such as the similarity between encoding and retrieval contexts, would be difficult to observe experimentally. Videos of environmental contexts, however, can be used to produce powerful context-dependent memory effects, particularly when only one memory target is associated with each video context, intentional item-context encoding is encouraged, and free recall tests are used. Experiment 1 showed that a not previously viewed video of the study context provided an effective recall cue, although it was not as effective as the originally viewed video context. Experiments 2 and 3 showed that videos of environments that were conceptually similar to encoding contexts (e.g., both were videos of ball field games) also cued recall, but not as well if the encoding contexts were given specific labels (e.g., "home run") incompatible with test contexts (e.g., a soccer scene). A fourth experiment that used incidental item-context encoding showed that video context reinstatement has a robust effect on paired associate memory, indicating that the video context reinstatement effect does not depend on interactive item-context encoding or free recall testing.

  18. Effects of similarity on environmental context cueing.

    PubMed

    Smith, Steven M; Handy, Justin D; Angello, Genna; Manzano, Isabel

    2014-01-01

    Three experiments examined the prediction that context cues which are similar to study contexts can facilitate episodic recall, even if those cues are never seen before the recall test. Environmental context cueing effects have typically produced such small effect sizes that influences of moderating factors, such as the similarity between encoding and retrieval contexts, would be difficult to observe experimentally. Videos of environmental contexts, however, can be used to produce powerful context-dependent memory effects, particularly when only one memory target is associated with each video context, intentional item-context encoding is encouraged, and free recall tests are used. Experiment 1 showed that a not previously viewed video of the study context provided an effective recall cue, although it was not as effective as the originally viewed video context. Experiments 2 and 3 showed that videos of environments that were conceptually similar to encoding contexts (e.g., both were videos of ball field games) also cued recall, but not as well if the encoding contexts were given specific labels (e.g., "home run") incompatible with test contexts (e.g., a soccer scene). A fourth experiment that used incidental item-context encoding showed that video context reinstatement has a robust effect on paired associate memory, indicating that the video context reinstatement effect does not depend on interactive item-context encoding or free recall testing. PMID:23721293

  19. Arc-An OAI Service Provider for Digital Library Federation; Kepler-An OAI Data/Service Provider for the Individual; Information Objects and Rights Management: A Mediation-Based Approach to DRM Interoperability; Automated Name Authority Control and Enhanced Searching in the Levy Collection; Renardus Project Developments and the Wider Digital Library Context.

    ERIC Educational Resources Information Center

    Liu, Xiaoming; Maly, Kurt; Zubair, Mohammad; Nelson, Michael L.; Erickson, John S.; DiLauro, Tim; Choudhury, G. Sayeed; Patton, Mark; Warner, James W.; Brown, Elizabeth W.; Heery, Rachel; Carpenter, Leona; Day, Michael

    2001-01-01

    Includes five articles that discuss the OAI (Open Archive Initiative), an interface between data providers and service providers; information objects and digital rights management interoperability; digitizing library collections, including automated name authority control, metadata, and text searching engines; and building digital library services…

  20. Integration of electronic patient record context with message context.

    PubMed

    De Clercq, Etienne; Bangels, Marc; France, Francis Roger

    2004-01-01

    A methodology to construct specific messages with clear objectives inside clinical processes, while simultaneously including contextual information, remains a problem today. This paper addresses the issue of combining specific message context (process driven) with the context of a patient record (patient centered). In Belgium, simplified conceptual models for Electronic Patient Record (EPR) architecture and for message architecture, based on previous comprehensive and international work, have been produced, validated and mapped into an integrated message format. The resulting model described in this paper highlights the main conceptual links between both basic models: at the action level and at the Transaction level. Using XML, some parts of the model have already been implemented in various national projects. Key lessons learned may be imported at the international level. PMID:15360968

  1. Linked Micromaps: Statistical Summaries of Aquatic Monitoring Data in a Spatial Context

    EPA Science Inventory

    Communicating summaries of spatial data to decision makers and the public is challenging. Linked micromaps provide a way to simultaneously present geographic context and statistical summaries of data. Monitoring data collected over areal units, such as watersheds or ecoregions,...

  2. Instructional Context and Student Motivation, Learning, and Development: Commentary and Implications for School Psychologists

    ERIC Educational Resources Information Center

    Pendergast, Laura L.; Kaplan, Avi

    2015-01-01

    From an ecological perspective, learning and development in childhood and throughout the lifespan occur in the context of interactions within complex social networks. Collectively, the articles in this special issue illuminate three important themes related to teacher-student interactions within instructional contexts: relationships, competence,…

  3. Context and Culture in Language Teaching and Learning. Languages for Intercultural Communication and Education.

    ERIC Educational Resources Information Center

    Byram, Michael, Ed.; Grundy, Peter, Ed.

    This collection of papers examines how the contexts in which language teaching occurs impact the aims and methods of language teaching. Ten papers focus on the following: "Introduction: Context and Culture in Language Teaching and Learning" (Mike Byram and Peter Grundy); "From Practice to Theory and Back Again" (Claire Kramsch); "Carrying a Baby…

  4. The Decision-Making Process in Language Program Placement: Test and Nontest Factors Interacting in Context

    ERIC Educational Resources Information Center

    Plakans, Lia; Burke, Maureen

    2013-01-01

    The use of tests has been targeted as a critical point in validity, which suggests that contexts for test use warrant closer investigation. This article describes a study of decision making during test use in the context of a university intensive English language program. Over a period of 2 1/2 years, data were collected by audio-recording…

  5. Influence of Contexts on Vocabulary Testing

    ERIC Educational Resources Information Center

    Gao, Chun-mei

    2007-01-01

    In vocabulary testing, whether to adopt context is a heat-debated topic. In the article, an experiment is designed to investigate what is the effect of zero context and sentence context on the vocabulary testing? And how do the different kinds of context in vocabulary affect the subjects' performance? The experimental result demonstrates that…

  6. Minimalism context-aware displays.

    PubMed

    Cai, Yang

    2004-12-01

    Despite the rapid development of cyber technologies, today we still have very limited attention and communication bandwidth to process the increasing information flow. The goal of the study is to develop a context-aware filter to match the information load with particular needs and capacities. The functions include bandwidth-resolution trade-off and user context modeling. From the empirical lab studies, it is found that the resolution of images can be reduced in order of magnitude if the viewer knows that he/she is looking for particular features. The adaptive display queue is optimized with real-time operational conditions and user's inquiry history. Instead of measuring operator's behavior directly, ubiquitous computing models are developed to anticipate user's behavior from the operational environment data. A case study of the video stream monitoring for transit security is discussed in the paper. In addition, the author addresses the future direction of coherent human-machine vision systems. PMID:15687797

  7. Context effects on auditory distraction

    PubMed Central

    Chen, Sufen; Sussman, Elyse S.

    2014-01-01

    The purpose of the study was to test the hypothesis that sound context modulates the magnitude of auditory distraction, indexed by behavioral and electrophysiological measures. Participants were asked to identify tone duration, while irrelevant changes occurred in tone frequency, tone intensity, and harmonic structure. Frequency deviants were randomly intermixed with standards (Uni-Condition), with intensity deviants (Bi-Condition), and with both intensity and complex deviants (Tri-Condition). Only in the Tri-Condition did the auditory distraction effect reflect the magnitude difference among the frequency and intensity deviants. The mixture of the different types of deviants in the Tri-Condition modulated the perceived level of distraction, demonstrating that the sound context can modulate the effect of deviance level on processing irrelevant acoustic changes in the environment. These findings thus indicate that perceptual contrast plays a role in change detection processes that leads to auditory distraction. PMID:23886958

  8. Collection Development Policy.

    ERIC Educational Resources Information Center

    Monk, John S.

    This document outlines the collection development policies for the Eisenhower National Clearinghouse for Mathematics and Science Education (ENC). It details the clientele the collection is intended to serve, the scope and boundary of the collection, the methods employed to identify and acquire resources for the collection, the selection and…

  9. Context of practice, practice of context: A psychotherapeutic meditation.

    PubMed

    Jones, J W

    1987-12-01

    Intended as an essay on the perennial topic of the relation between theory and practice, which will not be all theory and no practice, this paper draws on contemporary philosphy of science and clinical theory to catalyze the reader's own further reflections on the topic by suggesting that the meanings of theories and practices are context-dependent, and so the question can never be answered in the abstract, and that the separation of theory and practice is something we can do only in theory, never in practice.

  10. Context Aware Middleware Architectures: Survey and Challenges.

    PubMed

    Li, Xin; Eckert, Martina; Martinez, José-Fernán; Rubio, Gregorio

    2015-01-01

    Context aware applications, which can adapt their behaviors to changing environments, are attracting more and more attention. To simplify the complexity of developing applications, context aware middleware, which introduces context awareness into the traditional middleware, is highlighted to provide a homogeneous interface involving generic context management solutions. This paper provides a survey of state-of-the-art context aware middleware architectures proposed during the period from 2009 through 2015. First, a preliminary background, such as the principles of context, context awareness, context modelling, and context reasoning, is provided for a comprehensive understanding of context aware middleware. On this basis, an overview of eleven carefully selected middleware architectures is presented and their main features explained. Then, thorough comparisons and analysis of the presented middleware architectures are performed based on technical parameters including architectural style, context abstraction, context reasoning, scalability, fault tolerance, interoperability, service discovery, storage, security & privacy, context awareness level, and cloud-based big data analytics. The analysis shows that there is actually no context aware middleware architecture that complies with all requirements. Finally, challenges are pointed out as open issues for future work. PMID:26307988

  11. Context Aware Middleware Architectures: Survey and Challenges.

    PubMed

    Li, Xin; Eckert, Martina; Martinez, José-Fernán; Rubio, Gregorio

    2015-01-01

    Context aware applications, which can adapt their behaviors to changing environments, are attracting more and more attention. To simplify the complexity of developing applications, context aware middleware, which introduces context awareness into the traditional middleware, is highlighted to provide a homogeneous interface involving generic context management solutions. This paper provides a survey of state-of-the-art context aware middleware architectures proposed during the period from 2009 through 2015. First, a preliminary background, such as the principles of context, context awareness, context modelling, and context reasoning, is provided for a comprehensive understanding of context aware middleware. On this basis, an overview of eleven carefully selected middleware architectures is presented and their main features explained. Then, thorough comparisons and analysis of the presented middleware architectures are performed based on technical parameters including architectural style, context abstraction, context reasoning, scalability, fault tolerance, interoperability, service discovery, storage, security & privacy, context awareness level, and cloud-based big data analytics. The analysis shows that there is actually no context aware middleware architecture that complies with all requirements. Finally, challenges are pointed out as open issues for future work.

  12. Context Aware Middleware Architectures: Survey and Challenges

    PubMed Central

    Li, Xin; Eckert, Martina; Martinez, José-Fernán; Rubio, Gregorio

    2015-01-01

    Context aware applications, which can adapt their behaviors to changing environments, are attracting more and more attention. To simplify the complexity of developing applications, context aware middleware, which introduces context awareness into the traditional middleware, is highlighted to provide a homogeneous interface involving generic context management solutions. This paper provides a survey of state-of-the-art context aware middleware architectures proposed during the period from 2009 through 2015. First, a preliminary background, such as the principles of context, context awareness, context modelling, and context reasoning, is provided for a comprehensive understanding of context aware middleware. On this basis, an overview of eleven carefully selected middleware architectures is presented and their main features explained. Then, thorough comparisons and analysis of the presented middleware architectures are performed based on technical parameters including architectural style, context abstraction, context reasoning, scalability, fault tolerance, interoperability, service discovery, storage, security & privacy, context awareness level, and cloud-based big data analytics. The analysis shows that there is actually no context aware middleware architecture that complies with all requirements. Finally, challenges are pointed out as open issues for future work. PMID:26307988

  13. 78 FR 54662 - Agency Information Collection Activities; Proposed Collection; Public Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-05

    ... the support staff coordinating the program. Data collection will focus on patient/family satisfaction... context means the time expended by persons to generate, maintain, retain, disclose or provide the information requested. This includes the time needed to review instructions; to develop, acquire, install...

  14. Collecting Data Outdoors: Making Connections to the Real World.

    ERIC Educational Resources Information Center

    Basile, Carole G.

    1999-01-01

    Describes a process of data collection with young children using the outdoors as a mathematical context. The process of data collection and processing introduces children to more abstract mathematics as they sort and classify data, create graphs, compare datasets, examine patterns, and interpret graphical representations. (ASK)

  15. Collective Learning: Interaction and a Shared Action Arena

    ERIC Educational Resources Information Center

    Doos, Marianne; Wilhelmson, Lena

    2011-01-01

    Purpose: The paper seeks to argue for a theoretical contribution that deals with the detection of collective learning. The aim is to examine and clarify the genesis processes of collective learning. The empirical basis is a telecoms context with task-driven networking across both internal and external organisational borders.…

  16. Visualising Cultures: The "European Picture Book Collection" Moves "Down Under"

    ERIC Educational Resources Information Center

    Cotton, Penni; Daly, Nicola

    2015-01-01

    The potential for picture books in national collections to act as mirrors reflecting the reader's cultural identity, is widely accepted. This paper shows that the books in a New Zealand Picture Book Collection can also become windows into unfamiliar worlds for non-New Zealand readers, giving them the opportunity to learn more about a context in…

  17. High School Accountability: The Role of Perceived Collective Efficacy

    ERIC Educational Resources Information Center

    Goddard, Roger D.; LoGerfo, Laura; Hoy, Wayne K.

    2004-01-01

    This study examined the relationship between collective efficacy and high school student achievement in a state with an accountability system heavily focused on achievement, measured by mandatory assessments in multiple content areas. Using social cognitive theory, a theoretical model was developed linking school context and collective efficacy to…

  18. Context-awareness in ubiquitous computing and the mobile devices

    NASA Astrophysics Data System (ADS)

    Akçit, Nuhcan; Tomur, Emrah; Karslıoǧlu, Mahmut Onur

    2015-06-01

    Mobile device use has vastly increased in the last few years. Many people use many mobile devices in their daily lives. Context-aware computing is the main feature of pervasive and ubiquitous computing. Context awareness is also an important topic that becomes more available with ubiquitous computing. As the sensors increase, the data collected via mobile device sensors and sensor networks do not have much value because of the difficulty in analysis and understanding the data. Context-aware computing helps us store contextual information and use or search it by mobile devices when we want to see or analyze it. Contextual data can be made more meaningful by context-aware processing. There are different types of data and context information that must be considered. By combining spatial and contextual data, we obtain more meaningful data based on the entities. Contextual data is any information that can be used to characterize the situation of the entity. The entity is a person, place, or object considered relevant to the interaction between the user and an application, including the users and the applications. Using contextual data and good integration to mobile devices adds great value to this data, and combining these with our other data sets will allow us to obtain more useful information and analysis.

  19. Context representation and fusion: advancements and opportunities.

    PubMed

    Khattak, Asad Masood; Akbar, Noman; Aazam, Mohammad; Ali, Taqdir; Khan, Adil Mehmood; Jeon, Seokhee; Hwang, Myunggwon; Lee, Sungyoung

    2014-01-01

    The acceptance and usability of context-aware systems have given them the edge of wide use in various domains and has also attracted the attention of researchers in the area of context-aware computing. Making user context information available to such systems is the center of attention. However, there is very little emphasis given to the process of context representation and context fusion which are integral parts of context-aware systems. Context representation and fusion facilitate in recognizing the dependency/relationship of one data source on another to extract a better understanding of user context. The problem is more critical when data is emerging from heterogeneous sources of diverse nature like sensors, user profiles, and social interactions and also at different timestamps. Both the processes of context representation and fusion are followed in one way or another; however, they are not discussed explicitly for the realization of context-aware systems. In other words most of the context-aware systems underestimate the importance context representation and fusion. This research has explicitly focused on the importance of both the processes of context representation and fusion and has streamlined their existence in the overall architecture of context-aware systems' design and development. Various applications of context representation and fusion in context-aware systems are also highlighted in this research. A detailed review on both the processes is provided in this research with their applications. Future research directions (challenges) are also highlighted which needs proper attention for the purpose of achieving the goal of realizing context-aware systems. PMID:24887042

  20. Context Representation and Fusion: Advancements and Opportunities

    PubMed Central

    Khattak, Asad Masood; Akbar, Noman; Aazam, Mohammad; Ali, Taqdir; Khan, Adil Mehmood; Jeon, Seokhee; Hwang, Myunggwon; Lee, Sungyoung

    2014-01-01

    The acceptance and usability of context-aware systems have given them the edge of wide use in various domains and has also attracted the attention of researchers in the area of context-aware computing. Making user context information available to such systems is the center of attention. However, there is very little emphasis given to the process of context representation and context fusion which are integral parts of context-aware systems. Context representation and fusion facilitate in recognizing the dependency/relationship of one data source on another to extract a better understanding of user context. The problem is more critical when data is emerging from heterogeneous sources of diverse nature like sensors, user profiles, and social interactions and also at different timestamps. Both the processes of context representation and fusion are followed in one way or another; however, they are not discussed explicitly for the realization of context-aware systems. In other words most of the context-aware systems underestimate the importance context representation and fusion. This research has explicitly focused on the importance of both the processes of context representation and fusion and has streamlined their existence in the overall architecture of context-aware systems’ design and development. Various applications of context representation and fusion in context-aware systems are also highlighted in this research. A detailed review on both the processes is provided in this research with their applications. Future research directions (challenges) are also highlighted which needs proper attention for the purpose of achieving the goal of realizing context-aware systems. PMID:24887042

  1. Context learning in the rodent hippocampus.

    PubMed

    Fuhs, Mark C; Touretzky, David S

    2007-12-01

    We present a Bayesian statistical theory of context learning in the rodent hippocampus. While context is often defined in an experimental setting in relation to specific background cues or task demands, we advance a single, more general notion of context that suffices for a variety of learning phenomena. Specifically, a context is defined as a statistically stationary distribution of experiences, and context learning is defined as the problem of how to form contexts out of groups of experiences that cluster together in time. The challenge of context learning is solving the model selection problem: How many contexts make up the rodent's world? Solving this problem requires balancing two opposing goals: minimize the variability of the distribution of experiences within a context and minimize the likelihood of transitioning between contexts. The theory provides an understanding of why hippocampal place cell remapping sometimes develops gradually over many days of experience and why even consistent landmark differences may need to be relearned after other environmental changes. The theory provides an explanation for progressive performance improvements in serial reversal learning, based on a clear dissociation between the incremental process of context learning and the relatively abrupt context selection process. The impact of partial reinforcement on reversal learning is also addressed. Finally, the theory explains why alternating sequence learning does not consistently result in unique context-dependent sequence representations in hippocampus.

  2. The shading cue in context

    PubMed Central

    Wagemans, Johan; van Doorn, Andrea J; Koenderink, Jan J

    2010-01-01

    The shading cue is supposed to be a major factor in monocular stereopsis. However, the hypothesis is hardly corroborated by available data. For instance, the conventional stimulus used in perception research, which involves a circular disk with monotonic luminance gradient on a uniform surround, is theoretically ‘explained’ by any quadric surface, including spherical caps or cups (the conventional response categories), cylindrical ruts or ridges, and saddle surfaces. Whereas cylindrical ruts or ridges are reported when the outline is changed from circular to square, saddle surfaces are never reported. We introduce a method that allows us to differentiate between such possible responses. We report observations on a number of variations of the conventional stimulus, including variations of shape and quality of the boundary, and contexts that allow the observer to infer illumination direction. We find strong and expected influences of outline shape, but, perhaps surprisingly, we fail to find any influence of context, and only partial influence of outline quality. Moreover, we report appreciable differences within the generic population. We trace some of the idiosyncrasies (as compared to shape from shading algorithms) of the human observer to generic properties of the environment, in particular the fact that many objects are limited in size and elliptically convex over most of their boundaries. PMID:23145221

  3. Context-aware visual tracking.

    PubMed

    Yang, Ming; Wu, Ying; Hua, Gang

    2009-07-01

    Enormous uncertainties in unconstrained environments lead to a fundamental dilemma that many tracking algorithms have to face in practice: Tracking has to be computationally efficient, but verifying whether or not the tracker is following the true target tends to be demanding, especially when the background is cluttered and/or when occlusion occurs. Due to the lack of a good solution to this problem, many existing methods tend to be either effective but computationally intensive by using sophisticated image observation models or efficient but vulnerable to false alarms. This greatly challenges long-duration robust tracking. This paper presents a novel solution to this dilemma by considering the context of the tracking scene. Specifically, we integrate into the tracking process a set of auxiliary objects that are automatically discovered in the video on the fly by data mining. Auxiliary objects have three properties, at least in a short time interval: 1) persistent co-occurrence with the target, 2) consistent motion correlation to the target, and 3) easy to track. Regarding these auxiliary objects as the context of the target, the collaborative tracking of these auxiliary objects leads to efficient computation as well as strong verification. Our extensive experiments have exhibited exciting performance in very challenging real-world testing cases.

  4. Context-Aware Recommender Systems

    NASA Astrophysics Data System (ADS)

    Adomavicius, Gediminas; Tuzhilin, Alexander

    The importance of contextual information has been recognized by researchers and practitioners in many disciplines, including e-commerce personalization, information retrieval, ubiquitous and mobile computing, data mining, marketing, and management. While a substantial amount of research has already been performed in the area of recommender systems, most existing approaches focus on recommending the most relevant items to users without taking into account any additional contextual information, such as time, location, or the company of other people (e.g., for watching movies or dining out). In this chapter we argue that relevant contextual information does matter in recommender systems and that it is important to take this information into account when providing recommendations. We discuss the general notion of context and how it can be modeled in recommender systems. Furthermore, we introduce three different algorithmic paradigms - contextual prefiltering, post-filtering, and modeling - for incorporating contextual information into the recommendation process, discuss the possibilities of combining several contextaware recommendation techniques into a single unifying approach, and provide a case study of one such combined approach. Finally, we present additional capabilities for context-aware recommenders and discuss important and promising directions for future research.

  5. Motor interference in interactive contexts

    PubMed Central

    Chinellato, Eris; Castiello, Umberto; Sartori, Luisa

    2015-01-01

    Action observation and execution share overlapping neural substrates, so that simultaneous activation by observation and execution modulates motor performance. Previous literature on simple prehension tasks has revealed that motor influence can be two-sided: facilitation for observed and performed congruent actions and interference for incongruent actions. But little is known of the specific modulations of motor performance in complex forms of interaction. Is it possible that the very same observed movement can lead either to interference or facilitation effects on a temporally overlapping congruent executed action, depending on the context? To answer this question participants were asked to perform a reach-to-grasp movement adopting a precision grip (PG) while: (i) observing a fixation cross, (ii) observing an actor performing a PG with interactive purposes, (iii) observing an actor performing a PG without interactive purposes. In particular, in the interactive condition the actor was shown trying to pour some sugar on a large cup located out of her reach but close to the participant watching the video, thus eliciting in reaction a complementary whole-hand grasp. Notably, fine-grained kinematic analysis for this condition revealed a specific delay in the grasping and reaching components and an increased trajectory deviation despite the observed and executed movement’s congruency. Moreover, early peaks of trajectory deviation seem to indicate that socially relevant stimuli are acknowledged by the motor system very early. These data suggest that interactive contexts can determine a prompt modulation of stimulus–response compatibility effects. PMID:26113835

  6. Reward, context, and human behaviour.

    PubMed

    Blaukopf, Clare L; DiGirolamo, Gregory J

    2007-01-01

    Animal models of reward processing have revealed an extensive network of brain areas that process different aspects of reward, from expectation and prediction to calculation of relative value. These results have been confirmed and extended in human neuroimaging to encompass secondary rewards more unique to humans, such as money. The majority of the extant literature covers the brain areas associated with rewards whilst neglecting analysis of the actual behaviours that these rewards generate. This review strives to redress this imbalance by illustrating the importance of looking at the behavioural outcome of rewards and the context in which they are produced. Following a brief review of the literature of reward-related activity in the brain, we examine the effect of reward context on actions. These studies reveal how the presence of reward vs. reward and punishment, or being conscious vs. unconscious of reward-related actions, differentially influence behaviour. The latter finding is of particular importance given the extent to which animal models are used in understanding the reward systems of the human mind. It is clear that further studies are needed to learn about the human reaction to reward in its entirety, including any distinctions between conscious and unconscious behaviours. We propose that studies of reward entail a measure of the animal's (human or nonhuman) knowledge of the reward and knowledge of its own behavioural outcome to achieve that reward. PMID:17619748

  7. Collective excitations of supersymmetric plasma

    SciTech Connect

    Czajka, Alina; Mrowczynski, Stanislaw

    2011-02-15

    Collective excitations of N=1 supersymmetric electromagnetic plasma are studied. Since the Keldysh-Schwinger approach is used, not only equilibrium but also nonequilibrium plasma, which is assumed to be ultrarelativistic, is under consideration. The dispersion equations of photon, photino, electron, and selectron modes are written down and the self-energies, which enter the equations, are computed in the hard loop approximation. The self-energies are discussed in the context of effective action which is also given. The photon modes and electron ones appear to be the same as in the usual ultrarelativistic plasma of electrons, positrons, and photons. The photino modes coincide with the electron ones and the selectron modes are as of a free relativistic massive particle.

  8. The Cognitive Context of Argument.

    ERIC Educational Resources Information Center

    Hample, Dale

    A study focusing on argument as a receiver-contained phenomenon assessed the differential importance of (new) arguments stimulated by a message, as opposed to (old) arguments previously integrated. Data were collected from 207 college students in a pretest, posttest, and delayed posttest design. The subjects provided information on their attitudes…

  9. Keywords in the Australian Context

    ERIC Educational Resources Information Center

    Doecke, Brenton; Howie, Mark; Sawyer, Wayne

    2006-01-01

    Borrowing the title of Raymond Williams' famous study, the following reflections--sometimes collective and sometimes individual--are based on a series of "Keywords", specifically: "fear" "community" and "creativity". By reflecting on the meanings these words have for us today, we attempt to capture their dialogical character, posing them as sites…

  10. Collection Mode Lens System

    DOEpatents

    Fletcher, Daniel A.; Kino, Gordon S.

    2002-11-05

    A lens system including a collection lens and a microlens spaced from the collection lens adjacent the region to be observed. The diameter of the observablel region depends substantially on the radius of the microlens.

  11. Guide to data collection

    NASA Technical Reports Server (NTRS)

    1981-01-01

    Guidelines and recommendations are presented for the collection of software development data. Motivation and planning for, and implementation and management of, a data collection effort are discussed. Topics covered include types, sources, and availability of data; methods and costs of data collection; types of analyses supported; and warnings and suggestions based on software engineering laboratory (SEL) experiences. This document is intended as a practical guide for software managers and engineers, abstracted and generalized from 5 years of SEL data collection.

  12. What Is a Collection?

    ERIC Educational Resources Information Center

    Lee, Hur-Li

    2000-01-01

    Examines traditional conceptions of a library collection, and reveals four major presumptions associated with collections: tangibility, ownership, a user community, and an integrated retrieval mechanism. Explores challenges posed by media, and proposes an expanded concept of collection that considers the perspectives of both user and collection…

  13. Student Loan Collection Procedures.

    ERIC Educational Resources Information Center

    National Association of College and University Business Officers, Washington, DC.

    This manual on the collection of student loans is intended for the use of business officers and loan collection personnel of colleges and universities of all sizes. The introductory chapter is an overview of sound collection practices and procedures. It discusses the making of a loan, in-school servicing of the accounts, the exit interview, the…

  14. Collection Development Project.

    ERIC Educational Resources Information Center

    Nuby, Mary

    Undertaken to provide data on the current status of collection development in selected academic libraries, this study also analyzed the structure of the collection development function at Chicago Academic Library Council (CALC) institutions and outlined a formal collection development policy for Chicago State University's Douglas Library.…

  15. False Context Fear Memory in Rats

    ERIC Educational Resources Information Center

    Bae, Sarah; Holmes, Nathan M.; Westbrook, R. Frederick

    2015-01-01

    Four experiments used rats to study false context fear memories. In Experiment 1, rats were pre-exposed to a distinctive chamber (context A) or to a control environment (context C), shocked after a delay in a second chamber (context B) and tested either in B or A. Rats pre-exposed to A froze just as much as control rats in B but more than control…

  16. Re-ranking with context for high-performance biomedical information retrieval.

    PubMed

    Yin, Xiaoshi; Huang, Jimmy Xiangji; Li, Zhoujun

    2012-01-01

    In this paper, we present a context-sensitive approach to re-ranking retrieved documents for further improving the effectiveness of high-performance biomedical literature retrieval systems. For each topic, a two-dimensional positive context is learnt from the top N retrieved documents and a group of negative contexts are learnt from the last N' documents in initial retrieval ranked list. The contextual space contains lexical context and conceptual context. The probabilities that retrieved documents are generated within the contextual space are then computed for document re-ranking. Empirical evaluation on the TREC Genomics full-text collection and three high-performance biomedical literature retrieval runs demonstrates that the context-sensitive re-ranking approach yields better retrieval performance.

  17. Considering Context: Developing Students' Leadership Capacity

    ERIC Educational Resources Information Center

    Osteen, Laura; Coburn, Mary B.

    2012-01-01

    The International Leadership Association's (ILA) Guiding Questions (2009) identify context as the foundational framework from which educators build successful leadership programs. Echoing sentiments from W. K. Kellogg's landmark study "Leadership in the Making" (Zimmerman-Oster and Burkhardt, 1999), context matters. Context includes tangible and…

  18. Stress Disrupts Context-Dependent Memory

    ERIC Educational Resources Information Center

    Schwabe, Lars; Bohringer, Andreas; Wolf, Oliver T.

    2009-01-01

    Memory is facilitated when the retrieval context resembles the learning context. The brain structures underlying contextual influences on memory are susceptible to stress. Whether stress interferes with context-dependent memory is still unknown. We exposed healthy adults to stress or a control procedure before they learned an object-location task…

  19. Context management platform for tourism applications.

    PubMed

    Buján, David; Martín, David; Torices, Ortzi; López-de-Ipiña, Diego; Lamsfus, Carlos; Abaitua, Joseba; Alzua-Sorzabal, Aurkene

    2013-06-24

    The notion of context has been widely studied and there are several authors that have proposed different definitions of context. However, context has not been widely studied in the framework of human mobility and the notion of context has been imported directly from other computing fields without specifically addressing the tourism domain requirements. In order to store and manage context information a context data model and a context management platform are needed. Ontologies have been widely used in context modelling, but many of them are designed to be applied in general ubiquitous computing environments, do not contain specific concepts related to the tourism domain or some approaches do not contain enough concepts to represent context information related to the visitor on the move. That is why we propose a new approach to provide a better solution to model context data in tourism environments, adding more value to our solution reusing data about tourist resources from an Open Data repository and publishing it as Linked Data. We also propose the architecture for a context information management platform based on this context data model.

  20. Context Management Platform for Tourism Applications

    PubMed Central

    Buján, David; Martín, David; Torices, Ortzi; López-de-Ipiña, Diego; Lamsfus, Carlos; Abaitua, Joseba; Alzua-Sorzabal, Aurkene

    2013-01-01

    The notion of context has been widely studied and there are several authors that have proposed different definitions of context. However, context has not been widely studied in the framework of human mobility and the notion of context has been imported directly from other computing fields without specifically addressing the tourism domain requirements. In order to store and manage context information a context data model and a context management platform are needed. Ontologies have been widely used in context modelling, but many of them are designed to be applied in general ubiquitous computing environments, do not contain specific concepts related to the tourism domain or some approaches do not contain enough concepts to represent context information related to the visitor on the move. That is why we propose a new approach to provide a better solution to model context data in tourism environments, adding more value to our solution reusing data about tourist resources from an Open Data repository and publishing it as Linked Data. We also propose the architecture for a context information management platform based on this context data model. PMID:23797739

  1. Context Utilization in Young and Old Adults.

    ERIC Educational Resources Information Center

    Hess, Thomas M.; Higgins, James N.

    1983-01-01

    Examined adult age differences in use of context to study and retrieve information. Young and old adults were presented with a series of homographs (targets). Recognition memory for targets was tested. Recognition decreased in both groups as the retrieval context became more dissimilar to the study context. (Author/JAC)

  2. Context and the human microbiome.

    PubMed

    McDonald, Daniel; Birmingham, Amanda; Knight, Rob

    2015-11-04

    Human microbiome reference datasets provide epidemiological context for researchers, enabling them to uncover new insights into their own data through meta-analyses. In addition, large and comprehensive reference sets offer a means to develop or test hypotheses and can pave the way for addressing practical study design considerations such as sample size decisions. We discuss the importance of reference sets in human microbiome research, limitations of existing resources, technical challenges to employing reference sets, examples of their usage, and contributions of the American Gut Project to the development of a comprehensive reference set. Through engaging the general public, the American Gut Project aims to address many of the issues present in existing reference resources, characterizing health and disease, lifestyle, and dietary choices of the participants while extending its efforts globally through international collaborations.

  3. Context based configuration management system

    NASA Technical Reports Server (NTRS)

    Gawdiak, Yuri O. (Inventor); Gurram, Mohana M. (Inventor); Maluf, David A. (Inventor); Mederos, Luis A. (Inventor)

    2010-01-01

    A computer-based system for configuring and displaying information on changes in, and present status of, a collection of events associated with a project. Classes of icons for decision events, configurations and feedback mechanisms, and time lines (sequential and/or simultaneous) for related events are displayed. Metadata for each icon in each class is displayed by choosing and activating the corresponding icon. Access control (viewing, reading, writing, editing, deleting, etc.) is optionally imposed for metadata and other displayed information.

  4. Social capital in an outdoor recreation context.

    PubMed

    Mann, Marilynne; Leahy, Jessica

    2010-02-01

    This study examined social capital development in three all-terrain vehicles (ATV) clubs in Maine using an adapted version of Lin's (2001) social capital theory model. The structural components of social capital identified included collective assets and individual assets in the form of normative behavior and trust relationships. Also identified were counter-norms for individual ATV riders identified as having divergent norms from club members. The second component of social capital is access to and mobilization of network contacts and resources. Access networks in the context of the ATV clubs studied were identified as community and landowner relations while mobilization of resources was existent in club membership attempts toward self-governance and efforts of the statewide "umbrella" organization. Instrumental outcomes benefit society and expressive outcomes benefit the individual. Both types of returns are present in the data suggesting that ATV clubs are creating social capital. This is important information to clubs who desire to market themselves, improve their reputations, and enhance their volunteer association. It is of further interest to state governments who fund clubs through trail grants as proof that a return on investment is being realized. Theoretical and applied implications for these and other types of recreation-based volunteer associations (e.g., clubs, friends groups, advocacy groups) are presented.

  5. Social Capital in an Outdoor Recreation Context

    NASA Astrophysics Data System (ADS)

    Mann, Marilynne; Leahy, Jessica

    2010-02-01

    This study examined social capital development in three all-terrain vehicles (ATV) clubs in Maine using an adapted version of Lin’s (2001) social capital theory model. The structural components of social capital identified included collective assets and individual assets in the form of normative behavior and trust relationships. Also identified were counter-norms for individual ATV riders identified as having divergent norms from club members. The second component of social capital is access to and mobilization of network contacts and resources. Access networks in the context of the ATV clubs studied were identified as community and landowner relations while mobilization of resources was existent in club membership attempts toward self-governance and efforts of the statewide “umbrella” organization. Instrumental outcomes benefit society and expressive outcomes benefit the individual. Both types of returns are present in the data suggesting that ATV clubs are creating social capital. This is important information to clubs who desire to market themselves, improve their reputations, and enhance their volunteer association. It is of further interest to state governments who fund clubs through trail grants as proof that a return on investment is being realized. Theoretical and applied implications for these and other types of recreation-based volunteer associations (e.g., clubs, friends groups, advocacy groups) are presented.

  6. Privacy and Property in the Biobank Context

    PubMed Central

    2010-01-01

    A research biobank is a collection of personal health and lifestyle information, including genetic samples of yet unknown but possibly large information potential about the participant. For the participants, the risk of taking part is not bodily harm but infringements of their privacy and the harmful consequences such infringements might have. But what do we mean by privacy? Which harms are we talking about? To address such questions we need to get a grip on what privacy is all about and aim for a fruitful perspective on the issues of property and privacy rights in the context of biobanking. This paper argues that the limits and handling of private matters is determined in specific social relations. The crucial point is thus to determine which information and activities are or are not the legitimate concern of others. Privacy and property rights should be seen as balanced by duties, that is as inherently relational interests extending into the public sphere, rather than to see these rights as the control of an object—for instance the participant’s biobank material. PMID:20799053

  7. Social capital in an outdoor recreation context.

    PubMed

    Mann, Marilynne; Leahy, Jessica

    2010-02-01

    This study examined social capital development in three all-terrain vehicles (ATV) clubs in Maine using an adapted version of Lin's (2001) social capital theory model. The structural components of social capital identified included collective assets and individual assets in the form of normative behavior and trust relationships. Also identified were counter-norms for individual ATV riders identified as having divergent norms from club members. The second component of social capital is access to and mobilization of network contacts and resources. Access networks in the context of the ATV clubs studied were identified as community and landowner relations while mobilization of resources was existent in club membership attempts toward self-governance and efforts of the statewide "umbrella" organization. Instrumental outcomes benefit society and expressive outcomes benefit the individual. Both types of returns are present in the data suggesting that ATV clubs are creating social capital. This is important information to clubs who desire to market themselves, improve their reputations, and enhance their volunteer association. It is of further interest to state governments who fund clubs through trail grants as proof that a return on investment is being realized. Theoretical and applied implications for these and other types of recreation-based volunteer associations (e.g., clubs, friends groups, advocacy groups) are presented. PMID:20016986

  8. Privacy and property in the biobank context.

    PubMed

    Ursin, Lars Oystein

    2010-09-01

    A research biobank is a collection of personal health and lifestyle information, including genetic samples of yet unknown but possibly large information potential about the participant. For the participants, the risk of taking part is not bodily harm but infringements of their privacy and the harmful consequences such infringements might have. But what do we mean by privacy? Which harms are we talking about? To address such questions we need to get a grip on what privacy is all about and aim for a fruitful perspective on the issues of property and privacy rights in the context of biobanking. This paper argues that the limits and handling of private matters is determined in specific social relations. The crucial point is thus to determine which information and activities are or are not the legitimate concern of others. Privacy and property rights should be seen as balanced by duties, that is as inherently relational interests extending into the public sphere, rather than to see these rights as the control of an object--for instance the participant's biobank material.

  9. Use of Context in Video Processing

    NASA Astrophysics Data System (ADS)

    Wu, Chen; Aghajan, Hamid

    Interpreting an event or a scene based on visual data often requires additional contextual information. Contextual information may be obtained from different sources. In this chapter, we discuss two broad categories of contextual sources: environmental context and user-centric context. Environmental context refers to information derived from domain knowledge or from concurrently sensed effects in the area of operation. User-centric context refers to information obtained and accumulated from the user. Both types of context can include static or dynamic contextual elements. Examples from a smart home environment are presented to illustrate how different types of contextual data can be applied to aid the decision-making process.

  10. Concepts of context in music therapy

    PubMed Central

    Rolvsjord, Randi; Stige, Brynjulf

    2015-01-01

    In contemporary music therapy as well as in related interdisciplinary fields, the importance of context in relation to theory, research, and practice has been emphasized. However, the word context seems to be used in several different ways and conceptualizations of contextual approaches vary too. The objective of this theoretical article is to clarify traditions of language use in relation to context in music therapy. In reviewing and discussing the literature, we focus on the field of mental health care. When discussing issues related to context, this literature partly focuses on the surroundings of music therapy practice, partly on the ecology of reciprocal influences within and between situations or systems. On this basis, three types of context awareness in music therapy are identified: music therapy in context; music therapy as context; and music therapy as interacting contexts. The identified types of context awareness are exemplified through references to music therapy literature and then discussed in relation to two very different metaphors, namely context as frame and context as link. Implications for practice, research, and theory development in music therapy are suggested. PMID:26157199

  11. Context-specific adaptation of saccade gain

    NASA Technical Reports Server (NTRS)

    Shelhamer, Mark; Clendaniel, Richard A.

    2002-01-01

    Previous studies established that vestibular reflexes can have two adapted states (e.g., gain) simultaneously, and that a context cue (e.g., vertical eye position) can switch between the two states. The present study examined this phenomenon of context-specific adaptationfor horizontal saccades, using a variety of contexts. Our overall goal was to assess the efficacy of different context cues in switching between adapted states. A standard double-step paradigm was used to adapt saccade gain. In each experiment, we asked for a simultaneous gain decrease in one context and gain increase in another context, and then determined if a change in the context would invoke switching between the adapted states. Horizontal eye position worked well as a context cue: saccades with the eyes deviated to the right could be made to have higher gains while saccades with the eyes deviated to the left could be made to have lower gains. Vertical eye position was less effective. This suggests that the more closely related a context cue is to the response being adapted, the more effective it is. Roll tilt of the head, and upright versus supine orientations, were somewhat effective in context switching; these paradigms contain orientation of gravity with respect to the head as part of the context.

  12. A spatial planetary image database in the context of processing

    NASA Astrophysics Data System (ADS)

    Willner, K.; Tasdelen, E.

    2015-10-01

    Planetary image data is collected and archived by e.g. the European Planetary Science Archive (PSA) or its US counterpart the Planetary Data System (PDS). These archives usually organize the data according to missions and their respective instruments. Search queries can be posted to retrieve data of interest for a specific instrument data set. In the context of processing data of a number of sensors and missions this is not practical. In the scope of the EU FP7 project PRoViDE meta-data from imaging sensors were collected from PSA as well as PDS and were rearranged and restructured according to the processing needs. Exemplary image data gathered from rover and lander missions operated on the Martian surface was organized into a new unique data base. The data base is a core component of the PRoViDE processing and visualization system as it enables multi-mission and -sensor searches to fully exploit the collected data.

  13. Dynamics of Context-Dependent Recall: An Examination of Internal and External Context Change

    ERIC Educational Resources Information Center

    Unsworth, Nash; Spillers, Gregory J.; Brewer, Gene A.

    2012-01-01

    Retrieval dynamics in context-dependent recall were explored via manipulations of external and internal context in two experiments. Participants were tested in either the same or different context as the material was learned in and correct recalls, errors, and recall latency measures were examined. In both experiments changes in context resulted…

  14. Determinants of Prosocial Behavior in Included Versus Excluded Contexts

    PubMed Central

    Cuadrado, Esther; Tabernero, Carmen; Steinel, Wolfgang

    2016-01-01

    Prosocial behavior (PSB) is increasingly becoming necessary as more and more individuals experience exclusion. In this context it is important to understand the motivational determinants of PSB. Here we report two experiments which analyzed the influence of dispositional (prosocialness; rejection sensitivity) and motivational variables (prosocial self-efficacy; prosocial collective efficacy; trust; anger; social affiliation motivation) on PSB under neutral contexts (Study 1), and once under inclusion or exclusion conditions (Study 2). Both studies provided evidence for the predicted mediation of PSB. Results in both neutral and inclusion and exclusion conditions supported our predictive model of PSB. In the model dispositional variables predicted motivational variables, which in turn predicted PSB. We showed that the investigated variables predicted PSB; this suggests that to promote PSB one could (1) foster prosocialness, prosocial self and collective efficacy, trust in others and affiliation motivation and (2) try to reduce negative feelings and the tendency to dread rejection in an attempt to reduce the negative impact that these variables have on PSB. Moreover, the few differences that emerged in the model between the inclusion and exclusion contexts suggested that in interventions with excluded individuals special care emphasis should be placed on addressing rejection sensitivity and lack of trust. PMID:26779103

  15. Solar energy collection system

    NASA Technical Reports Server (NTRS)

    Selcuk, M. K. (Inventor)

    1977-01-01

    An improved solar energy collection system, having enhanced energy collection and conversion capabilities, is delineated. The system is characterized by a plurality of receivers suspended above a heliostat field comprising a multiplicity of reflector surfaces, each being adapted to direct a concentrated beam of solar energy to illuminate a target surface for a given receiver. A magnitude of efficiency, suitable for effectively competing with systems employed in collecting and converting energy extracted from fossil fuels, is indicated.

  16. Sensory, motor, and combined contexts for context-specific adaptation of saccade gain in humans

    NASA Technical Reports Server (NTRS)

    Shelhamer, Mark; Clendaniel, Richard

    2002-01-01

    Saccadic eye movements can be adapted in a context-specific manner such that their gain can be made to depend on the state of a prevailing context cue. We asked whether context cues are more effective if their nature is primarily sensory, motor, or a combination of sensory and motor. Subjects underwent context-specific adaptation using one of three different context cues: a pure sensory context (head roll-tilt right or left); a pure motor context (changes in saccade direction); or a combined sensory-motor context (head roll-tilt and changes in saccade direction). We observed context-specific adaptation in each condition; the greatest degree of context-specificity occurred in paradigms that used the motor cue, alone or in conjunction with the sensory cue. Copyright 2002 Elsevier Science Ireland Ltd.

  17. Environmental indicators of biofuel sustainability: what about context?

    PubMed

    Efroymson, Rebecca A; Dale, Virginia H; Kline, Keith L; McBride, Allen C; Bielicki, Jeffrey M; Smith, Raymond L; Parish, Esther S; Schweizer, Peter E; Shaw, Denice M

    2013-02-01

    Indicators of the environmental sustainability of biofuel production, distribution, and use should be selected, measured, and interpreted with respect to the context in which they are used. The context of a sustainability assessment includes the purpose, the particular biofuel production and distribution system, policy conditions, stakeholder values, location, temporal influences, spatial scale, baselines, and reference scenarios. We recommend that biofuel sustainability questions be formulated with respect to the context, that appropriate indicators of environmental sustainability be developed or selected from more generic suites, and that decision makers consider context in ascribing meaning to indicators. In addition, considerations such as technical objectives, varying values and perspectives of stakeholder groups, indicator cost, and availability and reliability of data need to be understood and considered. Sustainability indicators for biofuels are most useful if adequate historical data are available, information can be collected at appropriate spatial and temporal scales, organizations are committed to use indicator information in the decision-making process, and indicators can effectively guide behavior toward more sustainable practices.

  18. Environmental Indicators of Biofuel Sustainability: What About Context?

    NASA Astrophysics Data System (ADS)

    Efroymson, Rebecca A.; Dale, Virginia H.; Kline, Keith L.; McBride, Allen C.; Bielicki, Jeffrey M.; Smith, Raymond L.; Parish, Esther S.; Schweizer, Peter E.; Shaw, Denice M.

    2013-02-01

    Indicators of the environmental sustainability of biofuel production, distribution, and use should be selected, measured, and interpreted with respect to the context in which they are used. The context of a sustainability assessment includes the purpose, the particular biofuel production and distribution system, policy conditions, stakeholder values, location, temporal influences, spatial scale, baselines, and reference scenarios. We recommend that biofuel sustainability questions be formulated with respect to the context, that appropriate indicators of environmental sustainability be developed or selected from more generic suites, and that decision makers consider context in ascribing meaning to indicators. In addition, considerations such as technical objectives, varying values and perspectives of stakeholder groups, indicator cost, and availability and reliability of data need to be understood and considered. Sustainability indicators for biofuels are most useful if adequate historical data are available, information can be collected at appropriate spatial and temporal scales, organizations are committed to use indicator information in the decision-making process, and indicators can effectively guide behavior toward more sustainable practices.

  19. Dermatophyte infections in environmental contexts.

    PubMed

    Segal, Esther; Frenkel, Michael

    2015-09-01

    Fungal dermal diseases caused by the molds of the Dermatophyte family are among the most frequent infectious diseases affecting quality of life. There are 3 attributed sources of infection by Dermatophytes:1) humans; 2) animals and 3) soil. Dermatophytes posses the ability to utilize keratin from human and animal tissues, or debris from dead animal sources found in soil, such as feathers, skin or nails. Hence, Dermatophytes are abundant in different ecological niches. All 3 groups can infect humans, causing dermatophytoses manifested in different clinical entities involving skin, hair or nails. The mode of infection of the Dermatophytes is via direct or indirect contact. Dermatophytes are found universally, however the relative prevalence of dermatophytoses caused by different Dermatophytes may vary in different geographic areas according to climatic conditions or lifestyle. Thus, studies in different geographic areas assessing the specific fungal etiology involved are of epidemiological relevance serving as baseline information for management of dermatophytoses at the local level. The present article will focus, mostly, on epidemiological data from published surveys conducted in different geographic/climatic areas analyzing the prevalence of specific Dermatophyte species in regard to gender, age, type of infection in context of environmental factors.

  20. Vygotsky's Crisis: Argument, context, relevance.

    PubMed

    Hyman, Ludmila

    2012-06-01

    Vygotsky's The Historical Significance of the Crisis in Psychology (1926-1927) is an important text in the history and philosophy of psychology that has only become available to scholars in 1982 in Russian, and in 1997 in English. The goal of this paper is to introduce Vygotsky's conception of psychology to a wider audience. I argue that Vygotsky's argument about the "crisis" in psychology and its resolution can be fully understood only in the context of his social and political thinking. Vygotsky shared the enthusiasm, widespread among Russian leftist intelligentsia in the 1920s, that Soviet society had launched an unprecedented social experiment: The socialist revolution opened the way for establishing social conditions that would let the individual flourish. For Vygotsky, this meant that "a new man" of the future would become "the first and only species in biology that would create itself." He envisioned psychology as a science that would serve this humanist teleology. I propose that The Crisis is relevant today insofar as it helps us define a fundamental problem: How can we systematically account for the development of knowledge in psychology? I evaluate how Vygotsky addresses this problem as a historian of the crisis. PMID:22520196

  1. Vygotsky's Crisis: Argument, context, relevance.

    PubMed

    Hyman, Ludmila

    2012-06-01

    Vygotsky's The Historical Significance of the Crisis in Psychology (1926-1927) is an important text in the history and philosophy of psychology that has only become available to scholars in 1982 in Russian, and in 1997 in English. The goal of this paper is to introduce Vygotsky's conception of psychology to a wider audience. I argue that Vygotsky's argument about the "crisis" in psychology and its resolution can be fully understood only in the context of his social and political thinking. Vygotsky shared the enthusiasm, widespread among Russian leftist intelligentsia in the 1920s, that Soviet society had launched an unprecedented social experiment: The socialist revolution opened the way for establishing social conditions that would let the individual flourish. For Vygotsky, this meant that "a new man" of the future would become "the first and only species in biology that would create itself." He envisioned psychology as a science that would serve this humanist teleology. I propose that The Crisis is relevant today insofar as it helps us define a fundamental problem: How can we systematically account for the development of knowledge in psychology? I evaluate how Vygotsky addresses this problem as a historian of the crisis.

  2. Cloud Computing with Context Cameras

    NASA Astrophysics Data System (ADS)

    Pickles, A. J.; Rosing, W. E.

    2016-05-01

    We summarize methods and plans to monitor and calibrate photometric observations with our autonomous, robotic network of 2m, 1m and 40cm telescopes. These are sited globally to optimize our ability to observe time-variable sources. Wide field "context" cameras are aligned with our network telescopes and cycle every ˜2 minutes through BVr'i'z' filters, spanning our optical range. We measure instantaneous zero-point offsets and transparency (throughput) against calibrators in the 5-12m range from the all-sky Tycho2 catalog, and periodically against primary standards. Similar measurements are made for all our science images, with typical fields of view of ˜0.5 degrees. These are matched against Landolt, Stetson and Sloan standards, and against calibrators in the 10-17m range from the all-sky APASS catalog. Such measurements provide pretty good instantaneous flux calibration, often to better than 5%, even in cloudy conditions. Zero-point and transparency measurements can be used to characterize, monitor and inter-compare sites and equipment. When accurate calibrations of Target against Standard fields are required, monitoring measurements can be used to select truly photometric periods when accurate calibrations can be automatically scheduled and performed.

  3. Collective decision-making in microbes.

    PubMed

    Ross-Gillespie, Adin; Kümmerli, Rolf

    2014-01-01

    Microbes are intensely social organisms that routinely cooperate and coordinate their activities to express elaborate population level phenotypes. Such coordination requires a process of collective decision-making, in which individuals detect and collate information not only from their physical environment, but also from their social environment, in order to arrive at an appropriately calibrated response. Here, we present a conceptual overview of collective decision-making as it applies to all group-living organisms; we introduce key concepts and principles developed in the context of animal and human group decisions; and we discuss, with appropriate examples, the applicability of each of these concepts in microbial contexts. In particular, we discuss the roles of information pooling, control skew, speed vs. accuracy trade-offs, local feedbacks, quorum thresholds, conflicts of interest, and the reliability of social information. We conclude that collective decision-making in microbes shares many features with collective decision-making in higher taxa, and we call for greater integration between this fledgling field and other allied areas of research, including in the humanities and the physical sciences.

  4. Collective decision-making in microbes

    PubMed Central

    Ross-Gillespie, Adin; Kümmerli, Rolf

    2014-01-01

    Microbes are intensely social organisms that routinely cooperate and coordinate their activities to express elaborate population level phenotypes. Such coordination requires a process of collective decision-making, in which individuals detect and collate information not only from their physical environment, but also from their social environment, in order to arrive at an appropriately calibrated response. Here, we present a conceptual overview of collective decision-making as it applies to all group-living organisms; we introduce key concepts and principles developed in the context of animal and human group decisions; and we discuss, with appropriate examples, the applicability of each of these concepts in microbial contexts. In particular, we discuss the roles of information pooling, control skew, speed vs. accuracy trade-offs, local feedbacks, quorum thresholds, conflicts of interest, and the reliability of social information. We conclude that collective decision-making in microbes shares many features with collective decision-making in higher taxa, and we call for greater integration between this fledgling field and other allied areas of research, including in the humanities and the physical sciences. PMID:24624121

  5. A Tasteful Collection.

    ERIC Educational Resources Information Center

    Canadian Architect, 2003

    2003-01-01

    Describes the design of the Canadian Wine Library at the University of British Columbia, including the educational context and design goals. Includes information on the architects, manufacturers/suppliers, and construction team; a general building description; and commentary on the design. Also includes the floor plan and photographs. (EV)

  6. Modeling Users, Context and Devices for Ambient Assisted Living Environments

    PubMed Central

    Castillejo, Eduardo; Almeida, Aitor; López-de-Ipiña, Diego; Chen, Liming

    2014-01-01

    The participation of users within AAL environments is increasing thanks to the capabilities of the current wearable devices. Furthermore, the significance of considering user's preferences, context conditions and device's capabilities help smart environments to personalize services and resources for them. Being aware of different characteristics of the entities participating in these situations is vital for reaching the main goals of the corresponding systems efficiently. To collect different information from these entities, it is necessary to design several formal models which help designers to organize and give some meaning to the gathered data. In this paper, we analyze several literature solutions for modeling users, context and devices considering different approaches in the Ambient Assisted Living domain. Besides, we remark different ongoing standardization works in this area. We also discuss the used techniques, modeled characteristics and the advantages and drawbacks of each approach to finally draw several conclusions about the reviewed works. PMID:24643006

  7. Abortion and politics in Mexico: 'context is all'.

    PubMed

    Lamas, M; Bissell, S

    2000-11-01

    A strong collective pro-choice mentality was recently manifested in Mexico when a legislative initiative to revoke the legal right of rape survivor to abortion in the state of Guanajuato awakened national indignation. Pro-choice values were expressed in public opinion with such force that it sparked off the passage of liberalising law reforms in Mexico City and the state of Morelos. In this paper we trace the development of these manifestations of pro-choice views, beginning with the Democratic Revolution Party's (PRD) refusal in 1999 to modify abortion legislation within the context of penal code reform, and moving through the events surrounding the Guanajuato reform, and the pro-choice response of Mexico City and Morelos legislators. This analysis allows us to recognise the emergence of a pro-choice consciousness and to understand that, when it comes to abortion, 'context is all'. PMID:11424237

  8. Abortion and politics in Mexico: 'context is all'.

    PubMed

    Lamas, M; Bissell, S

    2000-11-01

    A strong collective pro-choice mentality was recently manifested in Mexico when a legislative initiative to revoke the legal right of rape survivor to abortion in the state of Guanajuato awakened national indignation. Pro-choice values were expressed in public opinion with such force that it sparked off the passage of liberalising law reforms in Mexico City and the state of Morelos. In this paper we trace the development of these manifestations of pro-choice views, beginning with the Democratic Revolution Party's (PRD) refusal in 1999 to modify abortion legislation within the context of penal code reform, and moving through the events surrounding the Guanajuato reform, and the pro-choice response of Mexico City and Morelos legislators. This analysis allows us to recognise the emergence of a pro-choice consciousness and to understand that, when it comes to abortion, 'context is all'.

  9. [Experiencing care in the birthing center context: the users' perspective].

    PubMed

    Gonçalves, Roselane; de Azevedo Aguiar, Cláudia; Merighi, Miriam Aparecida Barbosa; de Jesus, Maria Cristina Pinto

    2011-03-01

    In Brazil, the delivery and birth care model in Brazil has been the topic of many studies and discussions about introducing obstetric practices that take women's autonomy into account in the parturition process. Birthing Centers propose models that represent a new scenario to deliver such care. The objective of this was to understand the experience of women in labor in the context of a Birthing Center located in the city of São Paulo. Data was collected from March to October 2007 and analyzed according to the Alfred Schütz social phenomenology framework. Seven women participated in this study. Results showed that women choose the Birthing Center expecting to receive humanized care and that, within this context, they have positive and negative experiences. It is imperative to discuss public policies for delivery care, as well as its implementation and impact on perinatal health indicators. PMID:21445490

  10. Profiling a Periodicals Collection

    ERIC Educational Resources Information Center

    Bolgiano, Christina E.; King, Mary Kathryn

    1978-01-01

    Libraries need solid information upon which to base collection development decisions. Specific evaluative methods for determining scope, access, and usefullness are described. Approaches used for data collection include analysis of interlibrary loan requests, comparison with major bibliographies, and analysis of accessibility through available…

  11. Collecting Best Practices

    ERIC Educational Resources Information Center

    Tedford, Jennifer

    2008-01-01

    How many beginning teachers struggle to create new lessons despite the fact that experienced teachers have already designed effective lessons for the same content? Shulman (1987) used the term "collective amnesia" to describe the failure of school leaders to design professional development that included the collection of its best practices.…

  12. Collection Development Policy.

    ERIC Educational Resources Information Center

    Casserly, Mary

    In this document the collection goals of the William Paterson New Jersey State College library are enumerated and the policies and procedures of the library regarding the selection and acquisition of different types of materials are summarized. Following a short introduction to the function of collection development policies is a general statement…

  13. Children's Collective Training Manual.

    ERIC Educational Resources Information Center

    Kimbrough, Jackie; And Others

    This children's collective manual describes a training program for parents and teachers of preschool children which is designed to encourage cooperative, community-oriented styles of group interaction in black preschool children. Developed by the Children's Collective of the Coordinated Child Care Council of South Los Angeles, the program is based…

  14. Temporal context and conditioned reinforcement value.

    PubMed

    Grace, R C; Savastano, H I

    2000-12-01

    The effectiveness of a stimulus as a conditioned reinforcer depends on the temporal context of reinforcement, that is, the overall rate of reinforcement in the situation. The dominant view has been that context determines the learned value of a stimulus directly, according to delay-reduction theory. By contrast, the contextual choice model (CCM) maintains that value is independent of context and incorporates the effects of context on choice in the framework of the matching law. The authors report 2 experiments with pigeons as subjects that use transfer tests to assess the value of stimuli in the concurrent-chains procedure. Results strongly support the assumption of CCM that pigeons learn the temporal relations between events independently of context but that context modulates the expression of that learning as choice.

  15. Toward sensor-based context aware systems.

    PubMed

    Sakurai, Yoshitaka; Takada, Kouhei; Anisetti, Marco; Bellandi, Valerio; Ceravolo, Paolo; Damiani, Ernesto; Tsuruta, Setsuo

    2012-01-01

    This paper proposes a methodology for sensor data interpretation that can combine sensor outputs with contexts represented as sets of annotated business rules. Sensor readings are interpreted to generate events labeled with the appropriate type and level of uncertainty. Then, the appropriate context is selected. Reconciliation of different uncertainty types is achieved by a simple technique that moves uncertainty from events to business rules by generating combs of standard Boolean predicates. Finally, context rules are evaluated together with the events to take a decision. The feasibility of our idea is demonstrated via a case study where a context-reasoning engine has been connected to simulated heartbeat sensors using prerecorded experimental data. We use sensor outputs to identify the proper context of operation of a system and trigger decision-making based on context information. PMID:22368489

  16. Infant speech recognition in multisyllabic contexts.

    PubMed

    Goodsitt, J V; Morse, P A; Ver Hoeve, J N; Cowan, N

    1984-06-01

    In 2 infant speech recognition experiments using trisyllabic sequences, the amount of redundancy within nontarget, context syllables was manipulated. Infants 6 1/2 months old were trained to discriminate the syllables [ba] versus [du] in contexts that were either redundant (e.g., [ko ba ko] or [ti ba ti]) or mixed (e.g., [ko ba ti] or [ti ba ko]) A visually reinforced head-turning procedure was employed. In Experiment 1, context was manipulated between subjects, but in Experiment 2 each subject received all 4 contexts (2 redundant, 2 mixed). Infants consistently recognized the familiar target in all contexts, but did so more successfully in redundant than in mixed trisyllablic contexts. These results suggest that amount of speech redundancy may be an important factor in infants' perceptual capabilities. PMID:6734325

  17. Temporal context in floristic classification

    NASA Astrophysics Data System (ADS)

    Fitzgerald, R. W.; Lees, B. G.

    1996-11-01

    Multi-temporal remote sensing data present a number of significant problems for the statistical and spatial competence of a classifier. Ideally, a classifier of multi-temporal data should be temporally invariant. It must have the capacity to account for the variations in season, growth cycle, radiometric, and atmospheric conditions at any point in time when classifying the land cover. This paper tests two methods of creating a temporally invariant classifier based on the pattern recognition capabilities of a neural network. A suite of twelve multi-temporal datasets spread over 5 yr along with a comprehensive mix of environmental variables are fused into floristic classification images by the neural network. Uncertainties in the classifications are addressed explicitly with a confidence mask generated from the fuzzy membership value's output by the neural network. These confidence masks are used to produce constrained classification images. The overall accuracy percentage achieved from a study site containing highly disturbed undulating terrain averages 60%. The first method of training, sequential learning of temporal context, is tested by an examination of the step-by-step evolution of the sequential training process. This reveals that the sequential classifier may not have learned about time, because time was constant during each network training session. It also suggests that there are optimal times during the annual cycle to train the classifier for particular floristic classes. The second method of training the classifier is randomised exposure to the entire temporal training suite. Time was now a fluctuating input variable during the network training process. This method produced the best spatially accurate results. The performance of this classifier as a temporally invariant classifier is tested amongst four multi-temporal datasets with encouraging results. The classifier consistently achieved an overall accuracy percentage of 60%. The pairwise predicted

  18. Debt collection project report

    SciTech Connect

    Not Available

    1980-05-01

    In October 1979 the Office of Management and Budget initiated a review of debt collection within the Federal Government. A DOE Debt Collection Project Team was established, and seven activites were selected for review. These were Albuquerque Operations Office; Bonneville Power Administration; Chicago Operations and Regional Office; Naval Petroleum Reserves, California; Oak Ridge Operations Office; Washington Financial Services Division; and Western Area Power Administration. The team visited each of these activities to collect data on the size, age, and types of receivables managed and procedures for billing, aging, and handling overdue accounts. Various deficiencies were found to exist at several of the DOE entities that are not consistent with good management practices in the performance of their debt collection functions. Also, the Debt Collection Project Team identified a wide variation in the procedures followed by DOE activities in the management of accounts receivable, and a wide variation in the effectiveness of the debt management functions. 1 figure, 17 tables. (RWR)

  19. Urine collection device

    NASA Technical Reports Server (NTRS)

    Michaud, R. B. (Inventor)

    1981-01-01

    A urine collection device for females is described. It is comprised of a collection element defining a urine collection chamber and an inlet opening into the chamber and is adapted to be disposed in surrounding relation to the urethral opening of the user. A drainage conduit is connected to the collection element in communication with the chamber whereby the chamber and conduit together comprise a urine flow pathway for carrying urine generally away from the inlet. A first body of wicking material is mounted adjacent the collection element and extends at least partially into the flow pathway. The device preferably also comprise a vaginal insert element including a seal portion for preventing the entry of urine into the vagina.

  20. The Neighborhood Context of Homelessness

    PubMed Central

    Pollio, David E.; North, Carol S.

    2013-01-01

    Objectives. We examined and compared the changing neighborhood characteristics of a group of homeless adults over time. Methods. We collected the addresses of previous housing and sleep locations from a longitudinal study of 400 homeless adults in the St. Louis, Missouri, region and compared census measures of housing and economic opportunities at different points along individual pathways from housing to homelessness and at 1- and 2-year follow-up interviews. Results. Sleep locations of homeless adults were much more concentrated in the urban core at baseline than were their previous housed and follow-up locations. These core areas had higher poverty, unemployment, and rent-to-income ratios and lower median incomes. Conclusions. The spatial concentration of homeless adults in areas with fewer opportunities and more economic and housing distress may present additional barriers to regaining stable housing and employment. A big-picture spatial and time-course viewpoint is critical for both policymakers and future homelessness researchers. PMID:23409889

  1. Family contexts, individualism-collectivism, and adolescents' aspirations for their futures.

    PubMed

    Marjoribanks, Kevin

    2003-08-01

    Relations were examined among family contexts, parents' individualistic-collectivistic value orientations, and adolescents' aspirations. Data were collected from 456 Australian families using two surveys when the subjects were 11 and 16 years old, respectively. Findings indicated that family ethnicity had large associations with parents' individualistic-collectivistic value orientations, but that these orientations were not associated with adolescents' aspirations, after taking into account differences in family contexts.

  2. Context in Mathematics Learning: Problems and Possibilities

    ERIC Educational Resources Information Center

    Lee, Ji-Eun

    2007-01-01

    This article presents an instructional idea that facilitates the students' active participation in the problem analysis process using insufficient or contradictory problem contexts. (Contains 1 figure.)

  3. Context dependent anti-aliasing image reconstruction

    NASA Technical Reports Server (NTRS)

    Beaudet, Paul R.; Hunt, A.; Arlia, N.

    1989-01-01

    Image Reconstruction has been mostly confined to context free linear processes; the traditional continuum interpretation of digital array data uses a linear interpolator with or without an enhancement filter. Here, anti-aliasing context dependent interpretation techniques are investigated for image reconstruction. Pattern classification is applied to each neighborhood to assign it a context class; a different interpolation/filter is applied to neighborhoods of differing context. It is shown how the context dependent interpolation is computed through ensemble average statistics using high resolution training imagery from which the lower resolution image array data is obtained (simulation). A quadratic least squares (LS) context-free image quality model is described from which the context dependent interpolation coefficients are derived. It is shown how ensembles of high-resolution images can be used to capture the a priori special character of different context classes. As a consequence, a priori information such as the translational invariance of edges along the edge direction, edge discontinuity, and the character of corners is captured and can be used to interpret image array data with greater spatial resolution than would be expected by the Nyquist limit. A Gibb-like artifact associated with this super-resolution is discussed. More realistic context dependent image quality models are needed and a suggestion is made for using a quality model which now is finding application in data compression.

  4. A Systematic Mapping on the Learning Analytics Field and Its Analysis in the Massive Open Online Courses Context

    ERIC Educational Resources Information Center

    Moissa, Barbara; Gasparini, Isabela; Kemczinski, Avanilde

    2015-01-01

    Learning Analytics (LA) is a field that aims to optimize learning through the study of dynamical processes occurring in the students' context. It covers the measurement, collection, analysis and reporting of data about students and their contexts. This study aims at surveying existing research on LA to identify approaches, topics, and needs for…

  5. Visualizing context through theory deconstruction: a content analysis of three bodies of evaluation theory literature.

    PubMed

    Vo, Anne T

    2013-06-01

    While the evaluation field collectively agrees that contextual factors bear on evaluation practice and related scholarly endeavors, the discipline does not yet have an explicit framework for understanding evaluation context. To address this gap in the knowledge base, this paper explores the ways in which evaluation context has been addressed in the practical-participatory, values-engaged, and emergent realist evaluation literatures. Five primary dimensions that constitute evaluation context were identified for this purpose: (1) stakeholder; (2) program; (3) organization; (4) historical/political; and (5) evaluator. Journal articles, book chapters, and conference papers rooted in the selected evaluation approaches were compared along these dimensions in order to explore points of convergence and divergence in the theories. Study results suggest that the selected prescriptive theories most clearly explicate stakeholder and evaluator contexts. Programmatic, organizational, and historical/political contexts, on the other hand, require further clarification. PMID:22469338

  6. Context Effects in Forensic Entomology and Use of Sequential Unmasking in Casework.

    PubMed

    Archer, Melanie S; Wallman, James F

    2016-09-01

    Context effects are pervasive in forensic science, and are being recognized by a growing number of disciplines as a threat to objectivity. Cognitive processes can be affected by extraneous context information, and many proactive scientists are therefore introducing context-minimizing systems into their laboratories. Forensic entomologists are also subject to context effects, both in the processes they undertake (e.g., evidence collection) and decisions they make (e.g., whether an invertebrate taxon is found in a certain geographic area). We stratify the risk of bias into low, medium, and high for the decisions and processes undertaken by forensic entomologists, and propose that knowledge of the time the deceased was last seen alive is the most potentially biasing piece of information for forensic entomologists. Sequential unmasking is identified as the best system for minimizing context information, illustrated with the results of a casework trial (n = 19) using this approach in Victoria, Australia.

  7. The development of science process skills in authentic contexts

    NASA Astrophysics Data System (ADS)

    Roth, Wolff-Michael; Roychoudhury, Anita

    Instructional strategies and curriculum sequences aimed at teaching process skills have received considerable attention in science education. On the other hand, the teaching of domain-independent, context-free skills has been subject to criticism on the ground that important aspects of cognitive activities are functions of meaningful contexts. The intent of this study was to examine the development of integrated process skills in the context of open-inquiry laboratory sessions. The data-collection approach was qualitative and included videotapes of laboratory sessions, laboratory reports of students, and the reflective journals kept by the two teachers involved in the study. Forty-eight students from the Grade 11 introductory physics course, 29 students from the Grade 12 physics course, and 60 students from the Grade 8 general science course from an all-boys private school participated in the study. An interpretive research methodology was adopted for construction of meaning from the data. Students worked in collaborative groups during all of the open-inquiry laboratory sessions. Findings from the study indicate that students develop higher-order process skills through nontraditional laboratory experiences that provided the students with freedom to perform experiments of personal relevance in authentic contexts. Students learned to (a) identify and define pertinent variables, (b) interpret, transform, and analyze data, (c) plan and design an experiment, and (d) formulate hypotheses. Findings of this study suggest that process skills need not be taught separately. Integrated process skills develop gradually and reach a high level of sophistication when experiments are performed in meaningful context.

  8. Lightweight Adaptation of Classifiers to Users and Contexts: Trends of the Emerging Domain

    PubMed Central

    Vildjiounaite, Elena; Gimel'farb, Georgy; Kyllönen, Vesa; Peltola, Johannes

    2015-01-01

    Intelligent computer applications need to adapt their behaviour to contexts and users, but conventional classifier adaptation methods require long data collection and/or training times. Therefore classifier adaptation is often performed as follows: at design time application developers define typical usage contexts and provide reasoning models for each of these contexts, and then at runtime an appropriate model is selected from available ones. Typically, definition of usage contexts and reasoning models heavily relies on domain knowledge. However, in practice many applications are used in so diverse situations that no developer can predict them all and collect for each situation adequate training and test databases. Such applications have to adapt to a new user or unknown context at runtime just from interaction with the user, preferably in fairly lightweight ways, that is, requiring limited user effort to collect training data and limited time of performing the adaptation. This paper analyses adaptation trends in several emerging domains and outlines promising ideas, proposed for making multimodal classifiers user-specific and context-specific without significant user efforts, detailed domain knowledge, and/or complete retraining of the classifiers. Based on this analysis, this paper identifies important application characteristics and presents guidelines to consider these characteristics in adaptation design. PMID:26473165

  9. Lightweight Adaptation of Classifiers to Users and Contexts: Trends of the Emerging Domain.

    PubMed

    Vildjiounaite, Elena; Gimel'farb, Georgy; Kyllönen, Vesa; Peltola, Johannes

    2015-01-01

    Intelligent computer applications need to adapt their behaviour to contexts and users, but conventional classifier adaptation methods require long data collection and/or training times. Therefore classifier adaptation is often performed as follows: at design time application developers define typical usage contexts and provide reasoning models for each of these contexts, and then at runtime an appropriate model is selected from available ones. Typically, definition of usage contexts and reasoning models heavily relies on domain knowledge. However, in practice many applications are used in so diverse situations that no developer can predict them all and collect for each situation adequate training and test databases. Such applications have to adapt to a new user or unknown context at runtime just from interaction with the user, preferably in fairly lightweight ways, that is, requiring limited user effort to collect training data and limited time of performing the adaptation. This paper analyses adaptation trends in several emerging domains and outlines promising ideas, proposed for making multimodal classifiers user-specific and context-specific without significant user efforts, detailed domain knowledge, and/or complete retraining of the classifiers. Based on this analysis, this paper identifies important application characteristics and presents guidelines to consider these characteristics in adaptation design.

  10. Student Behaviour Problems: Context, Initiatives and Programs. Selected Papers from the National Conference on Student Behaviour Problems: Context, Initiatives and Programs (3rd, Brisbane, Queensland, Australia, October 1991).

    ERIC Educational Resources Information Center

    Elkins, John, Ed.; Izard, John, Ed.

    The conference papers in this collection are grouped under the following topics: behavior problems in context; interpersonal relationships; initiatives by systems and schools; and programs in special settings. Papers included are: (1) National Trends in Discipline Policy Development (Roger Slee); (2) Balancing: The Protocols of Discipline (William…

  11. High context illness and dying in a low context medical world.

    PubMed

    Hallenbeck, James

    2006-01-01

    This article provides an introduction to the field of intercultural communication. Miscommunication among patients, families, and clinicians often results when participants are contextually "out-of-synch. " High context communication embeds more information in the contexts within which people communicate and is less dependent on language. Very sick and dying patients often use high context communication strategies. Low context communication stresses explicit verbal communication and is commonly used by clinicians. When clinicians use low context forms of communication with patients using high context styles, misunderstandings frequently arise. Suggestions are given for avoiding miscommunication and enhancing mutual understanding. PMID:16572749

  12. The Rhoton Collection.

    PubMed

    Sorenson, Jeffrey; Khan, Nickalus; Couldwell, William; Robertson, Jon

    2016-08-01

    The Rhoton Collection is an archive of Dr. Al Rhoton Jr.'s anatomical images and video lectures, as well as an anatomical reference. In an effort to maximize the educational impact of these teaching materials, web-based technologies are used to dynamically format this material for a variety of devices ranging from cellular phones to projectors. Surgical cases are cross-referenced to further enhance the usefulness of this collection, which is available at http://rhoton.ineurodb.org. The features of the Rhoton Collection website are described in this article. PMID:27319307

  13. Systems and context modeling approach to requirements analysis

    NASA Astrophysics Data System (ADS)

    Ahuja, Amrit; Muralikrishna, G.; Patwari, Puneet; Subhrojyoti, C.; Swaminathan, N.; Vin, Harrick

    2014-08-01

    Ensuring completeness and correctness of the requirements for a complex system such as the SKA is challenging. Current system engineering practice includes developing a stakeholder needs definition, a concept of operations, and defining system requirements in terms of use cases and requirements statements. We present a method that enhances this current practice into a collection of system models with mutual consistency relationships. These include stakeholder goals, needs definition and system-of-interest models, together with a context model that participates in the consistency relationships among these models. We illustrate this approach by using it to analyze the SKA system requirements.

  14. 1. Copy photo of context view taken in 1917 looking ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    1. Copy photo of context view taken in 1917 looking east along Farragut Avenue, then called Main Street, showing construction of double tracking. On right is Building 78 with original smoke stack. Building 59 is visible as third building from left. This photograph was taken from a hill that was later cut away in order to expand the shipyard. See photo for original caption. HABS negative is a 4x5' copy negative made from a print in the collection of the Photographic Branch, Puget Sound Naval Shipyard, Bremerton, WA. Photographer unknown. - Puget Sound Naval Shipyard, Administration Building, Farragut Avenue, Bremerton, Kitsap County, WA

  15. Sweat collection capsule

    NASA Technical Reports Server (NTRS)

    Delaplaine, R. W.; Greenleaf, J. E.

    1979-01-01

    Capsule, with filter paper insert, is used to collect sweat for rate monitoring, chromatographic analysis, or active sweat gland location within specified area. Construction of capsule allows change of inserts while device remains strapped in place.

  16. Vectorized garbage collection

    SciTech Connect

    Appel, A.W.; Bendiksen, A.

    1988-01-01

    Garbage collection can be done in vector mode on supercomputers like the Cray-2 and the Cyber 205. Both copying collection and mark-and-sweep can be expressed as breadth-first searches in which the queue can be processed in parallel. The authors have designed a copying garbage collector whose inner loop works entirely in vector mode. The only significant limitation of the algorithm is that if the size of the records is not constant, the implementation becomes much more complicated. The authors give performance measurements of the algorithm as implemented for Lisp CONS cells on the Cyber 205. Vector-mode garbage collection performs up to 9 times faster than scalar-mode collection.

  17. Context Matters in Child and Family Policy

    ERIC Educational Resources Information Center

    Dodge, Kenneth A.

    2011-01-01

    The traditional model of translation from basic laboratory science to efficacy trials to effectiveness trials to community dissemination has flaws that arise from false assumptions that context changes little or matters little. One of the most important findings in developmental science is that context matters, but this fact is not sufficiently…

  18. Shifting Context: A Better Approach to Training?

    ERIC Educational Resources Information Center

    Lefkoe, Morty

    1985-01-01

    Context shifting is an approach to training that aims to transform the participants' point of view, allowing them to create a new context in which to perform their jobs, a new way of defining their roles that motivates them to exhibit skills and use information. (SK)

  19. Operational Context Training in Individual Technical Skills.

    ERIC Educational Resources Information Center

    Hoehn, Arthur J.; And Others

    Four papers were presented at a conference dealing with the objectives and problems of operational context training (OCT) sponsored by HumRRO in June 1958. The first paper (by William McCleland) outlines the objectives of the conference and its general goals. The second paper (by Arthur J. Hoehn) describes the use of operational context training…

  20. Completion Mindsets and Contexts in Doctoral Supervision

    ERIC Educational Resources Information Center

    Green, Pam; Bowden, John

    2012-01-01

    Purpose: Doctoral candidates are now located within a research context of performativity where the push to successfully complete in a timely manner is central. The purpose of this paper is to develop a model of completion mindset within a completion context to assist research students and supervisors. Design/methodology/approach: The research was…

  1. Student Writing in Higher Education: New Contexts.

    ERIC Educational Resources Information Center

    Lea, Mary R., Ed.; Stierer, Barry, Ed.

    This book brings together research on student writing carried out by practitioners in a number of international university contexts. Each of the chapters focuses on some aspect of "new contexts" for student writing, either by examining the writing and assessment practices of nontraditional university courses or by exploring attempts to introduce…

  2. Context Improves Comprehension of Fronted Objects

    ERIC Educational Resources Information Center

    Kristensen, Line Burholt; Engberg-Pedersen, Elisabeth; Poulsen, Mads

    2014-01-01

    Object-initial clauses (OCs) are associated with more processing difficulties than subject-initial clauses (SCs) in a number of languages (e.g. English, German and Finnish), but a supportive context can reduce or neutralize the difference between SCs and OCs with respect to reading times. Still, it is unresolved how context can affect the…

  3. Intertextuality in EAP: An African Context

    ERIC Educational Resources Information Center

    Holmes, John

    2004-01-01

    This paper focuses on the development of EAP methodology within an African EAP context. I describe the setting up and implementation of an EAP study skills programme at the University of Asmara, Eritrea, over the period 1994-1998 and its subsequent development up to 2002. The unique social and political context of the EAP programme served as a…

  4. Student Reasoning about Graphs in Different Contexts

    ERIC Educational Resources Information Center

    Ivanjek, Lana; Susac, Ana; Planinic, Maja; Andrasevic, Aneta; Milin-Sipus, Zeljka

    2016-01-01

    This study investigates university students' graph interpretation strategies and difficulties in mathematics, physics (kinematics), and contexts other than physics. Eight sets of parallel (isomorphic) mathematics, physics, and other context questions about graphs, which were developed by us, were administered to 385 first-year students at the…

  5. Philosophy in Context: Reply to Trohler

    ERIC Educational Resources Information Center

    Smith, Richard

    2007-01-01

    This paper responds to Trohler's charge that my paper "As if by Machinery: The levelling of educational research" takes Francis Bacon's vision of scientific research out of context. I distinguish four senses of "decontextualisation": as ignorance, as belief in "timeless truths", as comparison of contexts, and as genealogy. I argue that Trohler has…

  6. Dimensions of Leadership in the Childcare Context

    ERIC Educational Resources Information Center

    Hujala, Eeva

    2004-01-01

    The contextual leadership theory provides a frame to investigate the leadership phenomenon in a childcare context. According to the contextual leadership theory, leadership is perceived of as a socially constructed, situational and interpretive phenomenon. The purpose of the study was to investigate leadership in a Finnish childcare context based…

  7. Enhanced Latent Inhibition in Context Aversion Conditioning

    ERIC Educational Resources Information Center

    Hall, Geoffrey; Symonds, Michelle; Rodriguez, Marcial

    2009-01-01

    In four experiments, we investigated the effect of giving rats exposure to a distinctive environmental context before a phase of training in which an injection of LiCl was paired with that context. The results of Experiments 1 and 2 were consistent with the possibility that such preexposure served to retard subsequent conditioning to the context…

  8. Children's Context Inappropriate Anger and Salivary Cortisol

    ERIC Educational Resources Information Center

    Locke, Robin L.; Davidson, Richard J.; Kalin, Ned H.; Goldsmith, H. Hill

    2009-01-01

    Some children show emotion that is not consistent with normative appraisal of the context and can therefore be defined as context inappropriate (CI). The authors used individual growth curve modeling and hierarchical multiple regression analyses to examine whether CI anger predicts differences in hypothalamic-pituitary-adrenal axis activity, as…

  9. Context-awareness for heterogeneous access management

    NASA Astrophysics Data System (ADS)

    Mannweiler, C.; Klein, A.; Schneider, J.; Schotten, H. D.

    2010-11-01

    The increasing availability of both static and dynamic context information has steadily been driving the development of context-aware communication systems. Adapting system behavior according to current context of the network, the user, and the terminal can yield significant end-to-end performance improvements. In this paper, we present a concept for how to use context information, in particular location information and movement prediction, for Heterogeneous Access Management (HAM). In a first step, we outline the functional architecture of a distributed and extensible context management system (CMS) that defines the roles, tasks, and interfaces of all modules within such a system for large-scale context acquisition and dissemination. In a second step, we depict how the available context information can be exploited for optimizing terminal handover decisions to be made in a multi-RAT (radio access technology) environment. In addition, the utilized method for predicting terminal location as well as the objective functions used for evaluating and comparing system performance are described. Finally, we present preliminary simulation results demonstrating that HAM systems that include current and future terminal context information in the handover decision process clearly outperform conventional systems.

  10. Context-Sensitive "Help" in CALL

    ERIC Educational Resources Information Center

    Heift, Trude

    2006-01-01

    This article discusses design and usability issues pertaining to context-sensitive "help" in computer-assisted language learning (CALL). As part of the discussion, we present a study in which we examined the effects of three independent factors on student usage of context-sensitive "help": feedback, exercise type, and language proficiency. Forty…

  11. Classifying the Context Clues in Children's Text

    ERIC Educational Resources Information Center

    Dowds, Susan J. Parault; Haverback, Heather Rogers; Parkinson, Meghan M.

    2016-01-01

    This study aimed to determine which types of context clues exist in children's texts and whether it is possible for experts to identify reliably those clues. Three experienced coders used Ames' clue set as a foundation for a system to classify context clues in children's text. Findings showed that the adjustments to Ames' system resulted in 15…

  12. Enhancing Vocabulary Development in Multiple Classroom Contexts.

    ERIC Educational Resources Information Center

    Harmon, Janis M.; Staton, Denise G.

    1999-01-01

    Describes ways teachers can enhance students' vocabulary development through multiple contexts available in typical middle school classroom settings. Addresses questions about vocabulary learning and offers suggestions for enhancing vocabulary with narrative and expository texts that involve multiple classroom contexts. Considers the Vocab-o-gram…

  13. Bilingual Lexical Activation in Sentence Context

    ERIC Educational Resources Information Center

    Schwartz, Ana I.; Kroll, Judith F.

    2006-01-01

    The present study investigated the cognitive nature of second language (L2) lexical processing in sentence context. We examined bilinguals' L2 word recognition performance for language-ambiguous words [cognates (e.g., "piano") and homographs (e.g., "pan")] in two sentence context experiments with highly proficient Spanish-English bilinguals living…

  14. The Social Context of Imitation in Infancy

    ERIC Educational Resources Information Center

    Learmonth, A.E.; Lamberth, R.; Rovee-Collier, C.

    2005-01-01

    Infants increasingly generalize deferred imitation across environmental contexts between 6 and 18 months of age. In three experiments with 126 6-, 9-, 12-, 15-, and 18-month-olds, we examined the role of the social context in deferred imitation. One experimenter demonstrated target actions on a hand puppet, and a second experimenter tested…

  15. Talking, Creating: Interactional Language, Creativity, and Context

    ERIC Educational Resources Information Center

    Carter, Ronald; McCarthy, Michael

    2004-01-01

    When creative uses of spoken language have been investigated, the main examples have been restricted to particular contexts such as narrative and related story-telling genres. This paper reports on an initial investigation using the 5 million word CANCODE corpus of everyday spoken English and discusses a range of social contexts in which creative…

  16. Abstraction and context in concept representation.

    PubMed Central

    Hampton, James A

    2003-01-01

    This paper develops the notion of abstraction in the context of the psychology of concepts, and discusses its relation to context dependence in knowledge representation. Three general approaches to modelling conceptual knowledge from the domain of cognitive psychology are discussed, which serve to illustrate a theoretical dimension of increasing levels of abstraction. PMID:12903660

  17. Language Proficiency, Reading Development, and Learning Context

    ERIC Educational Resources Information Center

    Li, Liu

    2014-01-01

    In the era of globalization, the number of students studying abroad is increasing dramatically. Accordingly, there is an increasing interest among researchers in students' language gains in the study-abroad (SA) context. To deepen our understanding of second language (L2) reading acquisition in different contexts, it is necessary to examine…

  18. Social Context Effects on School Effects.

    ERIC Educational Resources Information Center

    Hallinger, Philip; Murphy, Joseph

    In this two-part paper, an attempt is made to examine the relationship between social contexts and effective schools and specifically to contribute to the development of a conceptual model for understanding how social contexts influence the operation of effective schools and student learning. In the first part, school effects research is drawn…

  19. Context Sensitivity in the Force Concept Inventory

    ERIC Educational Resources Information Center

    Stewart, John; Griffin, Heather; Stewart, Gay

    2007-01-01

    The force concept inventory and a 10-question context-modified test were given to 647 students enrolled in introductory physics classes at the University of Arkansas. Context changes had an effect ranging from -3% to 10% on the individual questions. The average student score on the ten transformed questions was 3% higher than the average student…

  20. Language in Development Constrained: Three Contexts.

    ERIC Educational Resources Information Center

    Appleby, Roslyn; Copley, Kath; Sithirajvongsa, Sisamone; Pennycook, Alastair

    2002-01-01

    Explores the political, ethical, and professional dilemmas faced by English-as-a-Second-Language professionals working in the context of Australian language aid projects in Laos, East Timor, and Cambodia. Illuminates how language aid practitioners have to deal with issues of language choice, ownership, and political context. (Author/VWL)

  1. Sweat collection capsule

    NASA Technical Reports Server (NTRS)

    Greenleaf, J. E.; Delaplaine, R. W. (Inventor)

    1980-01-01

    A sweat collection capsule permitting quantitative collection of sweat is described. The device consists of a frame held immobile on the skin, a closure secured to the frame and absorbent material located next to the skin in a cavity formed by the frame and the closure. The absorbent material may be removed from the device by removing the closure from the frame while the frame is held immobile on the skin.

  2. Collective field accelerator

    DOEpatents

    Luce, John S.

    1978-01-01

    A collective field accelerator which operates with a vacuum diode and utilizes a grooved cathode and a dielectric anode that operates with a relativistic electron beam with a .nu./.gamma. of .about. 1, and a plurality of dielectric lenses having an axial magnetic field thereabout to focus the collectively accelerated electrons and ions which are ejected from the anode. The anode and lenses operate as unoptimized r-f cavities which modulate and focus the beam.

  3. Sparse matrix test collections

    SciTech Connect

    Duff, I.

    1996-12-31

    This workshop will discuss plans for coordinating and developing sets of test matrices for the comparison and testing of sparse linear algebra software. We will talk of plans for the next release (Release 2) of the Harwell-Boeing Collection and recent work on improving the accessibility of this Collection and others through the World Wide Web. There will only be three talks of about 15 to 20 minutes followed by a discussion from the floor.

  4. A Survey of Collectives

    NASA Technical Reports Server (NTRS)

    Tumer, Kagan; Wolpert, David

    2004-01-01

    Due to the increasing sophistication and miniaturization of computational components, complex, distributed systems of interacting agents are becoming ubiquitous. Such systems, where each agent aims to optimize its own performance, but where there is a well-defined set of system-level performance criteria, are called collectives. The fundamental problem in analyzing/designing such systems is in determining how the combined actions of self-interested agents leads to 'coordinated' behavior on a iarge scale. Examples of artificial systems which exhibit such behavior include packet routing across a data network, control of an array of communication satellites, coordination of multiple deployables, and dynamic job scheduling across a distributed computer grid. Examples of natural systems include ecosystems, economies, and the organelles within a living cell. No current scientific discipline provides a thorough understanding of the relation between the structure of collectives and how well they meet their overall performance criteria. Although still very young, research on collectives has resulted in successes both in understanding and designing such systems. It is eqected that as it matures and draws upon other disciplines related to collectives, this field will greatly expand the range of computationally addressable tasks. Moreover, in addition to drawing on them, such a fully developed field of collective intelligence may provide insight into already established scientific fields, such as mechanism design, economics, game theory, and population biology. This chapter provides a survey to the emerging science of collectives.

  5. Context improves comprehension of fronted objects.

    PubMed

    Kristensen, Line Burholt; Engberg-Pedersen, Elisabeth; Poulsen, Mads

    2014-04-01

    Object-initial clauses (OCs) are associated with more processing difficulties than subject-initial clauses (SCs) in a number of languages (e.g. English, German and Finnish), but a supportive context can reduce or neutralize the difference between SCs and OCs with respect to reading times. Still, it is unresolved how context can affect the comprehension of OCs. In the present self-paced reading study of Danish, we therefore investigated both reading times, comprehension accuracy and response times for OCs and SCs. In line with previous studies on word order processing, OCs in an unsupportive context showed longer reading times than SCs, longer response times and a comprehension accuracy as poor as chance level. A manipulation of context showed no effect of reading time, but a supportive context had a stronger facilitating effect on comprehension (response accuracy and response time) for OCs than for SCs.

  6. Generating Personalized Web Search Using Semantic Context

    PubMed Central

    Xu, Zheng; Chen, Hai-Yan; Yu, Jie

    2015-01-01

    The “one size fits the all” criticism of search engines is that when queries are submitted, the same results are returned to different users. In order to solve this problem, personalized search is proposed, since it can provide different search results based upon the preferences of users. However, existing methods concentrate more on the long-term and independent user profile, and thus reduce the effectiveness of personalized search. In this paper, the method captures the user context to provide accurate preferences of users for effectively personalized search. First, the short-term query context is generated to identify related concepts of the query. Second, the user context is generated based on the click through data of users. Finally, a forgetting factor is introduced to merge the independent user context in a user session, which maintains the evolution of user preferences. Experimental results fully confirm that our approach can successfully represent user context according to individual user information needs. PMID:26000335

  7. Generating personalized web search using semantic context.

    PubMed

    Xu, Zheng; Chen, Hai-Yan; Yu, Jie

    2015-01-01

    The "one size fits the all" criticism of search engines is that when queries are submitted, the same results are returned to different users. In order to solve this problem, personalized search is proposed, since it can provide different search results based upon the preferences of users. However, existing methods concentrate more on the long-term and independent user profile, and thus reduce the effectiveness of personalized search. In this paper, the method captures the user context to provide accurate preferences of users for effectively personalized search. First, the short-term query context is generated to identify related concepts of the query. Second, the user context is generated based on the click through data of users. Finally, a forgetting factor is introduced to merge the independent user context in a user session, which maintains the evolution of user preferences. Experimental results fully confirm that our approach can successfully represent user context according to individual user information needs.

  8. Le "Contexte": Aspects linguistiques et didactiques. ("Context": Linguistic and Didactic Aspects.)

    ERIC Educational Resources Information Center

    Cohen, Avraham

    1982-01-01

    A study investigated the ability of socially handicapped Israeli students to determine a word's meaning from its linguistic context. The results and their implications for second language instruction are examined in light of current theories of context. (MSE)

  9. The Ecological Context of Interpersonal Violence: From Culture to Collective Efficacy

    ERIC Educational Resources Information Center

    Almgren, Gunnar

    2005-01-01

    This brief essay outlines the progression over the last 20 years of ecological theories of interpersonal violence. The period between the present and the early 1980s began with a revival of cultural explanations of violence that paralleled the introduction of the neo-conservative social science and then witnessed a rediscovery of deficits-based…

  10. Ingroup glorification, moral disengagement, and justice in the context of collective violence.

    PubMed

    Leidner, Bernhard; Castano, Emanuele; Zaiser, Erica; Giner-Sorolla, Roger

    2010-08-01

    What aspects of ingroup identification can lead people to resist justice for the victims of their ingroup's mistreatment? In three studies carried out in the United States and United Kingdom, in which participants read reports of mistreatment of prisoners and civilians by coalition troops in the Iraq war, ingroup glorification, but not ingroup attachment or other individual-difference variables, was a key predictor of lesser demands for justice, but only when the perpetrators belonged to the ingroup. This effect of glorification was mediated by two moral disengagement mechanisms focusing on the outgroup: minimization of the emotional suffering of the victims' families and explicit dehumanization of the victim group. These findings further reinforce the difference between glorification and other forms of ingroup identification, demonstrating that glorification is problematic in maintaining and fostering intergroup relations because of its connection to moral disengagement.

  11. Microscopic description of large amplitude collective motion in the nuclear astrophysics context

    NASA Astrophysics Data System (ADS)

    Lacroix, Denis; Tanimura, Yusuke; Scamps, Guillaume; Simenel, Cédric

    2015-08-01

    In the last 10 years, we have observed an important increase of interest in the application of time-dependent energy density functional (TD-EDF) theory. This approach allows to treat nuclear structure and nuclear reaction from small to large amplitude dynamics in a unified framework. The possibility to perform unrestricted three-dimensional simulations using state-of-the-art effective interactions has opened new perspectives. In the present paper, an overview of applications where the predictive power of TD-EDF has been benchmarked is given. A special emphasize is made on processes that are of astrophysical interest. Illustrations discussed here include giant resonances, fission, binary and ternary collisions leading to fusion, transfer and deep inelastic processes.

  12. Personal Self and Collective Self: When Academic Choices Depend on the Context of Social Comparison

    ERIC Educational Resources Information Center

    Chazal, Sebastien; Guimond, Serge; Darnon, Celine

    2012-01-01

    This research examines the impact of same-sex versus opposite-sex social comparisons on the perception of one's own abilities at school and subsequent reported marks and academic choices. During their final year, male and female high school students were asked to describe themselves either in comparison with boys in their class, in comparison with…

  13. Collective decisions among bacterial viruses

    NASA Astrophysics Data System (ADS)

    Joh, Richard; Mileyko, Yuriy; Voit, Eberhard; Weitz, Joshua

    2010-03-01

    For many temperate bacteriophages, the decision of whether to kill hosts or enter a latent state depends on the multiplicity of infection. In this talk, I present a quantitative model of gene regulatory dynamics to describe how phages make collective decisions within host cells. Unlike most previous studies, the copy number of viral genomes is treated as a variable. In the absence of feedback loops, viral mRNA transcription is expected to be proportional to the viral copy number. However, when there are nonlinear feedback loops in viral gene regulation, our model shows that gene expression patterns are sensitive to changes in viral copy number and there can be a domain of copy number where the system becomes bistable. Hence, the viral copy number is a key control parameter determining host cell fates. This suggests that bacterial viruses can respond adaptively to changes in population dynamics, and can make alternative decisions as a bet-hedging strategy. Finally, I present a stochastic version of viral gene regulation and discuss speed-accuracy trade-offs in the context of cell fate determination by viruses.

  14. Academic Success in Context-Based Chemistry: Demonstrating Fluid Transitions between Concepts and Context

    ERIC Educational Resources Information Center

    King, Donna Therese; Ritchie, Stephen M.

    2013-01-01

    Curriculum developers and researchers have promoted context-based programmes to arrest waning student interest and participation in the enabling sciences at high school and university. Context-based programmes aim for student connections between scientific discourse and real-world contexts to elevate curricular relevance without diminishing…

  15. Context-Outcome Associations Underlie Context-Switch Effects after Partial Reinforcement in Human Predictive Learning

    ERIC Educational Resources Information Center

    Moreno-Fernandez, Maria M.; Abad, Maria J. F.; Ramos-Alvarez, Manuel M.; Rosas, Juan M.

    2011-01-01

    Predictive value for continuously reinforced cues is affected by context changes when they are trained within a context in which a different cue undergoes partial reinforcement. An experiment was conducted with the goal of exploring the mechanisms underlying this context-switch effect. Human participants were trained in a predictive learning…

  16. [Images of Brazil: a Rockefeller Archive Center collection].

    PubMed

    de Lacerda, Aline Lopes

    2002-01-01

    This article describes and comments on the collection of photographs of Brazil that belongs to the Rockefeller Foundation archives (Rockefeller Archive Center) in the United States. It also contains information about the origin of such documents and the way they were collected, as well as analyzes the context in which these visual documents were produced. They record the relationship between Rockefeller Foundation and Brazilian institutions engaged in the combat against yellow fever, malaria and ancyclostomaisis from 1920 to 1940.

  17. Theory of Collective Intelligence

    NASA Technical Reports Server (NTRS)

    Wolpert, David H.

    2003-01-01

    In this chapter an analysis of the behavior of an arbitrary (perhaps massive) collective of computational processes in terms of an associated "world" utility function is presented We concentrate on the situation where each process in the collective can be viewed as though it were striving to maximize its own private utility function. For such situations the central design issue is how to initialize/update the collective's structure, and in particular the private utility functions, so as to induce the overall collective to behave in a way that has large values of the world utility. Traditional "team game" approaches to this problem simply set each private utility function equal to the world utility function. The "Collective Intelligence" (COIN) framework is a semi-formal set of heuristics that recently have been used to construct private utility. functions that in many experiments have resulted in world utility values up to orders of magnitude superior to that ensuing from use of the team game utility. In this paper we introduce a formal mathematics for analyzing and designing collectives. We also use this mathematics to suggest new private utilities that should outperform the COIN heuristics in certain kinds of domains. In accompanying work we use that mathematics to explain previous experimental results concerning the superiority of COIN heuristics. In that accompanying work we also use the mathematics to make numerical predictions, some of which we then test. In this way these two papers establish the study of collectives as a proper science, involving theory, explanation of old experiments, prediction concerning new experiments, and engineering insights.

  18. Environmental indicators of biofuel sustainability: What about context?

    SciTech Connect

    Efroymson, Rebecca Ann; Dale, Virginia H; Kline, Keith L; McBride, Allen; Bielicki, Jeffrey M; Smith, Raymond; Parish, Esther S; Schweizer, Peter E; Shaw, Denice

    2013-01-01

    Indicators of the environmental sustainability of biofuel production, distribution, and use should be selected, measured, and interpreted with respect to the context in which they are used. These indicators include measures of soil quality, water quality and quantity, greenhouse-gas emissions, biodiversity, air quality, and vegetation productivity. Contextual considerations include the purpose for the sustainability analysis, the particular biofuel production and distribution system (including supply chain, management aspects, and system viability), policy conditions, stakeholder values, location, temporal influences, spatial scale, baselines, and reference scenarios. Recommendations presented in this paper include formulating the problem for particular analyses, selecting appropriate context-specific indicators of environmental sustainability, and developing indicators that can reflect multiple environmental properties at low cost within a defined context. In addition, contextual considerations such as technical objectives, varying values and perspectives of stakeholder groups, and availability and reliability of data need to be understood and considered. Sustainability indicators for biofuels are most useful if adequate historical data are available, information can be collected at appropriate spatial and temporal scales, organizations are committed to use indicator information in the decision-making process, and indicators can effectively guide behavior toward more sustainable practices.

  19. Flexible human collective wisdom.

    PubMed

    Juni, Mordechai Z; Eckstein, Miguel P

    2015-12-01

    Group decisions typically outperform individual decisions. But how do groups combine their individual decisions to reach their collective decisions? Previous studies conceptualize collective decision making using static combination rules, be it a majority-voting rule or a weighted-averaging rule. Unknown is whether groups adapt their combination rules to changing information environments. We implemented a novel paradigm for which information obeyed a mixture of distributions, such that the optimal Bayesian rule is nonlinear and often follows minority opinions, while the majority rule leads to suboptimal but above chance performance. Using perceptual (Experiment 1) and cognitive (Experiment 2) signal-detection tasks, we switched the information environment halfway through the experiments to a mixture of distributions without informing participants. Groups gradually abandoned the majority rule to follow any minority opinion advocating signal presence with high confidence. Furthermore, groups with greater ability to abandon the majority rule achieved higher collective-decision accuracies. It is important to note that this abandonment was not triggered by performance loss for the majority rule relative to the first half of the experiment. Our results propose a new theory of human collective decision making: Humans make inferences about how information is distributed across individuals and time, and dynamically alter their joint decision algorithms to enhance the benefits of collective wisdom.

  20. Mechanosensory interactions drive collective behaviour in Drosophila.

    PubMed

    Ramdya, Pavan; Lichocki, Pawel; Cruchet, Steeve; Frisch, Lukas; Tse, Winnie; Floreano, Dario; Benton, Richard

    2015-03-12

    Collective behaviour enhances environmental sensing and decision-making in groups of animals. Experimental and theoretical investigations of schooling fish, flocking birds and human crowds have demonstrated that simple interactions between individuals can explain emergent group dynamics. These findings indicate the existence of neural circuits that support distributed behaviours, but the molecular and cellular identities of relevant sensory pathways are unknown. Here we show that Drosophila melanogaster exhibits collective responses to an aversive odour: individual flies weakly avoid the stimulus, but groups show enhanced escape reactions. Using high-resolution behavioural tracking, computational simulations, genetic perturbations, neural silencing and optogenetic activation we demonstrate that this collective odour avoidance arises from cascades of appendage touch interactions between pairs of flies. Inter-fly touch sensing and collective behaviour require the activity of distal leg mechanosensory sensilla neurons and the mechanosensory channel NOMPC. Remarkably, through these inter-fly encounters, wild-type flies can elicit avoidance behaviour in mutant animals that cannot sense the odour--a basic form of communication. Our data highlight the unexpected importance of social context in the sensory responses of a solitary species and open the door to a neural-circuit-level understanding of collective behaviour in animal groups. PMID:25533959

  1. Stimulus generalization and operant context renewal.

    PubMed

    Podlesnik, Christopher A; Miranda-Dukoski, Ludmila

    2015-10-01

    Context renewal is the relapse of an extinguished response due to changing the stimulus context following extinction. Reinforcing operant responding in Context A and extinguishing in Context B results in relapse when either returning to Context A (ABA renewal) or introducing a novel Context C (ABC renewal). ABA renewal typically is greater than ABC renewal. The present study assessed whether renewal might be conceptualized through excitatory and inhibitory generalization gradients inferred from studies of stimulus generalization. We arranged one keylight-color alternation frequency for pigeons to signal reinforcement in Phase 1 and a different alternation frequency to signal extinction in Phase 2. During a subsequent test in extinction, we presented a range of keylight-alternation frequencies and found renewal to be a function of keylight-alternation frequency. Specifically, Phase-3 responding increased as keylight-alternation frequency differed from that arranged during extinction in Phase 2. Moreover, we observed a shift in the function beyond the originally reinforced keylight-alternation frequency arranged in training (i.e., peak shift). We discuss the relevance of these findings for conceptualizing stimulus-control processes governing generalization gradients for understanding the processes underlying context renewal. PMID:26241660

  2. Context Prediction Analysis and Episodic Memory

    PubMed Central

    Mizumori, Sheri J. Y.

    2013-01-01

    Events that happen at a particular place and time come to define our episodic memories. Extensive experimental and clinical research illustrate that the hippocampus is central to the processing of episodic memories, and this is in large part due to its analysis of context information according to spatial and temporal references. In this way, hippocampus defines ones expectations for a given context as well as detects errors in predicted contextual features. The detection of context prediction errors is hypothesized to distinguished events into meaningful epochs that come to be recalled as separate episodic memories. The nature of the spatial and temporal context information processed by hippocampus is described, as is a hypothesis that the apparently self-regulatory nature of hippocampal context processing may ultimately be mediated by natural homeostatic operations and plasticity. Context prediction errors by hippocampus are suggested to be valued by the midbrain dopamine system, the output of which is ultimately fed back to hippocampus to update memory-driven context expectations for future events. Thus, multiple network functions (both within and outside hippocampus) combine to result in adaptive episodic memories. PMID:24109442

  3. Context awareness and sensitivity in SEA implementation

    SciTech Connect

    Hilding-Rydevik, Tuija Bjarnadottir, Holmfridur

    2007-10-15

    The Impact Assessment research community repeatedly asserts that the implementation of Strategic Environmental Assessment (SEA) should take the issue of context into consideration. The primary aim of this paper then is to attempt to give substance to the concept of 'context' in relation to the implementation of SEA. The second aim is to discuss the relevance of context consciousness and sensitivity in relation to one of the main aims given to SEA implementation i.e. to contribute to the 'integration' of environmental perspectives in planning processes. Context must be defined in relation to a certain question. In this paper the question in focus is the assumption that SEA implementation will contribute to integration of environmental issues in planning processes. Research results relating to the use of environmental tools, like for example SEA, and experiences of integration efforts, strongly indicate that the use of a single tool like SEA is not enough to achieve this integration. The current 'context free' normative and procedural assumptions concerning the aim of SEA implementation and 'best practice' in term of SEA can be criticised on the same grounds as normative and procedural planning theories, as being context free. The assumptions behind the current formulations of the aim and best practice of SEA need to be revisited. A firm empirical and theoretical knowledge and discussion is needed, especially in relation to the issue of context and integration. This paper provides a starting point in this direction.

  4. Deep belief networks learn context dependent behavior.

    PubMed

    Raudies, Florian; Zilli, Eric A; Hasselmo, Michael E

    2014-01-01

    With the goal of understanding behavioral mechanisms of generalization, we analyzed the ability of neural networks to generalize across context. We modeled a behavioral task where the correct responses to a set of specific sensory stimuli varied systematically across different contexts. The correct response depended on the stimulus (A,B,C,D) and context quadrant (1,2,3,4). The possible 16 stimulus-context combinations were associated with one of two responses (X,Y), one of which was correct for half of the combinations. The correct responses varied symmetrically across contexts. This allowed responses to previously unseen stimuli (probe stimuli) to be generalized from stimuli that had been presented previously. By testing the simulation on two or more stimuli that the network had never seen in a particular context, we could test whether the correct response on the novel stimuli could be generated based on knowledge of the correct responses in other contexts. We tested this generalization capability with a Deep Belief Network (DBN), Multi-Layer Perceptron (MLP) network, and the combination of a DBN with a linear perceptron (LP). Overall, the combination of the DBN and LP had the highest success rate for generalization. PMID:24671178

  5. Stimulus generalization and operant context renewal.

    PubMed

    Podlesnik, Christopher A; Miranda-Dukoski, Ludmila

    2015-10-01

    Context renewal is the relapse of an extinguished response due to changing the stimulus context following extinction. Reinforcing operant responding in Context A and extinguishing in Context B results in relapse when either returning to Context A (ABA renewal) or introducing a novel Context C (ABC renewal). ABA renewal typically is greater than ABC renewal. The present study assessed whether renewal might be conceptualized through excitatory and inhibitory generalization gradients inferred from studies of stimulus generalization. We arranged one keylight-color alternation frequency for pigeons to signal reinforcement in Phase 1 and a different alternation frequency to signal extinction in Phase 2. During a subsequent test in extinction, we presented a range of keylight-alternation frequencies and found renewal to be a function of keylight-alternation frequency. Specifically, Phase-3 responding increased as keylight-alternation frequency differed from that arranged during extinction in Phase 2. Moreover, we observed a shift in the function beyond the originally reinforced keylight-alternation frequency arranged in training (i.e., peak shift). We discuss the relevance of these findings for conceptualizing stimulus-control processes governing generalization gradients for understanding the processes underlying context renewal.

  6. Bacterial Population Genetics in a Forensic Context

    SciTech Connect

    Velsko, S P

    2009-11-02

    This report addresses the recent Department of Homeland Security (DHS) call for a Phase I study to (1) assess gaps in the forensically relevant knowledge about the population genetics of eight bacterial agents of concern, (2) formulate a technical roadmap to address those gaps, and (3) identify new bioinformatics tools that would be necessary to analyze and interpret population genetic data in a forensic context. The eight organisms that were studied are B. anthracis, Y. pestis, F. tularensis, Brucella spp., E. coli O157/H7, Burkholderia mallei, Burkholderia pseudomallei, and C. botulinum. Our study focused on the use of bacterial population genetics by forensic investigators to test hypotheses about the possible provenance of an agent that was used in a crime or act of terrorism. Just as human population genetics underpins the calculations of match probabilities for human DNA evidence, bacterial population genetics determines the level of support that microbial DNA evidence provides for or against certain well-defined hypotheses about the origins of an infecting strain. Our key findings are: (1) Bacterial population genetics is critical for answering certain types of questions in a probabilistic manner, akin (but not identical) to 'match probabilities' in DNA forensics. (2) A basic theoretical framework for calculating likelihood ratios or posterior probabilities for forensic hypotheses based on microbial genetic comparisons has been formulated. This 'inference-on-networks' framework has deep but simple connections to the population genetics of mtDNA and Y-STRs in human DNA forensics. (3) The 'phylogeographic' approach to identifying microbial sources is not an adequate basis for understanding bacterial population genetics in a forensic context, and has limited utility, even for generating 'leads' with respect to strain origin. (4) A collection of genotyped isolates obtained opportunistically from international locations augmented by phylogenetic representations

  7. The Geneva brain collection

    PubMed Central

    Kövari, Enikö; Hof, Patrick R.; Bouras, Constantin

    2011-01-01

    The University of Geneva brain collection was founded at the beginning of the 20th century. Today, it consists of 10,154 formaldehyde- or buffered formaldehyde–fixed brains obtained from the autopsies of the Department of Psychiatry and, since 1971, from the Department of Geriatrics as well. More than 100,000 paraffin-embedded blocks and 200,000 histological slides have also been collected since 1901. From the time of its creation, this collection has served as an important resource for pathological studies and clinicopathological correlations, primarily in the field of dementing illnesses and brain aging research. These materials have permitted a number of original neuropathological observations, such as the classification of Pick’s disease by Constantinidis, or the description of dyshoric angiopathy and laminar sclerosis by Morel. The large number of cases, including some very rare conditions, provides a unique resource and an opportunity for worldwide collaborations. PMID:21599692

  8. Curating Virtual Data Collections

    NASA Technical Reports Server (NTRS)

    Lynnes, Chris; Leon, Amanda; Ramapriyan, Hampapuram; Tsontos, Vardis; Shie, Chung-Lin; Liu, Zhong

    2015-01-01

    NASAs Earth Observing System Data and Information System (EOSDIS) contains a rich set of datasets and related services throughout its many elements. As a result, locating all the EOSDIS data and related resources relevant to particular science theme can be daunting. This is largely because EOSDIS data's organizing principle is affected more by the way they are produced than around the expected end use. Virtual collections oriented around science themes can overcome this by presenting collections of data and related resources that are organized around the user's interest, not around the way the data were produced. Virtual collections consist of annotated web addresses (URLs) that point to data and related resource addresses, thus avoiding the need to copy all of the relevant data to a single place. These URL addresses can be consumed by a variety of clients, ranging from basic URL downloaders (wget, curl) and web browsers to sophisticated data analysis programs such as the Integrated Data Viewer.

  9. Heat collection system

    SciTech Connect

    Ramlow, B.L.; Steele, R.R.

    1982-04-06

    A heat collection system is disclosed which is capable of collecting heat from an animal husbandry enclosures such as a dairy barn, and transferring the heat into a home. Animal husbandry enclosures, such as dairy barns, tend to have excess heat, even in winter, the excess heat normally being wasted. The heat is collected by a pair of evaporators located in the dairy barn, with the evaporators being oversized to limit the amount of cooling taking place in the barn. Fluid from the evaporators is compressed by compressors after which it passes through a condenser from which heat may be extracted into the home. Pressure regulating valves are provided to insure that the compressors are not overloaded and to insure that a maximum heating effect is achieved. A thermostatically controlled fan is provided to drive air across the condenser so that heat is introduced into the home.

  10. THE CULTURAL CONTEXT OF POLIO BIOGRAPHIES

    PubMed Central

    Scheer, Jessica; Luborsky, Mark L.

    2014-01-01

    Cultural contexts influence the ways individuals interpret and experience functional losses associated with post-polio sequelae. Using in-depth multiple interview case studies from two National Institute on Aging projects, the concept of “biographies” is presented to place the individuals’ polio-related experiences within the context of their lives. Two major cultural contexts shape the construction of polio biographies: normative life course expectations and developmental tasks; and traditions associated with polio recovery and rehabilitation. The authors identify key dimensions of personal concern among polio survivors that can be used as entrance points for effective clinical intervention and to promote treatment compliance. PMID:1758785

  11. [Neurotransmitter mechanisms of context-dependent behavior].

    PubMed

    D'iakonova, V E

    2012-01-01

    The influence of context on behavioral choice is well known. Context can refer to behavioral state of an animal and to external factors such as season, presence of other individuals or food availability. How external and internal factors influencing decision-making are translated at the cellular level? I review the recent neuroethological data that strongly suggest that context reflects in content of neuroactive substances (neurotransmitters, modulators, hormones) that present in the extraneuronal milieu, while heterochemical neuronal microenvironment in its turn impacts motor program selection. PMID:23530445

  12. Portable data collection device

    DOEpatents

    French, Patrick D.

    1996-01-01

    The present invention provides a portable data collection device that has a variety of sensors that are interchangeable with a variety of input ports in the device. The various sensors include a data identification feature that provides information to the device regarding the type of physical data produced by each sensor and therefore the type of sensor itself. The data identification feature enables the device to locate the input port where the sensor is connected and self adjust when a sensor is removed or replaced. The device is able to collect physical data, whether or not a function of a time.

  13. Portable data collection device

    DOEpatents

    French, P.D.

    1996-06-11

    The present invention provides a portable data collection device that has a variety of sensors that are interchangeable with a variety of input ports in the device. The various sensors include a data identification feature that provides information to the device regarding the type of physical data produced by each sensor and therefore the type of sensor itself. The data identification feature enables the device to locate the input port where the sensor is connected and self adjust when a sensor is removed or replaced. The device is able to collect physical data, whether or not a function of a time. 7 figs.

  14. The extinction context enables extinction performance after a change in context

    PubMed Central

    Nelson, James Byron; Gregory, Pamela; Sanjuan, Maria del Carmen

    2012-01-01

    One experiment with human participants determined the extent to which recovery of extinguished responding with a context switch was due to a failure to retrieve contextually-controlled learning, or some other process such as participants learning that context changes signal reversals in the meaning of stimulus – outcome relationships. In a video game, participants learned to suppress mouse clicking in the presence of a stimulus that predicted an attack. Then, that stimulus underwent extinction in a different context (environment within the game). Following extinction, suppression was recovered and then extinguished again during testing in the conditioning context. In a final test, participants that were tested in the context where extinction first took place showed less of a recovery than those tested in a neutral context, but they showed a recovery of suppression nevertheless. A change in context tended to cause a change in the meaning of the stimulus, leading to recovery in both the neutral and extinction contexts. The extinction context attenuated that recovery, perhaps by enabling retrieval of the learning that took place in extinction. Recovery outside an extinction context is due to a failure of the context to enable the learning acquired during extinction, but only in part. PMID:22521549

  15. 43 CFR 3160.0-9 - Information collection.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... leases and agreements specifically refer to 30 CFR part 221 or specific sections thereof, which has been redesignated as 43 CFR part 3160. Those references shall now be read in the context of Secretarial Order 3087... 43 Public Lands: Interior 2 2014-10-01 2014-10-01 false Information collection. 3160.0-9...

  16. Collective (Team) Learning Process Models: A Conceptual Review

    ERIC Educational Resources Information Center

    Knapp, Randall

    2010-01-01

    Teams have become a key resource for learning and accomplishing work in organizations. The development of collective learning in specific contexts is not well understood, yet has become critical to organizational success. The purpose of this conceptual review is to inform human resource development (HRD) practice about specific team behaviors and…

  17. A Collective Bargaining Contract Analyzer for Community Colleges.

    ERIC Educational Resources Information Center

    Lovell, Ned B.; And Others

    This monograph provides comparative data to assist community colleges in analyzing, planning, and negotiating collective bargaining agreements within the context of a comprehensive Contract Item Analysis (CIA) model. In the monograph, the CIA model is applied to agreements reached in the Illinois Community College System (ICCS), although it…

  18. Ubiquitous Geo-Sensing for Context-Aware Analysis: Exploring Relationships between Environmental and Human Dynamics

    PubMed Central

    Sagl, Günther; Blaschke, Thomas; Beinat, Euro; Resch, Bernd

    2012-01-01

    Ubiquitous geo-sensing enables context-aware analyses of physical and social phenomena, i.e., analyzing one phenomenon in the context of another. Although such context-aware analysis can potentially enable a more holistic understanding of spatio-temporal processes, it is rarely documented in the scientific literature yet. In this paper we analyzed the collective human behavior in the context of the weather. We therefore explored the complex relationships between these two spatio-temporal phenomena to provide novel insights into the dynamics of urban systems. Aggregated mobile phone data, which served as a proxy for collective human behavior, was linked with the weather data from climate stations in the case study area, the city of Udine, Northern Italy. To identify and characterize potential patterns within the weather-human relationships, we developed a hybrid approach which integrates several spatio-temporal statistical analysis methods. Thereby we show that explanatory factor analysis, when applied to a number of meteorological variables, can be used to differentiate between normal and adverse weather conditions. Further, we measured the strength of the relationship between the ‘global’ adverse weather conditions and the spatially explicit effective variations in user-generated mobile network traffic for three distinct periods using the Maximal Information Coefficient (MIC). The analyses result in three spatially referenced maps of MICs which reveal interesting insights into collective human dynamics in the context of weather, but also initiate several new scientific challenges. PMID:23012571

  19. Leadership in entrepreneurial organizations: context and motives.

    PubMed

    Martí Ripoll, Margarita; Gil Rodríguez, Francisco; Barrasa, Angel; Antino, Mirko

    2010-11-01

    Although organizational contexts have an influence on leadership, and some of their characteristics may facilitate (through weak structures) or inhibit (through strong structures) the leaders' behaviors, the extent of their influence has rarely been studied. Indeed, research of the influence of some types of contexts (entrepreneurial vs. non-entrepreneurial) on the emergence of certain variables (leaders' motives) is even scarcer. This paper analyses this influence in 40 companies, interviewing their leaders to obtain a qualitative register of their motives, and administering questionnaires to members of their respective management teams. The hypothesis considered was that, in 'weak' contexts (entrepreneurial), the leaders' motives would be more salient than in 'strong' contexts (non-entrepreneurial). The results largely confirm this hypothesis with respect to behaviors that are directly related to three main motives (power, affiliation and achievement). These results are discussed, and practical suggestions are provided for future research.

  20. Theorizing Social Context: Rethinking Behavioral Theory

    PubMed Central

    Burke, Nancy J.; Joseph, Galen; Pasick, Rena J.; Barker, Judith C.

    2013-01-01

    Major behavioral theories focus on proximal influences on behavior that are considered to be predominantly cognitive characteristics of the individual largely uninfluenced by social context. Social ecological models integrate multiple levels of influence on health behavior and are noted for emphasizing the interdependence of environmental settings and life domains. This theory-based article explains how social context is conceptualized in the social sciences and how the social science conceptualization differs from and can broaden the analytic approach to health behavior. The authors use qualitative data from the “Behavioral Constructs and Culture in Cancer Screening” study to illustrate our conceptualization of social context. We conclude that the incorporation into health behavior theory of a multidimensional socio-culturally oriented, theoretical approach to social context is critical to understand and redress health disparities in multicultural societies like that in the United States. PMID:19805791

  1. Student Reasoning Across Domains of Context

    NASA Astrophysics Data System (ADS)

    Warnakulasooriya, Rasil; Bao, Lei

    2001-10-01

    Students' learning and understanding of physical concepts depend on the context settings in which the concepts are introduced. In this research, questions were developed to investigate students' understanding of a wide range of physical concepts and how these were carried across different context domains. We conducted surveys and interviews with students in an algebra-based course on electricity and magnetism at The Ohio State University. The results show that students often apply their knowledge of physical principles inconsistently across context domains. For example, students who show understanding of the Newton's third law in a classical mechanics setting fail to recognize the same concept in the context of electricity and magnetism. Ref: L. Bao and E.F. Redish, "Model Analysis: Assessing the Dynamics of Student Learning." Submitted to Cognition and Instruction (2001). This work is supported in part by NSF grant REC-0087788

  2. Children's Context Inappropriate Anger and Salivary Cortisol

    PubMed Central

    Locke, Robin L.; Davidson, Richard J.; Kalin, Ned H.; Goldsmith, H. Hill

    2009-01-01

    Some children show emotion that is not consistent with normative appraisal of the context and can therefore be defined as context inappropriate (CI). The authors used individual growth curve modeling and hierarchical multiple regression analyses to examine whether CI anger predicts differences in hypothalamic-pituitary-adrenal axis activity, as manifest in salivary cortisol measures. About 23% of the 360 children (ages 6–10 years, primarily 7–8) showed at least 1 expression of CI anger in situations designed to elicit positive affect. Expression of anger across 2 positive assessments was less common (around 4%). CI anger predicted the hypothesized lower levels of cortisol beyond that attributed to context appropriate anger. Boys' CI anger predicted lower morning cortisol and flatter slopes. Results suggest that this novel approach to studying children's emotion across varying contexts can provide insight into affective style. PMID:19702392

  3. Emotional context, maternal behavior and emotion regulation.

    PubMed

    Roque, Lisa; Veríssimo, Manuela

    2011-12-01

    This study investigated the importance of emotion-eliciting context (positive and negative) and mother's behaviors (constrained and involved) on toddlers' emotion regulation behavioral strategies, emotional expressiveness and intensity, during three episodes eliciting fear, frustration/anger and positive affect. Fifty-five children between 18 and 26 months of age and their mothers participated in the study. Toddlers' regulatory strategies varied as function of emotion-eliciting context (children exhibited behavioral strategies more frequently during positive affect and frustration/anger episodes and less frequently during fear episodes) and maternal involvement. Toddlers' expression of emotion varied as function of emotion-eliciting context (children exhibited more emotional expressions, both negative and positive during fear and frustration/anger episodes compared to positive affect episodes). Toddlers' expression of emotion was not strongly related to maternal involvement, however, the intensity of emotional expression was related to the interaction of context and maternal involvement.

  4. Physics Learning through a Telecommunications Context.

    ERIC Educational Resources Information Center

    Edwards, Christopher

    2000-01-01

    Describes the Physics Phones Home unit which is context-led and developed by the Supported Learning in Physics Projects. Teaches introductory magnetism; electric, magnetic and gravitational fields; and electricity and circular motion. (YDS)

  5. Leadership in entrepreneurial organizations: context and motives.

    PubMed

    Martí Ripoll, Margarita; Gil Rodríguez, Francisco; Barrasa, Angel; Antino, Mirko

    2010-11-01

    Although organizational contexts have an influence on leadership, and some of their characteristics may facilitate (through weak structures) or inhibit (through strong structures) the leaders' behaviors, the extent of their influence has rarely been studied. Indeed, research of the influence of some types of contexts (entrepreneurial vs. non-entrepreneurial) on the emergence of certain variables (leaders' motives) is even scarcer. This paper analyses this influence in 40 companies, interviewing their leaders to obtain a qualitative register of their motives, and administering questionnaires to members of their respective management teams. The hypothesis considered was that, in 'weak' contexts (entrepreneurial), the leaders' motives would be more salient than in 'strong' contexts (non-entrepreneurial). The results largely confirm this hypothesis with respect to behaviors that are directly related to three main motives (power, affiliation and achievement). These results are discussed, and practical suggestions are provided for future research. PMID:21044527

  6. Theorizing social context: rethinking behavioral theory.

    PubMed

    Burke, Nancy J; Joseph, Galen; Pasick, Rena J; Barker, Judith C

    2009-10-01

    Major behavioral theories focus on proximal influences on behavior that are considered to be predominantly cognitive characteristics of the individual largely uninfluenced by social context. Social ecological models integrate multiple levels of influence on health behavior and are noted for emphasizing the interdependence of environmental settings and life domains. This theory-based article explains how social context is conceptualized in the social sciences and how the social science conceptualization differs from and can broaden the analytic approach to health behavior. The authors use qualitative data from the Behavioral Constructs and Culture in Cancer Screening study to illustrate our conceptualization of social context. We conclude that the incorporation into health behavior theory of a multidimensional socioculturally oriented, theoretical approach to social context is critical to understand and redress health disparities in multicultural societies like the United States. PMID:19805791

  7. Materials and Collections

    ERIC Educational Resources Information Center

    Hinseth, Lois

    1978-01-01

    This discussion of collection development considers (1) special problems as they relate to specific types of institutions--nursing, long term residential, psychiatric and developmental; (2) acquisition; (3) organization--classification, cataloging, and physical arrangement; (4) use--circulation, special methods, and the role of librarians; and (5)…

  8. The Fall Collection.

    ERIC Educational Resources Information Center

    VanDeman, Barry A.

    1984-01-01

    Presents ideas for collecting objects on the school grounds or in the surrounding neighborhood. Objects include feathers/fur, leaves, galls, seeds, shells, spiderwebs, and litter. Also presents procedures for making impressions of bark, leaves, fossils, flora, and shadows. All activities can be adopted for students in kindergarten through grade…

  9. Universities and Collective Bargaining.

    ERIC Educational Resources Information Center

    Savage, Donald C.

    1994-01-01

    Responds to David Cameron's "More than an Academic Question" and to the review by Barbara Anderson disagreeing with Cameron's suggestion that democratization and decentralization were a mistake, and arguing for collective bargaining. The paper counters Cameron's support of the continuation of mandatory retirement with reference to the United…

  10. Surface reference data collection

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Applications of remote sensing must define relationships between image data and conditions at corresponding points on the ground. Unfortunately, many published remote sensing reports focus on image processing techniques with little detail regarding the methods used for collecting ground truth data....

  11. Television's New Humane Collectivity.

    ERIC Educational Resources Information Center

    Schrag, Robert L.; And Others

    1981-01-01

    Analyzes "Taxi,""Barney Miller,""Lou Grant," and "M*A*S*H" in terms of three fantasy themes: the realization of significant others, the alliance in action, and membership into personhood. From these themes emerges a rhetorical vision of the new humane collectivity. (PD)

  12. Authentic Assessment: A Collection.

    ERIC Educational Resources Information Center

    Burke, Kay, Ed.

    The essays in this collection consider the meaning of authentic assessment and the implications of its use. "Section 1: Assessing Assessment" includes the following essays: (1) "The Nation's Report Card Goes Home: Good News and Bad about Trends in Achievement" (Robert L. Linn and Stephen B. Dunbar); (2) "Budgets, Politics, and Testing" (Chris…

  13. Deterritorializing Collective Biography

    ERIC Educational Resources Information Center

    Gannon, Susanne; Walsh, Susan; Byers, Michele; Rajiva, Mythili

    2014-01-01

    This paper proposes a new move in the methodological practice of collective biography, by provoking a shift beyond any remnant attachment to the speaking/writing subject towards her dispersal and displacement via textual interventions that stress multivocality. These include the use of photographs, drama, and various genres of writing. Using a…

  14. Collection Maintenance and Improvement.

    ERIC Educational Resources Information Center

    Byrne, Sherry

    This resource guide provides information about the range of activities that can be implemented to maintain and improve the condition of research collections to ensure that they remain usable as long as possible. After an introduction that describes the major activities and a review of an investigation process that gives an overview of good…

  15. Collection Development Policy. Revised.

    ERIC Educational Resources Information Center

    Sawin, Philip, Jr., Ed.

    This collection development policy paper incorporates guidelines contributed by all university academic departments, as well as by members of the Library Learning Center professional staff. An alphabetical index provides access to major subject areas and subdivisions, which are assigned one of four level designators indicating the depth of…

  16. Collecting My Thoughts.

    ERIC Educational Resources Information Center

    Carr, William G.

    A broad range of educational issues is treated in this collection of 120 short essays, written from the perspective of the author's 40 years in the education field. Section titles include: Teachers and Teaching; Episodes in the History of Education; Flights of Fancy; Defending the Schools; War and Peace; A Few Questions and Fewer Answers; and…

  17. Collections Define Cataloging's Future

    ERIC Educational Resources Information Center

    Simpson, Betsy

    2007-01-01

    The role of catalogers within academic libraries is evolving to meet new demands and cultivating a broader understanding of cataloging--one that focuses on collections, not the catalog, and applies cataloger expertise across metadata activities. Working collaboratively as never before, catalogers are reinventing their place within the library.

  18. Medical futility and the social context.

    PubMed Central

    Halliday, R

    1997-01-01

    The concept of medical futility has come to be seen in some quarters as a value-neutral trump card when dealing with issues of power and conflicting values in medicine. I argue that this concept is potentially useful, but only in a social context that provides a normative framework for its use. This social context needs to include a broad consensus about the purpose of medicine and the nature of the physician-patient relationship. PMID:9220326

  19. Agriculture as an Upholder of Cultural Heritage? Conceptualizations and Value Judgements--A Norwegian Perspective in International Context

    ERIC Educational Resources Information Center

    Daugstad, Karoline; Ronningen, Katrina; Skar, Birgitte

    2006-01-01

    The multifunctional role of agriculture as a producer of collective goods in addition to food and fibre, has been stressed within the context of negotiations on the liberalization of the world market for food (WTO) and in general in discussions concerning restructuring of the agricultural sector. One of these collective goods, cultural heritage,…

  20. Adolescent neurobiological susceptibility to social context.

    PubMed

    Schriber, Roberta A; Guyer, Amanda E

    2016-06-01

    Adolescence has been characterized as a period of heightened sensitivity to social contexts. However, adolescents vary in how their social contexts affect them. According to neurobiological susceptibility models, endogenous, biological factors confer some individuals, relative to others, with greater susceptibility to environmental influences, whereby more susceptible individuals fare the best or worst of all individuals, depending on the environment encountered (e.g., high vs. low parental warmth). Until recently, research guided by these theoretical frameworks has not incorporated direct measures of brain structure or function to index this sensitivity. Drawing on prevailing models of adolescent neurodevelopment and a growing number of neuroimaging studies on the interrelations among social contexts, the brain, and developmental outcomes, we review research that supports the idea of adolescent neurobiological susceptibility to social context for understanding why and how adolescents differ in development and well-being. We propose that adolescent development is shaped by brain-based individual differences in sensitivity to social contexts - be they positive or negative - such as those created through relationships with parents/caregivers and peers. Ultimately, we recommend that future research measure brain function and structure to operationalize susceptibility factors that moderate the influence of social contexts on developmental outcomes. PMID:26773514

  1. Disentangling Metaphor from Context: An ERP Study.

    PubMed

    Bambini, Valentina; Bertini, Chiara; Schaeken, Walter; Stella, Alessandra; Di Russo, Francesco

    2016-01-01

    A large body of electrophysiological literature showed that metaphor comprehension elicits two different event-related brain potential responses, namely the so-called N400 and P600 components. Yet most of these studies test metaphor in isolation while in natural conversation metaphors do not come out of the blue but embedded in linguistic and extra-linguistic context. This study aimed at assessing the role of context in the metaphor comprehension process. We recorded EEG activity while participants were presented with metaphors and equivalent literal expressions in a minimal context (Experiment 1) and in a supportive context where the word expressing the ground between the metaphor's topic and vehicle was made explicit (Experiment 2). The N400 effect was visible only in minimal context, whereas the P600 was visible both in the absence and in the presence of contextual cues. These findings suggest that the N400 observed for metaphor is related to contextual aspects, possibly indexing contextual expectations on upcoming words that guide lexical access and retrieval, while the P600 seems to reflect truly pragmatic interpretative processes needed to make sense of a metaphor and derive the speaker's meaning, also in the presence of contextual cues. In sum, previous information in the linguistic context biases toward a metaphorical interpretation but does not suppress interpretative pragmatic mechanisms to establish the intended meaning. PMID:27199799

  2. Renewal, resurgence, and alternative reinforcement context.

    PubMed

    Sweeney, Mary M; Shahan, Timothy A

    2015-07-01

    Resurgence, relapse induced by the removal of alternative reinforcement, and renewal, relapse induced by a change in contextual stimuli, are typically studied separately in operant conditioning paradigms. In analogous treatments of operant problem behavior, aspects of both relapse phenomena can operate simultaneously. Therefore, the purpose of this study was to examine a novel method for studying resurgence and renewal in the same experimental preparation. An alternative source of reinforcement was available during extinction for one group of rats (a typical resurgence preparation). Another group experienced an operant renewal preparation in which the extinction context was distinguished via olfactory and visual stimuli. A third group experienced alternative reinforcement delivery in the new context, a novel combination of typical resurgence and renewal preparations. Removal of alternative reinforcement and/or a change in context induced relapse relative to an extinction-only control group. When alternative reinforcement was delivered in a novel context, the alternative response was less persistent relative to when extinction of the alternative response took place in the context in which it was trained. This methodology might be used to illustrate shared (or distinct) mechanisms of resurgence and renewal, and to determine how delivering alternative reinforcement in another context may affect persistence and relapse.

  3. Disentangling Metaphor from Context: An ERP Study

    PubMed Central

    Bambini, Valentina; Bertini, Chiara; Schaeken, Walter; Stella, Alessandra; Di Russo, Francesco

    2016-01-01

    A large body of electrophysiological literature showed that metaphor comprehension elicits two different event-related brain potential responses, namely the so-called N400 and P600 components. Yet most of these studies test metaphor in isolation while in natural conversation metaphors do not come out of the blue but embedded in linguistic and extra-linguistic context. This study aimed at assessing the role of context in the metaphor comprehension process. We recorded EEG activity while participants were presented with metaphors and equivalent literal expressions in a minimal context (Experiment 1) and in a supportive context where the word expressing the ground between the metaphor's topic and vehicle was made explicit (Experiment 2). The N400 effect was visible only in minimal context, whereas the P600 was visible both in the absence and in the presence of contextual cues. These findings suggest that the N400 observed for metaphor is related to contextual aspects, possibly indexing contextual expectations on upcoming words that guide lexical access and retrieval, while the P600 seems to reflect truly pragmatic interpretative processes needed to make sense of a metaphor and derive the speaker's meaning, also in the presence of contextual cues. In sum, previous information in the linguistic context biases toward a metaphorical interpretation but does not suppress interpretative pragmatic mechanisms to establish the intended meaning. PMID:27199799

  4. Disentangling Metaphor from Context: An ERP Study.

    PubMed

    Bambini, Valentina; Bertini, Chiara; Schaeken, Walter; Stella, Alessandra; Di Russo, Francesco

    2016-01-01

    A large body of electrophysiological literature showed that metaphor comprehension elicits two different event-related brain potential responses, namely the so-called N400 and P600 components. Yet most of these studies test metaphor in isolation while in natural conversation metaphors do not come out of the blue but embedded in linguistic and extra-linguistic context. This study aimed at assessing the role of context in the metaphor comprehension process. We recorded EEG activity while participants were presented with metaphors and equivalent literal expressions in a minimal context (Experiment 1) and in a supportive context where the word expressing the ground between the metaphor's topic and vehicle was made explicit (Experiment 2). The N400 effect was visible only in minimal context, whereas the P600 was visible both in the absence and in the presence of contextual cues. These findings suggest that the N400 observed for metaphor is related to contextual aspects, possibly indexing contextual expectations on upcoming words that guide lexical access and retrieval, while the P600 seems to reflect truly pragmatic interpretative processes needed to make sense of a metaphor and derive the speaker's meaning, also in the presence of contextual cues. In sum, previous information in the linguistic context biases toward a metaphorical interpretation but does not suppress interpretative pragmatic mechanisms to establish the intended meaning.

  5. Oral Fluency, Accuracy, and Complexity in Formal Instruction and Study Abroad Learning Contexts

    ERIC Educational Resources Information Center

    Mora, Joan C.; Valls-Ferrer, Margalida

    2012-01-01

    This study investigates the differential effects of two learning contexts, formal instruction (FI) at home and a study abroad period (SA), on the oral production skills of advanced-level Catalan-Spanish undergraduate learners of English. Speech samples elicited through an interview at three data collection times over a 2-year period were…

  6. The Influence of the Social Context on Students In-Class Physical Activity

    ERIC Educational Resources Information Center

    Perlman, Dana

    2013-01-01

    The purpose of this study was to examine the influence of the social context, based within self-determination theory, on student's in-class physical activity. A total of 84 Year 11/12 physical education students were randomly assigned to one of three treatment groups; Autonomy-supportive, Controlling and Balanced. Data were collected using a…

  7. Teacher Leadership Enactment in Professional Learning Community Contexts: Towards a Better Understanding of the Phenomenon

    ERIC Educational Resources Information Center

    Hairon, Salleh; Goh, Jonathan Wee Pin; Chua, Catherine Siew Kheng

    2015-01-01

    Professional learning communities (PLCs) have gained considerable attention in education. However, PLCs are dependent on how group members collectively work and learn towards shared goals on improving teaching and learning. This would require leadership to support meaningful and productive interactions within PLC contexts, and hence, the…

  8. Use of Social Media in Different Contexts of Information Seeking: Effects of Sex and Problemsolving Style

    ERIC Educational Resources Information Center

    Kim, Kyung­-Sun; Sin, Sei­-Ching Joanna

    2015-01-01

    Introduction: Social media are increasingly popular and emerging as important information sources. The study investigates how users' sex and problem-solving style affect their use and evaluation of social media in two contexts. Method: A Web survey including the problem solving inventory (problem solving inventory) was used to collect data. Over…

  9. The Care and Education of Young Children: Expanding Contexts, Sharpening Focus.

    ERIC Educational Resources Information Center

    Rust, Frances O'Connell, Ed.; Willliams, Leslie R., Ed.

    This collection of essays by child advocates explores three interconnected facets of the child care and education field: the broad sociocultural contexts influencing the development of young children and their families, the evolution of specific settings or programs where care and education occur, and the emerging consciousness of early childhood…

  10. Struggling with Involuntary Expressive Behaviours: Chinese Doctors' Professional Learning in Working Contexts

    ERIC Educational Resources Information Center

    Ma, Songge

    2012-01-01

    Purpose: This paper aims to explore what Chinese doctors have learned in authentic medical practice, what they want to learn, and the dynamics behind their professional learning in working contexts. Design/methodology/approach: The paper uses Narrative Inquiry, qualitative data which were collected by open-ended face-to-face interviews and…

  11. College Students' Conceptions of Context-Aware Ubiquitous Learning: A Phenomenographic Analysis

    ERIC Educational Resources Information Center

    Tsai, Pei-Shan; Tsai, Chin-Chung; Hwang, Gwo-Haur

    2011-01-01

    The purpose of this study was to explore students' conceptions of context-aware ubiquitous learning (u-learning). The students participated in a u-learning exercise using PDAs equipped with RFID readers. The data were collected from individual interviews with each of the students by a trained researcher, and the responses of the interviewees were…

  12. Of Mother Tongues and Other Tongues: The Stakes of Linguistically Inclusive Pedagogy in Minority Contexts

    ERIC Educational Resources Information Center

    Taylor, Lisa K.

    2008-01-01

    This article addresses two key challenges that globalization poses to literacy research: the need for new models of literacy and literacy education, and the stakes of adopting multiliteracies pedagogies in different contexts--that is, the tensions between competing hegemonic discourses of collective identity in the public sphere of ethnolinguistic…

  13. The Documentation of Kindergarten Children's Interactional Competency in an Informal Context of the Classroom.

    ERIC Educational Resources Information Center

    Black, Janet K.

    The interactional competence of 12 kindergarten children was studied through naturalistic research of their sociodramatic play in a classroom context. Data were collected by both videotape and trained observers. Contextual and interactional information was analyzed according to an Interactional Competency Checklist (ICC) designed by the author.…

  14. The Need to Consider Ethnocultural Context in Prevention Programming: A Case Example from Hawai'i

    ERIC Educational Resources Information Center

    Helm, Susana; Baker, Charlene K.

    2011-01-01

    Objective: This article highlights the importance of incorporating ethnocultural contexts in prevention research and programming. We provide a case example from our research in youth violence prevention in Hawai'i. Methods: Data were collected in multiethnic communities on O'ahu. Focus groups were conducted with high school-aged youths of Native…

  15. Lessons to Be Learned From Research on Peace Education in the Context of Intractable Conflict

    ERIC Educational Resources Information Center

    Kupermintz, Haggai; Salomon, Gavriel

    2005-01-01

    Recent research on peace education entails important practical lessons about educational work in regions of intractable conflict. Peace education in this context must deal with collective narratives and deeply rooted historical memories and societal beliefs. Research findings from a series of studies with Israeli and Palestinian students and…

  16. The Long-Day Childcare Context: Implications for Toddlers' Pretend Play

    ERIC Educational Resources Information Center

    Kowalski, Helen S.; Wyver, Shirley R.; Masselos, Grace; de Lacey, Philip

    2005-01-01

    Forty-eight toddlers aged 17 to 31 months attending long-day childcare participated in this project, which examined some of the influences of the day-care context on their emerging pretend play. Ninety minutes of video-taped observations were collected for each participant as they engaged in free play with their same-age peers and their…

  17. Epistemic Beliefs about Justification Employed by Physics Students and Faculty in Two Different Problem Contexts

    ERIC Educational Resources Information Center

    Mercan, Fatih Caglayan

    2012-01-01

    This study examines the epistemic beliefs about justification employed by physics undergraduate and graduate students and faculty in the context of solving a standard classical physics problem and a frontier physics problem. Data were collected by a think-aloud problem solving session followed by a semi-structured interview conducted with 50…

  18. Patterns of Change in Willingness to Communicate in Public Speaking Contexts: A Latent Growth Modeling Analysis

    ERIC Educational Resources Information Center

    Hodis, Georgeta M.; Bardhan, Nilanjana R.; Hodis, Flaviu A.

    2010-01-01

    This study offers a comprehensive analysis of change in willingness to communicate (WTC) in public speaking contexts (i.e., PS-WTC). The proposed conceptualization of change was tested using longitudinal data collected from a sample of 706 undergraduate students enrolled in an introductory communication course in a US university. Results of latent…

  19. The Eye of the Hurricane: Autoethnography in the Southern Brazilian School Context

    ERIC Educational Resources Information Center

    Bossle, Fabiano; Molina Neto, Vicente; Molina, Rosane Kreusburg

    2014-01-01

    The article systematizes the results of an autoethnography that aimed at understanding the difficulties of the collective work of teachers, their culture and their experience in the context of a municipal public school in Porto Alegre, Brazil. The autoreflexive exercise showed that urban violence leaves profound marks on the culture of the local…

  20. Diversified Professionalism of Physical Education Teachers in the Asian Context of Hong Kong

    ERIC Educational Resources Information Center

    Sum, Raymond Kim Wai; Dimmock, Clive

    2014-01-01

    This study investigates the socialization and professional experiences of primary school physical education teachers (PSPETs) in the Asian context of Hong Kong. A qualitative research design is adopted. The researcher used semi-structured interviews, supplemented by documentary sources (diaries) for conducting data collection. Eleven PSPETs…

  1. Power differentials in bullying: individuals in a community context.

    PubMed

    Schumann, Lyndall; Craig, Wendy; Rosu, Andrei

    2014-03-01

    Central to the definition of bullying is the abuse of power. Power relationships are inherent in social groups, by virtue of differing size, strength, age, socioeconomic status (SES), or social connectedness of individuals. Beyond the influence of these individual characteristics, environmental factors have the potential to affect the power dynamic in bullying and victimization, but are a relatively unexplored research area. In particular, we know little about how the community-level factors relate to bullying in the adolescent population. The present study is guided by a social ecological perspective to gain a deeper understanding of the individual and built community characteristics (e.g., parks, recreational spaces, buildings that facilitate social interaction and community connectedness) that contribute to the power dynamics related to victimization or bullying in traditional and electronic contexts. Data were collected from 17,777 students in Grades 6 to 10 as part of the 2009/2010 Health Behavior in School-aged Children (HBSC) Survey, from Geographical Information Systems (GIS) data, and from 2006 Canadian Census data. Two nested models were run using HLM with age, gender, ethnicity, SES, social inclusion factors (e.g., collective efficacy), and community resource factors (e.g., access to recreation) as predictors. Characteristics of individuals that placed them at a power disadvantage (being younger, female, and having low SES) were linked to higher rates of victimization. Lower individual collective efficacy was also associated with higher rates of traditional and electronic victimization. Community recreational opportunities were associated with decreased victimization in both contexts. The relative importance of individual and built environmental factors and conceptualization of bullying interactions within a social ecology model are discussed.

  2. Power differentials in bullying: individuals in a community context.

    PubMed

    Schumann, Lyndall; Craig, Wendy; Rosu, Andrei

    2014-03-01

    Central to the definition of bullying is the abuse of power. Power relationships are inherent in social groups, by virtue of differing size, strength, age, socioeconomic status (SES), or social connectedness of individuals. Beyond the influence of these individual characteristics, environmental factors have the potential to affect the power dynamic in bullying and victimization, but are a relatively unexplored research area. In particular, we know little about how the community-level factors relate to bullying in the adolescent population. The present study is guided by a social ecological perspective to gain a deeper understanding of the individual and built community characteristics (e.g., parks, recreational spaces, buildings that facilitate social interaction and community connectedness) that contribute to the power dynamics related to victimization or bullying in traditional and electronic contexts. Data were collected from 17,777 students in Grades 6 to 10 as part of the 2009/2010 Health Behavior in School-aged Children (HBSC) Survey, from Geographical Information Systems (GIS) data, and from 2006 Canadian Census data. Two nested models were run using HLM with age, gender, ethnicity, SES, social inclusion factors (e.g., collective efficacy), and community resource factors (e.g., access to recreation) as predictors. Characteristics of individuals that placed them at a power disadvantage (being younger, female, and having low SES) were linked to higher rates of victimization. Lower individual collective efficacy was also associated with higher rates of traditional and electronic victimization. Community recreational opportunities were associated with decreased victimization in both contexts. The relative importance of individual and built environmental factors and conceptualization of bullying interactions within a social ecology model are discussed. PMID:24203985

  3. Ensemble coding of context-dependent fear memory in the amygdala.

    PubMed

    Orsini, Caitlin A; Yan, Chen; Maren, Stephen

    2013-01-01

    After fear conditioning, presenting the conditioned stimulus (CS) alone yields a context-specific extinction memory; fear is suppressed in the extinction context, but renews in any other context. The context-dependence of extinction is mediated by a brain circuit consisting of the hippocampus, prefrontal cortex (PFC) and amygdala. In the present work, we sought to determine at what level of this circuit context-dependent representations of the CS emerge. To explore this question, we used cellular compartment analysis of temporal activity by fluorescent in situ hybridization (catFISH). This method exploits the intracellular expression profile of the immediate early gene (IEG), Arc, to visualize neuronal activation patterns to two different behavioral experiences. Rats were fear conditioned in one context and extinguished in another; 24 h later, they were sequentially exposed to the CS in the extinction context and another context. Control rats were also tested in each context, but were never extinguished. We assessed Arc mRNA expression within the basal amygdala (BA), lateral amygdala (LA), ventral hippocampus (VH), prelimbic cortex (PL) and infralimbic cortex (IL). We observed that the sequential retention tests induced context-dependent patterns of Arc expression in the BA, LA, and IL of extinguished rats; this was not observed in non-extinguished controls. In general, non-extinguished animals had proportionately greater numbers of non-selective (double-labeled) neurons than extinguished animals. Collectively, these findings suggest that extinction learning results in pattern separation, particularly within the BA, in which unique neuronal ensembles represent fear memories after extinction.

  4. Effects of multiple context and cumulative stress on urban children's adjustment in elementary school.

    PubMed

    Morales, Julie R; Guerra, Nancy G

    2006-01-01

    Using longitudinal data collected over 2 years on a sample of 2,745 urban elementary school children (1st-6th graders, ages 6-11 years) from economically disadvantaged communities, effects of stressful experiences within 3 contexts (school, family, neighborhood), cumulative stress, and multiple context stress on 3 indices of children's adjustment (achievement, depression, and aggression) were examined. All 3 stressor contexts were related contemporaneously and longitudinally to negative outcomes across adjustment measures, with differential paths in each predictive model. Cumulative stress was linearly related to increases in adjustment problems but multiple context stress was not related to problematic adjustment beyond effects of cumulative stress alone. The important influence of life events stress on children's adjustment in disadvantaged communities is discussed.

  5. A Study on Automated Context-aware Access Control Model Using Ontology

    NASA Astrophysics Data System (ADS)

    Jang, Bokman; Jang, Hyokyung; Choi, Euiin

    Applications in context-aware computing environment will be connected wireless network and various devices. According to, recklessness access of information resource can make trouble of system. So, access authority management is very important issue both information resource and adapt to system through founding security policy of needed system. But, existing security model is easy of approach to resource through simply user ID and password. This model has a problem that is not concerned about user's environment information. In this paper, propose model of automated context-aware access control using ontology that can more efficiently control about resource through inference and judgment of context information that collect user's information and user's environment context information in order to ontology modeling.

  6. Computerizing natural history collections.

    PubMed

    Sunderland, Mary E

    2013-09-01

    Computers are ubiquitous in the life sciences and are associated with many of the practical and conceptual changes that characterize biology's twentieth-century transformation. Yet comparatively little has been written about how scientists use computers. Despite this relative lack of scholarly attention, the claim that computers revolutionized the life sciences by making the impossible possible is widespread, and relatively unchallenged. How did the introduction of computers into research programs shape scientific practice? The Museum of Vertebrate Zoology (MVZ) at the University of California, Berkeley provides a tractable way into this under-examined question because it is possible to follow the computerization of data in the context of long-term research programs.

  7. Collective network routing

    SciTech Connect

    Hoenicke, Dirk

    2014-12-02

    Disclosed are a unified method and apparatus to classify, route, and process injected data packets into a network so as to belong to a plurality of logical networks, each implementing a specific flow of data on top of a common physical network. The method allows to locally identify collectives of packets for local processing, such as the computation of the sum, difference, maximum, minimum, or other logical operations among the identified packet collective. Packets are injected together with a class-attribute and an opcode attribute. Network routers, employing the described method, use the packet attributes to look-up the class-specific route information from a local route table, which contains the local incoming and outgoing directions as part of the specifically implemented global data flow of the particular virtual network.

  8. 78 FR 7463 - Information Collection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-01

    ... SPACE ADMINISTRATION Information Collection AGENCY: National Aeronautics and Space Administration (NASA... to take this opportunity to comment on proposed and/or continuing information collections, as... INFORMATION CONTACT: Requests for additional information or copies of the information collection...

  9. Collecting Passion with a Purpose.

    ERIC Educational Resources Information Center

    Vandergrift, Kay E.

    1986-01-01

    Explores collecting of children's books and discusses the motivations of collectors, various levels of collecting, bibliographic tools, sources of books, collection patterns, facsimiles, and cataloging. Lists of selected bibliographic tools and selected rare book dealers are included. (EM)

  10. Engaging young children in collective curriculum design

    NASA Astrophysics Data System (ADS)

    Goulart, Maria Inês Mafra; Roth, Wolff-Michael

    2010-09-01

    In this study we investigate how 5-year-old children in Brazil and their teachers collectively design science curriculum. More specifically, we develop an agency|structure dialectic as a framework to describe this collective praxis in which science curriculum may emerge as the result of children-teacher transactions rather than as a result of being predetermined and controlled by the latter. We draw on a cultural-historical approach and on the theory of structure and agency to analyze the events showing the complexity of the activity inside a classroom of very young children by science education standards. Data were collected in the context of a science unit in an early-childhood education program in Belo Horizonte. Our study suggests that (a) throughout the movement of agency|passivity || schema|resources one can observe participative thinking, a form of collective consciousness that arises in and from lived experience; (b) learning is a process in which a group is invested in searching for solutions while they create schemas and rearrange resources to evolve a new structure; and (c) the emergent curriculum is a powerful form of praxis that develops children's participation from early childhood on.

  11. [Collective violence: neurobiological, psychosocial and sociological condition].

    PubMed

    Möller-Leimkühler, A M; Bogerts, B

    2013-11-01

    Collective violence, despite its often disastrous consequences has widely been disregarded by psychiatry, as was the case for individual violence. Physical violence is not only an individual, mostly male phenomenon but manifests mainly as collective violence among men in multiple forms. Due to the plentitude of theories and findings on collective violence the present article is limited to a few relevant sociological and neurobiological aspects of collective violence as a group and intergroup phenomenon. A special focus is given to the association of the phylogenetic disposition to group violence and constructions of masculinity, to the potential relevance of mirror neurons for social contagion and to the influence of sociostructural factors for male adolescents joining violence-prone groups. In this context group dynamics such as in-group overevaluation and out-group devaluation are of central importance by stabilizing the male sense of self-worth and legitimizing, normalizing and internalizing violent behavior. Instead of mythologizing, biologizing or banalizing violence, transdisciplinary approaches are necessary to improve violence prevention on different ecological levels being obligated to a culture of nonviolent conflict management.

  12. Collecting rare diseases

    PubMed Central

    Ekins, Sean

    2014-01-01

    This editorial introduces the F1000Research rare disease collection. It is common knowledge that for new treatments to be successful there has to be a partnership between the many interested parties such as the patient, advocate, disease foundations, the academic scientists, venture funding organizations, biotech companies, pharmaceutical companies, NIH, and the FDA. Our intention is to provide a forum for discussion and dissemination of any rare disease related topics that will advance scientific understanding and progress to treatments. PMID:25580231

  13. Wastewater Collection Systems.

    PubMed

    Vallabhaneni, Srinivas

    2016-10-01

    This chapter presents a review of the literature published in 2015 on topics relating to wastewater collection systems. It presents noteworthy advances in research and industry experiences selected from major literature sources. This review is divided into the following sections: sewer system planning; sewer condition assessment/rehabilitation; pump stations/force mains/ system design; operation and maintenance; asset management; and regulatory issues/ integrated planning. PMID:27620080

  14. Curating Virtual Data Collections

    NASA Astrophysics Data System (ADS)

    Lynnes, C.; Ramapriyan, H.; Leon, A.; Tsontos, V. M.; Liu, Z.; Shie, C. L.

    2015-12-01

    NASA's Earth Observing System Data and Information System (EOSDIS) contains a rich set of datasets and related services throughout its many elements. As a result, locating all the EOSDIS data and related resources relevant to particular science theme can be daunting. This is largely because EOSDIS data's organizing principle is affected more by the way they are produced than around the expected end use.Virtual collections oriented around science themes can overcome this by presenting collections of data and related resources that are organized around the user's interest, not around the way the data were produced. Science themes can be: Specific applications (uses) of the data, e.g., landslide prediction Geophysical events (e.g., Hurricane Sandy) A specific science research problem Virtual collections consist of annotated web addresses (URLs) that point to data and related resource addresses, thus avoiding the need to copy all of the relevant data to a single place. These URL addresses can be consumed by a variety of clients, ranging from basic URL downloaders (wget, curl) and web browsers to sophisticated data analysis programs such as the Integrated Data Viewer. Eligible resources include anything accessible via URL: data files: data file URLs data subsets: OPeNDAP, webification or Web Coverage Service URLs data visualizations: Web Map Service data search results: OpenSearch Atom response custom analysis workflows: e.g., Giovanni analysis URL

  15. The Application of Context Theory in English Teaching of Reading

    ERIC Educational Resources Information Center

    Zhu, Jiang; Han, Lemeng

    2010-01-01

    Context theory is a very important theory in English teaching, especially the teaching of reading. This paper first analyzes the theory of context, including the features of context and some principles in context theory. Then the paper discusses the application of context theory in English teaching of reading, including some problems met in…

  16. Contextual Control of Fluid Consumption: The Effects of Context Extinction

    ERIC Educational Resources Information Center

    Murphy, M.; Skinner, D.M.

    2005-01-01

    Rats were trained on a conditional discrimination task in which saccharin was paired with LiCl in one context but paired with saline in another context. Rats drank less saccharin in the danger context than in the safe context, and consumption in the home cage was intermediate to consumption in the two training contexts. Rats also avoided the…

  17. Context Dependency of Conditioned Aversions to Familiar and Novel Fluids

    ERIC Educational Resources Information Center

    Ishii, Kiyoshi; Iguchi, Yoshio; Sawa, Kosuke

    2006-01-01

    Using a context discrimination procedure and rats as the subjects, the formation of context-dependent aversions to novel and familiar fluids was investigated. Experiment 1 revealed that context dependency could be established to a novel fluid (saccharin) after three cycles of context discrimination training and that the acquired context dependency…

  18. Preserving the Context of Science Data

    NASA Astrophysics Data System (ADS)

    Janée, G.; Frew, J.

    2008-12-01

    Preserving any type of digital information requires preserving both the "bits" comprising the information, and sufficient context (metadata) to support interpreting the bits in the future. Unfortunately, this context is often implicit or embedded in organizations (e.g., communities of practice) or artifacts (e.g., computing platforms) that are not as survivable as the information itself. Therefore, digital preservation must explicitly preserve context. Two necessary components of digital scientific information context are formats and provenance. Formats describe the syntax and low-level semantics of digital information objects (e.g., files). The library community has promulgated format registries (e.g, PRONOM, GDFR, digitalpreservation.gov) that allow archival objects to refer to format definitions using standardized persistent identifiers. Format registries maintain this context separately from the information that references it, but make no archival guarantees about the context's survival. Meanwhile, the scientific community has focused on capturing the provenance of scientific information, typically as a formal workflow specification of the processing steps that created the information. Unfortunately, there is as yet no standard for scientific workflows, nor any guarantee that a specification that can reproduce information is sufficient for understanding it. We describe new technologies that may prove a better fit for preserving scientific information context. The National Geospatial Digital Archive (NGDA) data model represents formats as archival objects containing specifications, software implementations, and other documentation. A format registry is simply an archive that happens to hold archival objects representing formats. Both format and provenance relationships are represented by typed references. Any archival object may reference any other object for its interpretation: the referenced object may be a "file format" object or an object containing dataset

  19. Geomorphology in context: Dispatches from the field

    NASA Astrophysics Data System (ADS)

    Harden, Carol P.

    2013-10-01

    Field research enables a researcher to view geomorphic systems in broader contexts than those envisioned while at a desk and can yield unanticipated insights that change the course of an investigation or affect the interpretation of results. Geomorphological field research often produces 'aha!' moments, epiphanies that enhance understanding and lead toward more complete explanation of the processes and landforms under study. This paper uses examples from 'aha!' moments in the field to demonstrate the importance of field observation as a way of gaining information about the broader contexts of research sites, especially in process geomorphology. Spatial contexts include the scales of processes and features, linkages between a study site and its surroundings, and information observed in the field about other processes, anthropogenic activities, or unexpected factors that might affect a study. Temporal contexts, not as evident in the field, place a research site in a longer term history of changes and adjustments. Finally, exploring an abstract set of mental contexts reveals reasons that expectations differ from the realities encountered in the field—constraints and biases that a researcher may not have noted—and the possibility that the unexpected can potentially advance geomorphic research. Time spent in the field complements scientific reductionism and provides opportunities to appreciate the richness and complexity of Earth surface systems.

  20. Ontological System for Context Artifacts and Resources

    NASA Astrophysics Data System (ADS)

    Huang, T.; Chung, N. T.; Mukherjee, R. M.

    2012-12-01

    The Adaptive Vehicle Make (AVM) program is a portfolio of programs, managed by the Defense Advanced Research Projects Agency (DARPA). It was established to revolutionize how DoD designs, verifies, and manufactures complex defense systems and vehicles. The Component, Context, and Manufacturing Model Library (C2M2L; pronounced "camel") seeks to develop domain-specific models needed to enable design, verification, and fabrication of the Fast Adaptable Next-Generation (FANG) infantry fighting vehicle using in its overall infrastructure. Terrain models are being developed to represent the surface/fluid that an amphibious infantry fighting vehicle would traverse, ranging from paved road surfaces to rocky, mountainous terrain, slope, discrete obstacles, mud, sand snow, and water fording. Context models are being developed to provide additional data for environmental factors, such as: humidity, wind speed, particulate presence and character, solar radiation, cloud cover, precipitation, and more. The Ontological System for Context Artifacts and Resources (OSCAR) designed and developed at the Jet Propulsion Laboratory is semantic web data system that enables context artifacts to be registered and searched according to their meaning, rather than indexed according to their syntactic structure alone (as in the case for traditional search engines). The system leverages heavily on the Semantic Web for Earth and Environmental Terminology (SWEET) ontologies to model physical terrain environment and context model characteristics. In this talk, we focus on the application of the SWEET ontologies and the design of the OSCAR system architecture.

  1. Student reasoning about graphs in different contexts

    NASA Astrophysics Data System (ADS)

    Ivanjek, Lana; Susac, Ana; Planinic, Maja; Andrasevic, Aneta; Milin-Sipus, Zeljka

    2016-06-01

    This study investigates university students' graph interpretation strategies and difficulties in mathematics, physics (kinematics), and contexts other than physics. Eight sets of parallel (isomorphic) mathematics, physics, and other context questions about graphs, which were developed by us, were administered to 385 first-year students at the Faculty of Science, University of Zagreb. Students were asked to provide explanations and/or mathematical procedures with their answers. Students' main strategies and difficulties identified through the analysis of those explanations and procedures are described. Student strategies of graph interpretation were found to be largely context dependent and domain specific. A small fraction of students have used the same strategy in all three domains (mathematics, physics, and other contexts) on most sets of parallel questions. Some students have shown indications of transfer of knowledge in the sense that they used techniques and strategies developed in physics for solving (or attempting to solve) other context problems. In physics, the preferred strategy was the use of formulas, which sometimes seemed to block the use of other, more productive strategies which students displayed in other domains. Students' answers indicated the presence of slope-height confusion and interval-point confusion in all three domains. Students generally better interpreted graph slope than the area under a graph, although the concept of slope still seemed to be quite vague for many. The interpretation of the concept of area under a graph needs more attention in both physics and mathematics teaching.

  2. 77 FR 71640 - Agency Information Collection Activities; Proposed Collection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-03

    ... BOARD Agency Information Collection Activities; Proposed Collection AGENCY: Merit Systems Protection... a revised information collection from the Office of Management and Budget (OMB) under the Paperwork... before February 1, 2013. ADDRESSES: Submit written comments on the collection of information to William...

  3. 76 FR 74812 - Agency Information Collection Activities: Proposed Collection; Comment Request New Collection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-01

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF JUSTICE Office of Justice Programs Agency Information Collection Activities: Proposed Collection; Comment Request... information collection under review. The Department of Justice (DOJ), Office of Justice Programs, will...

  4. Context aware adaptive security service model

    NASA Astrophysics Data System (ADS)

    Tunia, Marcin A.

    2015-09-01

    Present systems and devices are usually protected against different threats concerning digital data processing. The protection mechanisms consume resources, which are either highly limited or intensively utilized by many entities. The optimization of these resources usage is advantageous. The resources that are saved performing optimization may be utilized by other mechanisms or may be sufficient for longer time. It is usually assumed that protection has to provide specific quality and attack resistance. By interpreting context situation of business services - users and services themselves, it is possible to adapt security services parameters to countermeasure threats associated with current situation. This approach leads to optimization of used resources and maintains sufficient security level. This paper presents architecture of adaptive security service, which is context-aware and exploits quality of context data issue.

  5. Management challenges of context-aware learning

    NASA Astrophysics Data System (ADS)

    Pankowska, Malgorzata

    2015-02-01

    The work covers different definitions of context and the explanation of the context value for university learning organization and management. The thesis of the paper is as follows: students' focus on sources of context has impact on their knowledge acquisition and determines students' profiles and learning process, within which the teachers support de-contextualization, i.e., generalization of experience and knowledge. The work emphasizes the meaning of mobile devices in university learning process. The paper presents the value of BYOD (bring-your-own-device) strategy at universities and opportunities for m-education. The student survey results are presented to emphasize the value of that strategy. Beyond that, the students' preferences towards open source software and open learning materials are also discussed and evaluated by student survey. Finally, the process of contextualization and de-contextualization is developed for support the learning at university level.

  6. Social contexts of trauma and healing.

    PubMed

    Ajdukovic, Dean

    2004-01-01

    The social contexts in which the mass trauma of thousands of people occur and in which their recovery should progress have qualities that distinguish it in important ways from individualised trauma in which a person is a victim of a violent attack, rape or a traffic accident. Organised violence, such as wars, oppression by dictatorships and massive terrorist attacks are extreme cases in which hundreds or thousands of people are exposed to trauma in a short period of time. As such, it has multiple consequences that extend beyond the affected individuals and the symptoms they suffer. Although the symptoms may be similar, the social contexts in which individual victimisation and exposure to organised violence happen are very different. The social milieu in which the survivors of individual trauma and survivors of mass trauma are embedded is likewise different, with important consequences for recovery. Understanding the social context of the trauma helps create the right social intervention for healing at social and personal levels.

  7. The context-tree kernel for strings.

    PubMed

    Cuturi, Marco; Vert, Jean-Philippe

    2005-10-01

    We propose a new kernel for strings which borrows ideas and techniques from information theory and data compression. This kernel can be used in combination with any kernel method, in particular Support Vector Machines for string classification, with notable applications in proteomics. By using a Bayesian averaging framework with conjugate priors on a class of Markovian models known as probabilistic suffix trees or context-trees, we compute the value of this kernel in linear time and space while only using the information contained in the spectrum of the considered strings. This is ensured through an adaptation of a compression method known as the context-tree weighting algorithm. Encouraging classification results are reported on a standard protein homology detection experiment, showing that the context-tree kernel performs well with respect to other state-of-the-art methods while using no biological prior knowledge.

  8. Semantic Context Detection Using Audio Event Fusion

    NASA Astrophysics Data System (ADS)

    Chu, Wei-Ta; Cheng, Wen-Huang; Wu, Ja-Ling

    2006-12-01

    Semantic-level content analysis is a crucial issue in achieving efficient content retrieval and management. We propose a hierarchical approach that models audio events over a time series in order to accomplish semantic context detection. Two levels of modeling, audio event and semantic context modeling, are devised to bridge the gap between physical audio features and semantic concepts. In this work, hidden Markov models (HMMs) are used to model four representative audio events, that is, gunshot, explosion, engine, and car braking, in action movies. At the semantic context level, generative (ergodic hidden Markov model) and discriminative (support vector machine (SVM)) approaches are investigated to fuse the characteristics and correlations among audio events, which provide cues for detecting gunplay and car-chasing scenes. The experimental results demonstrate the effectiveness of the proposed approaches and provide a preliminary framework for information mining by using audio characteristics.

  9. Collective Intelligence. Chapter 17

    NASA Technical Reports Server (NTRS)

    Wolpert, David H.

    2003-01-01

    Many systems of self-interested agents have an associated performance criterion that rates the dynamic behavior of the overall system. This chapter presents an introduction to the science of such systems. Formally, collectives are defined as any system having the following two characteristics: First, the system must contain one or more agents each of which we view as trying to maximize an associated private utility; second, the system must have an associated world utility function that rates the possible behaviors of that overall system. In practice, collectives are often very large, distributed, and support little, if any, centralized communication and control, although those characteristics are not part of their formal definition. A naturally occurring example of a collective is a human economy. One can identify the agents and their private utilities as the human individuals in the economy and the associated personal rewards they are each trying to maximize. One could then identify the world utility as the time average of the gross domestic product. ("World utility" per se is not a construction internal to a human economy, but rather something defined from the outside.) To achieve high world utility it is necessary to avoid having the agents work at cross-purposes lest phenomena like liquidity traps or the Tragedy of the Commons (TOC) occur, in which agents' individually pursuing their private utilities lowers world utility. The obvious way to avoid such phenomena is by modifying the agents utility functions to be "aligned" with the world utility. This can be done via punitive legislation. A real-world example of an attempt to do this was the creation of antitrust regulations designed to prevent monopolistic practices.

  10. Collective uncertainty entanglement test.

    PubMed

    Rudnicki, Łukasz; Horodecki, Paweł; Zyczkowski, Karol

    2011-10-01

    For a given pure state of a composite quantum system we analyze the product of its projections onto a set of locally orthogonal separable pure states. We derive a bound for this product analogous to the entropic uncertainty relations. For bipartite systems the bound is saturated for maximally entangled states and it allows us to construct a family of entanglement measures, we shall call collectibility. As these quantities are experimentally accessible, the approach advocated contributes to the task of experimental quantification of quantum entanglement, while for a three-qubit system it is capable to identify the genuine three-party entanglement.

  11. Collective Uncertainty Entanglement Test

    NASA Astrophysics Data System (ADS)

    Rudnicki, Łukasz; Horodecki, Paweł; Życzkowski, Karol

    2011-10-01

    For a given pure state of a composite quantum system we analyze the product of its projections onto a set of locally orthogonal separable pure states. We derive a bound for this product analogous to the entropic uncertainty relations. For bipartite systems the bound is saturated for maximally entangled states and it allows us to construct a family of entanglement measures, we shall call collectibility. As these quantities are experimentally accessible, the approach advocated contributes to the task of experimental quantification of quantum entanglement, while for a three-qubit system it is capable to identify the genuine three-party entanglement.

  12. Self-face recognition in social context.

    PubMed

    Sugiura, Motoaki; Sassa, Yuko; Jeong, Hyeonjeong; Wakusawa, Keisuke; Horie, Kaoru; Sato, Shigeru; Kawashima, Ryuta

    2012-06-01

    The concept of "social self" is often described as a representation of the self-reflected in the eyes or minds of others. Although the appearance of one's own face has substantial social significance for humans, neuroimaging studies have failed to link self-face recognition and the likely neural substrate of the social self, the medial prefrontal cortex (MPFC). We assumed that the social self is recruited during self-face recognition under a rich social context where multiple other faces are available for comparison of social values. Using functional magnetic resonance imaging (fMRI), we examined the modulation of neural responses to the faces of the self and of a close friend in a social context. We identified an enhanced response in the ventral MPFC and right occipitoparietal sulcus in the social context specifically for the self-face. Neural response in the right lateral parietal and inferior temporal cortices, previously claimed as self-face-specific, was unaffected for the self-face but unexpectedly enhanced for the friend's face in the social context. Self-face-specific activation in the pars triangularis of the inferior frontal gyrus, and self-face-specific reduction of activation in the left middle temporal gyrus and the right supramarginal gyrus, replicating a previous finding, were not subject to such modulation. Our results thus demonstrated the recruitment of a social self during self-face recognition in the social context. At least three brain networks for self-face-specific activation may be dissociated by different patterns of response-modulation in the social context, suggesting multiple dynamic self-other representations in the human brain.

  13. Global Contexts for Learning: Exploring the Relationship between Low-Context Online Learning and High-Context Learners

    ERIC Educational Resources Information Center

    Westbrook, Timothy Paul

    2014-01-01

    Current research on culture and distance education suggests that cultural variables influence student success online. When online courses are writing-based, they may provide easy information dissemination; however, the low-context medium may restrict the learning experience and class dynamic due to the lack of nonverbal communication. Students who…

  14. Information compression in the context model

    NASA Technical Reports Server (NTRS)

    Gebhardt, Joerg; Kruse, Rudolf; Nauck, Detlef

    1992-01-01

    The Context Model provides a formal framework for the representation, interpretation, and analysis of vague and uncertain data. The clear semantics of the underlying concepts make it feasible to compare well-known approaches to the modeling of imperfect knowledge like that given in Bayes Theory, Shafer's Evidence Theory, the Transferable Belief Model, and Possibility Theory. In this paper we present the basic ideas of the Context Model and show its applicability as an alternative foundation of Possibility Theory and the epistemic view of fuzzy sets.

  15. Putting retrieval-induced forgetting in context: an inhibition-free, context-based account.

    PubMed

    Jonker, Tanya R; Seli, Paul; MacLeod, Colin M

    2013-10-01

    We present a new theoretical account of retrieval-induced forgetting (RIF) together with new experimental evidence that fits this account and challenges the dominant inhibition account. RIF occurs when the retrieval of some material from memory produces later forgetting of related material. The inhibition account asserts that RIF is the result of an inhibition mechanism that acts during retrieval to suppress the representations of interfering competitors. This inhibition is enduring, such that the suppressed material is difficult to access on a later test and is, therefore, recalled more poorly than baseline material. Although the inhibition account is widely accepted, a growing body of research challenges its fundamental assumptions. Our alternative account of RIF instead emphasizes the role of context in remembering. According to this context account, both of 2 tenets must be met for RIF to occur: (a) A context change must occur between study and subsequent retrieval practice, and (b) the retrieval practice context must be the active context during the final test when testing practiced categories. The results of 3 experiments, which directly test the divergent predictions of the 2 accounts, support the context account but cannot be explained by the inhibition account. In an extensive discussion, we survey the literature on RIF and apply our context account to the key findings, demonstrating the explanatory power of context.

  16. "Professional Contexts for Modern Languages": Work Experience and Academic Reflection in a Multilingual Context

    ERIC Educational Resources Information Center

    Gomez-Cash, Olga

    2016-01-01

    In the second year module "Professional Contexts for Modern Languages" at Lancaster University, students take 20-25 hour placements, and using a multimodal forum, they articulate their challenges, development and understanding of the varying contexts in which they are working. In summative assessment, students across languages and types…

  17. Analysing Policy in the Context(s) of Practice: A Theoretical Puzzle

    ERIC Educational Resources Information Center

    Grimaldi, Emiliano

    2012-01-01

    This essay contributes to the construction of a critically informed toolbox of diverse concepts for education policy analysis. Focusing on the context(s) of practice of the policy cycle, the article outlines an interpretative framework to grasp policy enactment across different localities, the influences bearing upon those enactments as well as…

  18. Academic Success in Context-Based Chemistry: Demonstrating fluid transitions between concepts and context

    NASA Astrophysics Data System (ADS)

    King, Donna Therese; Ritchie, Stephen M.

    2013-05-01

    Curriculum developers and researchers have promoted context-based programmes to arrest waning student interest and participation in the enabling sciences at high school and university. Context-based programmes aim for student connections between scientific discourse and real-world contexts to elevate curricular relevance without diminishing conceptual understanding. This interpretive study explored the learning transactions in one 11th grade context-based chemistry classroom where the context was the local creek. The dialectic of agency/structure was used as a lens to examine how the practices in classroom interactions afforded students the agency for learning. The results suggest that first, fluid transitions were evident in the student-student interactions involving successful students; and second, fluid transitions linking concepts to context were evident in the students' successful reports. The study reveals that the structures of writing and collaborating in groups enabled students' agential and fluent movement between the field of the real-world creek and the field of the formal chemistry classroom. Furthermore, characteristics of academically successful students in context-based chemistry are highlighted. Research, teaching, and future directions for context-based science teaching are discussed.

  19. Different Orthographies Different Context Effects: The Effects of Arabic Sentence Context in Skilled and Poor Readers.

    ERIC Educational Resources Information Center

    Rabia, Salim Abu; Siegel, Linda S.

    1995-01-01

    Investigates whether Arabic orthography differs from an alphabetic orthography regarding context effects among poor and skilled readers. Finds that skilled as well as poor readers significantly improved their reading accuracy when they read voweled and unvoweled words in context and that skilled readers significantly improved their reading voweled…

  20. Appetitive Context Conditioning Proactively, but Transiently, Interferes with Expression of Counterconditioned Context Fear

    ERIC Educational Resources Information Center

    Holmes, Nathan M.; Westbrook, R. Frederick

    2014-01-01

    Four experiments used rats to study appetitive-aversive transfer. Rats trained to eat a palatable food in a distinctive context and shocked in that context ate and did not freeze when tested 1 d later but froze and did not eat when tested 14 d later. These results were associatively mediated (Experiments 1 and 2), observed when rats were or were…