Science.gov

Sample records for privacy-preserving context collection

  1. Privacy-Preserving Health Data Collection for Preschool Children

    PubMed Central

    Zhang, Yuan; Ji, Yue

    2013-01-01

    With the development of network technology, more and more data are transmitted over the network and privacy issues have become a research focus. In this paper, we study the privacy in health data collection of preschool children and present a new identity-based encryption protocol for privacy protection. The background of the protocol is as follows. A physical examination for preschool children is needed every year out of consideration for the children's health. After the examination, data are transmitted through the Internet to the education authorities for analysis. In the process of data collection, it is unnecessary for the education authorities to know the identities of the children. Based on this, we designed a privacy-preserving protocol, which delinks the children's identities from the examination data. Thus, the privacy of the children is preserved during data collection. We present the protocol in detail and prove the correctness of the protocol. PMID:24285984

  2. Privacy-preserving health data collection for preschool children.

    PubMed

    Guan, Shaopeng; Zhang, Yuan; Ji, Yue

    2013-01-01

    With the development of network technology, more and more data are transmitted over the network and privacy issues have become a research focus. In this paper, we study the privacy in health data collection of preschool children and present a new identity-based encryption protocol for privacy protection. The background of the protocol is as follows. A physical examination for preschool children is needed every year out of consideration for the children's health. After the examination, data are transmitted through the Internet to the education authorities for analysis. In the process of data collection, it is unnecessary for the education authorities to know the identities of the children. Based on this, we designed a privacy-preserving protocol, which delinks the children's identities from the examination data. Thus, the privacy of the children is preserved during data collection. We present the protocol in detail and prove the correctness of the protocol.

  3. Applying Triple-Matrix Masking for Privacy Preserving Data Collection and Sharing in HIV Studies.

    PubMed

    Pei, Qinglin; Chen, Shigang; Xiao, Yao; Wu, Samuel S

    2016-01-01

    Many HIV research projects are plagued by the high missing rate of selfreported information during data collection. Also, due to the sensitive nature of the HIV research data, privacy protection is always a concern for data sharing in HIV studies. This paper applies a data masking approach, called triple-matrix masking [1], to the context of HIV research for ensuring privacy protection during the process of data collection and data sharing. Using a set of generated HIV patient data, we show step by step how the data are randomly transformed (masked) before leaving the patients' individual data collection device (which ensures that nobody sees the actual data) and how the masked data are further transformed by a masking service provider and a data collector. We demonstrate that the masked data retain statistical utility of the original data, yielding the exactly same inference results in the planned logistic regression on the effect of age on the adherence to antiretroviral therapy and in the Cox proportional hazard model for the age effect on time to viral load suppression. Privacy-preserving data collection method may help resolve the privacy protection issue in HIV research. The individual sensitive data can be completely hidden while the same inference results can still be obtained from the masked data, with the use of common statistical analysis methods.

  4. Context Sensing System Analysis for Privacy Preservation Based on Game Theory †

    PubMed Central

    Wang, Shengling; Li, Luyun; Sun, Weiman; Guo, Junqi; Bie, Rongfang; Lin, Kai

    2017-01-01

    In a context sensing system in which a sensor-equipped mobile phone runs an unreliable context-aware application, the application can infer the user’s contexts, based on which it provides personalized services. However, the application may sell the user’s contexts to some malicious adversaries to earn extra profits, which will hinder its widespread use. In the real world, the actions of the user, the application and the adversary in the context sensing system affect each other, so that their payoffs are constrained mutually. To figure out under which conditions they behave well (the user releases, the application does not leak and the adversary does not retrieve the context), we take advantage of game theory to analyze the context sensing system. We use the extensive form game and the repeated game, respectively, to analyze two typical scenarios, single interaction and multiple interaction among three players, from which Nash equilibriums and cooperation conditions are obtained. Our results show that the reputation mechanism for the context-sensing system in the former scenario is crucial to privacy preservation, so is the extent to which the participants are concerned about future payoffs in the latter one. PMID:28208593

  5. Context Sensing System Analysis for Privacy Preservation Based on Game Theory.

    PubMed

    Wang, Shengling; Li, Luyun; Sun, Weiman; Guo, Junqi; Bie, Rongfang; Lin, Kai

    2017-02-10

    In a context sensing system in which a sensor-equipped mobile phone runs an unreliable context-aware application, the application can infer the user's contexts, based on which it provides personalized services. However, the application may sell the user's contexts to some malicious adversaries to earn extra profits, which will hinder its widespread use. In the real world, the actions of the user, the application and the adversary in the context sensing system affect each other, so that their payoffs are constrained mutually. To figure out under which conditions they behave well (the user releases, the application does not leak and the adversary does not retrieve the context), we take advantage of game theory to analyze the context sensing system. We use the extensive form game and the repeated game, respectively, to analyze two typical scenarios, single interaction and multiple interaction among three players, from which Nash equilibriums and cooperation conditions are obtained. Our results show that the reputation mechanism for the context-sensing system in the former scenario is crucial to privacy preservation, so is the extent to which the participants are concerned about future payoffs in the latter one.

  6. Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme

    PubMed Central

    Zhu, Hui; Gao, Lijuan; Li, Hui

    2016-01-01

    With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users’ personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users’ query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users’ queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs. PMID:26840319

  7. Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme.

    PubMed

    Zhu, Hui; Gao, Lijuan; Li, Hui

    2016-02-01

    With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users' personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users' query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users' queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs.

  8. Data Collection Framework for Energy Efficient Privacy Preservation in Wireless Sensor Networks Having Many-to-Many Structures

    PubMed Central

    Bahşi, Hayretdin; Levi, Albert

    2010-01-01

    Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-to-many structures evolved due to the need for conveying collected event information to multiple sinks. Privacy preserved data collection models in the literature do not solve the problems of WSN applications in which network has multiple un-trusted sinks with different level of privacy requirements. This study proposes a data collection framework bases on k-anonymity for preventing record disclosure of collected event information in WSNs. Proposed method takes the anonymity requirements of multiple sinks into consideration by providing different levels of privacy for each destination sink. Attributes, which may identify an event owner, are generalized or encrypted in order to meet the different anonymity requirements of sinks at the same anonymized output. If the same output is formed, it can be multicasted to all sinks. The other trivial solution is to produce different anonymized outputs for each sink and send them to related sinks. Multicasting is an energy efficient data sending alternative for some sensor nodes. Since minimization of energy consumption is an important design criteria for WSNs, multicasting the same event information to multiple sinks reduces the energy consumption of overall network. PMID:22163660

  9. Data collection framework for energy efficient privacy preservation in wireless sensor networks having many-to-many structures.

    PubMed

    Bahşi, Hayretdin; Levi, Albert

    2010-01-01

    Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-to-many structures evolved due to the need for conveying collected event information to multiple sinks. Privacy preserved data collection models in the literature do not solve the problems of WSN applications in which network has multiple un-trusted sinks with different level of privacy requirements. This study proposes a data collection framework bases on k-anonymity for preventing record disclosure of collected event information in WSNs. Proposed method takes the anonymity requirements of multiple sinks into consideration by providing different levels of privacy for each destination sink. Attributes, which may identify an event owner, are generalized or encrypted in order to meet the different anonymity requirements of sinks at the same anonymized output. If the same output is formed, it can be multicasted to all sinks. The other trivial solution is to produce different anonymized outputs for each sink and send them to related sinks. Multicasting is an energy efficient data sending alternative for some sensor nodes. Since minimization of energy consumption is an important design criteria for WSNs, multicasting the same event information to multiple sinks reduces the energy consumption of overall network.

  10. Target-Based Maintenance of Privacy Preserving Association Rules

    ERIC Educational Resources Information Center

    Ahluwalia, Madhu V.

    2011-01-01

    In the context of association rule mining, the state-of-the-art in privacy preserving data mining provides solutions for categorical and Boolean association rules but not for quantitative association rules. This research fills this gap by describing a method based on discrete wavelet transform (DWT) to protect input data privacy while preserving…

  11. Target-Based Maintenance of Privacy Preserving Association Rules

    ERIC Educational Resources Information Center

    Ahluwalia, Madhu V.

    2011-01-01

    In the context of association rule mining, the state-of-the-art in privacy preserving data mining provides solutions for categorical and Boolean association rules but not for quantitative association rules. This research fills this gap by describing a method based on discrete wavelet transform (DWT) to protect input data privacy while preserving…

  12. Privacy-preserving restricted boltzmann machine.

    PubMed

    Li, Yu; Zhang, Yuan; Ji, Yue

    2014-01-01

    With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model.

  13. Privacy-Preserving Restricted Boltzmann Machine

    PubMed Central

    Li, Yu

    2014-01-01

    With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model. PMID:25101139

  14. Privacy-Preserving Collaborative Data Mining

    DTIC Science & Technology

    2003-01-01

    Privacy-preserving data mining is an important issue in the areas of data mining and security. In this paper, we study how to conduct association...rule mining, one of the core data mining techniques, on private data in the following scenario: Multiple parties, each having a private data set, want to

  15. Privacy Preservation in Distributed Subgradient Optimization Algorithms.

    PubMed

    Lou, Youcheng; Yu, Lean; Wang, Shouyang; Yi, Peng

    2017-07-31

    In this paper, some privacy-preserving features for distributed subgradient optimization algorithms are considered. Most of the existing distributed algorithms focus mainly on the algorithm design and convergence analysis, but not the protection of agents' privacy. Privacy is becoming an increasingly important issue in applications involving sensitive information. In this paper, we first show that the distributed subgradient synchronous homogeneous-stepsize algorithm is not privacy preserving in the sense that the malicious agent can asymptotically discover other agents' subgradients by transmitting untrue estimates to its neighbors. Then a distributed subgradient asynchronous heterogeneous-stepsize projection algorithm is proposed and accordingly its convergence and optimality is established. In contrast to the synchronous homogeneous-stepsize algorithm, in the new algorithm agents make their optimization updates asynchronously with heterogeneous stepsizes. The introduced two mechanisms of projection operation and asynchronous heterogeneous-stepsize optimization can guarantee that agents' privacy can be effectively protected.

  16. Privacy preserving RBF kernel support vector machine.

    PubMed

    Li, Haoran; Xiong, Li; Ohno-Machado, Lucila; Jiang, Xiaoqian

    2014-01-01

    Data sharing is challenging but important for healthcare research. Methods for privacy-preserving data dissemination based on the rigorous differential privacy standard have been developed but they did not consider the characteristics of biomedical data and make full use of the available information. This often results in too much noise in the final outputs. We hypothesized that this situation can be alleviated by leveraging a small portion of open-consented data to improve utility without sacrificing privacy. We developed a hybrid privacy-preserving differentially private support vector machine (SVM) model that uses public data and private data together. Our model leverages the RBF kernel and can handle nonlinearly separable cases. Experiments showed that this approach outperforms two baselines: (1) SVMs that only use public data, and (2) differentially private SVMs that are built from private data. Our method demonstrated very close performance metrics compared to nonprivate SVMs trained on the private data.

  17. Privacy Preserving RBF Kernel Support Vector Machine

    PubMed Central

    Xiong, Li; Ohno-Machado, Lucila

    2014-01-01

    Data sharing is challenging but important for healthcare research. Methods for privacy-preserving data dissemination based on the rigorous differential privacy standard have been developed but they did not consider the characteristics of biomedical data and make full use of the available information. This often results in too much noise in the final outputs. We hypothesized that this situation can be alleviated by leveraging a small portion of open-consented data to improve utility without sacrificing privacy. We developed a hybrid privacy-preserving differentially private support vector machine (SVM) model that uses public data and private data together. Our model leverages the RBF kernel and can handle nonlinearly separable cases. Experiments showed that this approach outperforms two baselines: (1) SVMs that only use public data, and (2) differentially private SVMs that are built from private data. Our method demonstrated very close performance metrics compared to nonprivate SVMs trained on the private data. PMID:25013805

  18. Privacy-preserving backpropagation neural network learning.

    PubMed

    Chen, Tingting; Zhong, Sheng

    2009-10-01

    With the development of distributed computing environment , many learning problems now have to deal with distributed input data. To enhance cooperations in learning, it is important to address the privacy concern of each data holder by extending the privacy preservation notion to original learning algorithms. In this paper, we focus on preserving the privacy in an important learning model, multilayer neural networks. We present a privacy-preserving two-party distributed algorithm of backpropagation which allows a neural network to be trained without requiring either party to reveal her data to the other. We provide complete correctness and security analysis of our algorithms. The effectiveness of our algorithms is verified by experiments on various real world data sets.

  19. Toward privacy-preserving JPEG image retrieval

    NASA Astrophysics Data System (ADS)

    Cheng, Hang; Wang, Jingyue; Wang, Meiqing; Zhong, Shangping

    2017-07-01

    This paper proposes a privacy-preserving retrieval scheme for JPEG images based on local variance. Three parties are involved in the scheme: the content owner, the server, and the authorized user. The content owner encrypts JPEG images for privacy protection by jointly using permutation cipher and stream cipher, and then, the encrypted versions are uploaded to the server. With an encrypted query image provided by an authorized user, the server may extract blockwise local variances in different directions without knowing the plaintext content. After that, it can calculate the similarity between the encrypted query image and each encrypted database image by a local variance-based feature comparison mechanism. The authorized user with the encryption key can decrypt the returned encrypted images with plaintext content similar to the query image. The experimental results show that the proposed scheme not only provides effective privacy-preserving retrieval service but also ensures both format compliance and file size preservation for encrypted JPEG images.

  20. Cryptographic Techniques for Privacy Preserving Identity

    DTIC Science & Technology

    2011-05-13

    Cryptographic Techniques for Privacy Preserving Identity John Bethencourt Electrical Engineering and Computer Sciences University of California at...AND ADDRESS(ES) University of California, Berkely,Electrical Engineering and Computer Sciences ,Berkeley,CA,94720 8. PERFORMING ORGANIZATION REPORT...Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 Copyright © 2011, by the author(s). All rights reserved. Permission to make digital or

  1. Privacy Preservation in Context-Aware Systems

    DTIC Science & Technology

    2011-01-01

    and Abowd , G. D. 2004. The personal audio loop: Designing a ubiquitous audio-based memory aid. In In Proceedings of Mobile HCI, 168–179. Springer...Verlag. [14] Iachello, G.; Truong, K. N.; Abowd , G. D.; Hayes, G. R.; and Stevens, M. 2006. Prototyping and sampling experience to evaluate ubiquitous...Kapadia, A.; Kotz, D.; and Triandopoulos, N. 2009. Opportunistic sensing: security challenges for the new paradigm. 127–136. [20] Kidd, C.; Orr, R.; Abowd

  2. Privacy Preserving Publication of Moving Object Data

    NASA Astrophysics Data System (ADS)

    Bonchi, Francesco

    The increasing availability of space-time trajectories left by location-aware devices is expected to enable novel classes of applications where the discovery of consumable, concise, and actionable knowledge is the key step. However, the analysis of mobility data is a critic task by the privacy point of view: in fact, the peculiar nature of location data might enable intrusive inferences in the life of the individuals whose data is analyzed. It is thus important to develop privacy-preserving techniques for the publication and the analysis of mobility data.

  3. The study on privacy preserving data mining for information security

    NASA Astrophysics Data System (ADS)

    Li, Xiaohui

    2012-04-01

    Privacy preserving data mining have a rapid development in a short year. But it still faces many challenges in the future. Firstly, the level of privacy has different definitions in different filed. Therefore, the measure of privacy preserving data mining technology protecting private information is not the same. So, it's an urgent issue to present a unified privacy definition and measure. Secondly, the most of research in privacy preserving data mining is presently confined to the theory study.

  4. Privacy-preserving heterogeneous health data sharing

    PubMed Central

    Mohammed, Noman; Jiang, Xiaoqian; Chen, Rui; Fung, Benjamin C M; Ohno-Machado, Lucila

    2013-01-01

    Objective Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees and makes no assumptions about an adversary's background knowledge. All existing solutions that ensure ε-differential privacy handle the problem of disclosing relational and set-valued data in a privacy-preserving manner separately. In this paper, we propose an algorithm that considers both relational and set-valued data in differentially private disclosure of healthcare data. Methods The proposed approach makes a simple yet fundamental switch in differentially private algorithm design: instead of listing all possible records (ie, a contingency table) for noise addition, records are generalized before noise addition. The algorithm first generalizes the raw data in a probabilistic way, and then adds noise to guarantee ε-differential privacy. Results We showed that the disclosed data could be used effectively to build a decision tree induction classifier. Experimental results demonstrated that the proposed algorithm is scalable and performs better than existing solutions for classification analysis. Limitation The resulting utility may degrade when the output domain size is very large, making it potentially inappropriate to generate synthetic data for large health databases. Conclusions Unlike existing techniques, the proposed algorithm allows the disclosure of health data containing both relational and set-valued data in a differentially private manner, and can retain essential information for discriminative analysis. PMID:23242630

  5. Privacy-preserving heterogeneous health data sharing.

    PubMed

    Mohammed, Noman; Jiang, Xiaoqian; Chen, Rui; Fung, Benjamin C M; Ohno-Machado, Lucila

    2013-05-01

    Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees and makes no assumptions about an adversary's background knowledge. All existing solutions that ensure ε-differential privacy handle the problem of disclosing relational and set-valued data in a privacy-preserving manner separately. In this paper, we propose an algorithm that considers both relational and set-valued data in differentially private disclosure of healthcare data. The proposed approach makes a simple yet fundamental switch in differentially private algorithm design: instead of listing all possible records (ie, a contingency table) for noise addition, records are generalized before noise addition. The algorithm first generalizes the raw data in a probabilistic way, and then adds noise to guarantee ε-differential privacy. We showed that the disclosed data could be used effectively to build a decision tree induction classifier. Experimental results demonstrated that the proposed algorithm is scalable and performs better than existing solutions for classification analysis. The resulting utility may degrade when the output domain size is very large, making it potentially inappropriate to generate synthetic data for large health databases. Unlike existing techniques, the proposed algorithm allows the disclosure of health data containing both relational and set-valued data in a differentially private manner, and can retain essential information for discriminative analysis.

  6. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    ERIC Educational Resources Information Center

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  7. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    ERIC Educational Resources Information Center

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  8. Privacy preserving interactive record linkage (PPIRL)

    PubMed Central

    Kum, Hye-Chung; Krishnamurthy, Ashok; Machanavajjhala, Ashwin; Reiter, Michael K; Ahalt, Stanley

    2014-01-01

    Objective Record linkage to integrate uncoordinated databases is critical in biomedical research using Big Data. Balancing privacy protection against the need for high quality record linkage requires a human–machine hybrid system to safely manage uncertainty in the ever changing streams of chaotic Big Data. Methods In the computer science literature, private record linkage is the most published area. It investigates how to apply a known linkage function safely when linking two tables. However, in practice, the linkage function is rarely known. Thus, there are many data linkage centers whose main role is to be the trusted third party to determine the linkage function manually and link data for research via a master population list for a designated region. Recently, a more flexible computerized third-party linkage platform, Secure Decoupled Linkage (SDLink), has been proposed based on: (1) decoupling data via encryption, (2) obfuscation via chaffing (adding fake data) and universe manipulation; and (3) minimum information disclosure via recoding. Results We synthesize this literature to formalize a new framework for privacy preserving interactive record linkage (PPIRL) with tractable privacy and utility properties and then analyze the literature using this framework. Conclusions Human-based third-party linkage centers for privacy preserving record linkage are the accepted norm internationally. We find that a computer-based third-party platform that can precisely control the information disclosed at the micro level and allow frequent human interaction during the linkage process, is an effective human–machine hybrid system that significantly improves on the linkage center model both in terms of privacy and utility. PMID:24201028

  9. Privacy-preserving matching of similar patients.

    PubMed

    Vatsalan, Dinusha; Christen, Peter

    2016-02-01

    The identification of similar entities represented by records in different databases has drawn considerable attention in many application areas, including in the health domain. One important type of entity matching application that is vital for quality healthcare analytics is the identification of similar patients, known as similar patient matching. A key component of identifying similar records is the calculation of similarity of the values in attributes (fields) between these records. Due to increasing privacy and confidentiality concerns, using the actual attribute values of patient records to identify similar records across different organizations is becoming non-trivial because the attributes in such records often contain highly sensitive information such as personal and medical details of patients. Therefore, the matching needs to be based on masked (encoded) values while being effective and efficient to allow matching of large databases. Bloom filter encoding has widely been used as an efficient masking technique for privacy-preserving matching of string and categorical values. However, no work on Bloom filter-based masking of numerical data, such as integer (e.g. age), floating point (e.g. body mass index), and modulus (numbers wrap around upon reaching a certain value, e.g. date and time), which are commonly required in the health domain, has been presented in the literature. We propose a framework with novel methods for masking numerical data using Bloom filters, thereby facilitating the calculation of similarities between records. We conduct an empirical study on publicly available real-world datasets which shows that our framework provides efficient masking and achieves similar matching accuracy compared to the matching of actual unencoded patient records.

  10. NES++: number system for encryption based privacy preserving speaker verification

    NASA Astrophysics Data System (ADS)

    Xu, Lei; Feng, Tao; Zhao, Xi; Shi, Weidong

    2014-05-01

    As speech based operation becomes a main hand-free interaction solution between human and mobile devices (i.e., smartphones, Google Glass), privacy preserving speaker verification receives much attention nowadays. Privacy preserving speaker verification can be achieved through many different ways, such as fuzzy vault and encryption. Encryption based solutions are promising as cryptography is based on solid mathematic foundations and the security properties can be easily analyzed in a well established framework. Most current asymmetric encryption schemes work on finite algebraic structures, such as finite group and finite fields. However, the encryption scheme for privacy preserving speaker verification must handle floating point numbers. This gap must be filled to make the overall scheme practical. In this paper, we propose a number system that meets the requirements of both speaker verification and the encryption scheme used in the process. It also supports addition homomorphic property of Pailliers encryption, which is crucial for privacy preserving speaker verification. As asymmetric encryption is expensive, we propose a method of packing several numbers into one plain-text and the computation overhead is greatly reduced. To evaluate the performance of this method, we implement Pailliers encryption scheme over proposed number system and the packing technique. Our findings show that the proposed solution can fulfill the gap between speaker verification and encryption scheme very well, and the packing technique improves the overall performance. Furthermore, our solution is a building block of encryption based privacy preserving speaker verification, the privacy protection and accuracy rate are not affected.

  11. Quantifying the Correctness, Computational Complexity, and Security of Privacy-Preserving String Comparators for Record Linkage.

    PubMed

    Durham, Elizabeth; Xue, Yuan; Kantarcioglu, Murat; Malin, Bradley

    2012-10-01

    Record linkage is the task of identifying records from disparate data sources that refer to the same entity. It is an integral component of data processing in distributed settings, where the integration of information from multiple sources can prevent duplication and enrich overall data quality, thus enabling more detailed and correct analysis. Privacy-preserving record linkage (PPRL) is a variant of the task in which data owners wish to perform linkage without revealing identifiers associated with the records. This task is desirable in various domains, including healthcare, where it may not be possible to reveal patient identity due to confidentiality requirements, and in business, where it could be disadvantageous to divulge customers' identities. To perform PPRL, it is necessary to apply string comparators that function in the privacy-preserving space. A number of privacy-preserving string comparators (PPSCs) have been proposed, but little research has compared them in the context of a real record linkage application. This paper performs a principled and comprehensive evaluation of six PPSCs in terms of three key properties: 1) correctness of record linkage predictions, 2) computational complexity, and 3) security. We utilize a real publicly-available dataset, derived from the North Carolina voter registration database, to evaluate the tradeoffs between the aforementioned properties. Among our results, we find that PPSCs that partition, encode, and compare strings yield highly accurate record linkage results. However, as a tradeoff, we observe that such PPSCs are less secure than those that map and compare strings in a reduced dimensional space.

  12. Privacy-preserving microbiome analysis using secure computation.

    PubMed

    Wagner, Justin; Paulson, Joseph N; Wang, Xiao; Bhattacharjee, Bobby; Corrada Bravo, Héctor

    2016-06-15

    Developing targeted therapeutics and identifying biomarkers relies on large amounts of research participant data. Beyond human DNA, scientists now investigate the DNA of micro-organisms inhabiting the human body. Recent work shows that an individual's collection of microbial DNA consistently identifies that person and could be used to link a real-world identity to a sensitive attribute in a research dataset. Unfortunately, the current suite of DNA-specific privacy-preserving analysis tools does not meet the requirements for microbiome sequencing studies. To address privacy concerns around microbiome sequencing, we implement metagenomic analyses using secure computation. Our implementation allows comparative analysis over combined data without revealing the feature counts for any individual sample. We focus on three analyses and perform an evaluation on datasets currently used by the microbiome research community. We use our implementation to simulate sharing data between four policy-domains. Additionally, we describe an application of our implementation for patients to combine data that allows drug developers to query against and compensate patients for the analysis. The software is freely available for download at: http://cbcb.umd.edu/∼hcorrada/projects/secureseq.html Supplementary data are available at Bioinformatics online. hcorrada@umiacs.umd.edu. © The Author 2016. Published by Oxford University Press.

  13. A Robust Conditional Privacy-Preserving Authentication Protocol in VANET

    NASA Astrophysics Data System (ADS)

    Jung, Chae Duk; Sur, Chul; Park, Youngho; Rhee, Kyung-Hyune

    Recently, Lu et al. proposed an efficient conditional privacy preservation protocol, named ECPP, based on group signature scheme for secure vehicular communications. However, ECPP dose not provide unlinkability and traceability when multiple RSUs are compromised. In this paper, we make up for the limitations and propose a robust conditional privacy-preserving authentication protocol without loss of efficiency as compared with ECPP. Furthermore, in our protocol, RSUs can issue multiple anonymous certificates to an OBU to alleviate system overheads for validity check of RSUs. In order to achieve these goals, we consider a universal re-encryption scheme as our building block.

  14. Privacy-preserving periodical publishing for medical information

    NASA Astrophysics Data System (ADS)

    Jin, Hua; Ju, Shi-guang; Liu, Shan-cheng

    2013-07-01

    Existing privacy-preserving publishing models can not meet the requirement of periodical publishing for medical information whether these models are static or dynamic. This paper presents a (k,l)-anonymity model with keeping individual association and a principle based on (Epsilon)-invariance group for subsequent periodical publishing, and then, the PKIA and PSIGI algorithms are designed for them. The proposed methods can reserve more individual association with privacy-preserving and have better publishing quality. Experiments confirm our theoretical results and its practicability.

  15. A collaborative framework for Distributed Privacy-Preserving Support Vector Machine learning.

    PubMed

    Que, Jialan; Jiang, Xiaoqian; Ohno-Machado, Lucila

    2012-01-01

    A Support Vector Machine (SVM) is a popular tool for decision support. The traditional way to build an SVM model is to estimate parameters based on a centralized repository of data. However, in the field of biomedicine, patient data are sometimes stored in local repositories or institutions where they were collected, and may not be easily shared due to privacy concerns. This creates a substantial barrier for researchers to effectively learn from the distributed data using machine learning tools like SVMs. To overcome this difficulty and promote efficient information exchange without sharing sensitive raw data, we developed a Distributed Privacy Preserving Support Vector Machine (DPP-SVM). The DPP-SVM enables privacy-preserving collaborative learning, in which a trusted server integrates "privacy-insensitive" intermediary results. The globally learned model is guaranteed to be exactly the same as learned from combined data. We also provide a free web-service (http://privacy.ucsd.edu:8080/ppsvm/) for multiple participants to collaborate and complete the SVM-learning task in an efficient and privacy-preserving manner.

  16. A Collaborative Framework for Distributed Privacy-Preserving Support Vector Machine Learning

    PubMed Central

    Que, Jialan; Jiang, Xiaoqian; Ohno-Machado, Lucila

    2012-01-01

    A Support Vector Machine (SVM) is a popular tool for decision support. The traditional way to build an SVM model is to estimate parameters based on a centralized repository of data. However, in the field of biomedicine, patient data are sometimes stored in local repositories or institutions where they were collected, and may not be easily shared due to privacy concerns. This creates a substantial barrier for researchers to effectively learn from the distributed data using machine learning tools like SVMs. To overcome this difficulty and promote efficient information exchange without sharing sensitive raw data, we developed a Distributed Privacy Preserving Support Vector Machine (DPP-SVM). The DPP-SVM enables privacy-preserving collaborative learning, in which a trusted server integrates “privacy-insensitive” intermediary results. The globally learned model is guaranteed to be exactly the same as learned from combined data. We also provide a free web-service (http://privacy.ucsd.edu:8080/ppsvm/) for multiple participants to collaborate and complete the SVM-learning task in an efficient and privacy-preserving manner. PMID:23304414

  17. Architecture and Assessment: Privacy Preserving Biometrically Secured Electronic Documents

    DTIC Science & Technology

    This document explores an application which uses biometrics to secure electronic travel authorizations granted to foreign passport holders wishing to...TA) system in which foreign passport holders obtain electronic credentials which permit entry to Canada. This b-TA can be seen as a privacy preserving

  18. Estimating parameters for probabilistic linkage of privacy-preserved datasets.

    PubMed

    Brown, Adrian P; Randall, Sean M; Ferrante, Anna M; Semmens, James B; Boyd, James H

    2017-07-10

    Probabilistic record linkage is a process used to bring together person-based records from within the same dataset (de-duplication) or from disparate datasets using pairwise comparisons and matching probabilities. The linkage strategy and associated match probabilities are often estimated through investigations into data quality and manual inspection. However, as privacy-preserved datasets comprise encrypted data, such methods are not possible. In this paper, we present a method for estimating the probabilities and threshold values for probabilistic privacy-preserved record linkage using Bloom filters. Our method was tested through a simulation study using synthetic data, followed by an application using real-world administrative data. Synthetic datasets were generated with error rates from zero to 20% error. Our method was used to estimate parameters (probabilities and thresholds) for de-duplication linkages. Linkage quality was determined by F-measure. Each dataset was privacy-preserved using separate Bloom filters for each field. Match probabilities were estimated using the expectation-maximisation (EM) algorithm on the privacy-preserved data. Threshold cut-off values were determined by an extension to the EM algorithm allowing linkage quality to be estimated for each possible threshold. De-duplication linkages of each privacy-preserved dataset were performed using both estimated and calculated probabilities. Linkage quality using the F-measure at the estimated threshold values was also compared to the highest F-measure. Three large administrative datasets were used to demonstrate the applicability of the probability and threshold estimation technique on real-world data. Linkage of the synthetic datasets using the estimated probabilities produced an F-measure that was comparable to the F-measure using calculated probabilities, even with up to 20% error. Linkage of the administrative datasets using estimated probabilities produced an F-measure that was higher

  19. Privacy preserving index for encrypted electronic medical records.

    PubMed

    Chen, Yu-Chi; Horng, Gwoboa; Lin, Yi-Jheng; Chen, Kuo-Chang

    2013-12-01

    With the development of electronic systems, privacy has become an important security issue in real-life. In medical systems, privacy of patients' electronic medical records (EMRs) must be fully protected. However, to combine the efficiency and privacy, privacy preserving index is introduced to preserve the privacy, where the EMR can be efficiently accessed by this patient or specific doctor. In the literature, Goh first proposed a secure index scheme with keyword search over encrypted data based on a well-known primitive, Bloom filter. In this paper, we propose a new privacy preserving index scheme, called position index (P-index), with keyword search over the encrypted data. The proposed index scheme is semantically secure against the adaptive chosen keyword attack, and it also provides flexible space, lower false positive rate, and search privacy. Moreover, it does not rely on pairing, a complicate computation, and thus can search over encrypted electronic medical records from the cloud server efficiently.

  20. piBox: A Platform for Privacy-Preserving Apps

    DTIC Science & Technology

    2012-10-03

    Finally, there are apps—e.g., Facebook, Twitter, or multiplayer online games—whose sole purpose is to allow users to connect, communicate, collaborate, and...media Arcade/Action! Books! Brain/Puzzles! Business! Cards/ Casino ! Casual! Comics! Communication! Education! Entertainment! Finance! Health/Fitness...ObliviAd [5] and PrivAd [22] are privacy-preserving online advertising systems that aim to protect user pro- files from ad brokers. ObliviAd creates a

  1. A Secure and Privacy-Preserving Targeted Ad-System

    NASA Astrophysics Data System (ADS)

    Androulaki, Elli; Bellovin, Steven M.

    Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods violate consumers' privacy, which has engendered resistance to the ads. However, protecting privacy through anonymity seems to encourage click-fraud. In this paper, we define consumer's privacy and present a privacy-preserving, targeted ad system (PPOAd) which is resistant towards click fraud. Our scheme is structured to provide financial incentives to all entities involved.

  2. Privacy-preserving outlier detection through random nonlinear data distortion.

    PubMed

    Bhaduri, Kanishka; Stefanski, Mark D; Srivastava, Ashok N

    2011-02-01

    Consider a scenario in which the data owner has some private or sensitive data and wants a data miner to access them for studying important patterns without revealing the sensitive information. Privacy-preserving data mining aims to solve this problem by randomly transforming the data prior to their release to the data miners. Previous works only considered the case of linear data perturbations--additive, multiplicative, or a combination of both--for studying the usefulness of the perturbed output. In this paper, we discuss nonlinear data distortion using potentially nonlinear random data transformation and show how it can be useful for privacy-preserving anomaly detection from sensitive data sets. We develop bounds on the expected accuracy of the nonlinear distortion and also quantify privacy by using standard definitions. The highlight of this approach is to allow a user to control the amount of privacy by varying the degree of nonlinearity. We show how our general transformation can be used for anomaly detection in practice for two specific problem instances: a linear model and a popular nonlinear model using the sigmoid function. We also analyze the proposed nonlinear transformation in full generality and then show that, for specific cases, it is distance preserving. A main contribution of this paper is the discussion between the invertibility of a transformation and privacy preservation and the application of these techniques to outlier detection. The experiments conducted on real-life data sets demonstrate the effectiveness of the approach.

  3. Quantifying the Correctness, Computational Complexity, and Security of Privacy-Preserving String Comparators for Record Linkage

    PubMed Central

    Durham, Elizabeth; Xue, Yuan; Kantarcioglu, Murat; Malin, Bradley

    2011-01-01

    Record linkage is the task of identifying records from disparate data sources that refer to the same entity. It is an integral component of data processing in distributed settings, where the integration of information from multiple sources can prevent duplication and enrich overall data quality, thus enabling more detailed and correct analysis. Privacy-preserving record linkage (PPRL) is a variant of the task in which data owners wish to perform linkage without revealing identifiers associated with the records. This task is desirable in various domains, including healthcare, where it may not be possible to reveal patient identity due to confidentiality requirements, and in business, where it could be disadvantageous to divulge customers' identities. To perform PPRL, it is necessary to apply string comparators that function in the privacy-preserving space. A number of privacy-preserving string comparators (PPSCs) have been proposed, but little research has compared them in the context of a real record linkage application. This paper performs a principled and comprehensive evaluation of six PPSCs in terms of three key properties: 1) correctness of record linkage predictions, 2) computational complexity, and 3) security. We utilize a real publicly-available dataset, derived from the North Carolina voter registration database, to evaluate the tradeoffs between the aforementioned properties. Among our results, we find that PPSCs that partition, encode, and compare strings yield highly accurate record linkage results. However, as a tradeoff, we observe that such PPSCs are less secure than those that map and compare strings in a reduced dimensional space. PMID:22904698

  4. Privacy-Preserving Distributed Information Sharing

    DTIC Science & Technology

    2006-07-01

    fool other players. Note that our protocol defends against all of these attacks, by provably achieving the properties of owner and data privacy as...instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send...sufficiently efficient protocols for these problems, we define two new privacy properties: owner privacy and data privacy. Protocols that achieve these

  5. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  6. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    PubMed Central

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  7. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs.

    PubMed

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-03-24

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme.

  8. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs

    PubMed Central

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-01-01

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme. PMID:28338620

  9. Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey

    PubMed Central

    Bista, Rabindra; Chang, Jae-Woo

    2010-01-01

    Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs. PMID:22399893

  10. Privacy-preserving data aggregation protocols for wireless sensor networks: a survey.

    PubMed

    Bista, Rabindra; Chang, Jae-Woo

    2010-01-01

    Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.

  11. Privacy-preserving record linkage on large real world datasets.

    PubMed

    Randall, Sean M; Ferrante, Anna M; Boyd, James H; Bauer, Jacqueline K; Semmens, James B

    2014-08-01

    Record linkage typically involves the use of dedicated linkage units who are supplied with personally identifying information to determine individuals from within and across datasets. The personally identifying information supplied to linkage units is separated from clinical information prior to release by data custodians. While this substantially reduces the risk of disclosure of sensitive information, some residual risks still exist and remain a concern for some custodians. In this paper we trial a method of record linkage which reduces privacy risk still further on large real world administrative data. The method uses encrypted personal identifying information (bloom filters) in a probability-based linkage framework. The privacy preserving linkage method was tested on ten years of New South Wales (NSW) and Western Australian (WA) hospital admissions data, comprising in total over 26 million records. No difference in linkage quality was found when the results were compared to traditional probabilistic methods using full unencrypted personal identifiers. This presents as a possible means of reducing privacy risks related to record linkage in population level research studies. It is hoped that through adaptations of this method or similar privacy preserving methods, risks related to information disclosure can be reduced so that the benefits of linked research taking place can be fully realised. Copyright © 2013 Elsevier Inc. All rights reserved.

  12. A comprehensive review on privacy preserving data mining.

    PubMed

    Aldeen, Yousra Abdul Alsahib S; Salleh, Mazleena; Razzaque, Mohammad Abdur

    2015-01-01

    Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publishing. Ever-escalating internet phishing posed severe threat on widespread propagation of sensitive information over the web. Conversely, the dubious feelings and contentions mediated unwillingness of various information providers towards the reliability protection of data from disclosure often results utter rejection in data sharing or incorrect information sharing. This article provides a panoramic overview on new perspective and systematic interpretation of a list published literatures via their meticulous organization in subcategories. The fundamental notions of the existing privacy preserving data mining methods, their merits, and shortcomings are presented. The current privacy preserving data mining techniques are classified based on distortion, association rule, hide association rule, taxonomy, clustering, associative classification, outsourced data mining, distributed, and k-anonymity, where their notable advantages and disadvantages are emphasized. This careful scrutiny reveals the past development, present research challenges, future trends, the gaps and weaknesses. Further significant enhancements for more robust privacy protection and preservation are affirmed to be mandatory.

  13. Privacy preserving data anonymization of spontaneous ADE reporting system dataset.

    PubMed

    Lin, Wen-Yang; Yang, Duen-Chuan; Wang, Jie-Teng

    2016-07-18

    To facilitate long-term safety surveillance of marketing drugs, many spontaneously reporting systems (SRSs) of ADR events have been established world-wide. Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing (PPDP), that is, how to sanitize (anonymize) raw data before publishing. Although much work has been done on PPDP, very few studies have focused on protecting privacy of SRS data and none of the anonymization methods is favorable for SRS datasets, due to which contain some characteristics such as rare events, multiple individual records, and multi-valued sensitive attributes. We propose a new privacy model called MS(k, θ (*) )-bounding for protecting published spontaneous ADE reporting data from privacy attacks. Our model has the flexibility of varying privacy thresholds, i.e., θ (*) , for different sensitive values and takes the characteristics of SRS data into consideration. We also propose an anonymization algorithm for sanitizing the raw data to meet the requirements specified through the proposed model. Our algorithm adopts a greedy-based clustering strategy to group the records into clusters, conforming to an innovative anonymization metric aiming to minimize the privacy risk as well as maintain the data utility for ADR detection. Empirical study was conducted using FAERS dataset from 2004Q1 to 2011Q4. We compared our model with four prevailing methods, including k-anonymity, (X, Y)-anonymity, Multi-sensitive l-diversity, and (α, k)-anonymity, evaluated via two measures, Danger Ratio (DR) and Information Loss (IL), and considered three different scenarios of threshold setting for θ (*) , including uniform setting, level-wise setting and frequency-based setting. We also conducted experiments to inspect the impact of anonymized data on the strengths of discovered ADR signals. With all three

  14. Fully Decentralized Semi-supervised Learning via Privacy-preserving Matrix Completion.

    PubMed

    Fierimonte, Roberto; Scardapane, Simone; Uncini, Aurelio; Panella, Massimo

    2016-08-26

    Distributed learning refers to the problem of inferring a function when the training data are distributed among different nodes. While significant work has been done in the contexts of supervised and unsupervised learning, the intermediate case of Semi-supervised learning in the distributed setting has received less attention. In this paper, we propose an algorithm for this class of problems, by extending the framework of manifold regularization. The main component of the proposed algorithm consists of a fully distributed computation of the adjacency matrix of the training patterns. To this end, we propose a novel algorithm for low-rank distributed matrix completion, based on the framework of diffusion adaptation. Overall, the distributed Semi-supervised algorithm is efficient and scalable, and it can preserve privacy by the inclusion of flexible privacy-preserving mechanisms for similarity computation. The experimental results and comparison on a wide range of standard Semi-supervised benchmarks validate our proposal.

  15. Privacy Preserving Facial and Fingerprint Multi-biometric Authentication

    NASA Astrophysics Data System (ADS)

    Anzaku, Esla Timothy; Sohn, Hosik; Ro, Yong Man

    The cases of identity theft can be mitigated by the adoption of secure authentication methods. Biohashing and its variants, which utilizes secret keys and biometrics, are promising methods for secure authentication; however, their shortcoming is the degraded performance under the assumption that secret keys are compromised. In this paper, we extend the concept of Biohashing to multi-biometrics - facial and fingerprint traits. We chose these traits because they are widely used, howbeit, little research attention has been given to designing privacy preserving multi-biometric systems using them. Instead of just using a single modality (facial or fingerprint), we presented a framework for using both modalities. The improved performance of the proposed method, using face and fingerprint, as against either facial or fingerprint trait used in isolation is evaluated using two chimerical bimodal databases formed from publicly available facial and fingerprint databases.

  16. Personalized Privacy-Preserving Frequent Itemset Mining Using Randomized Response

    PubMed Central

    Sun, Chongjing; Fu, Yan; Zhou, Junlin; Gao, Hui

    2014-01-01

    Frequent itemset mining is the important first step of association rule mining, which discovers interesting patterns from the massive data. There are increasing concerns about the privacy problem in the frequent itemset mining. Some works have been proposed to handle this kind of problem. In this paper, we introduce a personalized privacy problem, in which different attributes may need different privacy levels protection. To solve this problem, we give a personalized privacy-preserving method by using the randomized response technique. By providing different privacy levels for different attributes, this method can get a higher accuracy on frequent itemset mining than the traditional method providing the same privacy level. Finally, our experimental results show that our method can have better results on the frequent itemset mining while preserving personalized privacy. PMID:25143989

  17. Personalized privacy-preserving frequent itemset mining using randomized response.

    PubMed

    Sun, Chongjing; Fu, Yan; Zhou, Junlin; Gao, Hui

    2014-01-01

    Frequent itemset mining is the important first step of association rule mining, which discovers interesting patterns from the massive data. There are increasing concerns about the privacy problem in the frequent itemset mining. Some works have been proposed to handle this kind of problem. In this paper, we introduce a personalized privacy problem, in which different attributes may need different privacy levels protection. To solve this problem, we give a personalized privacy-preserving method by using the randomized response technique. By providing different privacy levels for different attributes, this method can get a higher accuracy on frequent itemset mining than the traditional method providing the same privacy level. Finally, our experimental results show that our method can have better results on the frequent itemset mining while preserving personalized privacy.

  18. Infrastructure Aided Privacy Preserving-Authentication in VANETs

    NASA Astrophysics Data System (ADS)

    Chaurasia, Brijesh Kumar; Verma, Shekhar; Tomar, G. S.

    The paper presents a privacy preserving authentication protocol for vehicles in a VANET. The authentication process involves authentication of the vehicle and the corresponding RSU by a fixed infrastructure (CTA). Every RSU has a public key infrastructure and continuously broadcasts public key. The vehicle encrypts its identity, RSU Id and timestamp using its symmetric key. The encrypted bits along with the pseudonym of vehicle and timestamp are again encrypted by the public key of RSU and send to the RSU. RSU forwards the encrypted part to the CTA. CTA sends its verification to the RSU. The verification of the vehicle is encrypted by the vehicle symmetric key and sends along with authentication of the vehicle to the RSU. The encrypted portion is forwarded to the vehicle which confirms the authentication of the RSU after decryption. The CTA also sends a temporary short certificate to the vehicle for vehicle to vehicle communication. The whole process needs only one request and reply between different entities. Simulation results indicate the time taken (~ 223 ms) for the whole process is small and constitutes only a small portion of the stay time of a vehicle within an RSU region.

  19. Digression and Value Concatenation to Enable Privacy-Preserving Regression

    PubMed Central

    Li, Xiao-Bai; Sarkar, Sumit

    2015-01-01

    Regression techniques can be used not only for legitimate data analysis, but also to infer private information about individuals. In this paper, we demonstrate that regression trees, a popular data-analysis and data-mining technique, can be used to effectively reveal individuals’ sensitive data. This problem, which we call a “regression attack,” has not been addressed in the data privacy literature, and existing privacy-preserving techniques are not appropriate in coping with this problem. We propose a new approach to counter regression attacks. To protect against privacy disclosure, our approach introduces a novel measure, called digression, which assesses the sensitive value disclosure risk in the process of building a regression tree model. Specifically, we develop an algorithm that uses the measure for pruning the tree to limit disclosure of sensitive data. We also propose a dynamic value-concatenation method for anonymizing data, which better preserves data utility than a user-defined generalization scheme commonly used in existing approaches. Our approach can be used for anonymizing both numeric and categorical data. An experimental study is conducted using real-world financial, economic and healthcare data. The results of the experiments demonstrate that the proposed approach is very effective in protecting data privacy while preserving data quality for research and analysis. PMID:26752802

  20. Privacy-preserving GWAS analysis on federated genomic datasets

    PubMed Central

    2015-01-01

    Background The biomedical community benefits from the increasing availability of genomic data to support meaningful scientific research, e.g., Genome-Wide Association Studies (GWAS). However, high quality GWAS usually requires a large amount of samples, which can grow beyond the capability of a single institution. Federated genomic data analysis holds the promise of enabling cross-institution collaboration for effective GWAS, but it raises concerns about patient privacy and medical information confidentiality (as data are being exchanged across institutional boundaries), which becomes an inhibiting factor for the practical use. Methods We present a privacy-preserving GWAS framework on federated genomic datasets. Our method is to layer the GWAS computations on top of secure multi-party computation (MPC) systems. This approach allows two parties in a distributed system to mutually perform secure GWAS computations, but without exposing their private data outside. Results We demonstrate our technique by implementing a framework for minor allele frequency counting and χ2 statistics calculation, one of typical computations used in GWAS. For efficient prototyping, we use a state-of-the-art MPC framework, i.e., Portable Circuit Format (PCF) [1]. Our experimental results show promise in realizing both efficient and secure cross-institution GWAS computations. PMID:26733045

  1. Enabling Privacy-Preserving GWASs in Heterogeneous Human Populations.

    PubMed

    Simmons, Sean; Sahinalp, Cenk; Berger, Bonnie

    2016-07-01

    The proliferation of large genomic databases offers the potential to perform increasingly larger-scale genome-wide association studies (GWASs). Due to privacy concerns, however, access to these data is limited, greatly reducing their usefulness for research. Here, we introduce a computational framework for performing GWASs that adapts principles of differential privacy-a cryptographic theory that facilitates secure analysis of sensitive data-to both protect private phenotype information (e.g., disease status) and correct for population stratification. This framework enables us to produce privacy-preserving GWAS results based on EIGENSTRAT and linear mixed model (LMM)-based statistics, both of which correct for population stratification. We test our differentially private statistics, PrivSTRAT and PrivLMM, on simulated and real GWAS datasets and find they are able to protect privacy while returning meaningful results. Our framework can be used to securely query private genomic datasets to discover which specific genomic alterations may be associated with a disease, thus increasing the availability of these valuable datasets.

  2. EGPS: An Efficient Privacy Preserving Scheme for Vehicular ad hoc Networks

    NASA Astrophysics Data System (ADS)

    Zhao, Baokang; Su, Xiangyu; Su, Jinshu; Song, Ziming; Sun, Yipin; Tao, Jing; Tang, Yong; Chen, Shuhui; Zhao, Guohong; Chen, Yijiao

    2010-09-01

    In this paper, we propose EGPS, an efficient privacy preserving scheme for vehicular ad hoc networks. The EGPS scheme is based on a very efficient group signature and Identity Based Cryptography(IBC) techniques. Several security properties of EGPS, including the correctness and unforgeability have been proved. Furthermore, EGPS is also proved to be more efficient than GSIS, which is currently one of the best state-of-the-art VANET privacy preserving schemes.

  3. Privacy-preserving search for chemical compound databases

    PubMed Central

    2015-01-01

    Background Searching for similar compounds in a database is the most important process for in-silico drug screening. Since a query compound is an important starting point for the new drug, a query holder, who is afraid of the query being monitored by the database server, usually downloads all the records in the database and uses them in a closed network. However, a serious dilemma arises when the database holder also wants to output no information except for the search results, and such a dilemma prevents the use of many important data resources. Results In order to overcome this dilemma, we developed a novel cryptographic protocol that enables database searching while keeping both the query holder's privacy and database holder's privacy. Generally, the application of cryptographic techniques to practical problems is difficult because versatile techniques are computationally expensive while computationally inexpensive techniques can perform only trivial computation tasks. In this study, our protocol is successfully built only from an additive-homomorphic cryptosystem, which allows only addition performed on encrypted values but is computationally efficient compared with versatile techniques such as general purpose multi-party computation. In an experiment searching ChEMBL, which consists of more than 1,200,000 compounds, the proposed method was 36,900 times faster in CPU time and 12,000 times as efficient in communication size compared with general purpose multi-party computation. Conclusion We proposed a novel privacy-preserving protocol for searching chemical compound databases. The proposed method, easily scaling for large-scale databases, may help to accelerate drug discovery research by making full use of unused but valuable data that includes sensitive information. PMID:26678650

  4. Obfuscatable multi-recipient re-encryption for secure privacy-preserving personal health record services.

    PubMed

    Shi, Yang; Fan, Hongfei; Xiong, Guoyue

    2015-01-01

    With the rapid development of cloud computing techniques, it is attractive for personal health record (PHR) service providers to deploy their PHR applications and store the personal health data in the cloud. However, there could be a serious privacy leakage if the cloud-based system is intruded by attackers, which makes it necessary for the PHR service provider to encrypt all patients' health data on cloud servers. Existing techniques are insufficiently secure under circumstances where advanced threats are considered, or being inefficient when many recipients are involved. Therefore, the objectives of our solution are (1) providing a secure implementation of re-encryption in white-box attack contexts and (2) assuring the efficiency of the implementation even in multi-recipient cases. We designed the multi-recipient re-encryption functionality by randomness-reusing and protecting the implementation by obfuscation. The proposed solution is secure even in white-box attack contexts. Furthermore, a comparison with other related work shows that the computational cost of the proposed solution is lower. The proposed technique can serve as a building block for supporting secure, efficient and privacy-preserving personal health record service systems.

  5. A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service.

    PubMed

    Yang, Xue; Yin, Fan; Tang, Xiaohu

    2017-07-11

    Location-based services (LBS), as one of the most popular location-awareness applications, has been further developed to achieve low-latency with the assistance of fog computing. However, privacy issues remain a research challenge in the context of fog computing. Therefore, in this paper, we present a fine-grained and privacy-preserving query scheme for fog computing-enhanced location-based services, hereafter referred to as FGPQ. In particular, mobile users can obtain the fine-grained searching result satisfying not only the given spatial range but also the searching content. Detailed privacy analysis shows that our proposed scheme indeed achieves the privacy preservation for the LBS provider and mobile users. In addition, extensive performance analyses and experiments demonstrate that the FGPQ scheme can significantly reduce computational and communication overheads and ensure the low-latency, which outperforms existing state-of-the art schemes. Hence, our proposed scheme is more suitable for real-time LBS searching.

  6. A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service

    PubMed Central

    Yin, Fan; Tang, Xiaohu

    2017-01-01

    Location-based services (LBS), as one of the most popular location-awareness applications, has been further developed to achieve low-latency with the assistance of fog computing. However, privacy issues remain a research challenge in the context of fog computing. Therefore, in this paper, we present a fine-grained and privacy-preserving query scheme for fog computing-enhanced location-based services, hereafter referred to as FGPQ. In particular, mobile users can obtain the fine-grained searching result satisfying not only the given spatial range but also the searching content. Detailed privacy analysis shows that our proposed scheme indeed achieves the privacy preservation for the LBS provider and mobile users. In addition, extensive performance analyses and experiments demonstrate that the FGPQ scheme can significantly reduce computational and communication overheads and ensure the low-latency, which outperforms existing state-of-the art schemes. Hence, our proposed scheme is more suitable for real-time LBS searching. PMID:28696395

  7. RiPPAS: A Ring-Based Privacy-Preserving Aggregation Scheme in Wireless Sensor Networks.

    PubMed

    Zhang, Kejia; Han, Qilong; Cai, Zhipeng; Yin, Guisheng

    2017-02-07

    Recently, data privacy in wireless sensor networks (WSNs) has been paid increased attention. The characteristics of WSNs determine that users' queries are mainly aggregation queries. In this paper, the problem of processing aggregation queries in WSNs with data privacy preservation is investigated. A Ring-based Privacy-Preserving Aggregation Scheme (RiPPAS) is proposed. RiPPAS adopts ring structure to perform aggregation. It uses pseudonym mechanism for anonymous communication and uses homomorphic encryption technique to add noise to the data easily to be disclosed. RiPPAS can handle both s u m ( ) queries and m i n ( ) / m a x ( ) queries, while the existing privacy-preserving aggregation methods can only deal with s u m ( ) queries. For processing s u m ( ) queries, compared with the existing methods, RiPPAS has advantages in the aspects of privacy preservation and communication efficiency, which can be proved by theoretical analysis and simulation results. For processing m i n ( ) / m a x ( ) queries, RiPPAS provides effective privacy preservation and has low communication overhead.

  8. RiPPAS: A Ring-Based Privacy-Preserving Aggregation Scheme in Wireless Sensor Networks

    PubMed Central

    Zhang, Kejia; Han, Qilong; Cai, Zhipeng; Yin, Guisheng

    2017-01-01

    Recently, data privacy in wireless sensor networks (WSNs) has been paid increased attention. The characteristics of WSNs determine that users’ queries are mainly aggregation queries. In this paper, the problem of processing aggregation queries in WSNs with data privacy preservation is investigated. A Ring-based Privacy-Preserving Aggregation Scheme (RiPPAS) is proposed. RiPPAS adopts ring structure to perform aggregation. It uses pseudonym mechanism for anonymous communication and uses homomorphic encryption technique to add noise to the data easily to be disclosed. RiPPAS can handle both sum() queries and min()/max() queries, while the existing privacy-preserving aggregation methods can only deal with sum() queries. For processing sum() queries, compared with the existing methods, RiPPAS has advantages in the aspects of privacy preservation and communication efficiency, which can be proved by theoretical analysis and simulation results. For processing min()/max() queries, RiPPAS provides effective privacy preservation and has low communication overhead. PMID:28178197

  9. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data.

    PubMed

    Xie, Qingqing; Wang, Liangmin

    2016-11-25

    With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead.

  10. A Neural-Network Clustering-Based Algorithm for Privacy Preserving Data Mining

    NASA Astrophysics Data System (ADS)

    Tsiafoulis, S.; Zorkadis, V. C.; Karras, D. A.

    The increasing use of fast and efficient data mining algorithms in huge collections of personal data, facilitated through the exponential growth of technology, in particular in the field of electronic data storage media and processing power, has raised serious ethical, philosophical and legal issues related to privacy protection. To cope with these concerns, several privacy preserving methodologies have been proposed, classified in two categories, methodologies that aim at protecting the sensitive data and those that aim at protecting the mining results. In our work, we focus on sensitive data protection and compare existing techniques according to their anonymity degree achieved, the information loss suffered and their performance characteristics. The ℓ-diversity principle is combined with k-anonymity concepts, so that background information can not be exploited to successfully attack the privacy of data subjects data refer to. Based on Kohonen Self Organizing Feature Maps (SOMs), we firstly organize data sets in subspaces according to their information theoretical distance to each other, then create the most relevant classes paying special attention to rare sensitive attribute values, and finally generalize attribute values to the minimum extend required so that both the data disclosure probability and the information loss are possibly kept negligible. Furthermore, we propose information theoretical measures for assessing the anonymity degree achieved and empirical tests to demonstrate it.

  11. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data †

    PubMed Central

    Xie, Qingqing; Wang, Liangmin

    2016-01-01

    With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead. PMID:27897984

  12. PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems

    PubMed Central

    Xu, Chang; Lu, Rongxing; Wang, Huaxiong; Zhu, Liehuang; Huang, Cheng

    2017-01-01

    Air pollution has become one of the most pressing environmental issues in recent years. According to a World Health Organization (WHO) report, air pollution has led to the deaths of millions of people worldwide. Accordingly, expensive and complex air-monitoring instruments have been exploited to measure air pollution. Comparatively, a vehicle sensing system (VSS), as it can be effectively used for many purposes and can bring huge financial benefits in reducing high maintenance and repair costs, has received considerable attention. However, the privacy issues of VSS including vehicles’ location privacy have not been well addressed. Therefore, in this paper, we propose a new privacy-preserving data aggregation scheme, called PAVS, for VSS. Specifically, PAVS combines privacy-preserving classification and privacy-preserving statistics on both the mean E(·) and variance Var(·), which makes VSS more promising, as, with minimal privacy leakage, more vehicles are willing to participate in sensing. Detailed analysis shows that the proposed PAVS can achieve the properties of privacy preservation, data accuracy and scalability. In addition, the performance evaluations via extensive simulations also demonstrate its efficiency. PMID:28273795

  13. PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems.

    PubMed

    Xu, Chang; Lu, Rongxing; Wang, Huaxiong; Zhu, Liehuang; Huang, Cheng

    2017-03-03

    Air pollution has become one of the most pressing environmental issues in recent years. According to a World Health Organization (WHO) report, air pollution has led to the deaths of millions of people worldwide. Accordingly, expensive and complex air-monitoring instruments have been exploited to measure air pollution. Comparatively, a vehicle sensing system (VSS), as it can be effectively used for many purposes and can bring huge financial benefits in reducing high maintenance and repair costs, has received considerable attention. However, the privacy issues of VSS including vehicles' location privacy have not been well addressed. Therefore, in this paper, we propose a new privacy-preserving data aggregation scheme, called PAVS, for VSS. Specifically, PAVS combines privacy-preserving classification and privacy-preserving statistics on both the mean E(·) and variance Var(·), which makes VSS more promising, as, with minimal privacy leakage, more vehicles are willing to participate in sensing. Detailed analysis shows that the proposed PAVS can achieve the properties of privacy preservation, data accuracy and scalability. In addition, the performance evaluations via extensive simulations also demonstrate its efficiency.

  14. Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes

    NASA Astrophysics Data System (ADS)

    Su, Chunhua; Bao, Feng; Zhou, Jianying; Takagi, Tsuyoshi; Sakurai, Kouichi

    Due to the fast development of Internet and the related IT technologies, it becomes more and more easier to access a large amount of data. k-means clustering is a powerful and frequently used technique in data mining. Many research papers about privacy-preserving k-means clustering were published. In this paper, we analyze the existing privacy-preserving k-means clustering schemes based on the cryptographic techniques. We show those schemes will cause the privacy breach and cannot output the correct results due to the faults in the protocol construction. Furthermore, we analyze our proposal as an option to improve such problems but with intermediate information breach during the computation.

  15. Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks†

    PubMed Central

    Zhang, Xiaoying; Dong, Lei; Peng, Hui; Chen, Hong; Zhao, Suyun; Li, Cuiping

    2014-01-01

    Wireless sensor networks (WSNs) are indispensable building blocks for the Internet of Things (IoT). With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromised master nodes, but neglects the damage of node collusion. In this paper, we propose a series of collusion-aware privacy-preserving range query protocols in two-tiered WSNs. To the best of our knowledge, this paper is the first to consider collusion attacks for a range query in tiered WSNs while fulfilling the preservation of privacy and integrity. To preserve the privacy of data and queries, we propose a novel encoding scheme to conceal sensitive information. To preserve the integrity of the results, we present a verification scheme using the correlation among data. In addition, two schemes are further presented to improve result accuracy and reduce communication cost. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and privacy of our proposals. PMID:25615731

  16. Efficient and Privacy-Preserving Online Medical Pre-Diagnosis Framework Using Nonlinear SVM.

    PubMed

    Zhu, Hui; Liu, Xiaoxia; Lu, Rongxing; Li, Hui

    2016-03-29

    With the advances of machine learning algorithms and the pervasiveness of network terminals, online medical prediagnosis system, which can provide the diagnosis of healthcare provider anywhere anytime, has attracted considerable interest recently. However, the flourish of online medical pre-diagnosis system still faces many challenges including information security and privacy preservation. In this paper, we propose an efficient and privacy-preserving online medical pre-diagnosis framework, called eDiag, by using nonlinear kernel support vector machine (SVM). With eDiag, the sensitive personal health information can be processed without privacy disclosure during online prediagnosis service. Specifically, based on an improved expression for the nonlinear SVM, an efficient and privacy-preserving classification scheme is introduced with lightweight multi-party random masking and polynomial aggregation techniques. The encrypted user query is directly operated at the service provider without decryption, and the diagnosis result can only be decrypted by user. Through extensive analysis, we show that eDiag can ensure that users' health information and healthcare provider's prediction model are kept confidential, and has significantly less computation and communication overhead than existing schemes. In addition, performance evaluations via implementing eDiag on smartphone and computer demonstrate eDiag's effectiveness in term of real online environment.

  17. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.

    PubMed

    Sahi, Aqeel; Lai, David; Li, Yan

    2016-11-01

    Cloud computing was introduced as an alternative storage and computing model in the health sector as well as other sectors to handle large amounts of data. Many healthcare companies have moved their electronic data to the cloud in order to reduce in-house storage, IT development and maintenance costs. However, storing the healthcare records in a third-party server may cause serious storage, security and privacy issues. Therefore, many approaches have been proposed to preserve security as well as privacy in cloud computing projects. Cryptographic-based approaches were presented as one of the best ways to ensure the security and privacy of healthcare data in the cloud. Nevertheless, the cryptographic-based approaches which are used to transfer health records safely remain vulnerable regarding security, privacy, or the lack of any disaster recovery strategy. In this paper, we review the related work on security and privacy preserving as well as disaster recovery in the eHealth cloud domain. Then we propose two approaches, the Security-Preserving approach and the Privacy-Preserving approach, and a disaster recovery plan. The Security-Preserving approach is a robust means of ensuring the security and integrity of Electronic Health Records, and the Privacy-Preserving approach is an efficient authentication approach which protects the privacy of Personal Health Records. Finally, we discuss how the integrated approaches and the disaster recovery plan can ensure the reliability and security of cloud projects.

  18. Collusion-aware privacy-preserving range query in tiered wireless sensor networks.

    PubMed

    Zhang, Xiaoying; Dong, Lei; Peng, Hui; Chen, Hong; Zhao, Suyun; Li, Cuiping

    2014-12-11

    Wireless sensor networks (WSNs) are indispensable building blocks for the Internet of Things (IoT). With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromisedmaster nodes, but neglects the damage of node collusion. In this paper, we propose a series of collusion-aware privacy-preserving range query protocols in two-tiered WSNs. To the best of our knowledge, this paper is the first to consider collusion attacks for a range query in tiered WSNs while fulfilling the preservation of privacy and integrity. To preserve the privacy of data and queries, we propose a novel encoding scheme to conceal sensitive information. To preserve the integrity of the results, we present a verification scheme using the correlation among data. In addition, two schemes are further presented to improve result accuracy and reduce communication cost. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and privacy of our proposals.

  19. Privacy-Preserving Data Exploration in Genome-Wide Association Studies.

    PubMed

    Johnson, Aaron; Shmatikov, Vitaly

    2013-08-01

    Genome-wide association studies (GWAS) have become a popular method for analyzing sets of DNA sequences in order to discover the genetic basis of disease. Unfortunately, statistics published as the result of GWAS can be used to identify individuals participating in the study. To prevent privacy breaches, even previously published results have been removed from public databases, impeding researchers' access to the data and hindering collaborative research. Existing techniques for privacy-preserving GWAS focus on answering specific questions, such as correlations between a given pair of SNPs (DNA sequence variations). This does not fit the typical GWAS process, where the analyst may not know in advance which SNPs to consider and which statistical tests to use, how many SNPs are significant for a given dataset, etc. We present a set of practical, privacy-preserving data mining algorithms for GWAS datasets. Our framework supports exploratory data analysis, where the analyst does not know a priori how many and which SNPs to consider. We develop privacy-preserving algorithms for computing the number and location of SNPs that are significantly associated with the disease, the significance of any statistical test between a given SNP and the disease, any measure of correlation between SNPs, and the block structure of correlations. We evaluate our algorithms on real-world datasets and demonstrate that they produce significantly more accurate results than prior techniques while guaranteeing differential privacy.

  20. Privacy-Preserving Data Exploration in Genome-Wide Association Studies

    PubMed Central

    Johnson, Aaron; Shmatikov, Vitaly

    2013-01-01

    Genome-wide association studies (GWAS) have become a popular method for analyzing sets of DNA sequences in order to discover the genetic basis of disease. Unfortunately, statistics published as the result of GWAS can be used to identify individuals participating in the study. To prevent privacy breaches, even previously published results have been removed from public databases, impeding researchers’ access to the data and hindering collaborative research. Existing techniques for privacy-preserving GWAS focus on answering specific questions, such as correlations between a given pair of SNPs (DNA sequence variations). This does not fit the typical GWAS process, where the analyst may not know in advance which SNPs to consider and which statistical tests to use, how many SNPs are significant for a given dataset, etc. We present a set of practical, privacy-preserving data mining algorithms for GWAS datasets. Our framework supports exploratory data analysis, where the analyst does not know a priori how many and which SNPs to consider. We develop privacy-preserving algorithms for computing the number and location of SNPs that are significantly associated with the disease, the significance of any statistical test between a given SNP and the disease, any measure of correlation between SNPs, and the block structure of correlations. We evaluate our algorithms on real-world datasets and demonstrate that they produce significantly more accurate results than prior techniques while guaranteeing differential privacy. PMID:26691928

  1. Secure and Privacy-Preserving Distributed Information Brokering

    ERIC Educational Resources Information Center

    Li, Fengjun

    2010-01-01

    As enormous structured, semi-structured and unstructured data are collected and archived by organizations in many realms ranging from business to health networks to government agencies, the needs for efficient yet secure inter-organization information sharing naturally arise. Unlike early information sharing approaches that only involve a small…

  2. Privacy-Preserving and Usable Data Publishing and Analysis

    ERIC Educational Resources Information Center

    Shen, Entong

    2013-01-01

    In the current digital world, data is becoming an increasingly valuable resource and the demand for sharing or releasing data has never been higher. Organizations need to make available versions of the data they collected for business or legal reasons and at the same time they are under strong obligation to protect sensitive information about…

  3. Secure and Privacy-Preserving Distributed Information Brokering

    ERIC Educational Resources Information Center

    Li, Fengjun

    2010-01-01

    As enormous structured, semi-structured and unstructured data are collected and archived by organizations in many realms ranging from business to health networks to government agencies, the needs for efficient yet secure inter-organization information sharing naturally arise. Unlike early information sharing approaches that only involve a small…

  4. Privacy-Preserving and Usable Data Publishing and Analysis

    ERIC Educational Resources Information Center

    Shen, Entong

    2013-01-01

    In the current digital world, data is becoming an increasingly valuable resource and the demand for sharing or releasing data has never been higher. Organizations need to make available versions of the data they collected for business or legal reasons and at the same time they are under strong obligation to protect sensitive information about…

  5. Differential Privacy Preserving in Big Data Analytics for Connected Health.

    PubMed

    Lin, Chi; Song, Zihao; Song, Houbing; Zhou, Yanhong; Wang, Yi; Wu, Guowei

    2016-04-01

    In Body Area Networks (BANs), big data collected by wearable sensors usually contain sensitive information, which is compulsory to be appropriately protected. Previous methods neglected privacy protection issue, leading to privacy exposure. In this paper, a differential privacy protection scheme for big data in body sensor network is developed. Compared with previous methods, this scheme will provide privacy protection with higher availability and reliability. We introduce the concept of dynamic noise thresholds, which makes our scheme more suitable to process big data. Experimental results demonstrate that, even when the attacker has full background knowledge, the proposed scheme can still provide enough interference to big sensitive data so as to preserve the privacy.

  6. Efficient spatial privacy preserving scheme for sensor network

    NASA Astrophysics Data System (ADS)

    Debnath, Ashmita; Singaravelu, Pradheepkumar; Verma, Shekhar

    2013-03-01

    The privacy of sensitive events observed by a wireless sensor networks (WSN) needs to be protected. Adversaries with the knowledge of sensor deployment and network protocols can infer the location of a sensed event by monitoring the communication from the sensors even when the messages are encrypted. Encryption provides confidentiality; however, the context of the event can used to breach the privacy of sensed objects. An adversary can track the trajectory of a moving object or determine the location of the occurrence of a critical event to breach its privacy. In this paper, we propose ring signature to obfuscate the spatial information. Firstly, the extended region of location of an event of interest as estimated from a sensor communication is presented. Then, the increase in this region of spatial uncertainty due to the effect of ring signature is determined. We observe that ring signature can effectively enhance the region of location uncertainty of a sensed event. As the event of interest can be situated anywhere in the enhanced region of uncertainty, its privacy against local or global adversary is ensured. Both analytical and simulation results show that induced delay and throughput are insignificant with negligible impact on the performance of a WSN.

  7. Efficient spatial privacy preserving scheme for sensor network

    NASA Astrophysics Data System (ADS)

    Debnath, Ashmita; Singaravelu, Pradheepkumar; Verma, Shekhar

    2013-03-01

    The privacy of sensitive events observed by a wireless sensor networks (WSN) needs to be protected. Adversaries with the knowledge of sensor deployment and network protocols can infer the location of a sensed event by monitoring the communication from the sensors even when the messages are encrypted. Encryption provides confidentiality; however, the context of the event can used to breach the privacy of sensed objects. An adversary can track the trajectory of a moving object or determine the location of the occurrence of a critical event to breach its privacy. In this paper, we propose ring signature to obfuscate the spatial information. Firstly, the extended region of location of an event of interest as estimated from a sensor communication is presented. Then, the increase in this region of spatial uncertainty due to the effect of ring signature is determined. We observe that ring signature can effectively enhance the region of location uncertainty of a sensed event. As the event of interest can be situated anywhere in the enhanced region of uncertainty, its privacy against local or global adversary is ensured. Both analytical and simulation results show that induced delay and throughput are insignificant with negligible impact on the performance of a WSN.

  8. δ-dependency for privacy-preserving XML data publishing.

    PubMed

    Landberg, Anders H; Nguyen, Kinh; Pardede, Eric; Rahayu, J Wenny

    2014-08-01

    An ever increasing amount of medical data such as electronic health records, is being collected, stored, shared and managed in large online health information systems and electronic medical record systems (EMR) (Williams et al., 2001; Virtanen, 2009; Huang and Liou, 2007) [1-3]. From such rich collections, data is often published in the form of census and statistical data sets for the purpose of knowledge sharing and enabling medical research. This brings with it an increasing need for protecting individual people privacy, and it becomes an issue of great importance especially when information about patients is exposed to the public. While the concept of data privacy has been comprehensively studied for relational data, models and algorithms addressing the distinct differences and complex structure of XML data are yet to be explored. Currently, the common compromise method is to convert private XML data into relational data for publication. This ad hoc approach results in significant loss of useful semantic information previously carried in the private XML data. Health data often has very complex structure, which is best expressed in XML. In fact, XML is the standard format for exchanging (e.g. HL7 version 3(1)) and publishing health information. Lack of means to deal directly with data in XML format is inevitably a serious drawback. In this paper we propose a novel privacy protection model for XML, and an algorithm for implementing this model. We provide general rules, both for transforming a private XML schema into a published XML schema, and for mapping private XML data to the new privacy-protected published XML data. In addition, we propose a new privacy property, δ-dependency, which can be applied to both relational and XML data, and that takes into consideration the hierarchical nature of sensitive data (as opposed to "quasi-identifiers"). Lastly, we provide an implementation of our model, algorithm and privacy property, and perform an experimental analysis

  9. Privacy preserving protocol for detecting genetic relatives using rare variants

    PubMed Central

    Hormozdiari, Farhad; Joo, Jong Wha J; Wadia, Akshay; Guan, Feng; Ostrosky, Rafail; Sahai, Amit; Eskin, Eleazar

    2014-01-01

    Motivation: High-throughput sequencing technologies have impacted many areas of genetic research. One such area is the identification of relatives from genetic data. The standard approach for the identification of genetic relatives collects the genomic data of all individuals and stores it in a database. Then, each pair of individuals is compared to detect the set of genetic relatives, and the matched individuals are informed. The main drawback of this approach is the requirement of sharing your genetic data with a trusted third party to perform the relatedness test. Results: In this work, we propose a secure protocol to detect the genetic relatives from sequencing data while not exposing any information about their genomes. We assume that individuals have access to their genome sequences but do not want to share their genomes with anyone else. Unlike previous approaches, our approach uses both common and rare variants which provide the ability to detect much more distant relationships securely. We use a simulated data generated from the 1000 genomes data and illustrate that we can easily detect up to fifth degree cousins which was not possible using the existing methods. We also show in the 1000 genomes data with cryptic relationships that our method can detect these individuals. Availability: The software is freely available for download at http://genetics.cs.ucla.edu/crypto/. Contact: fhormoz@cs.ucla.edu or eeskin@cs.ucla.edu Supplementary information: Supplementary data are available at Bioinformatics online PMID:24931985

  10. Comment on id-based remote data integrity checking with data privacy preserving

    NASA Astrophysics Data System (ADS)

    Zhang, Jianhong; Meng, Hongxin

    2017-09-01

    Recently, an ID-based remote data integrity checking protocol with perfect data privacy preserving (IEEE Transactions on Information Forensics and Security, doi: 10.1109/TIFS.2016.2615853) was proposed to achieve data privacy protection and integrity checking. Unfortunately, in this letter, we demonstrate that their protocol is insecure. An active hacker can modify the stored data without being detected by the verifier in the auditing. And we also show malicious cloud server can convince the verifier that the stored data are kept intact after the outsourced data blocks are deleted. Finally, the reasons to produce such attacks are given.

  11. Analysis of Existing Privacy-Preserving Protocols in Domain Name System

    NASA Astrophysics Data System (ADS)

    Zhao, Fangming; Hori, Yoshiaki; Sakurai, Kouichi

    In a society preoccupied with gradual erosion of electronic privacy, loss of privacy in the current Domain Name System is an important issue worth considering. In this paper, we first review the DNS and some security & privacy threats to make average users begin to concern about the significance of privacy preservation in DNS protocols. Then, by an careful survey of four noise query generation based existing privacy protection approaches, we analyze some benefits and limitations of these proposals in terms of both related performance evaluation results and theoretic proofs. Finally, we point out some problems that still exist for research community's continuing efforts in the future.

  12. Privacy preservation and information security protection for patients' portable electronic health records.

    PubMed

    Huang, Lu-Chou; Chu, Huei-Chung; Lien, Chung-Yueh; Hsiao, Chia-Hung; Kao, Tsair

    2009-09-01

    As patients face the possibility of copying and keeping their electronic health records (EHRs) through portable storage media, they will encounter new risks to the protection of their private information. In this study, we propose a method to preserve the privacy and security of patients' portable medical records in portable storage media to avoid any inappropriate or unintentional disclosure. Following HIPAA guidelines, the method is designed to protect, recover and verify patient's identifiers in portable EHRs. The results of this study show that our methods are effective in ensuring both information security and privacy preservation for patients through portable storage medium.

  13. An innovative privacy preserving technique for incremental datasets on cloud computing.

    PubMed

    Aldeen, Yousra Abdul Alsahib S; Salleh, Mazleena; Aljeroudi, Yazan

    2016-08-01

    Cloud computing (CC) is a magnificent service-based delivery with gigantic computer processing power and data storage across connected communications channels. It imparted overwhelming technological impetus in the internet (web) mediated IT industry, where users can easily share private data for further analysis and mining. Furthermore, user affable CC services enable to deploy sundry applications economically. Meanwhile, simple data sharing impelled various phishing attacks and malware assisted security threats. Some privacy sensitive applications like health services on cloud that are built with several economic and operational benefits necessitate enhanced security. Thus, absolute cyberspace security and mitigation against phishing blitz became mandatory to protect overall data privacy. Typically, diverse applications datasets are anonymized with better privacy to owners without providing all secrecy requirements to the newly added records. Some proposed techniques emphasized this issue by re-anonymizing the datasets from the scratch. The utmost privacy protection over incremental datasets on CC is far from being achieved. Certainly, the distribution of huge datasets volume across multiple storage nodes limits the privacy preservation. In this view, we propose a new anonymization technique to attain better privacy protection with high data utility over distributed and incremental datasets on CC. The proficiency of data privacy preservation and improved confidentiality requirements is demonstrated through performance evaluation.

  14. A Privacy Preservation Model for Health-Related Social Networking Sites

    PubMed Central

    2015-01-01

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS. PMID:26155953

  15. Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks.

    PubMed

    Meganathan, Navamani Thandava; Palanichamy, Yogesh

    2015-01-01

    Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, and anonymity are to be ensured during route discovery. These properties can be achieved by implementing group signature and ID-based encryption schemes during route discovery. Due to the characteristics of WMNs, it is more vulnerable to many network layer attacks. Hence, a strong protection is needed to avoid these attacks and this can be achieved by introducing a new Cross-Layer and Subject Logic based Dynamic Reputation (CLSL-DR) mechanism during route discovery. In this paper, we propose a new Privacy preserved and Secured Reliable Routing (PSRR) protocol for WMNs. This protocol incorporates group signature, ID-based encryption schemes, and CLSL-DR mechanism to ensure strong privacy, security, and reliability in WMNs. Simulation results prove this by showing better performance in terms of most of the chosen parameters than the existing protocols.

  16. Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks

    PubMed Central

    Thandava Meganathan, Navamani; Palanichamy, Yogesh

    2015-01-01

    Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, and anonymity are to be ensured during route discovery. These properties can be achieved by implementing group signature and ID-based encryption schemes during route discovery. Due to the characteristics of WMNs, it is more vulnerable to many network layer attacks. Hence, a strong protection is needed to avoid these attacks and this can be achieved by introducing a new Cross-Layer and Subject Logic based Dynamic Reputation (CLSL-DR) mechanism during route discovery. In this paper, we propose a new Privacy preserved and Secured Reliable Routing (PSRR) protocol for WMNs. This protocol incorporates group signature, ID-based encryption schemes, and CLSL-DR mechanism to ensure strong privacy, security, and reliability in WMNs. Simulation results prove this by showing better performance in terms of most of the chosen parameters than the existing protocols. PMID:26484361

  17. Privacy-preserving genomic testing in the clinic: a model using HIV treatment

    PubMed Central

    McLaren, Paul J.; Raisaro, Jean Louis; Aouri, Manel; Rotger, Margalida; Ayday, Erman; Bartha, István; Delgado, Maria B.; Vallet, Yannick; Günthard, Huldrych F.; Cavassini, Matthias; Furrer, Hansjakob; Doco-Lecompte, Thanh; Marzolini, Catia; Schmid, Patrick; Di Benedetto, Caroline; Decosterd, Laurent A.; Fellay, Jacques; Hubaux, Jean-Pierre; Telenti, Amalio

    2016-01-01

    Purpose: The implementation of genomic-based medicine is hindered by unresolved questions regarding data privacy and delivery of interpreted results to health-care practitioners. We used DNA-based prediction of HIV-related outcomes as a model to explore critical issues in clinical genomics. Genet Med 18 8, 814–822. Methods: We genotyped 4,149 markers in HIV-positive individuals. Variants allowed for prediction of 17 traits relevant to HIV medical care, inference of patient ancestry, and imputation of human leukocyte antigen (HLA) types. Genetic data were processed under a privacy-preserving framework using homomorphic encryption, and clinical reports describing potentially actionable results were delivered to health-care providers. Genet Med 18 8, 814–822. Results: A total of 230 patients were included in the study. We demonstrated the feasibility of encrypting a large number of genetic markers, inferring patient ancestry, computing monogenic and polygenic trait risks, and reporting results under privacy-preserving conditions. The average execution time of a multimarker test on encrypted data was 865 ms on a standard computer. The proportion of tests returning potentially actionable genetic results ranged from 0 to 54%. Genet Med 18 8, 814–822. Conclusions: The model of implementation presented herein informs on strategies to deliver genomic test results for clinical care. Data encryption to ensure privacy helps to build patient trust, a key requirement on the road to genomic-based medicine. Genet Med 18 8, 814–822. PMID:26765343

  18. An efficient reversible privacy-preserving data mining technology over data streams.

    PubMed

    Lin, Chen-Yi; Kao, Yuan-Hung; Lee, Wei-Bin; Chen, Rong-Chang

    2016-01-01

    With the popularity of smart handheld devices and the emergence of cloud computing, users and companies can save various data, which may contain private data, to the cloud. Topics relating to data security have therefore received much attention. This study focuses on data stream environments and uses the concept of a sliding window to design a reversible privacy-preserving technology to process continuous data in real time, known as a continuous reversible privacy-preserving (CRP) algorithm. Data with CRP algorithm protection can be accurately recovered through a data recovery process. In addition, by using an embedded watermark, the integrity of the data can be verified. The results from the experiments show that, compared to existing algorithms, CRP is better at preserving knowledge and is more effective in terms of reducing information loss and privacy disclosure risk. In addition, it takes far less time for CRP to process continuous data than existing algorithms. As a result, CRP is confirmed as suitable for data stream environments and fulfills the requirements of being lightweight and energy-efficient for smart handheld devices.

  19. A Lightweight Encryption Scheme Combined with Trust Management for Privacy-Preserving in Body Sensor Networks.

    PubMed

    Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N

    2015-12-01

    With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.

  20. A Privacy Preservation Model for Health-Related Social Networking Sites.

    PubMed

    Li, Jingquan

    2015-07-08

    The increasing use of social networking sites (SNS) in health care has resulted in a growing number of individuals posting personal health information online. These sites may disclose users' health information to many different individuals and organizations and mine it for a variety of commercial and research purposes, yet the revelation of personal health information to unauthorized individuals or entities brings a concomitant concern of greater risk for loss of privacy among users. Many users join multiple social networks for different purposes and enter personal and other specific information covering social, professional, and health domains into other websites. Integration of multiple online and real social networks makes the users vulnerable to unintentional and intentional security threats and misuse. This paper analyzes the privacy and security characteristics of leading health-related SNS. It presents a threat model and identifies the most important threats to users and SNS providers. Building on threat analysis and modeling, this paper presents a privacy preservation model that incorporates individual self-protection and privacy-by-design approaches and uses the model to develop principles and countermeasures to protect user privacy. This study paves the way for analysis and design of privacy-preserving mechanisms on health-related SNS.

  1. An analysis of random projection for changeable and privacy-preserving biometric verification.

    PubMed

    Wang, Yongjin; Plataniotis, Konstantinos N

    2010-10-01

    Changeability and privacy protection are important factors for widespread deployment of biometrics-based verification systems. This paper presents a systematic analysis of a random-projection (RP)-based method for addressing these problems. The employed method transforms biometric data using a random matrix with each entry an independent and identically distributed Gaussian random variable. The similarity- and privacy-preserving properties, as well as the changeability of the biometric information in the transformed domain, are analyzed in detail. Specifically, RP on both high-dimensional image vectors and dimensionality-reduced feature vectors is discussed and compared. A vector translation method is proposed to improve the changeability of the generated templates. The feasibility of the introduced solution is well supported by detailed theoretical analyses. Extensive experimentation on a face-based biometric verification problem shows the effectiveness of the proposed method.

  2. PREMIX: PRivacy-preserving EstiMation of Individual admiXture.

    PubMed

    Chen, Feng; Dow, Michelle; Ding, Sijie; Lu, Yao; Jiang, Xiaoqian; Tang, Hua; Wang, Shuang

    2016-01-01

    In this paper we proposed a framework: PRivacy-preserving EstiMation of Individual admiXture (PREMIX) using Intel software guard extensions (SGX). SGX is a suite of software and hardware architectures to enable efficient and secure computation over confidential data. PREMIX enables multiple sites to securely collaborate on estimating individual admixture within a secure enclave inside Intel SGX. We implemented a feature selection module to identify most discriminative Single Nucleotide Polymorphism (SNP) based on informativeness and an Expectation Maximization (EM)-based Maximum Likelihood estimator to identify the individual admixture. Experimental results based on both simulation and 1000 genome data demonstrated the efficiency and accuracy of the proposed framework. PREMIX ensures a high level of security as all operations on sensitive genomic data are conducted within a secure enclave using SGX.

  3. PREMIX: PRivacy-preserving EstiMation of Individual admiXture

    PubMed Central

    Chen, Feng; Dow, Michelle; Ding, Sijie; Lu, Yao; Jiang, Xiaoqian; Tang, Hua; Wang, Shuang

    2016-01-01

    In this paper we proposed a framework: PRivacy-preserving EstiMation of Individual admiXture (PREMIX) using Intel software guard extensions (SGX). SGX is a suite of software and hardware architectures to enable efficient and secure computation over confidential data. PREMIX enables multiple sites to securely collaborate on estimating individual admixture within a secure enclave inside Intel SGX. We implemented a feature selection module to identify most discriminative Single Nucleotide Polymorphism (SNP) based on informativeness and an Expectation Maximization (EM)-based Maximum Likelihood estimator to identify the individual admixture. Experimental results based on both simulation and 1000 genome data demonstrated the efficiency and accuracy of the proposed framework. PREMIX ensures a high level of security as all operations on sensitive genomic data are conducted within a secure enclave using SGX. PMID:28269933

  4. Privacy-Preserving Location-Based Query Using Location Indexes and Parallel Searching in Distributed Networks

    PubMed Central

    Liu, Lei; Zhao, Jing

    2014-01-01

    An efficient location-based query algorithm of protecting the privacy of the user in the distributed networks is given. This algorithm utilizes the location indexes of the users and multiple parallel threads to search and select quickly all the candidate anonymous sets with more users and their location information with more uniform distribution to accelerate the execution of the temporal-spatial anonymous operations, and it allows the users to configure their custom-made privacy-preserving location query requests. The simulated experiment results show that the proposed algorithm can offer simultaneously the location query services for more users and improve the performance of the anonymous server and satisfy the anonymous location requests of the users. PMID:24790579

  5. EXpectation Propagation LOgistic REgRession (EXPLORER): Distributed Privacy-Preserving Online Model Learning

    PubMed Central

    Wang, Shuang; Jiang, Xiaoqian; Wu, Yuan; Cui, Lijuan; Cheng, Samuel; Ohno-Machado, Lucila

    2013-01-01

    We developed an EXpectation Propagation LOgistic REgRession (EXPLORER) model for distributed privacy-preserving online learning. The proposed framework provides a high level guarantee for protecting sensitive information, since the information exchanged between the server and the client is the encrypted posterior distribution of coefficients. Through experimental results, EXPLORER shows the same performance (e.g., discrimination, calibration, feature selection etc.) as the traditional frequentist Logistic Regression model, but provides more flexibility in model updating. That is, EXPLORER can be updated one point at a time rather than having to retrain the entire data set when new observations are recorded. The proposed EXPLORER supports asynchronized communication, which relieves the participants from coordinating with one another, and prevents service breakdown from the absence of participants or interrupted communications. PMID:23562651

  6. A Framework for Privacy-preserving Classification of Next-generation PHR data.

    PubMed

    Koufi, Vassiliki; Malamateniou, Flora; Prentza, Andriana; Vassilacopoulos, George

    2014-01-01

    Personal Health Records (PHRs), integrated with data from various sources, such as social care data, Electronic Health Record data and genetic information, are envisaged as having a pivotal role in transforming healthcare. These data, lumped under the term 'big data', are usually complex, noisy, heterogeneous, longitudinal and voluminous thus prohibiting their meaningful use by clinicians. Deriving value from these data requires the utilization of innovative data analysis techniques, which, however, may be hindered due to potential security and privacy breaches that may arise from improper release of personal health information. This paper presents a HIPAA-compliant machine learning framework that enables privacy-preserving classification of next-generation PHR data. The predictive models acquired can act as supporting tools to clinical practice by enabling more effective prevention, diagnosis and treatment of new incidents. The proposed framework has a huge potential for complementing medical staff expertise as it outperforms the manual inspection of PHR data while protecting patient privacy.

  7. Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials

    NASA Astrophysics Data System (ADS)

    Park, Jun-Cheol

    User privacy preservation is critical to prevent many sophisticated attacks that are based on the user's server access patterns and ID-related information. We propose a password-based user authentication scheme that provides strong privacy protection using one-time credentials. It eliminates the possibility of tracing a user's authentication history and hides the user's ID and password even from servers. In addition, it is resistant against user impersonation even if both a server's verification database and a user's smart card storage are disclosed. We also provide a revocation scheme for a user to promptly invalidate the user's credentials on a server when the user's smart card is compromised. The schemes use lightweight operations only such as computing hashes and bitwise XORs.

  8. EPPRD: An Efficient Privacy-Preserving Power Requirement and Distribution Aggregation Scheme for a Smart Grid

    PubMed Central

    Zhang, Lei; Zhang, Jing

    2017-01-01

    A Smart Grid (SG) facilitates bidirectional demand-response communication between individual users and power providers with high computation and communication performance but also brings about the risk of leaking users’ private information. Therefore, improving the individual power requirement and distribution efficiency to ensure communication reliability while preserving user privacy is a new challenge for SG. Based on this issue, we propose an efficient and privacy-preserving power requirement and distribution aggregation scheme (EPPRD) based on a hierarchical communication architecture. In the proposed scheme, an efficient encryption and authentication mechanism is proposed for better fit to each individual demand-response situation. Through extensive analysis and experiment, we demonstrate how the EPPRD resists various security threats and preserves user privacy while satisfying the individual requirement in a semi-honest model; it involves less communication overhead and computation time than the existing competing schemes. PMID:28783122

  9. EPPRD: An Efficient Privacy-Preserving Power Requirement and Distribution Aggregation Scheme for a Smart Grid.

    PubMed

    Zhang, Lei; Zhang, Jing

    2017-08-07

    A Smart Grid (SG) facilitates bidirectional demand-response communication between individual users and power providers with high computation and communication performance but also brings about the risk of leaking users' private information. Therefore, improving the individual power requirement and distribution efficiency to ensure communication reliability while preserving user privacy is a new challenge for SG. Based on this issue, we propose an efficient and privacy-preserving power requirement and distribution aggregation scheme (EPPRD) based on a hierarchical communication architecture. In the proposed scheme, an efficient encryption and authentication mechanism is proposed for better fit to each individual demand-response situation. Through extensive analysis and experiment, we demonstrate how the EPPRD resists various security threats and preserves user privacy while satisfying the individual requirement in a semi-honest model; it involves less communication overhead and computation time than the existing competing schemes.

  10. Privacy-preserving location-based query using location indexes and parallel searching in distributed networks.

    PubMed

    Zhong, Cheng; Liu, Lei; Zhao, Jing

    2014-01-01

    An efficient location-based query algorithm of protecting the privacy of the user in the distributed networks is given. This algorithm utilizes the location indexes of the users and multiple parallel threads to search and select quickly all the candidate anonymous sets with more users and their location information with more uniform distribution to accelerate the execution of the temporal-spatial anonymous operations, and it allows the users to configure their custom-made privacy-preserving location query requests. The simulated experiment results show that the proposed algorithm can offer simultaneously the location query services for more users and improve the performance of the anonymous server and satisfy the anonymous location requests of the users.

  11. Securing SIFT: Privacy-preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data.

    PubMed

    Hu, Shengshan; Wang, Qian; Wang, Jingjun; Qin, Zhan; Ren, Kui

    2016-05-13

    Advances in cloud computing have greatly motivated data owners to outsource their huge amount of personal multimedia data and/or computationally expensive tasks onto the cloud by leveraging its abundant resources for cost saving and flexibility. Despite the tremendous benefits, the outsourced multimedia data and its originated applications may reveal the data owner's private information, such as the personal identity, locations or even financial profiles. This observation has recently aroused new research interest on privacy-preserving computations over outsourced multimedia data. In this paper, we propose an effective and practical privacy-preserving computation outsourcing protocol for the prevailing scale-invariant feature transform (SIFT) over massive encrypted image data. We first show that previous solutions to this problem have either efficiency/security or practicality issues, and none can well preserve the important characteristics of the original SIFT in terms of distinctiveness and robustness. We then present a new scheme design that achieves efficiency and security requirements simultaneously with the preservation of its key characteristics, by randomly splitting the original image data, designing two novel efficient protocols for secure multiplication and comparison, and carefully distributing the feature extraction computations onto two independent cloud servers. We both carefully analyze and extensively evaluate the security and effectiveness of our design. The results show that our solution is practically secure, outperforms the state-of-theart, and performs comparably to the original SIFT in terms of various characteristics, including rotation invariance, image scale invariance, robust matching across affine distortion, addition of noise and change in 3D viewpoint and illumination.

  12. SecSIFT: Privacy-preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data.

    PubMed

    Hu, Shengshan; Wang, Qian; Wang, Jingjun; Qin, Zhan; Ren, Kui

    2016-05-13

    Advances in cloud computing have greatly motivated data owners to outsource their huge amount of personal multimedia data and/or computationally expensive tasks onto the cloud by leveraging its abundant resources for cost saving and flexibility. Despite the tremendous benefits, the outsourced multimedia data and its originated applications may reveal the data owner's private information, such as the personal identity, locations or even financial profiles. This observation has recently aroused new research interest on privacy-preserving computations over outsourced multimedia data. In this paper, we propose an effective and practical privacy-preserving computation outsourcing protocol for the prevailing scale-invariant feature transform (SIFT) over massive encrypted image data. We first show that previous solutions to this problem have either efficiency/security or practicality issues, and none can well preserve the important characteristics of the original SIFT in terms of distinctiveness and robustness. We then present a new scheme design that achieves efficiency and security requirements simultaneously with the preservation of its key characteristics, by randomly splitting the original image data, designing two novel efficient protocols for secure multiplication and comparison, and carefully distributing the feature extraction computations onto two independent cloud servers. We both carefully analyze and extensively evaluate the security and effectiveness of our design. The results show that our solution is practically secure, outperforms the state-of-theart, and performs comparably to the original SIFT in terms of various characteristics, including rotation invariance, image scale invariance, robust matching across affine distortion, addition of noise and change in 3D viewpoint and illumination.

  13. A privacy-preserving solution for compressed storage and selective retrieval of genomic data

    PubMed Central

    Huang, Zhicong; Ayday, Erman; Lin, Huang; Aiyar, Raeka S.; Molyneaux, Adam; Xu, Zhenyu; Hubaux, Jean-Pierre

    2016-01-01

    In clinical genomics, the continuous evolution of bioinformatic algorithms and sequencing platforms makes it beneficial to store patients’ complete aligned genomic data in addition to variant calls relative to a reference sequence. Due to the large size of human genome sequence data files (varying from 30 GB to 200 GB depending on coverage), two major challenges facing genomics laboratories are the costs of storage and the efficiency of the initial data processing. In addition, privacy of genomic data is becoming an increasingly serious concern, yet no standard data storage solutions exist that enable compression, encryption, and selective retrieval. Here we present a privacy-preserving solution named SECRAM (Selective retrieval on Encrypted and Compressed Reference-oriented Alignment Map) for the secure storage of compressed aligned genomic data. Our solution enables selective retrieval of encrypted data and improves the efficiency of downstream analysis (e.g., variant calling). Compared with BAM, the de facto standard for storing aligned genomic data, SECRAM uses 18% less storage. Compared with CRAM, one of the most compressed nonencrypted formats (using 34% less storage than BAM), SECRAM maintains efficient compression and downstream data processing, while allowing for unprecedented levels of security in genomic data storage. Compared with previous work, the distinguishing features of SECRAM are that (1) it is position-based instead of read-based, and (2) it allows random querying of a subregion from a BAM-like file in an encrypted form. Our method thus offers a space-saving, privacy-preserving, and effective solution for the storage of clinical genomic data. PMID:27789525

  14. Constructing distributed Hippocratic video databases for privacy-preserving online patient training and counseling.

    PubMed

    Peng, Jinye; Babaguchi, Noboru; Luo, Hangzai; Gao, Yuli; Fan, Jianping

    2010-07-01

    Digital video now plays an important role in supporting more profitable online patient training and counseling, and integration of patient training videos from multiple competitive organizations in the health care network will result in better offerings for patients. However, privacy concerns often prevent multiple competitive organizations from sharing and integrating their patient training videos. In addition, patients with infectious or chronic diseases may not want the online patient training organizations to identify who they are or even which video clips they are interested in. Thus, there is an urgent need to develop more effective techniques to protect both video content privacy and access privacy . In this paper, we have developed a new approach to construct a distributed Hippocratic video database system for supporting more profitable online patient training and counseling. First, a new database modeling approach is developed to support concept-oriented video database organization and assign a degree of privacy of the video content for each database level automatically. Second, a new algorithm is developed to protect the video content privacy at the level of individual video clip by filtering out the privacy-sensitive human objects automatically. In order to integrate the patient training videos from multiple competitive organizations for constructing a centralized video database indexing structure, a privacy-preserving video sharing scheme is developed to support privacy-preserving distributed classifier training and prevent the statistical inferences from the videos that are shared for cross-validation of video classifiers. Our experiments on large-scale video databases have also provided very convincing results.

  15. A privacy-preserving solution for compressed storage and selective retrieval of genomic data.

    PubMed

    Huang, Zhicong; Ayday, Erman; Lin, Huang; Aiyar, Raeka S; Molyneaux, Adam; Xu, Zhenyu; Fellay, Jacques; Steinmetz, Lars M; Hubaux, Jean-Pierre

    2016-12-01

    In clinical genomics, the continuous evolution of bioinformatic algorithms and sequencing platforms makes it beneficial to store patients' complete aligned genomic data in addition to variant calls relative to a reference sequence. Due to the large size of human genome sequence data files (varying from 30 GB to 200 GB depending on coverage), two major challenges facing genomics laboratories are the costs of storage and the efficiency of the initial data processing. In addition, privacy of genomic data is becoming an increasingly serious concern, yet no standard data storage solutions exist that enable compression, encryption, and selective retrieval. Here we present a privacy-preserving solution named SECRAM (Selective retrieval on Encrypted and Compressed Reference-oriented Alignment Map) for the secure storage of compressed aligned genomic data. Our solution enables selective retrieval of encrypted data and improves the efficiency of downstream analysis (e.g., variant calling). Compared with BAM, the de facto standard for storing aligned genomic data, SECRAM uses 18% less storage. Compared with CRAM, one of the most compressed nonencrypted formats (using 34% less storage than BAM), SECRAM maintains efficient compression and downstream data processing, while allowing for unprecedented levels of security in genomic data storage. Compared with previous work, the distinguishing features of SECRAM are that (1) it is position-based instead of read-based, and (2) it allows random querying of a subregion from a BAM-like file in an encrypted form. Our method thus offers a space-saving, privacy-preserving, and effective solution for the storage of clinical genomic data. © 2016 Huang et al.; Published by Cold Spring Harbor Laboratory Press.

  16. Privacy preserving probabilistic record linkage (P3RL): a novel method for linking existing health-related data and maintaining participant confidentiality.

    PubMed

    Schmidlin, Kurt; Clough-Gorr, Kerri M; Spoerri, Adrian

    2015-05-30

    Record linkage of existing individual health care data is an efficient way to answer important epidemiological research questions. Reuse of individual health-related data faces several problems: Either a unique personal identifier, like social security number, is not available or non-unique person identifiable information, like names, are privacy protected and cannot be accessed. A solution to protect privacy in probabilistic record linkages is to encrypt these sensitive information. Unfortunately, encrypted hash codes of two names differ completely if the plain names differ only by a single character. Therefore, standard encryption methods cannot be applied. To overcome these challenges, we developed the Privacy Preserving Probabilistic Record Linkage (P3RL) method. In this Privacy Preserving Probabilistic Record Linkage method we apply a three-party protocol, with two sites collecting individual data and an independent trusted linkage center as the third partner. Our method consists of three main steps: pre-processing, encryption and probabilistic record linkage. Data pre-processing and encryption are done at the sites by local personnel. To guarantee similar quality and format of variables and identical encryption procedure at each site, the linkage center generates semi-automated pre-processing and encryption templates. To retrieve information (i.e. data structure) for the creation of templates without ever accessing plain person identifiable information, we introduced a novel method of data masking. Sensitive string variables are encrypted using Bloom filters, which enables calculation of similarity coefficients. For date variables, we developed special encryption procedures to handle the most common date errors. The linkage center performs probabilistic record linkage with encrypted person identifiable information and plain non-sensitive variables. In this paper we describe step by step how to link existing health-related data using encryption methods to

  17. A compressive sensing based secure watermark detection and privacy preserving storage framework.

    PubMed

    Qia Wang; Wenjun Zeng; Jun Tian

    2014-03-01

    Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service, such as the cloud. In this paper, we identify a cloud computing application scenario that requires simultaneously performing secure watermark detection and privacy preserving multimedia data storage. We then propose a compressive sensing (CS)-based framework using secure multiparty computation (MPC) protocols to address such a requirement. In our framework, the multimedia data and secret watermark pattern are presented to the cloud for secure watermark detection in a CS domain to protect the privacy. During CS transformation, the privacy of the CS matrix and the watermark pattern is protected by the MPC protocols under the semi-honest security model. We derive the expected watermark detection performance in the CS domain, given the target image, watermark pattern, and the size of the CS matrix (but without the CS matrix itself). The correctness of the derived performance has been validated by our experiments. Our theoretical analysis and experimental results show that secure watermark detection in the CS domain is feasible. Our framework can also be extended to other collaborative secure signal processing and data-mining applications in the cloud.

  18. Privacy-preserving photo sharing based on a public key infrastructure

    NASA Astrophysics Data System (ADS)

    Yuan, Lin; McNally, David; Küpçü, Alptekin; Ebrahimi, Touradj

    2015-09-01

    A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the best interest of many such services if their users restrict access to their shared pictures, most services keep users' photos unprotected which makes them available to all insiders. This paper presents an architecture for a privacy-preserving photo sharing based on an image scrambling scheme and a public key infrastructure. A secure JPEG scrambling is applied to protect regional visual information in photos. Protected images are still compatible with JPEG coding and therefore can be viewed by any one on any device. However, only those who are granted secret keys will be able to descramble the photos and view their original versions. The proposed architecture applies an attribute-based encryption along with conventional public key cryptography, to achieve secure transmission of secret keys and a fine-grained control over who may view shared photos. In addition, we demonstrate the practical feasibility of the proposed photo sharing architecture with a prototype mobile application, ProShare, which is built based on iOS platform.

  19. Privacy preserving data publishing of categorical data through k-anonymity and feature selection.

    PubMed

    Aristodimou, Aristos; Antoniades, Athos; Pattichis, Constantinos S

    2016-03-01

    In healthcare, there is a vast amount of patients' data, which can lead to important discoveries if combined. Due to legal and ethical issues, such data cannot be shared and hence such information is underused. A new area of research has emerged, called privacy preserving data publishing (PPDP), which aims in sharing data in a way that privacy is preserved while the information lost is kept at a minimum. In this Letter, a new anonymisation algorithm for PPDP is proposed, which is based on k-anonymity through pattern-based multidimensional suppression (kPB-MS). The algorithm uses feature selection for reducing the data dimensionality and then combines attribute and record suppression for obtaining k-anonymity. Five datasets from different areas of life sciences [RETINOPATHY, Single Proton Emission Computed Tomography imaging, gene sequencing and drug discovery (two datasets)], were anonymised with kPB-MS. The produced anonymised datasets were evaluated using four different classifiers and in 74% of the test cases, they produced similar or better accuracies than using the full datasets.

  20. TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs

    PubMed Central

    Hu, Hao; Lu, Rongxing; Huang, Cheng; Zhang, Zonghua

    2016-01-01

    In this paper, we propose a trust-based vehicular platoon crowdsensing scheme, named TripSense, in VANET. The proposed TripSense scheme introduces a trust-based system to evaluate vehicles’ sensing abilities and then selects the more capable vehicles in order to improve sensing results accuracy. In addition, the sensing tasks are accomplished by platoon member vehicles and preprocessed by platoon head vehicles before the data are uploaded to server. Hence, it is less time-consuming and more efficient compared with the way where the data are submitted by individual platoon member vehicles. Hence it is more suitable in ephemeral networks like VANET. Moreover, our proposed TripSense scheme integrates unlinkable pseudo-ID techniques to achieve PM vehicle identity privacy, and employs a privacy-preserving sensing vehicle selection scheme without involving the PM vehicle’s trust score to keep its location privacy. Detailed security analysis shows that our proposed TripSense scheme not only achieves desirable privacy requirements but also resists against attacks launched by adversaries. In addition, extensive simulations are conducted to show the correctness and effectiveness of our proposed scheme. PMID:27258287

  1. Privacy-Preserving and Secure Sharing of PHR in the Cloud.

    PubMed

    Zhang, Leyou; Wu, Qing; Mu, Yi; Zhang, Jingxia

    2016-12-01

    As a new summarized record of an individual's medical data and information, Personal Health Record (PHR) can be accessible online. The owner can control fully his/her PHR files to be shared with different users such as doctors, clinic agents, and friends. However, in an open network environment like in the Cloud, these sensitive privacy information may be gotten by those unauthorized parties and users. In this paper, we consider how to achieve PHR data confidentiality and provide fine-grained access control of PHR files in the public Cloud based on Attribute Based Encryption(ABE). Differing from previous works, we also consider the privacy preserving of the receivers since the attributes of the receivers relate to their identity or medical information, which would make some sensitive data exposed to third services. Anonymous ABE(AABE) not only enforces the security of PHR of the owners but also preserves the privacy of the receivers. But a normal AABE with a single private key generation(PKG) center may not match a PHR system in the hierarchical architecture. Therefore, we discuss not only the construction of the PHR sharing system base on AABE but also how to construct the PHR sharing system based on the hierarchical AABE. The proposed schemes(especially based on hierarchical AABE) have many advantages over the available such as short public keys, constant-size private keys, which overcome the weaknesses in the existing works. In the standard model, the introduced schemes achieve compact security in the prime order groups.

  2. Combining Different Privacy-Preserving Record Linkage Methods for Hospital Admission Data.

    PubMed

    Stausberg, Jürgen; Waldenburger, Andreas; Borgs, Christian; Schnell, Rainer

    2017-01-01

    Record linkage (RL) is the process of identifying pairs of records that correspond to the same entity, for example the same patient. The basic approach assigns to each pair of records a similarity weight, and then determines a certain threshold, above which the two records are considered to be a match. Three different RL methods were applied under privacy-preserving conditions on hospital admission data: deterministic RL (DRL), probabilistic RL (PRL), and Bloom filters. The patient characteristics like names were one-way encrypted (DRL, PRL) or transformed to a cryptographic longterm key (Bloom filters). Based on one year of hospital admissions, the data set was split randomly in 30 thousand new and 1,5 million known patients. With the combination of the three RL-methods, a positive predictive value of 83 % (95 %-confidence interval 65 %-94 %) was attained. Thus, the application of the presented combination of RL-methods seem to be suited for other applications of population-based research.

  3. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    PubMed

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes.

  4. Remote access methods for exploratory data analysis and statistical modelling: Privacy-Preserving Analytics.

    PubMed

    Sparks, Ross; Carter, Chris; Donnelly, John B; O'Keefe, Christine M; Duncan, Jodie; Keighley, Tim; McAullay, Damien

    2008-09-01

    This paper is concerned with the challenge of enabling the use of confidential or private data for research and policy analysis, while protecting confidentiality and privacy by reducing the risk of disclosure of sensitive information. Traditional solutions to the problem of reducing disclosure risk include releasing de-identified data and modifying data before release. In this paper we discuss the alternative approach of using a remote analysis server which does not enable any data release, but instead is designed to deliver useful results of user-specified statistical analyses with a low risk of disclosure. The techniques described in this paper enable a user to conduct a wide range of methods in exploratory data analysis, regression and survival analysis, while at the same time reducing the risk that the user can read or infer any individual record attribute value. We illustrate our methods with examples from biostatistics using publicly available data. We have implemented our techniques into a software demonstrator called Privacy-Preserving Analytics (PPA), via a web-based interface to the R software. We believe that PPA may provide an effective balance between the competing goals of providing useful information and reducing disclosure risk in some situations.

  5. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks

    PubMed Central

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant’s profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes. PMID:27337001

  6. TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs.

    PubMed

    Hu, Hao; Lu, Rongxing; Huang, Cheng; Zhang, Zonghua

    2016-06-01

    In this paper, we propose a trust-based vehicular platoon crowdsensing scheme, named TripSense, in VANET. The proposed TripSense scheme introduces a trust-based system to evaluate vehicles' sensing abilities and then selects the more capable vehicles in order to improve sensing results accuracy. In addition, the sensing tasks are accomplished by platoon member vehicles and preprocessed by platoon head vehicles before the data are uploaded to server. Hence, it is less time-consuming and more efficient compared with the way where the data are submitted by individual platoon member vehicles. Hence it is more suitable in ephemeral networks like VANET. Moreover, our proposed TripSense scheme integrates unlinkable pseudo-ID techniques to achieve PM vehicle identity privacy, and employs a privacy-preserving sensing vehicle selection scheme without involving the PM vehicle's trust score to keep its location privacy. Detailed security analysis shows that our proposed TripSense scheme not only achieves desirable privacy requirements but also resists against attacks launched by adversaries. In addition, extensive simulations are conducted to show the correctness and effectiveness of our proposed scheme.

  7. Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification.

    PubMed

    Liu, Ximeng; Lu, Rongxing; Ma, Jianfeng; Chen, Le; Qin, Baodong

    2016-03-01

    Clinical decision support system, which uses advanced data mining techniques to help clinician make proper decisions, has received considerable attention recently. The advantages of clinical decision support system include not only improving diagnosis accuracy but also reducing diagnosis time. Specifically, with large amounts of clinical data generated everyday, naïve Bayesian classification can be utilized to excavate valuable information to improve a clinical decision support system. Although the clinical decision support system is quite promising, the flourish of the system still faces many challenges including information security and privacy concerns. In this paper, we propose a new privacy-preserving patient-centric clinical decision support system, which helps clinician complementary to diagnose the risk of patients' disease in a privacy-preserving way. In the proposed system, the past patients' historical data are stored in cloud and can be used to train the naïve Bayesian classifier without leaking any individual patient medical data, and then the trained classifier can be applied to compute the disease risk for new coming patients and also allow these patients to retrieve the top- k disease names according to their own preferences. Specifically, to protect the privacy of past patients' historical data, a new cryptographic tool called additive homomorphic proxy aggregation scheme is designed. Moreover, to leverage the leakage of naïve Bayesian classifier, we introduce a privacy-preserving top- k disease names retrieval protocol in our system. Detailed privacy analysis ensures that patient's information is private and will not be leaked out during the disease diagnosis phase. In addition, performance evaluation via extensive simulations also demonstrates that our system can efficiently calculate patient's disease risk with high accuracy in a privacy-preserving way.

  8. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge.

    PubMed

    Yu, Fei; Ji, Zhanglong

    2014-01-01

    In response to the growing interest in genome-wide association study (GWAS) data privacy, the Integrating Data for Analysis, Anonymization and SHaring (iDASH) center organized the iDASH Healthcare Privacy Protection Challenge, with the aim of investigating the effectiveness of applying privacy-preserving methodologies to human genetic data. This paper is based on a submission to the iDASH Healthcare Privacy Protection Challenge. We apply privacy-preserving methods that are adapted from Uhler et al. 2013 and Yu et al. 2014 to the challenge's data and analyze the data utility after the data are perturbed by the privacy-preserving methods. Major contributions of this paper include new interpretation of the χ2 statistic in a GWAS setting and new results about the Hamming distance score, a key component for one of the privacy-preserving methods.

  9. Hiding in Plain Sight: Anonymity and Privacy Preserving Mechanisms for Data Collection and Collaboration

    ERIC Educational Resources Information Center

    Kumar, Rajeev

    2009-01-01

    This dissertation contributes to the society by providing mechanisms that can potentially increase the availability of valuable personal level information without sacrificing the privacy of citizens. We consider two settings by which personal level data can be made available to its users such as researchers, who then may use it for the benefit of…

  10. Hiding in Plain Sight: Anonymity and Privacy Preserving Mechanisms for Data Collection and Collaboration

    ERIC Educational Resources Information Center

    Kumar, Rajeev

    2009-01-01

    This dissertation contributes to the society by providing mechanisms that can potentially increase the availability of valuable personal level information without sacrificing the privacy of citizens. We consider two settings by which personal level data can be made available to its users such as researchers, who then may use it for the benefit of…

  11. Design and implementation of a privacy preserving electronic health record linkage tool in Chicago

    PubMed Central

    Cashy, John P; Jackson, Kathryn L; Pah, Adam R; Goel, Satyender; Boehnke, Jörn; Humphries, John Eric; Kominers, Scott Duke; Hota, Bala N; Sims, Shannon A; Malin, Bradley A; French, Dustin D; Walunas, Theresa L; Meltzer, David O; Kaleba, Erin O; Jones, Roderick C; Galanter, William L

    2015-01-01

    Objective To design and implement a tool that creates a secure, privacy preserving linkage of electronic health record (EHR) data across multiple sites in a large metropolitan area in the United States (Chicago, IL), for use in clinical research. Methods The authors developed and distributed a software application that performs standardized data cleaning, preprocessing, and hashing of patient identifiers to remove all protected health information. The application creates seeded hash code combinations of patient identifiers using a Health Insurance Portability and Accountability Act compliant SHA-512 algorithm that minimizes re-identification risk. The authors subsequently linked individual records using a central honest broker with an algorithm that assigns weights to hash combinations in order to generate high specificity matches. Results The software application successfully linked and de-duplicated 7 million records across 6 institutions, resulting in a cohort of 5 million unique records. Using a manually reconciled set of 11 292 patients as a gold standard, the software achieved a sensitivity of 96% and a specificity of 100%, with a majority of the missed matches accounted for by patients with both a missing social security number and last name change. Using 3 disease examples, it is demonstrated that the software can reduce duplication of patient records across sites by as much as 28%. Conclusions Software that standardizes the assignment of a unique seeded hash identifier merged through an agreed upon third-party honest broker can enable large-scale secure linkage of EHR data for epidemiologic and public health research. The software algorithm can improve future epidemiologic research by providing more comprehensive data given that patients may make use of multiple healthcare systems. PMID:26104741

  12. Design and implementation of a privacy preserving electronic health record linkage tool in Chicago.

    PubMed

    Kho, Abel N; Cashy, John P; Jackson, Kathryn L; Pah, Adam R; Goel, Satyender; Boehnke, Jörn; Humphries, John Eric; Kominers, Scott Duke; Hota, Bala N; Sims, Shannon A; Malin, Bradley A; French, Dustin D; Walunas, Theresa L; Meltzer, David O; Kaleba, Erin O; Jones, Roderick C; Galanter, William L

    2015-09-01

    To design and implement a tool that creates a secure, privacy preserving linkage of electronic health record (EHR) data across multiple sites in a large metropolitan area in the United States (Chicago, IL), for use in clinical research. The authors developed and distributed a software application that performs standardized data cleaning, preprocessing, and hashing of patient identifiers to remove all protected health information. The application creates seeded hash code combinations of patient identifiers using a Health Insurance Portability and Accountability Act compliant SHA-512 algorithm that minimizes re-identification risk. The authors subsequently linked individual records using a central honest broker with an algorithm that assigns weights to hash combinations in order to generate high specificity matches. The software application successfully linked and de-duplicated 7 million records across 6 institutions, resulting in a cohort of 5 million unique records. Using a manually reconciled set of 11 292 patients as a gold standard, the software achieved a sensitivity of 96% and a specificity of 100%, with a majority of the missed matches accounted for by patients with both a missing social security number and last name change. Using 3 disease examples, it is demonstrated that the software can reduce duplication of patient records across sites by as much as 28%. Software that standardizes the assignment of a unique seeded hash identifier merged through an agreed upon third-party honest broker can enable large-scale secure linkage of EHR data for epidemiologic and public health research. The software algorithm can improve future epidemiologic research by providing more comprehensive data given that patients may make use of multiple healthcare systems. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  13. A security and privacy preserving e-prescription system based on smart cards.

    PubMed

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.

  14. A review on the state-of-the-art privacy-preserving approaches in the e-health clouds.

    PubMed

    Abbas, Assad; Khan, Samee U

    2014-07-01

    Cloud computing is emerging as a new computing paradigm in the healthcare sector besides other business domains. Large numbers of health organizations have started shifting the electronic health information to the cloud environment. Introducing the cloud services in the health sector not only facilitates the exchange of electronic medical records among the hospitals and clinics, but also enables the cloud to act as a medical record storage center. Moreover, shifting to the cloud environment relieves the healthcare organizations of the tedious tasks of infrastructure management and also minimizes development and maintenance costs. Nonetheless, storing the patient health data in the third-party servers also entails serious threats to data privacy. Because of probable disclosure of medical records stored and exchanged in the cloud, the patients' privacy concerns should essentially be considered when designing the security and privacy mechanisms. Various approaches have been used to preserve the privacy of the health information in the cloud environment. This survey aims to encompass the state-of-the-art privacy-preserving approaches employed in the e-Health clouds. Moreover, the privacy-preserving approaches are classified into cryptographic and noncryptographic approaches and taxonomy of the approaches is also presented. Furthermore, the strengths and weaknesses of the presented approaches are reported and some open issues are highlighted.

  15. Privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks.

    PubMed

    Sun, Yi; Wen, Qiaoyan; Zhang, Yudong; Li, Wenmin

    2014-01-01

    With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients' health information and doctors' diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions.

  16. Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks

    PubMed Central

    Wen, Qiaoyan; Zhang, Yudong; Li, Wenmin

    2014-01-01

    With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients' health information and doctors' diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions. PMID:25126107

  17. Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query

    NASA Astrophysics Data System (ADS)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2017-01-01

    The point-inclusion problem is an important secure multi-party computation that it involves two parties, where one has a private point and the other has a private area, and they want to determine whether the point is inside the area without revealing their respective private information. All previously proposed point-inclusion protocols are only suitable for a specific area, such as circle, rectangle and convex polygon. In this paper, we present a novel privacy-preserving point-inclusion quantum protocol for an arbitrary area, which is surrounded by any plane geometric figure. Compared to the classical related protocols, our protocol has the advantages of the higher security and the lower communication complexity.

  18. Collective Contexts in Conversation: Grounding by Proxy

    ERIC Educational Resources Information Center

    Eshghi, Arash; Healey, Patrick G. T.

    2016-01-01

    Anecdotal evidence suggests that participants in conversation can sometimes act as a coalition. This implies a level of conversational organization in which groups of individuals form a coherent unit. This paper investigates the implications of this phenomenon for psycholinguistic and semantic models of shared context in dialog. We present a…

  19. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  20. Using medical history embedded in biometrics medical card for user identity authentication: privacy preserving authentication model by features matching.

    PubMed

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.

  1. Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Privacy Preserving Authentication Model by Features Matching

    PubMed Central

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration. PMID:22550398

  2. A smart-card-enabled privacy preserving E-prescription system.

    PubMed

    Yang, Yanjiang; Han, Xiaoxi; Bao, Feng; Deng, Robert H

    2004-03-01

    Within the overall context of protection of health care information, privacy of prescription data needs special treatment. First, the involvement of diverse parties, especially nonmedical parties in the process of drug prescription complicates the protection of prescription data. Second, both patients and doctors have privacy stakes in prescription, and their privacy should be equally protected. Third, the following facts determine that prescription should not be processed in a truly anonymous manner: certain involved parties conduct useful research on the basis of aggregation of prescription data that are linkable with respect to either the patients or the doctors; prescription data has to be identifiable in some extreme circumstances, e.g., under the court order for inspection and assign liability. In this paper, we propose an e-prescription system to address issues pertaining to the privacy protection in the process of drug prescription. In our system, patients' smart cards play an important role. For one thing, the smart cards are implemented to be portable repositories carrying up-to-date personal medical records and insurance information, providing doctors instant data access crucial to the process of diagnosis and prescription. For the other, with the secret signing key being stored inside, the smart card enables the patient to sign electronically the prescription pad, declaring his acceptance of the prescription. To make the system more realistic, we identify the needs for a patient to delegate his signing capability to other people so as to protect the privacy of information housed on his card. A strong proxy signature scheme achieving technologically mutual agreements on the delegation is proposed to implement the delegation functionality.

  3. Evaluating privacy-preserving record linkage using cryptographic long-term keys and multibit trees on large medical datasets.

    PubMed

    Brown, Adrian P; Borgs, Christian; Randall, Sean M; Schnell, Rainer

    2017-06-08

    Integrating medical data using databases from different sources by record linkage is a powerful technique increasingly used in medical research. Under many jurisdictions, unique personal identifiers needed for linking the records are unavailable. Since sensitive attributes, such as names, have to be used instead, privacy regulations usually demand encrypting these identifiers. The corresponding set of techniques for privacy-preserving record linkage (PPRL) has received widespread attention. One recent method is based on Bloom filters. Due to superior resilience against cryptographic attacks, composite Bloom filters (cryptographic long-term keys, CLKs) are considered best practice for privacy in PPRL. Real-world performance of these techniques using large-scale data is unknown up to now. Using a large subset of Australian hospital admission data, we tested the performance of an innovative PPRL technique (CLKs using multibit trees) against a gold-standard derived from clear-text probabilistic record linkage. Linkage time and linkage quality (recall, precision and F-measure) were evaluated. Clear text probabilistic linkage resulted in marginally higher precision and recall than CLKs. PPRL required more computing time but 5 million records could still be de-duplicated within one day. However, the PPRL approach required fine tuning of parameters. We argue that increased privacy of PPRL comes with the price of small losses in precision and recall and a large increase in computational burden and setup time. These costs seem to be acceptable in most applied settings, but they have to be considered in the decision to apply PPRL. Further research on the optimal automatic choice of parameters is needed.

  4. Scalable privacy-preserving data sharing methodology for genome-wide association studies.

    PubMed

    Yu, Fei; Fienberg, Stephen E; Slavković, Aleksandra B; Uhler, Caroline

    2014-08-01

    The protection of privacy of individual-level information in genome-wide association study (GWAS) databases has been a major concern of researchers following the publication of "an attack" on GWAS data by Homer et al. (2008). Traditional statistical methods for confidentiality and privacy protection of statistical databases do not scale well to deal with GWAS data, especially in terms of guarantees regarding protection from linkage to external information. The more recent concept of differential privacy, introduced by the cryptographic community, is an approach that provides a rigorous definition of privacy with meaningful privacy guarantees in the presence of arbitrary external information, although the guarantees may come at a serious price in terms of data utility. Building on such notions, Uhler et al. (2013) proposed new methods to release aggregate GWAS data without compromising an individual's privacy. We extend the methods developed in Uhler et al. (2013) for releasing differentially-private χ(2)-statistics by allowing for arbitrary number of cases and controls, and for releasing differentially-private allelic test statistics. We also provide a new interpretation by assuming the controls' data are known, which is a realistic assumption because some GWAS use publicly available data as controls. We assess the performance of the proposed methods through a risk-utility analysis on a real data set consisting of DNA samples collected by the Wellcome Trust Case Control Consortium and compare the methods with the differentially-private release mechanism proposed by Johnson and Shmatikov (2013).

  5. A novel, privacy-preserving cryptographic approach for sharing sequencing data

    PubMed Central

    Cassa, Christopher A; Miller, Rachel A; Mandl, Kenneth D

    2013-01-01

    Objective DNA samples are often processed and sequenced in facilities external to the point of collection. These samples are routinely labeled with patient identifiers or pseudonyms, allowing for potential linkage to identity and private clinical information if intercepted during transmission. We present a cryptographic scheme to securely transmit externally generated sequence data which does not require any patient identifiers, public key infrastructure, or the transmission of passwords. Materials and methods This novel encryption scheme cryptographically protects participant sequence data using a shared secret key that is derived from a unique subset of an individual’s genetic sequence. This scheme requires access to a subset of an individual’s genetic sequence to acquire full access to the transmitted sequence data, which helps to prevent sample mismatch. Results We validate that the proposed encryption scheme is robust to sequencing errors, population uniqueness, and sibling disambiguation, and provides sufficient cryptographic key space. Discussion Access to a set of an individual’s genotypes and a mutually agreed cryptographic seed is needed to unlock the full sequence, which provides additional sample authentication and authorization security. We present modest fixed and marginal costs to implement this transmission architecture. Conclusions It is possible for genomics researchers who sequence participant samples externally to protect the transmission of sequence data using unique features of an individual’s genetic sequence. PMID:23125421

  6. A novel, privacy-preserving cryptographic approach for sharing sequencing data.

    PubMed

    Cassa, Christopher A; Miller, Rachel A; Mandl, Kenneth D

    2013-01-01

    DNA samples are often processed and sequenced in facilities external to the point of collection. These samples are routinely labeled with patient identifiers or pseudonyms, allowing for potential linkage to identity and private clinical information if intercepted during transmission. We present a cryptographic scheme to securely transmit externally generated sequence data which does not require any patient identifiers, public key infrastructure, or the transmission of passwords. This novel encryption scheme cryptographically protects participant sequence data using a shared secret key that is derived from a unique subset of an individual's genetic sequence. This scheme requires access to a subset of an individual's genetic sequence to acquire full access to the transmitted sequence data, which helps to prevent sample mismatch. We validate that the proposed encryption scheme is robust to sequencing errors, population uniqueness, and sibling disambiguation, and provides sufficient cryptographic key space. Access to a set of an individual's genotypes and a mutually agreed cryptographic seed is needed to unlock the full sequence, which provides additional sample authentication and authorization security. We present modest fixed and marginal costs to implement this transmission architecture. It is possible for genomics researchers who sequence participant samples externally to protect the transmission of sequence data using unique features of an individual's genetic sequence.

  7. Efficient privacy-preserving string search and an application in genomics

    PubMed Central

    Shimizu, Kana; Nuida, Koji; Rätsch, Gunnar

    2016-01-01

    Motivation: Personal genomes carry inherent privacy risks and protecting privacy poses major social and technological challenges. We consider the case where a user searches for genetic information (e.g. an allele) on a server that stores a large genomic database and aims to receive allele-associated information. The user would like to keep the query and result private and the server the database. Approach: We propose a novel approach that combines efficient string data structures such as the Burrows–Wheeler transform with cryptographic techniques based on additive homomorphic encryption. We assume that the sequence data is searchable in efficient iterative query operations over a large indexed dictionary, for instance, from large genome collections and employing the (positional) Burrows–Wheeler transform. We use a technique called oblivious transfer that is based on additive homomorphic encryption to conceal the sequence query and the genomic region of interest in positional queries. Results: We designed and implemented an efficient algorithm for searching sequences of SNPs in large genome databases. During search, the user can only identify the longest match while the server does not learn which sequence of SNPs the user queried. In an experiment based on 2184 aligned haploid genomes from the 1000 Genomes Project, our algorithm was able to perform typical queries within ≈ 4.6 s and ≈ 10.8 s for client and server side, respectively, on laptop computers. The presented algorithm is at least one order of magnitude faster than an exhaustive baseline algorithm. Availability and implementation: https://github.com/iskana/PBWT-sec and https://github.com/ratschlab/PBWT-sec. Contacts: shimizu-kana@aist.go.jp or Gunnar.Ratsch@ratschlab.org Supplementary information: Supplementary data are available at Bioinformatics online. PMID:27153731

  8. Privacy preserving, real-time and location secured biometrics for mCommerce authentication

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Al-Assam, Hisham; Jassim, Sabah; Lami, Ihsan A.

    2011-06-01

    Secure wireless connectivity between mobile devices and financial/commercial establishments is mature, and so is the security of remote authentication for mCommerce. However, the current techniques are open for hacking, false misrepresentation, replay and other attacks. This is because of the lack of real-time and current-precise-location in the authentication process. This paper proposes a new technique that includes freshly-generated real-time personal biometric data of the client and present-position of the mobile device used by the client to perform the mCommerce so to form a real-time biometric representation to authenticate any remote transaction. A fresh GPS fix generates the "time and location" to stamp the biometric data freshly captured to produce a single, real-time biometric representation on the mobile device. A trusted Certification Authority (CA) acts as an independent authenticator of such client's claimed realtime location and his/her provided fresh biometric data. Thus eliminates the necessity of user enrolment with many mCommerce services and application providers. This CA can also "independently from the client" and "at that instant of time" collect the client's mobile device "time and location" from the cellular network operator so to compare with the received information, together with the client's stored biometric information. Finally, to preserve the client's location privacy and to eliminate the possibility of cross-application client tracking, this paper proposes shielding the real location of the mobile device used prior to submission to the CA or authenticators.

  9. Harms and benefits: collecting ethnicity data in a clinical context.

    PubMed

    Varcoe, Colleen; Browne, Annette J; Wong, Sabrina; Smye, Victoria L

    2009-05-01

    Although ethnicity data are collected in most countries at the population level, it has become more common to collect such data in healthcare settings, partially in response to growing health and social inequities worldwide. However, the implications of doing so have not been studied. This two-year study was designed to critically examine the implications of collecting ethnicity data in healthcare settings. Using a critical ethnographic approach, we interviewed 104 patients, community and healthcare leaders, and healthcare workers within diverse clinical contexts in a large city in Western Canada in 2006-2007. This paper presents an interpretive thematic analysis, using an ethical lens, of the harms and benefits associated with the process of data collection in a clinical context. While most leaders and healthcare workers and some patients envisioned potential benefits associated with having ethnicity data, these benefits were seen as largely contingent upon action being taken to ameliorate inequities. Overwhelmingly, however, leaders from ethno-cultural communities and patients of diverse identities anticipated potential harm arising both from having ethnicity data and the process of collection. The analysis illustrates that in today's sociopolitical context, collecting ethnicity data in clinical contexts may engender considerable harm, particularly for racialized, vulnerable patients. If ethnicity data are currently collected at the population level, evidence of benefit is required before proceeding to collect these data at the point of care.

  10. Privacy-preserving telecardiology sensor networks: toward a low-cost portable wireless hardware/software codesign.

    PubMed

    Hu, Fei; Jiang, Meng; Wagner, Mark; Dong, De-Cun

    2007-11-01

    Recently, a remote-sensing platform based on wireless interconnection of tiny ECG sensors called Telecardiology Sensor Networks (TSN) provided a promising approach to perform low-cost real-time cardiac patient monitoring at any time in community areas (such as elder nursing homes or hospitals). The contribution of this research is the design of a practical TSN hardware/software platform for a typical U.S. healthcare community scenario (such as large nursing homes with many elder patients) to perform real-time healthcare data collections. On the other hand, due to the radio broadcasting nature of MANET, a TSN has the risk of losing the privacy of patients' data. Medical privacy has been highly emphasized by U.S. Department of Health and Human Services. This research also designs a medical security scheme with low communication overhead to achieve confidential electrocardiogram data transmission in wireless medium.

  11. Privacy in Georeferenced Context-Aware Services: A Survey

    NASA Astrophysics Data System (ADS)

    Riboni, Daniele; Pareschi, Linda; Bettini, Claudio

    Location based services (LBS) are a specific instance of a broader class of Internet services that are predicted to become popular in a near future: context-aware services. The privacy concerns that LBS have raised are likely to become even more serious when several context data, other than location and time, are sent to service providers as part of an Internet request. This paper provides a classification and a brief survey of the privacy preservation techniques that have been proposed for this type of services. After identifying the benefits and shortcomings of each class of techniques, the paper proposes a combined approach to achieve a more comprehensive solution for privacy preservation in georeferenced context-aware services.

  12. Collective Decision Making in the Social Context of Science.

    ERIC Educational Resources Information Center

    Aikenhead, Glen S.

    1985-01-01

    Addresses the meaning of decision making on societal issues related to science/technology and explores practical implications for secondary science teaching. Cases on marijuana, abortion, and public inquiries are included together with discussion of collective decision making at the global, strategic, personal, and scientific community levels. A…

  13. Living and Dormant Collective Memories as Contexts of History Learning

    ERIC Educational Resources Information Center

    Goldberg, Tsafrir; Schwarz, Baruch B.; Porat, Dan

    2008-01-01

    This article investigates the effect of the vitality of historical issues in collective memory on students' history learning processes and products. Forty 12th grade students of different ethnic background participated in two historical problem-solving learning tasks. The historical issues were found to differ in their vitality in collective…

  14. Exemplary Mentors' Perspectives towards Mentoring across Mentoring Contexts: Lessons from Collective Case Studies

    ERIC Educational Resources Information Center

    Orland-Barak, Lily; Hasin, Ronit

    2010-01-01

    Framed as collective case studies, this study examined the perspectives that mentors, who are considered exemplary in the field, exhibit towards mentoring in different mentoring contexts in the Israeli school system from a variety of view points: The mentors themselves, their mentees, supervisors, school principals, and project leaders. Mentoring…

  15. Exemplary Mentors' Perspectives towards Mentoring across Mentoring Contexts: Lessons from Collective Case Studies

    ERIC Educational Resources Information Center

    Orland-Barak, Lily; Hasin, Ronit

    2010-01-01

    Framed as collective case studies, this study examined the perspectives that mentors, who are considered exemplary in the field, exhibit towards mentoring in different mentoring contexts in the Israeli school system from a variety of view points: The mentors themselves, their mentees, supervisors, school principals, and project leaders. Mentoring…

  16. Collective secondary cremation in a pit grave: a unique funerary context in Portuguese Chalcolithic burial practices.

    PubMed

    Silva, A M; Leandro, I; Pereira, D; Costa, C; Valera, A C

    2015-02-01

    Perdigões is a large site with a set of ditched enclosures located at Reguengos de Monsaraz, Alentejo, South Portugal. Recently at the central area of this site burnt human remains were found in a pit (#16). This structure had inside human remains, animal bones (namely pig, sheep or goat, cattle, dog, deer and rabbit), shards, ivory idols and arrowheads. All have been subjected to fire and later deposited in that pit, resulting in a secondary disposal of human bones. The recovered fragmented human bones (4845.18 g) correspond to a minimal number of 9 individuals: 6 adults and 3 sub-adults. The aim of this work is to document and interpret this funerary context based on the study of the recovered human remains. For that purpose, observations of all alterations due to fire, such as colour change and type of bone distortion, as well as anthropological data were collected. The data obtained suggest that these human remains were probably intentionally cremated, carefully collected and finally deposited in this pit. The cremation was conducted on probably complete corpses, some of them still fairly fresh and fleshed, as some bones presented thumbnail fractures. The collective cremation of the pit 16 represents an unprecedented funerary context for Portuguese, and Iberian Peninsula, Chalcolithic burial practices. Moreover, it is an example of the increasing diversity of mortuary practices of Chalcolithic human populations described in present Portuguese territory, as well as, in the Iberian Peninsula.

  17. Privacy-Preserving Location-Based Services

    ERIC Educational Resources Information Center

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  18. Privacy-Preserving Security for Vehicular Communications

    ERIC Educational Resources Information Center

    Weerasinghe, Hesiri Dhammika

    2011-01-01

    Because of the large number of deaths, severe injuries and huge financial loss due to auto accidents and poor traffic management, road safety and traffic management have become very important areas of interest among research community. As a result, Vehicular Ad-hoc Network (VANET) becomes a promising technology to improve road safety and quality…

  19. Privacy-Preserving Collaborative Sequential Pattern Mining

    DTIC Science & Technology

    2004-01-01

    In the modern business world, collaborative data mining becomes especially important because of the mutual benefit it brings to the collaborators...the collaboration? To use the existing data mining algorithms, all parties need to send their data to a trusted central place to conduct the mining

  20. Randomization Based Privacy Preserving Categorical Data Analysis

    ERIC Educational Resources Information Center

    Guo, Ling

    2010-01-01

    The success of data mining relies on the availability of high quality data. To ensure quality data mining, effective information sharing between organizations becomes a vital requirement in today's society. Since data mining often involves sensitive information of individuals, the public has expressed a deep concern about their privacy.…

  1. Privacy Preserving PCA on Distributed Bioinformatics Datasets

    ERIC Educational Resources Information Center

    Li, Xin

    2011-01-01

    In recent years, new bioinformatics technologies, such as gene expression microarray, genome-wide association study, proteomics, and metabolomics, have been widely used to simultaneously identify a huge number of human genomic/genetic biomarkers, generate a tremendously large amount of data, and dramatically increase the knowledge on human…

  2. Privacy-Preserving Security for Vehicular Communications

    ERIC Educational Resources Information Center

    Weerasinghe, Hesiri Dhammika

    2011-01-01

    Because of the large number of deaths, severe injuries and huge financial loss due to auto accidents and poor traffic management, road safety and traffic management have become very important areas of interest among research community. As a result, Vehicular Ad-hoc Network (VANET) becomes a promising technology to improve road safety and quality…

  3. Randomization Based Privacy Preserving Categorical Data Analysis

    ERIC Educational Resources Information Center

    Guo, Ling

    2010-01-01

    The success of data mining relies on the availability of high quality data. To ensure quality data mining, effective information sharing between organizations becomes a vital requirement in today's society. Since data mining often involves sensitive information of individuals, the public has expressed a deep concern about their privacy.…

  4. Towards Practical Privacy-Preserving Internet Services

    ERIC Educational Resources Information Center

    Wang, Shiyuan

    2012-01-01

    Today's Internet offers people a vast selection of data centric services, such as online query services, the cloud, and location-based services, etc. These internet services bring people a lot of convenience, but at the same time raise privacy concerns, e.g., sensitive information revealed by the queries, sensitive data being stored and…

  5. Privacy-Preserving Location-Based Services

    ERIC Educational Resources Information Center

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  6. Privacy Preserving PCA on Distributed Bioinformatics Datasets

    ERIC Educational Resources Information Center

    Li, Xin

    2011-01-01

    In recent years, new bioinformatics technologies, such as gene expression microarray, genome-wide association study, proteomics, and metabolomics, have been widely used to simultaneously identify a huge number of human genomic/genetic biomarkers, generate a tremendously large amount of data, and dramatically increase the knowledge on human…

  7. Towards Practical Privacy-Preserving Internet Services

    ERIC Educational Resources Information Center

    Wang, Shiyuan

    2012-01-01

    Today's Internet offers people a vast selection of data centric services, such as online query services, the cloud, and location-based services, etc. These internet services bring people a lot of convenience, but at the same time raise privacy concerns, e.g., sensitive information revealed by the queries, sensitive data being stored and…

  8. Collective Identity Development among Arab-Palestinian Students in Israel: Context, Content, and Process.

    ERIC Educational Resources Information Center

    Makkawi, Ibrahim

    A study explored the process of collective identity development and related social-psychological factors among the Arab-Palestinian students in Israeli universities. The purpose was not only to explore the content or structure of collective identity among this national minority, but more importantly, to understand collective identity as a…

  9. Perinatal data collection: current practice in the Australian nursing and midwifery healthcare context.

    PubMed

    Craswell, Alison; Moxham, Lorna; Broadbent, Marc

    2013-01-01

    The collection of perinatal data within Queensland, Australia, has traditionally been achieved via a paper form completed by midwives after each birth. Recently, with an increase in the use of e-health systems in healthcare, perinatal data collection has migrated to an online system. It is suggested that this move from paper to an ehealth platform has resulted in improvement to error rates, completion levels, timeliness of data transfer from healthcare institutions to the perinatal data collection and subsequent publication of data items. Worldwide, perinatal data are collected utilising a variety of methods, but essentially data are used for similar purposes: to monitor outcome patterns within obstetrics and midwifery. This paper discusses current practice in relation to perinatal data collection worldwide and within Australia, with a specific focus on Queensland, highlights relevant issues for midwives, and points to the need for further research into the efficient use of an e-health platform for perinatal data collection.

  10. Collective Capacity Building of Academic Leaders: A University Model of Leadership and Learning in Context

    ERIC Educational Resources Information Center

    Debowski, Shelda; Blake, Vivienne

    2007-01-01

    Academic leaders face particular challenges when they assume formal leadership roles in higher education. For the most part, they have had little prior engagement with the political, economic and strategic context of their institution and limited leadership networks on which to draw. The University of Western Australia has trialled a number of…

  11. Campus Educational Contexts and Civic Participation: Organizational Links to Collective Action

    ERIC Educational Resources Information Center

    Barnhardt, Cassie L.

    2015-01-01

    Proponents of civic engagement extol the virtues of the college experience for enhancing students' capacities for democratic participation, yet few studies have examined the organizational contexts of such actions. This article applies theory regarding social movements in organizations to highlight the relationship between campus curricular…

  12. Negative Affect during a Collective (but Not an Individual) Task Is Associated with Holistic Attention in East Asian Cultural Context.

    PubMed

    Tominaga, Hitoshi; Uchida, Yukiko; Miyamoto, Yuri; Yamasaki, Teruo

    2017-01-01

    Previous studies have suggested that individuals from East Asian cultures are more likely to show holistic attention-a pattern of attention that incorporates contextual information into focal stimuli-than individuals from North American cultures. Holistic attention is also prevalent in communities that require close cooperation. However, it is not yet known how cooperation is related to holistic attention. We theorized that holistic attention increases when people experience negative affect (e.g., worry, sadness, and frustration) during collective tasks (but not during individual tasks) because negative affect in social contexts signals the existence of potential threats to social harmony, thus indicating a need to restore social harmony. To examine this hypothesis, an experiment was conducted in which participants performed a musical duet either with another participant (a collective task requiring cooperation), or individually with a computer (an individual task). After the musical task, the Framed Line Task (FLT) was administered to examine their holistic attention. Participants also reported their emotional states both before and after the music task. Results suggested that negative affect in the collective task-but not the individual task-was positively correlated with a holistic pattern of attention. The function of negative affect in social contexts as motivation to restore relationships and how this enhances holistic attention is discussed. The moderating effect of social context on the link between negative affect and cognition is also discussed.

  13. Negative Affect during a Collective (but Not an Individual) Task Is Associated with Holistic Attention in East Asian Cultural Context

    PubMed Central

    Tominaga, Hitoshi; Uchida, Yukiko; Miyamoto, Yuri; Yamasaki, Teruo

    2017-01-01

    Previous studies have suggested that individuals from East Asian cultures are more likely to show holistic attention—a pattern of attention that incorporates contextual information into focal stimuli—than individuals from North American cultures. Holistic attention is also prevalent in communities that require close cooperation. However, it is not yet known how cooperation is related to holistic attention. We theorized that holistic attention increases when people experience negative affect (e.g., worry, sadness, and frustration) during collective tasks (but not during individual tasks) because negative affect in social contexts signals the existence of potential threats to social harmony, thus indicating a need to restore social harmony. To examine this hypothesis, an experiment was conducted in which participants performed a musical duet either with another participant (a collective task requiring cooperation), or individually with a computer (an individual task). After the musical task, the Framed Line Task (FLT) was administered to examine their holistic attention. Participants also reported their emotional states both before and after the music task. Results suggested that negative affect in the collective task—but not the individual task—was positively correlated with a holistic pattern of attention. The function of negative affect in social contexts as motivation to restore relationships and how this enhances holistic attention is discussed. The moderating effect of social context on the link between negative affect and cognition is also discussed. PMID:28824483

  14. Performance of the Landsat-Data Collection System in a Total System Context

    NASA Technical Reports Server (NTRS)

    Paulson, R. W. (Principal Investigator); Merk, C. F.

    1975-01-01

    The author has identified the following significant results. This experiment was, and continues to be, an integration of the LANDSAT-DCS with the data collection and processing system of the Geological Survey. Although an experimental demonstration, it was a successful integration of a satellite relay system that is capable of continental data collection, and an existing governmental nationwide operational data processing and distributing networks. The Survey's data processing system uses a large general purpose computer with insufficient redundancy for 24-hour a day, 7 day a week operation. This is significant, but soluble obstacle to converting the experimental integration of the system to an operational integration.

  15. Preparing Teachers for Diverse Contexts: A Collective Case Study of Critical Reflection

    ERIC Educational Resources Information Center

    Ramirez, Laurie A.

    2009-01-01

    This collective case study focused on 4 novice teachers' reflections on diversity in their classrooms and schools. The 4 participants were followed throughout their final year of an undergraduate, secondary teacher education program and into their 1st year of teaching in public secondary schools. This research was an effort to engage…

  16. Teachers' Collective Efficacy, Job Satisfaction, and Job Stress in Cross-Cultural Context

    ERIC Educational Resources Information Center

    Klassen, Robert M.; Usher, Ellen L.; Bong, Mimi

    2010-01-01

    This study examines how teachers' collective efficacy (TCE), job stress, and the cultural dimension of collectivism are associated with job satisfaction for 500 teachers from Canada, Korea (South Korea or Republic of Korea), and the United States. Multigroup path analysis revealed that TCE predicted job satisfaction across settings. Job stress was…

  17. Preparing Teachers for Diverse Contexts: A Collective Case Study of Critical Reflection

    ERIC Educational Resources Information Center

    Ramirez, Laurie A.

    2009-01-01

    This collective case study focused on 4 novice teachers' reflections on diversity in their classrooms and schools. The 4 participants were followed throughout their final year of an undergraduate, secondary teacher education program and into their 1st year of teaching in public secondary schools. This research was an effort to engage…

  18. Capturing the Friendship Context with a Collective Property: Friendship Group Engagement vs. Disaffection

    ERIC Educational Resources Information Center

    Furrer, Carrie J.

    2010-01-01

    The purpose of this study was to introduce a motivational property of the group, friendship group engagement vs. disaffection, and to examine different composition models for combining individual reports into an indicator of a group-level property. Data were collected from 312 ninth grade students and their teachers. Self-reported friendship group…

  19. Teachers' Collective Efficacy, Job Satisfaction, and Job Stress in Cross-Cultural Context

    ERIC Educational Resources Information Center

    Klassen, Robert M.; Usher, Ellen L.; Bong, Mimi

    2010-01-01

    This study examines how teachers' collective efficacy (TCE), job stress, and the cultural dimension of collectivism are associated with job satisfaction for 500 teachers from Canada, Korea (South Korea or Republic of Korea), and the United States. Multigroup path analysis revealed that TCE predicted job satisfaction across settings. Job stress was…

  20. Capturing the friendship context with a collective property: friendship group engagement vs. disaffection.

    PubMed

    Furrer, Carrie J

    2010-12-01

    The purpose of this study was to introduce a motivational property of the group, friendship group engagement vs. disaffection, and to examine different composition models for combining individual reports into an indicator of a group-level property. Data were collected from 312 ninth grade students and their teachers. Self-reported friendship group (FG) engagement and disaffection were related to self-reported classroom engagement, aggression, and peer problem behavior, but not to teacher-reported classroom engagement. Group-reported FG engagement and disaffection were related to self-reported FG engagement and disaffection, classroom engagement, aggression, and peer problem behavior, but these relationships were moderated by within-group agreement on the group property. Findings underscore the importance of a priori conceptualization of group-level properties that are theoretically linked to adolescent adjustment, and the need to consider composition models when aggregating individual reports to create profiles of the group. Implications for future work on capturing properties of friendship groups are discussed. Copyright © 2010 The Association for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  1. Individual and collective problem-solving in a foraging context in the leaf-cutting ant Atta colombica.

    PubMed

    Dussutour, Audrey; Deneubourg, Jean-Louis; Beshers, Samuel; Fourcassié, Vincent

    2009-01-01

    In this paper we investigate the flexibility of foraging behavior in the leaf-cutting ant Atta colombica, both at the individual and collective levels, following a change in the physical properties of their environment. We studied in laboratory conditions the changes occurring in foraging behavior when a height constraint was placed 1 cm above part of the trail linking the nest to the foraging area. We found that the size and shape of the fragments of foraging material brought back to the nest were significantly modified when the constraint was placed on the trail: independent of their size, forager ants cut smaller and rounder fragments in the presence of a height constraint than in its absence. This size adjustment does not require any direct sensory feedback because it occurred when the ants cut fragments in the foraging area; no further cutting was done when they encountered the constraint. This points to the existence of a template that ants store and use as a reference to adjust their reach while cutting. Remarkably, despite the decrease in the foraging material brought to the nest per capita the colony was still able to improve its foraging performance by doubling the number of transporters. This study illustrates the flexibility of foraging behavior exhibited by an ant colony. It provides a rare example of insects finding an intelligent solution to a problem occurring in a foraging context, at both the individual and collective levels.

  2. Literacies and the Workplace: A Collection of Original Essays. EAE646 Language and Literacies: Contexts and Challenges in the Workplace.

    ERIC Educational Resources Information Center

    Deakin Univ., Victoria (Australia).

    This book is part of the study materials for the distance education course, Language and Literacies: Contexts and Challenges in the Workplace, in the Open Campus Program at Deakin University. It contains five essays about literacies in the workplace. The "Introduction" (Mike Brown) discusses the following topics: literacies in the…

  3. A Randomized Response Model For Privacy Preserving Smart Metering

    PubMed Central

    Cui, Lijuan; Que, Jialan; Choi, Dae-Hyun; Jiang, Xiaoqian; Cheng, Samuel; Xie, Le

    2012-01-01

    The adoption of smart meters may bring new privacy concerns to the general public. Given the fact that metering data of individual homes/factories is accumulated every 15 minutes, it is possible to infer the pattern of electricity consumption of individual users. In order to protect the privacy of users in a completely de-centralized setting (i.e., individuals do not communicate with one another), we propose a novel protocol, which allows individual meters to report the true electricity consumption reading with a pre-determinted probability. Load serving entities (LSE) can reconstruct the total electricity consumption of a region or a district through inference algorithm, but their ability of identifying individual users’ energy consumption pattern is significantly reduced. Using simulated data, we verify the feasibility of the proposed method and demonstrate performance advantages over existing approaches. PMID:23243488

  4. Characterizing and Implementing Efficient Primitives for Privacy-Preserving Computation

    DTIC Science & Technology

    2015-07-01

    when compared to their desktop counterparts. When taken as a whole, our work has moved the reality of SFE on mobile devices from barely possible to...PUBLIC RELEASE; DISTRIBUTION UNLIMITED 2 This work represents nearly four years of concerted effort to make this goal a reality . As we began this work...proving demonstrably more correct results than related work, does so orders of magnitude faster. When taken as a whole, our work has moved the reality of

  5. Privacy-Preserving Relationship Path Discovery in Social Networks

    NASA Astrophysics Data System (ADS)

    Mezzour, Ghita; Perrig, Adrian; Gligor, Virgil; Papadimitratos, Panos

    As social networks sites continue to proliferate and are being used for an increasing variety of purposes, the privacy risks raised by the full access of social networking sites over user data become uncomfortable. A decentralized social network would help alleviate this problem, but offering the functionalities of social networking sites is a distributed manner is a challenging problem. In this paper, we provide techniques to instantiate one of the core functionalities of social networks: discovery of paths between individuals. Our algorithm preserves the privacy of relationship information, and can operate offline during the path discovery phase. We simulate our algorithm on real social network topologies.

  6. Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection.

    PubMed

    Son, Junggab; Park, Juyoung; Oh, Heekuck; Bhuiyan, Md Zakirul Alam; Hur, Junbeom; Kang, Kyungtae

    2017-06-12

    Long-term electrocardiogram (ECG) monitoring, as a representative application of cyber-physical systems, facilitates the early detection of arrhythmia. A considerable number of previous studies has explored monitoring techniques and the automated analysis of sensing data. However, ensuring patient privacy or confidentiality has not been a primary concern in ECG monitoring. First, we propose an intelligent heart monitoring system, which involves a patient-worn ECG sensor (e.g., a smartphone) and a remote monitoring station, as well as a decision support server that interconnects these components. The decision support server analyzes the heart activity, using the Pan-Tompkins algorithm to detect heartbeats and a decision tree to classify them. Our system protects sensing data and user privacy, which is an essential attribute of dependability, by adopting signal scrambling and anonymous identity schemes. We also employ a public key cryptosystem to enable secure communication between the entities. Simulations using data from the MIT-BIH arrhythmia database demonstrate that our system achieves a 95.74% success rate in heartbeat detection and almost a 96.63% accuracy in heartbeat classification, while successfully preserving privacy and securing communications among the involved entities.

  7. Performance-Oriented Privacy-Preserving Data Integration

    SciTech Connect

    Pon, R K; Critchlow, T

    2004-09-15

    Current solutions to integrating private data with public data have provided useful privacy metrics, such as relative information gain, that can be used to evaluate alternative approaches. Unfortunately, they have not addressed critical performance issues, especially when the public database is very large. The use of hashes and noise yields better performance than existing techniques while still making it difficult for unauthorized entities to distinguish which data items truly exist in the private database. As we show here, leveraging the uncertainty introduced by collisions caused by hashing and the injection of noise, we present a technique for performing a relational join operation between a massive public table and a relatively smaller private one.

  8. Data privacy preservation in telemedicine: the PAIRSE project.

    PubMed

    Nageba, Ebrahim; Defude, Bruno; Morvan, Franck; Ghedira, Chirine; Fayn, Jocelyne

    2011-01-01

    The preservation of medical data privacy and confidentiality is a major challenge in eHealth systems and applications. A technological solution based on advanced information and communication systems architectures is needed in order to retrieve and exchange the patient's data in a secure and reliable manner. In this paper, we introduce the project PAIRSE, Preserving Privacy in Peer to Peer (P2P) environments, which proposes an original web service oriented framework preserving the privacy and confidentiality of shared or exchanged medical data.

  9. The Theory and Application of Privacy-preserving Computation

    DTIC Science & Technology

    2015-03-26

    fully homomorphic cipher could compute any function. Rivest et al. left the construction of such a cipher as an open problem in cryptography , which...difficult process. One technique that has been used in many areas of cryptography , and in particular, in multiparty computation, is the universally...O. Goldreich, The Foundations of Cryptography - Volume 2, Basic Applications. Cambridge University Press, 2004. [41] Z. Brakerski, C. Gentry, and V

  10. Privacy-Preserving Content-Based Publish/Subscribe Networks

    NASA Astrophysics Data System (ADS)

    Shikfa, Abdullatif; Önen, Melek; Molva, Refik

    Privacy and confidentiality are crucial issues in content-based publish/subscribe (CBPS) networks. We tackle the problem of end-user privacy in CBPS. This problem raises a challenging requirement for handling encrypted data for the purpose of routing based on protected content and encrypted subscription information. We suggest a solution based on a commutative multiple encryption scheme in order to allow brokers to operate in-network matching and content based routing without having access to the content of the packets. This is the first solution that avoids key sharing among end-users and targets an enhanced CBPS model where brokers can also be subscribers at the same time.

  11. Security and Privacy Preservation in Human-Involved Networks

    NASA Astrophysics Data System (ADS)

    Asher, Craig; Aumasson, Jean-Philippe; Phan, Raphael C.-W.

    This paper discusses security within human-involved networks, with a focus on social networking services (SNS). We argue that more secure networks could be designed using semi-formal security models inspired from cryptography, as well as notions like that of ceremony, which exploits human-specific abilities and psychology to assist creating more secure protocols. We illustrate some of our ideas with the example of the SNS Facebook.

  12. Facilitating Trust in Privacy-Preserving E-Learning Environments

    ERIC Educational Resources Information Center

    Anwar, M.; Greer, J.

    2012-01-01

    This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants,…

  13. Facilitating Trust in Privacy-Preserving E-Learning Environments

    ERIC Educational Resources Information Center

    Anwar, M.; Greer, J.

    2012-01-01

    This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants,…

  14. A privacy-preserving parallel and homomorphic encryption scheme

    NASA Astrophysics Data System (ADS)

    Min, Zhaoe; Yang, Geng; Shi, Jingqi

    2017-04-01

    In order to protect data privacy whilst allowing efficient access to data in multi-nodes cloud environments, a parallel homomorphic encryption (PHE) scheme is proposed based on the additive homomorphism of the Paillier encryption algorithm. In this paper we propose a PHE algorithm, in which plaintext is divided into several blocks and blocks are encrypted with a parallel mode. Experiment results demonstrate that the encryption algorithm can reach a speed-up ratio at about 7.1 in the MapReduce environment with 16 cores and 4 nodes.

  15. Privacy preserving processing of genomic data: A survey.

    PubMed

    Akgün, Mete; Bayrak, A Osman; Ozer, Bugra; Sağıroğlu, M Şamil

    2015-08-01

    Recently, the rapid advance in genome sequencing technology has led to production of huge amount of sensitive genomic data. However, a serious privacy challenge is confronted with increasing number of genetic tests as genomic data is the ultimate source of identity for humans. Lately, privacy threats and possible solutions regarding the undesired access to genomic data are discussed, however it is challenging to apply proposed solutions to real life problems due to the complex nature of security definitions. In this review, we have categorized pre-existing problems and corresponding solutions in more understandable and convenient way. Additionally, we have also included open privacy problems coming with each genomic data processing procedure. We believe our classification of genome associated privacy problems will pave the way for linking of real-life problems with previously proposed methods. Copyright © 2015 Elsevier Inc. All rights reserved.

  16. A Randomized Response Model For Privacy Preserving Smart Metering.

    PubMed

    Wang, Shuang; Cui, Lijuan; Que, Jialan; Choi, Dae-Hyun; Jiang, Xiaoqian; Cheng, Samuel; Xie, Le

    2012-09-01

    The adoption of smart meters may bring new privacy concerns to the general public. Given the fact that metering data of individual homes/factories is accumulated every 15 minutes, it is possible to infer the pattern of electricity consumption of individual users. In order to protect the privacy of users in a completely de-centralized setting (i.e., individuals do not communicate with one another), we propose a novel protocol, which allows individual meters to report the true electricity consumption reading with a pre-determinted probability. Load serving entities (LSE) can reconstruct the total electricity consumption of a region or a district through inference algorithm, but their ability of identifying individual users' energy consumption pattern is significantly reduced. Using simulated data, we verify the feasibility of the proposed method and demonstrate performance advantages over existing approaches.

  17. Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection †

    PubMed Central

    Son, Junggab; Park, Juyoung; Oh, Heekuck; Bhuiyan, Md Zakirul Alam; Hur, Junbeom; Kang, Kyungtae

    2017-01-01

    Long-term electrocardiogram (ECG) monitoring, as a representative application of cyber-physical systems, facilitates the early detection of arrhythmia. A considerable number of previous studies has explored monitoring techniques and the automated analysis of sensing data. However, ensuring patient privacy or confidentiality has not been a primary concern in ECG monitoring. First, we propose an intelligent heart monitoring system, which involves a patient-worn ECG sensor (e.g., a smartphone) and a remote monitoring station, as well as a decision support server that interconnects these components. The decision support server analyzes the heart activity, using the Pan–Tompkins algorithm to detect heartbeats and a decision tree to classify them. Our system protects sensing data and user privacy, which is an essential attribute of dependability, by adopting signal scrambling and anonymous identity schemes. We also employ a public key cryptosystem to enable secure communication between the entities. Simulations using data from the MIT-BIH arrhythmia database demonstrate that our system achieves a 95.74% success rate in heartbeat detection and almost a 96.63% accuracy in heartbeat classification, while successfully preserving privacy and securing communications among the involved entities. PMID:28604628

  18. How risk perception shapes collective action intentions in repressive contexts: A study of Egyptian activists during the 2013 post-coup uprising.

    PubMed

    Ayanian, Arin H; Tausch, Nicole

    2016-12-01

    Social psychological research has overlooked collective action in repressive contexts, where activists face substantial personal risks. This paper examines the social psychological processes motivating activists to engage in collective action in risky contexts. We investigate the idea that perceived risks due to government sanctions can galvanize action through fuelling anger, shaping efficacy beliefs, and increasing identification with the movement. We also argue that anger, efficacy, and identification motivate action intentions directly and indirectly through reducing the personal importance activists attach to these risks. We tested our hypotheses within a sample of Egyptian activists (N = 146) from two protest movements who protested against Morsi's government and the military interventions, respectively, during the 2013 anticoup uprising. In line with our hypotheses, the perceived likelihood of risks was positively associated with anger and identity consolidation efficacy and positively predicted action intentions indirectly through these variables. Risk was also associated with increased political efficacy, but only among antimilitary protesters. Anger and political efficacy predicted action intentions directly and indirectly through reduced risk importance. Results also highlighted differential significance of emotional and instrumental motives for the two protest movements. We discuss directions for future research on the motivators of collective action in repressive contexts.

  19. Collective self and individual choice: the effects of inter-group comparative context on environmental values and behaviour.

    PubMed

    Rabinovich, Anna; Morton, Thomas A; Postmes, Tom; Verplanken, Bas

    2012-12-01

    Self-categorization theory suggests that inter-group comparisons inform individual behaviour by affecting perceived in-group stereotypes that are internalized by group members. The present paper provides evidence for this chain of effects in the domain of environmental behaviour. In two studies, inter-group comparative context was manipulated. Study 1 found that the perceived in-group stereotype, self-stereotype (as represented by the reported value centrality), and behavioural intentions shifted away from a comparison out-group (irrespective of whether this was an upward or downward comparison). Study 1 also revealed that the effect of comparative context on individual environmental intentions was mediated by the perceived in-group stereotype and by changes in personal values. Study 2 extrapolated the observed effect on actual behavioural choices. The findings demonstrate the utility of a self-categorization approach to individual behaviour change. ©2011 The British Psychological Society.

  20. The context of collecting family health history: examining definitions of family and family communication about health among African American women.

    PubMed

    Thompson, Tess; Seo, Joann; Griffith, Julia; Baxter, Melanie; James, Aimee; Kaphingst, Kimberly A

    2015-04-01

    Public health initiatives encourage the public to discuss and record family health history information, which can inform prevention and screening for a variety of conditions. Most research on family health history discussion and collection, however, has predominantly involved White participants and has not considered lay definitions of family or family communication patterns about health. This qualitative study of 32 African American women-16 with a history of cancer-analyzed participants' definitions of family, family communication about health, and collection of family health history information. Family was defined by biological relatedness, social ties, interactions, and proximity. Several participants noted using different definitions of family for different purposes (e.g., biomedical vs. social). Health discussions took place between and within generations and were influenced by structural relationships (e.g., sister) and characteristics of family members (e.g., trustworthiness). Participants described managing tensions between sharing health information and protecting privacy, especially related to generational differences in sharing information, fear of familial conflict or gossip, and denial (sometimes described as refusal to "own" or "claim" a disease). Few participants reported that anyone in their family kept formal family health history records. Results suggest family health history initiatives should address family tensions and communication patterns that affect discussion and collection of family health history information.

  1. The Context of Collecting Family Health History: Examining Definitions of Family and Family Communication About Health Among African American Women

    PubMed Central

    THOMPSON, TESS; SEO, JOANN; GRIFFITH, JULIA; BAXTER, MELANIE; JAMES, AIMEE; KAPHINGST, KIMBERLY A.

    2015-01-01

    Public health initiatives encourage the public to discuss and record family health history (FHH) information, which can inform prevention and screening for a variety of conditions. Most research on FHH discussion and collection, however, has involved predominantly White participants and has not considered lay definitions of family or family communication patterns about health. This qualitative study of 32 African American women, 16 with a history of cancer, analyzed participants’ definitions of family, family communication about health, and collection of FHH information. “Family” was defined by biological relatedness, social ties, interactions, and proximity. Several participants noted using different definitions of family for different purposes (e.g. biomedical vs. social). Health discussions took place between and within generations and were influenced by structural relationships (e.g. sister) and characteristics of family members (e.g. trustworthiness). Participants described managing tensions between sharing health information and protecting privacy, especially related to generational differences in sharing information, fear of familial conflict or gossip, and denial (sometimes described as refusal to “own” or “claim” a disease). Few participants reported that anyone in their family kept formal FHH records. Results suggest FHH initiatives should address family tensions and communication patterns that affect discussion and collection of FHH information. PMID:25730634

  2. Caliper Context Annotation Library

    SciTech Connect

    2015-09-30

    To understand the performance of parallel programs, developers need to be able to relate performance measurement data with context information, such as the call path / line numbers or iteration numbers where measurements were taken. Caliper provides a generic way to specify and collect multi-dimensional context information across the software stack, and provide ti to third-party measurement tools or write it into a file or database in the form of context streams.

  3. The history of botany in Moscow and Russia in the 18th and early 19th centuries in the context of the Linnaean Collection at Moscow University (MW).

    PubMed

    Sokoloff, Dmitry D; Balandin, Sergey A; Gubanov, Ivan A; Jarvis, Charles E; Majorov, Sergey R; Simonov, Sergey S

    2002-01-01

    The Herbarium of Moscow State University, Russia, possesses a relatively small (63 specimens), but historically interesting, collection of herbarium specimens linked with Carl Linnaeus (1707-1778). Some of these originally formed part of Linnaeus' own herbarium while others, although never his property, were nevertheless studied by him and may be original material for the typification of his plant names. This paper discusses the broad historical background to the gathering of these specimens, their study by Linnaeus and their subsequent fate. Specimens linked with Linnaeus have been encountered in each of the four largest historical collections of the Herbarium of Moscow State University, i. e., in the herbaria of J. F. Ehrhart, G. F. Hoffmann, C. B. von Trinius and C. L. Goldbach. Ehrhart's General Herbarium contains 31 sheets, which were more or less certainly collected or studied by Linnaeus. Ehrhart, a pupil of Linnaeus, received some specimens directly from the latter, while others came to him from Linnaeus filius, A. Dahl, and P. J. Bergius. Ehrhart's collections were purchased by G. F. Hoffmann, later, the first head of the Department of Botany at Moscow University, who took them to Russia. Hoffmann's General Herbarium contains three specimens that may be connected with Linnaeus. They were received from C. P. Thunberg, J. A. Murray, and an unknown person, respectively. At least five specimens from Trinius' collection, although certainly never seen by Linnaeus, are probable duplicates of material that was studied by him. Some of them are almost certainly iso-lectotypes of Linnaean names. Finally, 24 specimens linked with Linnaeus were found in Goldbach's herbarium. The majority of them were collected in the Lower Volga Region by J. Lerche and during the Second Kamchatka Expedition (Great Northern Expedition) by J. G. Gmelin and G. W. Steller.

  4. Individual Participation in Collective Action in the Context of a Caribbean Island State: Testing the Effects of Multiple Dimensions of Social Capital

    ERIC Educational Resources Information Center

    Jicha, Karl A.; Thompson, Gretchen H.; Fulkerson, Gregory M.; May, Jonathan E.

    2011-01-01

    This article presents the findings of a case study examining the relationship between social capital and individual participation in collective action on a Caribbean island recovering from devastation inflicted by Hurricanes Ivan and Emily. Using data drawn from 114 residential surveys on the island of Carriacou, Grenada, over the summer of 2006,…

  5. Individual Participation in Collective Action in the Context of a Caribbean Island State: Testing the Effects of Multiple Dimensions of Social Capital

    ERIC Educational Resources Information Center

    Jicha, Karl A.; Thompson, Gretchen H.; Fulkerson, Gregory M.; May, Jonathan E.

    2011-01-01

    This article presents the findings of a case study examining the relationship between social capital and individual participation in collective action on a Caribbean island recovering from devastation inflicted by Hurricanes Ivan and Emily. Using data drawn from 114 residential surveys on the island of Carriacou, Grenada, over the summer of 2006,…

  6. Collective inquiry in the context of school-wide reform: Exploring science curriculum and instruction through team-based professional development

    NASA Astrophysics Data System (ADS)

    Eddy Spicer, David Henning

    Teacher collaboration and joint reflective inquiry have been viewed as central elements of progressive educational reform for more than two decades. More recently, researchers, policy-makers, and practitioners have heralded "blended" or "hybrid" approaches that combine online and on-site environments for collaborative learning as especially promising for "scaling up" instructional improvement. Yet, relatively little is known about how teachers working together navigate organizational and interpersonal constraints to develop and sustain conditions essential to collective inquiry. This in-depth study of meaning making about curriculum and instruction among a group of 11 physics teachers in a public, urban secondary school in the U.S. is an effort to explore collective inquiry as a resource for teacher learning and innovations in teaching practice. Through extended observations, multiple interviews, and close analyses of interaction, the study followed teachers for 7 months as they worked together across 3 settings organized in fundamentally different ways to promote joint inquiry into teaching practice. The explanatory framework of the study rests on the mutually-reinforcing conceptual underpinnings of sociocultural theory and systemic functional linguistics to establish connections between micro-social interactions and macro-social processes. Drawing on systemic functional linguistics, the study explores interpersonal meaning making through close analyses of speech function and speech role in 6 extended sequences of generative interaction. Concepts from activity theory elucidate those features of settings and school that directly impinged on or advanced teachers' collaborative work. Findings run counter to prevailing congenial views of teacher collegiality by identifying ways in which collective inquiry is inherently unstable. That instability makes itself apparent at two levels: (a) the dynamics of authority within the group, and (b) middle-level features of

  7. Collective Enumeration

    PubMed Central

    Bahrami, Bahador; Didino, Daniele; Frith, Chris; Butterworth, Brian; Rees, Geraint

    2012-01-01

    Many joint decisions in everyday life (e.g., Which bar is less crowded?) depend on approximate enumeration, but very little is known about the psychological characteristics of counting together. Here we systematically investigated collective approximate enumeration. Pairs of participants made individual and collective enumeration judgments in a 2-alternative forced-choice task and when in disagreement, they negotiated joint decisions via verbal communication and received feedback about accuracy at the end of each trial. The results showed that two people could collectively count better than either one alone, but not as well as expected by previous models of collective sensory decision making in more basic perceptual domains (e.g., luminance contrast). Moreover, such collective enumeration benefited from prior, noninteractive practice showing that social learning of how to combine shared information about enumeration required substantial individual experience. Finally, the collective context had a positive but transient impact on an individual's enumeration sensitivity. This transient social influence may be explained as a motivational factor arising from the fact that members of a collective must take responsibility for their individual decisions and face the consequences of their judgments. PMID:22889187

  8. Collective enumeration.

    PubMed

    Bahrami, Bahador; Didino, Daniele; Frith, Chris; Butterworth, Brian; Rees, Geraint

    2013-04-01

    Many joint decisions in everyday life (e.g., Which bar is less crowded?) depend on approximate enumeration, but very little is known about the psychological characteristics of counting together. Here we systematically investigated collective approximate enumeration. Pairs of participants made individual and collective enumeration judgments in a 2-alternative forced-choice task and when in disagreement, they negotiated joint decisions via verbal communication and received feedback about accuracy at the end of each trial. The results showed that two people could collectively count better than either one alone, but not as well as expected by previous models of collective sensory decision making in more basic perceptual domains (e.g., luminance contrast). Moreover, such collective enumeration benefited from prior, noninteractive practice showing that social learning of how to combine shared information about enumeration required substantial individual experience. Finally, the collective context had a positive but transient impact on an individual's enumeration sensitivity. This transient social influence may be explained as a motivational factor arising from the fact that members of a collective must take responsibility for their individual decisions and face the consequences of their judgments.

  9. Privacy Preserving Service Discovery for Interoperability in Power to the Edge Approach

    DTIC Science & Technology

    2011-06-01

    IEICE Technical Report vol. 109, No. 271, pp. 69-74 (2009) [4] S . Tsujii, H. Yamaguchi, A. Kitazawa , K. Kurosawa: “A method for voting protocols with...Discovery for Interoperability in Power to the Edge Approach 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR( S ) 5d. PROJECT...NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) Chuo University,Research and Development Initiative

  10. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  11. Anatomisation with slicing: a new privacy preservation approach for multiple sensitive attributes.

    PubMed

    Susan, V Shyamala; Christopher, T

    2016-01-01

    An enormous quantity of personal health information is available in recent decades and tampering of any part of this information imposes a great risk to the health care field. Existing anonymization methods are only apt for single sensitive and low dimensional data to keep up with privacy specifically like generalization and bucketization. In this paper, an anonymization technique is proposed that is a combination of the benefits of anatomization, and enhanced slicing approach adhering to the principle of k-anonymity and l-diversity for the purpose of dealing with high dimensional data along with multiple sensitive data. The anatomization approach dissociates the correlation observed between the quasi identifier attributes and sensitive attributes (SA) and yields two separate tables with non-overlapping attributes. In the enhanced slicing algorithm, vertical partitioning does the grouping of the correlated SA in ST together and thereby minimizes the dimensionality by employing the advanced clustering algorithm. In order to get the optimal size of buckets, tuple partitioning is conducted by MFA. The experimental outcomes indicate that the proposed method can preserve privacy of data with numerous SA. The anatomization approach minimizes the loss of information and slicing algorithm helps in the preservation of correlation and utility which in turn results in reducing the data dimensionality and information loss. The advanced clustering algorithms prove its efficiency by minimizing the time and complexity. Furthermore, this work sticks to the principle of k-anonymity, l-diversity and thus avoids privacy threats like membership, identity and attributes disclosure.

  12. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    PubMed

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-09-03

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  13. Quantifying the costs and benefits of privacy-preserving health data publishing.

    PubMed

    Khokhar, Rashid Hussain; Chen, Rui; Fung, Benjamin C M; Lui, Siu Man

    2014-08-01

    Cost-benefit analysis is a prerequisite for making good business decisions. In the business environment, companies intend to make profit from maximizing information utility of published data while having an obligation to protect individual privacy. In this paper, we quantify the trade-off between privacy and data utility in health data publishing in terms of monetary value. We propose an analytical cost model that can help health information custodians (HICs) make better decisions about sharing person-specific health data with other parties. We examine relevant cost factors associated with the value of anonymized data and the possible damage cost due to potential privacy breaches. Our model guides an HIC to find the optimal value of publishing health data and could be utilized for both perturbative and non-perturbative anonymization techniques. We show that our approach can identify the optimal value for different privacy models, including K-anonymity, LKC-privacy, and ∊-differential privacy, under various anonymization algorithms and privacy parameters through extensive experiments on real-life data.

  14. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks

    PubMed Central

    Wang, Changji; Yuan, Yuan; Wu, Jiayuan

    2017-01-01

    Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication. PMID:28632171

  15. Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption

    PubMed Central

    2015-01-01

    Objective Developed sequencing techniques are yielding large-scale genomic data at low cost. A genome-wide association study (GWAS) targeting genetic variations that are significantly associated with a particular disease offers great potential for medical improvement. However, subjects who volunteer their genomic data expose themselves to the risk of privacy invasion; these privacy concerns prevent efficient genomic data sharing. Our goal is to presents a cryptographic solution to this problem. Methods To maintain the privacy of subjects, we propose encryption of all genotype and phenotype data. To allow the cloud to perform meaningful computation in relation to the encrypted data, we use a fully homomorphic encryption scheme. Noting that we can evaluate typical statistics for GWAS from a frequency table, our solution evaluates frequency tables with encrypted genomic and clinical data as input. We propose to use a packing technique for efficient evaluation of these frequency tables. Results Our solution supports evaluation of the D′ measure of linkage disequilibrium, the Hardy-Weinberg Equilibrium, the χ2 test, etc. In this paper, we take χ2 test and linkage disequilibrium as examples and demonstrate how we can conduct these algorithms securely and efficiently in an outsourcing setting. We demonstrate with experimentation that secure outsourcing computation of one χ2 test with 10, 000 subjects requires about 35 ms and evaluation of one linkage disequilibrium with 10, 000 subjects requires about 80 ms. Conclusions With appropriate encoding and packing technique, cryptographic solutions based on fully homomorphic encryption for secure computations of GWAS can be practical. PMID:26732892

  16. A Privacy-Preserving ID-Based Group Key Agreement Scheme Applied in VPAN

    NASA Astrophysics Data System (ADS)

    de Mulder, Yoni; Wouters, Karel; Preneel, Bart

    In 2008, Wan et al. presented an anonymous ID-based group key agreement scheme for wireless networks, for which they claim that it ensures anonymity and unlinkability of the group members, as well as forward and backward secrecy of the group session key. In this paper, we show that forward and backward secrecy do not hold for the protocol. We propose a correction that introduces a shielding factor that protects each member's input to the group key. we also introduce a new feature that assures the correctness of the key as computed by all group members. This results in an increased computation cost, due to extra public key operations, and a similar communication cost. We also show in which practical setting the protocol can be deployed.

  17. kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity

    NASA Astrophysics Data System (ADS)

    Kisilevich, Slava; Elovici, Yuval; Shapira, Bracha; Rokach, Lior

    k-anonymity is the method used for masking sensitive data which successfully solves the problem of re-linking of data with an external source and makes it difficult to re-identify the individual. Thus k-anonymity works on a set of quasi-identifiers (public sensitive attributes), whose possible availability and linking is anticipated from external dataset, and demands that the released dataset will contain at least k records for every possible quasi-identifier value. Another aspect of k is its capability of maintaining the truthfulness of the released data (unlike other existing methods). This is achieved by generalization, a primary technique in k-anonymity. Generalization consists of generalizing attribute values and substituting them with semantically consistent but less precise values. When the substituted value doesn’t preserve semantic validity the technique is called suppression which is a private case of generalization. We present a hybrid approach called compensation which is based on suppression and swapping for achieving privacy. Since swapping decreases the truthfulness of attribute values there is a tradeoff between level of swapping (information truthfulness) and suppression (information loss) incorporated in our algorithm.

  18. A Privacy-Preserved Analytical Method for eHealth Database with Minimized Information Loss

    PubMed Central

    Chen, Ya-Ling; Cheng, Bo-Chao; Chen, Hsueh-Lin; Lin, Chia-I; Liao, Guo-Tan; Hou, Bo-Yu; Hsu, Shih-Chun

    2012-01-01

    Digitizing medical information is an emerging trend that employs information and communication technology (ICT) to manage health records, diagnostic reports, and other medical data more effectively, in order to improve the overall quality of medical services. However, medical information is highly confidential and involves private information, even legitimate access to data raises privacy concerns. Medical records provide health information on an as-needed basis for diagnosis and treatment, and the information is also important for medical research and other health management applications. Traditional privacy risk management systems have focused on reducing reidentification risk, and they do not consider information loss. In addition, such systems cannot identify and isolate data that carries high risk of privacy violations. This paper proposes the Hiatus Tailor (HT) system, which ensures low re-identification risk for medical records, while providing more authenticated information to database users and identifying high-risk data in the database for better system management. The experimental results demonstrate that the HT system achieves much lower information loss than traditional risk management methods, with the same risk of re-identification. PMID:22969273

  19. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system

    NASA Astrophysics Data System (ADS)

    Karabat, Cagatay; Kiraz, Mehmet Sabir; Erdogan, Hakan; Savas, Erkay

    2015-12-01

    In this paper, we introduce a new biometric verification and template protection system which we call THRIVE. The system includes novel enrollment and authentication protocols based on threshold homomorphic encryption where a private key is shared between a user and a verifier. In the THRIVE system, only encrypted binary biometric templates are stored in a database and verification is performed via homomorphically randomized templates, thus, original templates are never revealed during authentication. Due to the underlying threshold homomorphic encryption scheme, a malicious database owner cannot perform full decryption on encrypted templates of the users in the database. In addition, security of the THRIVE system is enhanced using a two-factor authentication scheme involving user's private key and biometric data. Using simulation-based techniques, the proposed system is proven secure in the malicious model. The proposed system is suitable for applications where the user does not want to reveal her biometrics to the verifier in plain form, but needs to prove her identity by using biometrics. The system can be used with any biometric modality where a feature extraction method yields a fixed size binary template and a query template is verified when its Hamming distance to the database template is less than a threshold. The overall connection time for the proposed THRIVE system is estimated to be 336 ms on average for 256-bit biometric templates on a desktop PC running with quad core 3.2 GHz CPUs at 10 Mbit/s up/down link connection speed. Consequently, the proposed system can be efficiently used in real-life applications.

  20. Embedding a hiding function in a portable electronic health record for privacy preservation.

    PubMed

    Huang, Lu-Chou; Chu, Huei-Chung; Lien, Chung-Yueh; Hsiao, Chia-Hung; Kao, Tsair

    2010-06-01

    The objective of this study was to develop a method to hide information in a portable electronic health record (PEHR). In compliance with HIPAA guidelines, a hiding function for personal identifiers in a PEHR was implemented by recognizing and hiding techniques. The method emphasizes the feasibility of embedding a hiding function in a PEHR. The hiding function could be executed to hide identifiers in offline mode. The present study showed that embedding the hiding function in a PEHR is a practical way not only satisfies data confidentiability needs, but also meets patient's personal privacy requirements. The effects of executing the hiding function would be the same as through de-identification or anonymization process.

  1. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    PubMed

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.

  2. Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption.

    PubMed

    Lu, Wen-Jie; Yamada, Yoshiji; Sakuma, Jun

    2015-01-01

    Developed sequencing techniques are yielding large-scale genomic data at low cost. A genome-wide association study (GWAS) targeting genetic variations that are significantly associated with a particular disease offers great potential for medical improvement. However, subjects who volunteer their genomic data expose themselves to the risk of privacy invasion; these privacy concerns prevent efficient genomic data sharing. Our goal is to presents a cryptographic solution to this problem. To maintain the privacy of subjects, we propose encryption of all genotype and phenotype data. To allow the cloud to perform meaningful computation in relation to the encrypted data, we use a fully homomorphic encryption scheme. Noting that we can evaluate typical statistics for GWAS from a frequency table, our solution evaluates frequency tables with encrypted genomic and clinical data as input. We propose to use a packing technique for efficient evaluation of these frequency tables. Our solution supports evaluation of the D' measure of linkage disequilibrium, the Hardy-Weinberg Equilibrium, the χ2 test, etc. In this paper, we take χ2 test and linkage disequilibrium as examples and demonstrate how we can conduct these algorithms securely and efficiently in an outsourcing setting. We demonstrate with experimentation that secure outsourcing computation of one χ2 test with 10, 000 subjects requires about 35 ms and evaluation of one linkage disequilibrium with 10, 000 subjects requires about 80 ms. With appropriate encoding and packing technique, cryptographic solutions based on fully homomorphic encryption for secure computations of GWAS can be practical.

  3. Privacy-preserving screen capture: towards closing the loop for health IT usability.

    PubMed

    Cooley, Joseph; Smith, Sean

    2013-08-01

    As information technology permeates healthcare (particularly provider-facing systems), maximizing system effectiveness requires the ability to document and analyze tricky or troublesome usage scenarios. However, real-world health IT systems are typically replete with privacy-sensitive data regarding patients, diagnoses, clinicians, and EMR user interface details; instrumentation for screen capture (capturing and recording the scenario depicted on the screen) needs to respect these privacy constraints. Furthermore, real-world health IT systems are typically composed of modules from many sources, mission-critical and often closed-source; any instrumentation for screen capture can rely neither on access to structured output nor access to software internals. In this paper, we present a tool to help solve this problem: a system that combines keyboard video mouse (KVM) capture with automatic text redaction (and interactively selectable unredaction) to produce precise technical content that can enrich stakeholder communications and improve end-user influence on system evolution. KVM-based capture makes our system both application-independent and OS-independent because it eliminates software-interface dependencies on capture targets. Using a corpus of EMR screenshots, we present empirical measurements of redaction effectiveness and processing latency to demonstrate system performances. We discuss how these techniques can translate into instrumentation systems that improve real-world health IT deployments.

  4. De-identification of unstructured paper-based health records for privacy-preserving secondary use.

    PubMed

    Fenz, Stefan; Heurix, Johannes; Neubauer, Thomas; Rella, Antonio

    2014-07-01

    Abstract Whenever personal data is processed, privacy is a serious issue. Especially in the document-centric e-health area, the patients' privacy must be preserved in order to prevent any negative repercussions for the patient. Clinical research, for example, demands structured health records to carry out efficient clinical trials, whereas legislation (e.g. HIPAA) regulates that only de-identified health records may be used for research. However, unstructured and often paper-based data dominates information technology, especially in the healthcare sector. Existing approaches are geared towards data in English-language documents only and have not been designed to handle the recognition of erroneous personal data which is the result of the OCR-based digitization of paper-based health records.

  5. METASEQ: PRIVACY PRESERVING META-ANALYSIS OF SEQUENCING-BASED ASSOCIATION STUDIES*

    PubMed Central

    SINGH, ANGAD PAL; ZAFER, SAMREEN; PE’ER, ITSIK

    2013-01-01

    Human genetics recently transitioned from GWAS to studies based on NGS data. For GWAS, small effects dictated large sample sizes, typically made possible through meta-analysis by exchanging summary statistics across consortia. NGS studies groupwise-test for association of multiple potentially-causal alleles along each gene. They are subject to similar power constraints and therefore likely to resort to meta-analysis as well. The problem arises when considering privacy of the genetic information during the data-exchange process. Many scoring schemes for NGS association rely on the frequency of each variant thus requiring the exchange of identity of the sequenced variant. As such variants are often rare, potentially revealing the identity of their carriers and jeopardizing privacy. We have thus developed MetaSeq, a protocol for meta-analysis of genome-wide sequencing data by multiple collaborating parties, scoring association for rare variants pooled per gene across all parties. We tackle the challenge of tallying frequency counts of rare, sequenced alleles, for meta-analysis of sequencing data without disclosing the allele identity and counts, thereby protecting sample identity. This apparent paradoxical exchange of information is achieved through cryptographic means. The key idea is that parties encrypt identity of genes and variants. When they transfer information about frequency counts in cases and controls, the exchanged data does not convey the identity of a mutation and therefore does not expose carrier identity. The exchange relies on a 3rd party, trusted to follow the protocol although not trusted to learn about the raw data. We show applicability of this method to publicly available exome-sequencing data from multiple studies, simulating phenotypic information for powerful meta-analysis. The MetaSeq software is publicly available as open source. PMID:23424140

  6. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    PubMed Central

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-01-01

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300

  7. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.

  8. PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension.

    PubMed

    Chen, Feng; Wang, Chenghong; Dai, Wenrui; Jiang, Xiaoqian; Mohammed, Noman; Al Aziz, Md Momin; Sadat, Md Nazmus; Sahinalp, Cenk; Lauter, Kristin; Wang, Shuang

    2017-07-26

    Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research. However, privacy and security concerns have emerged as a challenge for utilizing cloud computing to handle sensitive genomic data. We present one of the first implementations of Software Guard Extension (SGX) based securely outsourced genetic testing framework, which leverages multiple cryptographic protocols and minimal perfect hash scheme to enable efficient and secure data storage and computation outsourcing. We compared the performance of the proposed PRESAGE framework with the state-of-the-art homomorphic encryption scheme, as well as the plaintext implementation. The experimental results demonstrated significant performance over the homomorphic encryption methods and a small computational overhead in comparison to plaintext implementation. The proposed PRESAGE provides an alternative solution for secure and efficient genomic data outsourcing in an untrusted cloud by using a hybrid framework that combines secure hardware and multiple crypto protocols.

  9. Open Content in Open Context

    ERIC Educational Resources Information Center

    Kansa, Sarah Whitcher; Kansa, Eric C.

    2007-01-01

    This article presents the challenges and rewards of sharing research content through a discussion of Open Context, a new open access data publication system for field sciences and museum collections. Open Context is the first data repository of its kind, allowing self-publication of research data, community commentary through tagging, and clear…

  10. Generative Contexts

    NASA Astrophysics Data System (ADS)

    Lyles, Dan Allen

    Educational research has identified how science, technology, engineering, and mathematics (STEM) practice and education have underperforming metrics in racial and gender diversity, despite decades of intervention. These disparities are part of the construction of a culture of science that is alienating to these populations. Recent studies in a social science framework described as "Generative Justice" have suggested that the context of social and scientific practice might be modified to bring about more just and equitable relations among the disenfranchised by circulating the value they and their non-human allies create back to them in unalienated forms. What is not known are the underlying principles of social and material space that makes a system more or less generative. I employ an autoethnographic method at four sites: a high school science class; a farm committed to "Black and Brown liberation"; a summer program geared towards youth environmental mapping; and a summer workshop for Harlem middle school students. My findings suggest that by identifying instances where material affinity, participatory voice, and creative solidarity are mutually reinforcing, it is possible to create educational contexts that generate unalienated value, and circulate it back to the producers themselves. This cycle of generation may help explain how to create systems of justice that strengthen and grow themselves through successive iterations. The problem of lack of diversity in STEM may be addressed not merely by recruiting the best and the brightest from underrepresented populations, but by changing the context of STEM education to provide tools for its own systematic restructuring.

  11. Managing University Research Microdata Collections

    ERIC Educational Resources Information Center

    Woolfrey, Lynn; Fry, Jane

    2015-01-01

    This article examines the management of microdata collections in a university context. It is a cross-country analysis: Collection management at data services in Canada and South Africa are considered. The case studies are of two university sub-contexts: One collection is located in a library; the other at a Faculty-based Data Service. Stages in…

  12. Managing University Research Microdata Collections

    ERIC Educational Resources Information Center

    Woolfrey, Lynn; Fry, Jane

    2015-01-01

    This article examines the management of microdata collections in a university context. It is a cross-country analysis: Collection management at data services in Canada and South Africa are considered. The case studies are of two university sub-contexts: One collection is located in a library; the other at a Faculty-based Data Service. Stages in…

  13. Terminal context in context-sensitive grammars.

    NASA Technical Reports Server (NTRS)

    Book, R. V.

    1972-01-01

    Investigation of the conditions whereunder context-sensitive grammars generate context-free languages. The obtained results indicate that, if every noncontext-free rewriting rule of a context-sensitive grammar has as left context a string of terminal symbols and the left context is at least as long as the right context, then the language generated is context-free. Likewise, if every noncontext-free rewriting rule of a context-sensitive grammar has strings of terminal symbols as left and right contexts, then the language generated is also context-free.

  14. Collecting and registering sexual health information in the context of HIV risk in the electronic medical record of general practitioners: a qualitative exploration of the preference of general practitioners in urban communities in Flanders (Belgium).

    PubMed

    Vos, Jolien; Pype, Peter; Deblonde, Jessika; Van den Eynde, Sandra; Aelbrecht, Karolien; Deveugele, Myriam; Avonts, Dirk

    2016-07-01

    Background and aim Current health-care delivery requires increasingly proactive and inter-professional work. Therefore, collecting patient information and knowledge management is of paramount importance. General practitioners (GPs) are well placed to lead these evolving models of care delivery. However, it is unclear how they are handling these changes. To gain an insight into this matter, the HIV epidemic was chosen as a test case. Data were collected and analysed from 13 semi-structured interviews with GPs, working in urban communities in Flanders. Findings GPs use various types of patient information to estimate patients' risk of HIV. The way in which sexual health information is collected and registered, depends on the type of information under discussion. General patient information and medical history data are often automatically collected and registered. Proactively collecting sexual health information is uncommon. Moreover, the registration of the latter is not obvious, mostly owing to insufficient space in the electronic medical record (EMR). GPs seem willing to systematically collect and register sexual health information, in particular about HIV-risk factors. They expressed a need for guidance together with practical adjustments of the EMR to adequately capture and share this information.

  15. Collection Mapping.

    ERIC Educational Resources Information Center

    Harbour, Denise

    2002-01-01

    Explains collection mapping for library media collections. Discusses purposes for creating collection maps, including helping with selection and weeding decisions, showing how the collection supports the curriculum, and making budget decisions; and methods of data collection, including evaluating a collaboratively taught unit with the classroom…

  16. Collection Mapping.

    ERIC Educational Resources Information Center

    Harbour, Denise

    2002-01-01

    Explains collection mapping for library media collections. Discusses purposes for creating collection maps, including helping with selection and weeding decisions, showing how the collection supports the curriculum, and making budget decisions; and methods of data collection, including evaluating a collaboratively taught unit with the classroom…

  17. Personality and social context.

    PubMed

    Webster, Mike M; Ward, Ashley J W

    2011-11-01

    There has been considerable interest among biologists in the phenomenon of non-human animal personality in recent years. Consistent variations among individuals in their behavioural responses to ecologically relevant stimuli, often relating to a trade-off between level of risk and reward, have been recorded in a wide variety of species, representing many animal taxa. Research into behavioural variation among individuals has major implications for our understanding of ecological patterns and processes at scales from the level of the individual to the level of the population. Until recently, however, many studies that have considered the broader ecological implications of animal personality have failed to take into account the crucial moderating effect of social context. It is well documented that social processes, such as conformity and facilitation, exert considerable influence on the behaviour of grouping animals and hence that isolated individuals may often behave in a qualitatively as well as quantitatively different manner to those in groups. Recently, a number of studies have begun to address aspects of this gap in our knowledge and have provided vital insights. In this review we examine the state of our knowledge on the relationship between individual personality and sociality. In doing so we consider the influence of the social context on individual personality responses, the interaction between the collective personalities of group members and the expression of those personalities in the individual, and the influence of the personalities of group members on group structure and function. We propose key areas of focus for future studies in order to develop our understanding of this fundamentally important area.

  18. Privacy-Preserving Discovery of Topic-Based Events from Social Sensor Signals: An Experimental Study on Twitter

    PubMed Central

    Nguyen, Duc T.; Jung, Jai E.

    2014-01-01

    Social network services (e.g., Twitter and Facebook) can be regarded as social sensors which can capture a number of events in the society. Particularly, in terms of time and space, various smart devices have improved the accessibility to the social network services. In this paper, we present a social software platform to detect a number of meaningful events from information diffusion patterns on such social network services. The most important feature is to process the social sensor signal for understanding social events and to support users to share relevant information along the social links. The platform has been applied to fetch and cluster tweets from Twitter into relevant categories to reveal hot topics. PMID:24955388

  19. Conducting Privacy-Preserving Multivariable Propensity Score Analysis When Patient Covariate Information Is Stored in Separate Locations.

    PubMed

    Bohn, Justin; Eddings, Wesley; Schneeweiss, Sebastian

    2017-03-15

    Distributed networks of health-care data sources are increasingly being utilized to conduct pharmacoepidemiologic database studies. Such networks may contain data that are not physically pooled but instead are distributed horizontally (separate patients within each data source) or vertically (separate measures within each data source) in order to preserve patient privacy. While multivariable methods for the analysis of horizontally distributed data are frequently employed, few practical approaches have been put forth to deal with vertically distributed health-care databases. In this paper, we propose 2 propensity score-based approaches to vertically distributed data analysis and test their performance using 5 example studies. We found that these approaches produced point estimates close to what could be achieved without partitioning. We further found a performance benefit (i.e., lower mean squared error) for sequentially passing a propensity score through each data domain (called the "sequential approach") as compared with fitting separate domain-specific propensity scores (called the "parallel approach"). These results were validated in a small simulation study. This proof-of-concept study suggests a new multivariable analysis approach to vertically distributed health-care databases that is practical, preserves patient privacy, and warrants further investigation for use in clinical research applications that rely on health-care databases. © The Author 2017. Published by Oxford University Press on behalf of the Johns Hopkins Bloomberg School of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  20. Approach to Privacy-Preserve Data in Two-Tiered Wireless Sensor Network Based on Linear System and Histogram

    NASA Astrophysics Data System (ADS)

    Dang, Van H.; Wohlgemuth, Sven; Yoshiura, Hiroshi; Nguyen, Thuc D.; Echizen, Isao

    Wireless sensor network (WSN) has been one of key technologies for the future with broad applications from the military to everyday life [1,2,3,4,5]. There are two kinds of WSN model models with sensors for sensing data and a sink for receiving and processing queries from users; and models with special additional nodes capable of storing large amounts of data from sensors and processing queries from the sink. Among the latter type, a two-tiered model [6,7] has been widely adopted because of its storage and energy saving benefits for weak sensors, as proved by the advent of commercial storage node products such as Stargate [8] and RISE. However, by concentrating storage in certain nodes, this model becomes more vulnerable to attack. Our novel technique, called zip-histogram, contributes to solving the problems of previous studies [6,7] by protecting the stored data's confidentiality and integrity (including data from the sensor and queries from the sink) against attackers who might target storage nodes in two-tiered WSNs.

  1. Collecting apparatus

    DOEpatents

    Duncan, Charles P.

    1983-01-01

    An improved collecting apparatus for small aquatic or airborne organisms such as plankton, larval fish, insects, etc. The improvement constitutes an apertured removal container within which is retained a collecting bag, and which is secured at the apex of a conical collecting net. Such collectors are towed behind a vessel or vehicle with the open end of the conical net facing forward for trapping the aquatic or airborne organisms within the collecting bag, while allowing the water or air to pass through the apertures in the container. The container is readily removable from the collecting net whereby the collecting bag can be quickly removed and replaced for further sample collection. The collecting bag is provided with means for preventing the bag from being pulled into the container by the water or air flowing therethrough.

  2. Collections Conservation.

    ERIC Educational Resources Information Center

    DeCandido, Robert

    Collections conservation is an approach to the preservation treatment of books and book-like materials that is conceptualized and organized in terms of large groups of materials. This guide is intended to enable a library to evaluate its current collections conservation activities. The introduction describes collections conservation and gives…

  3. Developing Collections to Empower Learners

    ERIC Educational Resources Information Center

    Kimmel, Sue C.

    2014-01-01

    "Developing Collections to Empower Learners" examines collection development in the context of today's shifts toward digital resources while emphasizing the foundational beliefs of the school library profession. Writer Sue Kimmel includes practical advice about needs assessment, planning, selection, acquisitions, evaluation, and…

  4. Collective neutrino oscillations in supernovae

    SciTech Connect

    Duan, Huaiyu

    2014-06-24

    In a dense neutrino medium neutrinos can experience collective flavor transformation through the neutrino-neutrino forward scattering. In this talk we present some basic features of collective neutrino flavor transformation in the context in core-collapse supernovae. We also give some qualitative arguments for why and when this interesting phenomenon may occur and how it may affect supernova nucleosynthesis.

  5. Context and Pavlovian conditioning.

    PubMed

    Landeira-Fernandez, J

    1996-02-01

    Procedurally, learning has to occur in a context. Several lines of evidence suggest that contextual stimuli actively affect learning and expression of the conditional response. The experimental context can become associated with the unconditional stimulus (US), especially when the US is presented in a context in the absence of a discrete conditional stimulus (CS). Moreover, context can modulate CS-US associations. Finally, it appears that context can become associated with the CS when it is presented before the CS-US training. The purpose of the present paper is to review some of the relevant literature that considers the context as an important feature of Pavlovian conditioning and to discuss some of the main learning theories that incorporate the context into their theoretical framework. The paper starts by mentioning historical positions that considered context an important variable in conditioning and then describes how the approach to contextual conditioning changed with the modern study of Pavlovian conditioning. Various forms of measurement of context conditioning are presented and the associative strength attached to context in several experimental paradigms is examined. The possible functions that context may acquire during conditioning are pointed out and related to major learning theories. Moreover, the effect of certain neurological manipulations on context conditioning is presented and these results are discussed in terms of possible functions that the context might acquire during Pavlovian conditioning. It is concluded that contextual stimuli acquire different functions during normal conditioning. A procedure in which animals are exposed to an aversive US immediately after they are placed in the experimental context is suggested as a useful control for the study of context conditioning.

  6. Imagining Another Context during Encoding Offsets Context-Dependent Forgetting

    ERIC Educational Resources Information Center

    Masicampo, E. J.; Sahakyan, Lili

    2014-01-01

    We tested whether imagining another context during encoding would offset context-dependent forgetting. All participants studied a list of words in Context A. Participants who remained in Context A during the test recalled more than participants who were tested in another context (Context B), demonstrating the standard context-dependent forgetting…

  7. Imagining Another Context during Encoding Offsets Context-Dependent Forgetting

    ERIC Educational Resources Information Center

    Masicampo, E. J.; Sahakyan, Lili

    2014-01-01

    We tested whether imagining another context during encoding would offset context-dependent forgetting. All participants studied a list of words in Context A. Participants who remained in Context A during the test recalled more than participants who were tested in another context (Context B), demonstrating the standard context-dependent forgetting…

  8. Collection Mapping and Collection Development.

    ERIC Educational Resources Information Center

    Murray, William; And Others

    1985-01-01

    Describes the use of collection mapping to assess media collections of Aurora, Colorado, Public Schools. Case studies of elementary, middle, and high school media centers describe materials selection and weeding and identify philosophies that library collections should support school curriculum, and teacher-library media specialist cooperation in…

  9. Collection Mapping and Collection Development.

    ERIC Educational Resources Information Center

    Murray, William; And Others

    1985-01-01

    Describes the use of collection mapping to assess media collections of Aurora, Colorado, Public Schools. Case studies of elementary, middle, and high school media centers describe materials selection and weeding and identify philosophies that library collections should support school curriculum, and teacher-library media specialist cooperation in…

  10. Politicized Collective Identity: A Social Psychological Analysis.

    ERIC Educational Resources Information Center

    Simon, Bernd; Klandermans, Bert

    2001-01-01

    Develops a social psychological model of politicized collective identity that revolves around three conceptual themes (collective identity, the struggle for power, and the wider societal context of that power struggle). Discusses how collective identity has been politicized, showing that politicized collective identity has important consequences…

  11. Imagining another context during encoding offsets context-dependent forgetting.

    PubMed

    Masicampo, E J; Sahakyan, Lili

    2014-11-01

    We tested whether imagining another context during encoding would offset context-dependent forgetting. All participants studied a list of words in Context A. Participants who remained in Context A during the test recalled more than participants who were tested in another context (Context B), demonstrating the standard context-dependent forgetting effect (e.g., Smith & Vela, 2001). Importantly, some participants imagined another mental context during encoding. Some of these participants imagined Context B during encoding, and when they were later tested in Context B or even in a completely new Context C, they did not show forgetting, confirming our predictions. Other participants imagined a new context during encoding simply by transforming the current context (i.e., by imagining that it was snowing in the room), and this likewise counteracted context-dependent forgetting. These data suggest a moderator of context-dependent forgetting. When the context surrounding a memory is largely mentally generated, context-dependent forgetting is eliminated.

  12. Stories, skulls, and colonial collections.

    PubMed

    Roque, Ricardo

    2011-01-01

    The essay explores the hypothesis of colonial collecting processes involving the active addition of the colonial context and historical past to museum objects through the production of short stories. It examines the emergent historicity of collections through a focus on the "histories" that museum workers and colonial agents have been attaching to scientific collections of human skulls. Drawing on the notions of collection trajectory and historiographical work, it offers an alternative perspective from which to approach the creation of singular histories and individual archives for objects in collections.

  13. Jay's Collectibles

    ERIC Educational Resources Information Center

    Cappel, James J.; Gillman, Jason R., Jr.

    2011-01-01

    There is growing interest in collectibles of many types, as indicated by the popularity of television programs such as the History Channel's "Pawn Stars" and "American Pickers" and the Public Broadcasting Service's "Antiques Road Show." The availability of online auction sites such as eBay has enabled many people to collect items of interest as a…

  14. Collective Enumeration

    ERIC Educational Resources Information Center

    Bahrami, Bahador; Didino, Daniele; Frith, Chris; Butterworth, Brian; Rees, Geraint

    2013-01-01

    Many joint decisions in everyday life (e.g., Which bar is less crowded?) depend on approximate enumeration, but very little is known about the psychological characteristics of counting together. Here we systematically investigated collective approximate enumeration. Pairs of participants made individual and collective enumeration judgments in a…

  15. Collecting Rocks.

    ERIC Educational Resources Information Center

    Barker, Rachel M.

    One of a series of general interest publications on science topics, the booklet provides those interested in rock collecting with a nontechnical introduction to the subject. Following a section examining the nature and formation of igneous, sedimentary, and metamorphic rocks, the booklet gives suggestions for starting a rock collection and using…

  16. Collective Enumeration

    ERIC Educational Resources Information Center

    Bahrami, Bahador; Didino, Daniele; Frith, Chris; Butterworth, Brian; Rees, Geraint

    2013-01-01

    Many joint decisions in everyday life (e.g., Which bar is less crowded?) depend on approximate enumeration, but very little is known about the psychological characteristics of counting together. Here we systematically investigated collective approximate enumeration. Pairs of participants made individual and collective enumeration judgments in a…

  17. Jay's Collectibles

    ERIC Educational Resources Information Center

    Cappel, James J.; Gillman, Jason R., Jr.

    2011-01-01

    There is growing interest in collectibles of many types, as indicated by the popularity of television programs such as the History Channel's "Pawn Stars" and "American Pickers" and the Public Broadcasting Service's "Antiques Road Show." The availability of online auction sites such as eBay has enabled many people to collect items of interest as a…

  18. Synthetic collective intelligence.

    PubMed

    Solé, Ricard; Amor, Daniel R; Duran-Nebreda, Salva; Conde-Pueyo, Núria; Carbonell-Ballestero, Max; Montañez, Raúl

    2016-10-01

    Intelligent systems have emerged in our biosphere in different contexts and achieving different levels of complexity. The requirement of communication in a social context has been in all cases a determinant. The human brain, probably co-evolving with language, is an exceedingly successful example. Similarly, social insects complex collective decisions emerge from information exchanges between many agents. The difference is that such processing is obtained out of a limited individual cognitive power. Computational models and embodied versions using non-living systems, particularly involving robot swarms, have been used to explore the potentiality of collective intelligence. Here we suggest a novel approach to the problem grounded in the genetic engineering of unicellular systems, which can be modified in order to interact, store memories or adapt to external stimuli in collective ways. What we label as Synthetic Swarm Intelligence defines a parallel approach to the evolution of computation and swarm intelligence and allows to explore potential embodied scenarios for decision making at the microscale. Here, we consider several relevant examples of collective intelligence and their synthetic organism counterparts. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  19. User Situational Context: An Essential Challenge to Context Awareness

    ERIC Educational Resources Information Center

    Mowafi, Yaser Abdallah

    2009-01-01

    Existing research on context and context awareness has broadly focused on the technical aspects of context acquisition and interpretation of users' surroundings, also called physical or sensor-based context. Such an approach has lacked from reconciling the perception of real-world context exhibited by humans, also known as user context, and…

  20. User Situational Context: An Essential Challenge to Context Awareness

    ERIC Educational Resources Information Center

    Mowafi, Yaser Abdallah

    2009-01-01

    Existing research on context and context awareness has broadly focused on the technical aspects of context acquisition and interpretation of users' surroundings, also called physical or sensor-based context. Such an approach has lacked from reconciling the perception of real-world context exhibited by humans, also known as user context, and…

  1. Nanotechnology and Social Context

    ERIC Educational Resources Information Center

    Sandler, Ronald

    2007-01-01

    The central claims defended in this article are the following: (a) The social and ethical challenges of nanotechnology can be fully identified only if both the characteristic features of nanotechnologies and the social contexts into which they are emerging are considered. (b) When this is done, a host of significant social context issues, or…

  2. Chapter Three: Investigating Context

    ERIC Educational Resources Information Center

    Young, Richard F.

    2008-01-01

    This chapter begins with the statement that all talk happens somewhere, somehow, at some time and is produced by somebody for some purpose, and the approach that practice theorists have taken is that talk and its context are inseparable. The challenges that face an analyst of practice are then to describe the context, describe the talk, and…

  3. Nanotechnology and Social Context

    ERIC Educational Resources Information Center

    Sandler, Ronald

    2007-01-01

    The central claims defended in this article are the following: (a) The social and ethical challenges of nanotechnology can be fully identified only if both the characteristic features of nanotechnologies and the social contexts into which they are emerging are considered. (b) When this is done, a host of significant social context issues, or…

  4. Contexts as Shared Commitments

    PubMed Central

    García-Carpintero, Manuel

    2015-01-01

    Contemporary semantics assumes two influential notions of context: one coming from Kaplan (1989), on which contexts are sets of predetermined parameters, and another originating in Stalnaker (1978), on which contexts are sets of propositions that are “common ground.” The latter is deservedly more popular, given its flexibility in accounting for context-dependent aspects of language beyond manifest indexicals, such as epistemic modals, predicates of taste, and so on and so forth; in fact, properly dealing with demonstratives (perhaps ultimately all indexicals) requires that further flexibility. Even if we acknowledge Lewis (1980)'s point that, in a sense, Kaplanian contexts already include common ground contexts, it is better to be clear and explicit about what contexts constitutively are. Now, Stalnaker (1978, 2002, 2014) defines context-as-common-ground as a set of propositions, but recent work shows that this is not an accurate conception. The paper explains why, and provides an alternative. The main reason is that several phenomena (presuppositional treatments of pejoratives and predicates of taste, forces other than assertion) require that the common ground includes non-doxastic attitudes such as appraisals, emotions, etc. Hence the common ground should not be taken to include merely contents (propositions), but those together with attitudes concerning them: shared commitments, as I will defend. PMID:26733087

  5. Incest in Context.

    ERIC Educational Resources Information Center

    Taubman, Stan

    1984-01-01

    Presents a comprehensive view of the societal, cultural, familial, and personality factors that form the context of people at risk for incest and associated problems. Summarizes the consequences and the causal context of incest and describes an ecosystems approach to intervention. (Author/LLL)

  6. Average Revisited in Context

    ERIC Educational Resources Information Center

    Watson, Jane; Chick, Helen

    2012-01-01

    This paper analyses the responses of 247 middle school students to items requiring the concept of average in three different contexts: a city's weather reported in maximum daily temperature, the number of children in a family, and the price of houses. The mixed but overall disappointing performance on the six items in the three contexts indicates…

  7. Contexts as Shared Commitments.

    PubMed

    García-Carpintero, Manuel

    2015-01-01

    Contemporary semantics assumes two influential notions of context: one coming from Kaplan (1989), on which contexts are sets of predetermined parameters, and another originating in Stalnaker (1978), on which contexts are sets of propositions that are "common ground." The latter is deservedly more popular, given its flexibility in accounting for context-dependent aspects of language beyond manifest indexicals, such as epistemic modals, predicates of taste, and so on and so forth; in fact, properly dealing with demonstratives (perhaps ultimately all indexicals) requires that further flexibility. Even if we acknowledge Lewis (1980)'s point that, in a sense, Kaplanian contexts already include common ground contexts, it is better to be clear and explicit about what contexts constitutively are. Now, Stalnaker (1978, 2002, 2014) defines context-as-common-ground as a set of propositions, but recent work shows that this is not an accurate conception. The paper explains why, and provides an alternative. The main reason is that several phenomena (presuppositional treatments of pejoratives and predicates of taste, forces other than assertion) require that the common ground includes non-doxastic attitudes such as appraisals, emotions, etc. Hence the common ground should not be taken to include merely contents (propositions), but those together with attitudes concerning them: shared commitments, as I will defend.

  8. Quantificational logic of context

    SciTech Connect

    Buvac, Sasa

    1996-12-31

    In this paper we extend the Propositional Logic of Context, to the quantificational (predicate calculus) case. This extension is important in the declarative representation of knowledge for two reasons. Firstly, since contexts are objects in the semantics which can be denoted by terms in the language and which can be quantified over, the extension enables us to express arbitrary first-order properties of contexts. Secondly, since the extended language is no longer only propositional, we can express that an arbitrary predicate calculus formula is true in a context. The paper describes the syntax and the semantics of a quantificational language of context, gives a Hilbert style formal system, and outlines a proof of the system`s completeness.

  9. Micrometeorite Collecting

    ERIC Educational Resources Information Center

    Toubes, Joe; Hoff, Darrel

    1974-01-01

    Describes how to collect micrometeorites and suggests a number of related activities such as determining the number of meteors entering the atmosphere and determining the composition of the micrometeorites. (BR)

  10. Micrometeorite Collecting

    ERIC Educational Resources Information Center

    Toubes, Joe; Hoff, Darrel

    1974-01-01

    Describes how to collect micrometeorites and suggests a number of related activities such as determining the number of meteors entering the atmosphere and determining the composition of the micrometeorites. (BR)

  11. Measuring School Contexts

    PubMed Central

    Muller, Chandra L.

    2016-01-01

    This article describes issues in measuring school contexts with an eye toward understanding students’ experiences and outcomes. I begin with an overview of the conceptual underpinnings related to measuring contexts, briefly describe the initiatives at the National Center for Education Statistics to measure school contexts, and identify possible gaps in those initiatives that if filled could provide valuable new data for researchers. Next, I discuss new approaches and opportunities for measurement, and special considerations related to diverse populations and youth development. I conclude with recommendations for future priorities. PMID:27158640

  12. Blood Collection

    NASA Technical Reports Server (NTRS)

    1999-01-01

    The method that is used for the collection, storage and real-time analysis of blood and other bodily fluids has been licensed to DBCD, Inc. by NASA. The result of this patent licensing agreement has been the development of a commercial product that can provide serum or plasma from whole blood volumes of 20 microliters to 4 milliliters. The device has a fibrous filter with a pore size of less than about 3 microns, and is coated with a mixture of mannitol and plasma fraction protein. The coating causes the cellular fraction to be trapped by the small pores, leaving the cellular fraction intact on the fibrous filter while the acellular fraction passes through the filter for collection in unaltered form from the serum sample collection chamber. The method used by this product is useful to NASA for blood analysis on manned space missions.

  13. Putting concepts into context

    PubMed Central

    Yee, Eiling; Thompson-Schill, Sharon L.

    2016-01-01

    At first glance, conceptual representations (e.g., our internal notion of the object lemon) seem static; we have the impression that there is something that lemon “means” (a sour, yellow, football-shaped, citrus fruit) and that this meaning does not vary. Research in semantic memory has traditionally taken this “static” perspective. Consequently, only effects demonstrated across a variety of contexts have typically been considered informative regarding the architecture of the semantic system. In this review, we take the opposite approach. We review instances of context-dependent conceptual activation at many different timescales—from long-term experience, to recent experience, to current task goals, to the unfolding process of conceptual activation itself—and we suggest that the pervasive effects of context across all of these timescales indicate that rather than being static, conceptual representations are constantly changing and are inextricably linked to their contexts. PMID:27282993

  14. Meaning in Context.

    PubMed

    Gerrig, Richard J

    2015-01-01

    People often encounter language in contexts that provide meanings that go beyond previous experience. For example, people recover metaphorical meanings that displace literal meanings for the same words. For such cases, researchers have addressed the question of whether contextual support allows people to truncate or eliminate consideration of meanings that precede specific contexts. The article reviews 3 domains in which this question has prompted research: recovery of metaphorical meanings, understanding of noun-noun combinations, and assimilation of actions within fantastic narrative worlds.

  15. Collecting Artifacts

    ERIC Educational Resources Information Center

    Coffey, Natalie

    2004-01-01

    Fresh out of college, the author had only a handful of items worthy of displaying, which included some fossils she had collected in her paleontology class. She had binders filled with great science information, but kids want to see "real" science, not paper science. Then it came to her: she could fill the shelves with science artifacts with the…

  16. Collecting Artifacts

    ERIC Educational Resources Information Center

    Coffey, Natalie

    2004-01-01

    Fresh out of college, the author had only a handful of items worthy of displaying, which included some fossils she had collected in her paleontology class. She had binders filled with great science information, but kids want to see "real" science, not paper science. Then it came to her: she could fill the shelves with science artifacts with the…

  17. Wastewater Collection.

    ERIC Educational Resources Information Center

    Chatterjee, Samar; And Others

    1978-01-01

    Presents a literature review of wastewater collection systems and components. This review covers: (1) planning, (2) construction; (3) sewer system evaluation; (4) maintenance; (5) rehabilitation; (6) overview prevention; and (7) wastewater pumping. A list of 111 references is also presented. (HM)

  18. Wastewater Collection.

    ERIC Educational Resources Information Center

    Chatterjee, Samar; And Others

    1978-01-01

    Presents a literature review of wastewater collection systems and components. This review covers: (1) planning, (2) construction; (3) sewer system evaluation; (4) maintenance; (5) rehabilitation; (6) overview prevention; and (7) wastewater pumping. A list of 111 references is also presented. (HM)

  19. Beauty in the Context of Particular Lives

    ERIC Educational Resources Information Center

    Rautio, Pauliina

    2010-01-01

    This paper is based on empirical research by the author into the everyday lives of people living in a small village. Everyday life is approached as a subjective process in time and space, experienced by particular people in a particular environmental and social context. The data of this research has been collected through correspondence in which…

  20. A Context Vector Model for Information Retrieval.

    ERIC Educational Resources Information Center

    Billhardt, Holger; Borrajo, Daniel; Maojo, Victor

    2002-01-01

    Presents an indexing and information retrieval method that, based on the vector space model, incorporates term dependencies and thus obtains semantically richer representations of documents. Highlights include term context vectors; techniques for estimating the dependencies among terms; term weights; experimental results on four text collections;…

  1. English in the Ecuadorian Commercial Context.

    ERIC Educational Resources Information Center

    Alm, Cecilia Ovesdotter

    2003-01-01

    Presents a study completed in Quito, Ecuador that investigates the attitudinal perceptions toward English in advertising in the Ecuadorian commercial context. Findings are the result of four data collection procedures; a questionnaire administered to advertising experts, an analysis of business names in ten shopping centers, an analysis of…

  2. Loneliness in Chinese Children across Contexts

    ERIC Educational Resources Information Center

    Chen, Xinyin; Wang, Li; Li, Dan; Liu, Junsheng

    2014-01-01

    This study examined loneliness and its associations with social functioning in children across different historical times and contexts in China. We collected data from urban and rural groups of school-age children (N = 2,588; M age = 10 years) using self-reports and peer assessments. The results indicated that children in 2002 and 2005 urban…

  3. Loneliness in Chinese Children across Contexts

    ERIC Educational Resources Information Center

    Chen, Xinyin; Wang, Li; Li, Dan; Liu, Junsheng

    2014-01-01

    This study examined loneliness and its associations with social functioning in children across different historical times and contexts in China. We collected data from urban and rural groups of school-age children (N = 2,588; M age = 10 years) using self-reports and peer assessments. The results indicated that children in 2002 and 2005 urban…

  4. Beauty in the Context of Particular Lives

    ERIC Educational Resources Information Center

    Rautio, Pauliina

    2010-01-01

    This paper is based on empirical research by the author into the everyday lives of people living in a small village. Everyday life is approached as a subjective process in time and space, experienced by particular people in a particular environmental and social context. The data of this research has been collected through correspondence in which…

  5. A Context Vector Model for Information Retrieval.

    ERIC Educational Resources Information Center

    Billhardt, Holger; Borrajo, Daniel; Maojo, Victor

    2002-01-01

    Presents an indexing and information retrieval method that, based on the vector space model, incorporates term dependencies and thus obtains semantically richer representations of documents. Highlights include term context vectors; techniques for estimating the dependencies among terms; term weights; experimental results on four text collections;…

  6. English in the Ecuadorian Commercial Context.

    ERIC Educational Resources Information Center

    Alm, Cecilia Ovesdotter

    2003-01-01

    Presents a study completed in Quito, Ecuador that investigates the attitudinal perceptions toward English in advertising in the Ecuadorian commercial context. Findings are the result of four data collection procedures; a questionnaire administered to advertising experts, an analysis of business names in ten shopping centers, an analysis of…

  7. Collective instabilities

    SciTech Connect

    K.Y. Ng

    2003-08-25

    The lecture covers mainly Sections 2.VIII and 3.VII of the book ''Accelerator Physics'' by S.Y. Lee, plus mode-coupling instabilities and chromaticity-driven head-tail instability. Besides giving more detailed derivation of many equations, simple interpretations of many collective instabilities are included with the intention that the phenomena can be understood more easily without going into too much mathematics. The notations of Lee's book as well as the e{sup jwt} convention are followed.

  8. Collective Electrodynamics

    NASA Astrophysics Data System (ADS)

    Mead, Carver A.

    2002-08-01

    In this book Carver Mead offers a radically new approach to the standard problems of electromagnetic theory. Motivated by the belief that the goal of scientific research should be the simplification and unification of knowledge, he describes a new way of doing electrodynamics--collective electrodynamics--that does not rely on Maxwell's equations, but rather uses the quantum nature of matter as its sole basis. Collective electrodynamics is a way of looking at how electrons interact, based on experiments that tell us about the electrons directly. (As Mead points out, Maxwell had no access to these experiments.) The results Mead derives for standard electromagnetic problems are identical to those found in any text. Collective electrodynamics reveals, however, that quantities that we usually think of as being very different are, in fact, the same--that electromagnetic phenomena are simple and direct manifestations of quantum phenomena. Mead views his approach as a first step toward reformulating quantum concepts in a clear and comprehensible manner. The book is divided into five sections: magnetic interaction of steady currents, propagating waves, electromagnetic energy, radiation in free space, and electromagnetic interaction of atoms. In an engaging preface, Mead tells how his approach to electromagnetic theory was inspired by his interaction with Richard Feynman. Carver A. Mead is the Gordon and Betty Moore Professor of Engineering and Applied Science, Emeritus, at the California Institute of Technology. He won the 1999 Lemelson-MIT Prize for Invention and Innovation.

  9. Context-dependent generalization

    PubMed Central

    Taylor, Jordan A.; Ivry, Richard B.

    2013-01-01

    The pattern of generalization following motor learning can provide a probe on the neural mechanisms underlying learning. For example, the breadth of generalization to untrained regions of space after visuomotor adaptation to targets in a restricted region of space has been attributed to the directional tuning properties of neurons in the motor system. Building on this idea, the effect of different types of perturbations on generalization (e.g., rotation vs. visual translation) have been attributed to the selection of differentially tuned populations. Overlooked in this discussion is consideration of how the context of the training environment may constrain generalization. Here, we explore the role of context by having participants learn a visuomotor rotation or a translational shift in two different contexts, one in which the array of targets were presented in a circular arrangement and the other in which they were presented in a rectilinear arrangement. The perturbation and environments were either consistent (e.g., rotation with circular arrangement) or inconsistent (e.g., rotation with rectilinear arrangement). The pattern of generalization across the workspace was much more dependent on the context of the environment than on the perturbation, with broad generalization for the rectilinear arrangement for both types of perturbations. Moreover, the generalization pattern for this context was evident, even when the perturbation was introduced in a gradual manner, precluding the use of an explicit strategy. We describe how current models of generalization might be modified to incorporate these results, building on the idea that context provides a strong bias for how the motor system infers the nature of the visuomotor perturbation and, in turn, how this information influences the pattern of generalization. PMID:23653603

  10. Collective motion

    NASA Astrophysics Data System (ADS)

    Vicsek, Tamás; Zafeiris, Anna

    2012-08-01

    We review the observations and the basic laws describing the essential aspects of collective motion - being one of the most common and spectacular manifestation of coordinated behavior. Our aim is to provide a balanced discussion of the various facets of this highly multidisciplinary field, including experiments, mathematical methods and models for simulations, so that readers with a variety of background could get both the basics and a broader, more detailed picture of the field. The observations we report on include systems consisting of units ranging from macromolecules through metallic rods and robots to groups of animals and people. Some emphasis is put on models that are simple and realistic enough to reproduce the numerous related observations and are useful for developing concepts for a better understanding of the complexity of systems consisting of many simultaneously moving entities. As such, these models allow the establishing of a few fundamental principles of flocking. In particular, it is demonstrated, that in spite of considerable differences, a number of deep analogies exist between equilibrium statistical physics systems and those made of self-propelled (in most cases living) units. In both cases only a few well defined macroscopic/collective states occur and the transitions between these states follow a similar scenario, involving discontinuity and algebraic divergences.

  11. Context, Learning, and Extinction

    ERIC Educational Resources Information Center

    Gershman, Samuel J.; Blei, David M.; Niv, Yael

    2010-01-01

    A. Redish et al. (2007) proposed a reinforcement learning model of context-dependent learning and extinction in conditioning experiments, using the idea of "state classification" to categorize new observations into states. In the current article, the authors propose an interpretation of this idea in terms of normative statistical inference. They…

  12. The African Context.

    ERIC Educational Resources Information Center

    Mans, Minette E.

    2000-01-01

    Provides background information on arts education and policy in the African context focusing on four countries: (1) Ghana; (2) Kenya; (3) Tanzania; and (4) Namibia. Introduces the articles in the symposium on "Arts Education Policy in Africa" in this issue of Art Education Policy Review. (CMK)

  13. From Context to Core

    ERIC Educational Resources Information Center

    Campus Technology, 2008

    2008-01-01

    At Campus Technology 2008, Arizona State University Technology Officer Adrian Sannier mesmerized audiences with his mandate to become more efficient by doing only the "core" tech stuff--and getting someone else to slog through the context. This article presents an excerpt from Sannier's hour-long keynote address at Campus Technology '08. Sannier…

  14. Community Contexts for Mentoring

    ERIC Educational Resources Information Center

    Hamilton, Stephen F.; Hamilton, Mary Agnes; Hirsch, Barton J.; Hughes, Jan; King, Jacqueline; Maton, Kenneth

    2006-01-01

    Mentoring programs attempt to foster a relationship that is too often missing from the lives of disadvantaged children and youth. However, in view of both the power and the limitations of mentoring programs, it is important to understand how mentoring occurs naturally. Assuming an ecological perspective, we examine mentoring in four contexts:…

  15. Technology in Context

    ERIC Educational Resources Information Center

    Jeans, Nick; Manches, Andrew; Stokes, Eleanor; Balmer, Kim

    2011-01-01

    People frequently hear competing media and research claims about the educational value of new technologies. But too often it is not clear how, if at all, these technologies are supporting learning. And there is not enough attention paid to the challenges of trying to introduce these technologies successfully into an educational context. To what…

  16. Context, Learning, and Extinction

    ERIC Educational Resources Information Center

    Gershman, Samuel J.; Blei, David M.; Niv, Yael

    2010-01-01

    A. Redish et al. (2007) proposed a reinforcement learning model of context-dependent learning and extinction in conditioning experiments, using the idea of "state classification" to categorize new observations into states. In the current article, the authors propose an interpretation of this idea in terms of normative statistical inference. They…

  17. Rural as Context.

    ERIC Educational Resources Information Center

    Howley, Craig B.; Howley, Aimee A.

    This essay explains two ways in which "the rural" serves as context. The common way interprets the rural lifeworld as an impediment to certain projects and goals, thus framing "the rural" as a subjugated and diminished reality. The other way is called "the rural circumstance" in order to situate the rural lifeworld as…

  18. Formative Assessment in Context

    ERIC Educational Resources Information Center

    Oxenford-O'Brian, Julie

    2013-01-01

    This dissertation responds to critical gaps in current research on formative assessment practice which could limit successful implementation of this practice within the K-12 classroom context. The study applies a socio cultural perspective of learning to interpret a cross-case analysis of formative assessment practice occurring during one…

  19. From Context to Core

    ERIC Educational Resources Information Center

    Campus Technology, 2008

    2008-01-01

    At Campus Technology 2008, Arizona State University Technology Officer Adrian Sannier mesmerized audiences with his mandate to become more efficient by doing only the "core" tech stuff--and getting someone else to slog through the context. This article presents an excerpt from Sannier's hour-long keynote address at Campus Technology '08. Sannier…

  20. Formative Assessment in Context

    ERIC Educational Resources Information Center

    Oxenford-O'Brian, Julie

    2013-01-01

    This dissertation responds to critical gaps in current research on formative assessment practice which could limit successful implementation of this practice within the K-12 classroom context. The study applies a socio cultural perspective of learning to interpret a cross-case analysis of formative assessment practice occurring during one…

  1. Community Contexts for Mentoring

    ERIC Educational Resources Information Center

    Hamilton, Stephen F.; Hamilton, Mary Agnes; Hirsch, Barton J.; Hughes, Jan; King, Jacqueline; Maton, Kenneth

    2006-01-01

    Mentoring programs attempt to foster a relationship that is too often missing from the lives of disadvantaged children and youth. However, in view of both the power and the limitations of mentoring programs, it is important to understand how mentoring occurs naturally. Assuming an ecological perspective, we examine mentoring in four contexts:…

  2. Putting tumours in context

    SciTech Connect

    Bissell, Mina J.; Radisky, Derek

    2001-10-01

    The interactions between cancer cells and their micro- and macroenvironment create a context that promotes tumor growth and protects it from immune attack. The functional association of cancer cells with their surrounding tissues forms a new 'organ' that changes as malignancy progresses. Investigation of this process might provide new insights into the mechanisms of tumorigenesis and could also lead to new therapeutic targets. Under normal conditions, ORGANS are made up of TISSUES that exchange information with other cell types via cell-cell contact, cytokines and the EXTRACELLULAR MATRIX (ECM). The ECM, which is produced by collaboration between STROMAL fibroblasts and EPITHELIAL cells, provides structural scaffolding for cells, as well as contextual information. The endothelial vasculature provides nutrients and oxygen, and cells of the immune system combat pathogens and remove apoptotic cells. Epithelial cells associate into intact, polarized sheets. These tissues communicate through a complex network of interactions: physically, through direct contact or through the intervening ECM, and biochemically, through both soluble and insoluble signalling molecules. In combination, these interactions provide the information that is necessary to maintain cellular differentiation and to create complex tissue structures. Occasionally, the intercellular signals that define the normal context become disrupted. Alterations in epithelial tissues can lead to movement of epithelial sheets and proliferation - for example, after activation of mesenchymal fibroblasts due to wounding.Normally, these conditions are temporary and reversible, but when inflammation is sustained, an escalating feedback loop ensues.Under persistent inflammatory conditions, continual upregulation of enzymes such as matrix metalloproteinases (MMPs) by stromal fibroblasts can disrupt the ECM, and invading immune cells can overproduce factors that promote abnormal proliferation. As this process progresses

  3. The Cultural Context of Learning in International Joint Ventures.

    ERIC Educational Resources Information Center

    Liu, Shimin; Vince, Russ

    1999-01-01

    A study of Chinese-Western joint business ventures showed that cultural context and different modes of managing and organizing must be considered. Successful joint ventures involve a process of collective, two-way learning. (SK)

  4. The Cultural Context of Learning in International Joint Ventures.

    ERIC Educational Resources Information Center

    Liu, Shimin; Vince, Russ

    1999-01-01

    A study of Chinese-Western joint business ventures showed that cultural context and different modes of managing and organizing must be considered. Successful joint ventures involve a process of collective, two-way learning. (SK)

  5. Image Acquisition Context

    PubMed Central

    Bidgood, W. Dean; Bray, Bruce; Brown, Nicolas; Mori, Angelo Rossi; Spackman, Kent A.; Golichowski, Alan; Jones, Robert H.; Korman, Louis; Dove, Brent; Hildebrand, Lloyd; Berg, Michael

    1999-01-01

    Objective: To support clinically relevant indexing of biomedical images and image-related information based on the attributes of image acquisition procedures and the judgments (observations) expressed by observers in the process of image interpretation. Design: The authors introduce the notion of “image acquisition context,” the set of attributes that describe image acquisition procedures, and present a standards-based strategy for utilizing the attributes of image acquisition context as indexing and retrieval keys for digital image libraries. Methods: The authors' indexing strategy is based on an interdependent message/terminology architecture that combines the Digital Imaging and Communication in Medicine (DICOM) standard, the SNOMED (Systematized Nomenclature of Human and Veterinary Medicine) vocabulary, and the SNOMED DICOM microglossary. The SNOMED DICOM microglossary provides context-dependent mapping of terminology to DICOM data elements. Results: The capability of embedding standard coded descriptors in DICOM image headers and image-interpretation reports improves the potential for selective retrieval of image-related information. This favorably affects information management in digital libraries. PMID:9925229

  6. Teacher Thinking in Cultural Contexts. SUNY Series, The Social Context of Education.

    ERIC Educational Resources Information Center

    Rios, Francisco A., Ed.

    This collection sheds light on current research on teacher thinking in cultural contexts and identifies promising practices in teacher education that take the most salient contextual variables into account. Teacher cognition as influenced by race, ethnicity, and culture is explored in: (1) "Teacher Thinking in Urban Schools: The Need for a…

  7. Defining Collections in Distributed Digital Libraries.

    ERIC Educational Resources Information Center

    Logoze, Carl; Fielding, David

    1998-01-01

    Describes the design for a digital collection service, an independent mechanism for introducing structure into a distributed space, research by Cornell Digital Library Research Group (CDLRG). Summarizes the component-based digital library architecture that is the context for the design. Describes a collection abstraction that is appropriate for…

  8. Context-dependent hierarchies in pigeons.

    PubMed

    Nagy, Máté; Vásárhelyi, Gábor; Pettit, Benjamin; Roberts-Mariani, Isabella; Vicsek, Tamás; Biro, Dora

    2013-08-06

    Hierarchical organization is widespread in the societies of humans and other animals, both in social structure and in decision-making contexts. In the case of collective motion, the majority of case studies report that dominant individuals lead group movements, in agreement with the common conflation of the terms "dominance" and "leadership." From a theoretical perspective, if social relationships influence interactions during collective motion, then social structure could also affect leadership in large, swarm-like groups, such as fish shoals and bird flocks. Here we use computer-vision-based methods and miniature GPS tracking to study, respectively, social dominance and in-flight leader-follower relations in pigeons. In both types of behavior we find hierarchically structured networks of directed interactions. However, instead of being conflated, dominance and leadership hierarchies are completely independent of each other. Although dominance is an important aspect of variation among pigeons, correlated with aggression and access to food, our results imply that the stable leadership hierarchies in the air must be based on a different set of individual competences. In addition to confirming the existence of independent and context-specific hierarchies in pigeons, we succeed in setting out a robust, scalable method for the automated analysis of dominance relationships, and thus of social structure, applicable to many species. Our results, as well as our methods, will help to incorporate the broader context of animal social organization into the study of collective behavior.

  9. Context-dependent hierarchies in pigeons

    PubMed Central

    Nagy, Máté; Vásárhelyi, Gábor; Pettit, Benjamin; Roberts-Mariani, Isabella; Vicsek, Tamás; Biro, Dora

    2013-01-01

    Hierarchical organization is widespread in the societies of humans and other animals, both in social structure and in decision-making contexts. In the case of collective motion, the majority of case studies report that dominant individuals lead group movements, in agreement with the common conflation of the terms “dominance” and “leadership.” From a theoretical perspective, if social relationships influence interactions during collective motion, then social structure could also affect leadership in large, swarm-like groups, such as fish shoals and bird flocks. Here we use computer-vision–based methods and miniature GPS tracking to study, respectively, social dominance and in-flight leader–follower relations in pigeons. In both types of behavior we find hierarchically structured networks of directed interactions. However, instead of being conflated, dominance and leadership hierarchies are completely independent of each other. Although dominance is an important aspect of variation among pigeons, correlated with aggression and access to food, our results imply that the stable leadership hierarchies in the air must be based on a different set of individual competences. In addition to confirming the existence of independent and context-specific hierarchies in pigeons, we succeed in setting out a robust, scalable method for the automated analysis of dominance relationships, and thus of social structure, applicable to many species. Our results, as well as our methods, will help to incorporate the broader context of animal social organization into the study of collective behavior. PMID:23878247

  10. Making Connections: Learning and Teaching Chemistry in Context

    NASA Astrophysics Data System (ADS)

    King, Donna; Bellocchi, Alberto; Ritchie, Stephen M.

    2008-05-01

    Even though several studies have reported positive attitudinal outcomes from context-based chemistry programs, methodological obstacles have prevented researchers from comparing satisfactorily the chemistry-learning outcomes between students who experience a context-based program with those who experience a content-driven program. In this narrative inquiry we are able to address the question: how do the recalled experiences of a student and her teacher in context-based and concept-based chemistry programs compare? From the student’s unique perspective of experiencing both programs with the same teacher, we have constructed our collective account around four themes; namely, the extent to which the student makes connections between chemistry concepts and real-world contexts, developing research independence through engaging in extended experimental investigations related to contexts, learning chemistry concepts through contexts, and conceptual sequencing in a context-based program. The student reported real-world connections between chemistry concepts and contexts, found her engagement in the context-driven tasks interesting and productive, and identified connected sequences of concepts across the contexts studied. Despite difficulties for teachers who are required to shift pedagogies, the student’s lived experiences and outcomes from a context-based program provide some encouragement in working through these issues.

  11. 78 FR 25450 - Agency Information Collection Activities; Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-01

    ... used to collect data regarding attitudes about and perceptions of the health IT workflows staff engage... interviewed to gather in depth information about the sociotechnical context of the practice. The...

  12. Distributed Control with Collective Intelligence

    NASA Technical Reports Server (NTRS)

    Wolpert, David H.; Wheeler, Kevin R.; Tumer, Kagan

    1998-01-01

    We consider systems of interacting reinforcement learning (RL) algorithms that do not work at cross purposes , in that their collective behavior maximizes a global utility function. We call such systems COllective INtelligences (COINs). We present the theory of designing COINs. Then we present experiments validating that theory in the context of two distributed control problems: We show that COINs perform near-optimally in a difficult variant of Arthur's bar problem [Arthur] (and in particular avoid the tragedy of the commons for that problem), and we also illustrate optimal performance in the master-slave problem.

  13. Collective accelerator for electron colliders

    SciTech Connect

    Briggs, R.J.

    1985-05-13

    A recent concept for collective acceleration and focusing of a high energy electron bunch is discussed, in the context of its possible applicability to large linear colliders in the TeV range. The scheme can be considered to be a member of the general class of two-beam accelerators, where a high current, low voltage beam produces the acceleration fields for a trailing high energy bunch.

  14. Putting teamwork in context.

    PubMed

    Boaden, N; Leaviss, J

    2000-11-01

    Multidisciplinary teamwork is becoming more important in both the delivery of health care and in the organization and management of that delivery. The first of these has been accepted but traditional professional education has done little to address the challenge it presents to professionals. Recent reforms in the British NHS have made the challenge more urgent. Professionals must work together but in increasingly flexible and innovatory ways. They are also required to play more formal roles in NHS management and policy. Where teamwork has been addressed in professional education it has concentrated on the inter-personal dynamics of working teams. This remains important but to respond effectively to the new challenges curricula and educational practice will have to be clearer about the variety of teams involved and the importance of the context within which teams work. One view is offered as to how that context might be understood in order to map team diversity. Two models are offered to help develop multidisciplinary team learning. One of these deals with key aspects of the organizational setting and the other with factors that affect team processes. It is argued that both should help to facilitate multidisciplinary curriculum development but also suggest learning needs to be met within unidisciplinary professional education. Concentration on team dynamics alone will not deliver the teamwork required in the new NHS.

  15. Mindfulness in cultural context.

    PubMed

    Kirmayer, Laurence J

    2015-08-01

    Mindfulness meditation and other techniques drawn from Buddhism have increasingly been integrated into forms of psychotherapeutic intervention. In much of this work, mindfulness is understood as a mode of awareness that is present-centered and nonevaluative. This form of awareness is assumed to have intrinsic value in promoting positive mental health and adaptation by interrupting discursive thoughts that give rise to suffering. However, in the societies where it originated, mindfulness meditation is part of a larger system of Buddhist belief and practice with strong ethical and moral dimensions. Extracting techniques like mindfulness meditation from the social contexts in which they originate may change the nature and effects of the practice. The papers in this issue of Transcultural Psychiatry explore the implications of a cultural and contextual view of mindfulness for continued dialogue between Buddhist thought and psychiatry. This introductory essay considers the meanings of mindfulness meditation in cultural context and the uses of mindfulness as a therapeutic intervention in contemporary psychiatry and psychology.

  16. Endeavour Crater in Context

    NASA Technical Reports Server (NTRS)

    2009-01-01

    [figure removed for brevity, see original site]

    The largest crater in this mosaic of images taken by the Context Camera on NASA's Mars Reconnaissance Orbiter is Endeavour Crater, which is 22 kilometers (14 miles) in diameter.

    The team operating NASA's Mars Exploration Rover Opportunity in the Meridiani Planum region of Mars chose to drive the rover toward Endeavour after Opportunity ascended out of smaller Victoria Crater in August 2008.

    Opportunity caught its first glimpse of Endeavour's rim on March 7, 2008, during the 1,820th Martian day, or sol, of the rover's mission on Mars. The rover was about 12 kilometers (7 miles) from the closest point of the crater.

    Annotations on Figure 1 show vectors from Opportunity's position on that date toward the portions of the rim seen in images that Opportunity's panoramic camera (Pancam) took from the Sol 1820 location. In addition to three portions of Endeavour's rim, the rim of a smaller, more distant crater, Iazu, appears faintly on the horizon in the Pancam images.

    NASA's Jet Propulsion Laboratory, a division of the California Institute of Technology in Pasadena, manages the Mars Reconnaissance Orbiter for NASA's Science Mission Directorate, Washington. Lockheed Martin Space Systems, Denver, is the prime contractor for the project and built the spacecraft. Malin Space Science Systems, San Diego, provided and operates the Context Camera.

  17. Identifying Context Variables in Research.

    ERIC Educational Resources Information Center

    Piazza, Carolyn L.

    1987-01-01

    Identifies context variables in written composition from theoretical perspectives in cognitive psychology, sociology, and anthropology. Considers how multiple views of context from across the disciplines can build toward a broader definition of writing. (JD)

  18. Identifying Context Variables in Research.

    ERIC Educational Resources Information Center

    Piazza, Carolyn L.

    1987-01-01

    Identifies context variables in written composition from theoretical perspectives in cognitive psychology, sociology, and anthropology. Considers how multiple views of context from across the disciplines can build toward a broader definition of writing. (JD)

  19. The HFEA in context.

    PubMed

    Franklin, Sarah

    2013-04-01

    While the regulatory role of the HFEA, its independence and its shortcomings are debated in the context of a fiscal economic crisis, the larger sociological importance of the Authority may be overlooked. Harder to calculate than its annual budget and more elusive than its technical remit as a licensing body, the cultural value of the HFEA as a historical and symbolic entity that was born out of a pioneering debate unique to the UK must be included in a discussion of its future role. Against its perceived shortcomings as an expensive and outdated quango is the importance of the Authority as a public instrument for enhancing the future of translational bioscience. From this point of view, the HFEA is crucial not only to ensuring the successful realization of a domestic bioscience agenda but also to protecting the international reputation of UK Plc as a best-practice model of publicly supported bioinnovation.

  20. Measuring local context as context-word probabilities.

    PubMed

    Hahn, Lance W

    2012-06-01

    Context enables readers to quickly recognize a related word but disturbs recognition of unrelated words. The relatedness of a final word to a sentence context has been estimated as the probability (cloze probability) that a participant will complete a sentence with a word. In four studies, I show that it is possible to estimate local context-word relatedness based on common language usage. Conditional probabilities were calculated for sentences with published cloze probabilities. Four-word contexts produced conditional probabilities significantly correlated with cloze probabilities, but usage statistics were unavailable for some sentence contexts. The present studies demonstrate that a composite context measure based on conditional probabilities for one- to four-word contexts and the presence of a final period represents all of the sentences and maintains significant correlations (.25, .52, .53) with cloze probabilities. Finally, the article provides evidence for the effectiveness of this measure by showing that local context varies in ways that are similar to the N400 effect and that are consistent with a role for local context in reading. The Supplemental materials include local context measures for three cloze probability data sets.

  1. Context Memory in Alzheimer's Disease

    PubMed Central

    El Haj, Mohamad; Kessels, Roy P.C.

    2013-01-01

    Background Alzheimer's disease (AD) is a neurodegenerative disease characterized by a gradual loss of memory. Specifically, context aspects of memory are impaired in AD. Our review sheds light on the neurocognitive mechanisms of this memory component that forms the core of episodic memory function. Summary Context recall, an element of episodic memory, refers to remembering the context in which an event has occurred, such as from whom or to whom information has been transmitted. Key Messages Our review raises crucial questions. For example, (1) which context element is more prone to being forgotten in the disease? (2) How do AD patients fail to bind context features together? (3) May distinctiveness heuristic or decisions based on metacognitive expectations improve context retrieval in these patients? (4) How does cueing at retrieval enhance reinstating of encoding context in AD? By addressing these questions, our work contributes to the understanding of the memory deficits in AD. PMID:24403906

  2. Politicized collective identity. A social psychological analysis.

    PubMed

    Simon, B; Klandermans, B

    2001-04-01

    This article develops a social psychological model of politicized collective identity that revolves around 3 conceptual triads. The 1st triad consists of collective identity, the struggle between groups for power, and the wider societal context. It is proposed that people evince politicized collective identity to the extent that they engage as self-conscious group members in a power struggle on behalf of their group knowing that it is the more inclusive societal context in which this struggle has to be fought out. Next, 3 antecedent stages leading to politicized collective identity are distinguished: awareness of shared grievances, adversarial attributions, and involvement of society at large. This sequence culminates in the final triad because the intergroup power struggle is eventually triangulated by involving society at large or representatives thereof. Consequences of politicized collective identity are discussed.

  3. Program Management Collection. "LINCS" Resource Collection News

    ERIC Educational Resources Information Center

    Literacy Information and Communication System, 2011

    2011-01-01

    This edition of "'LINCS' Resource Collection News" features the Program Management Collection, which covers the topics of Assessment, Learning Disabilities, and Program Improvement. Each month Collections News features one of the three "LINCS" (Literacy Information and Communication System) Resource Collections--Basic Skills, Program Management,…

  4. Workforce Competitiveness Collection. "LINCS" Resource Collection News

    ERIC Educational Resources Information Center

    Literacy Information and Communication System, 2011

    2011-01-01

    This edition of "'LINCS' Resource Collection News" features the Workforce Competitiveness Collection, covering the topics of workforce education, English language acquisition, and technology. Each month Collections News features one of the three "LINCS" (Literacy Information and Communication System) Resource Collections--Basic…

  5. The pleasure in context.

    PubMed

    Duff, Cameron

    2008-10-01

    The pleasures associated with the use of illicit drugs are rarely acknowledged in contemporary drug policy debates. Where they are, these pleasures are almost always attributed to the specific physiological and/or sensory effects of individual substances. Drawing on qualitative research recently completed in Melbourne, Australia, this paper argues that the pleasures associated with illicit drug use extend well beyond the purely physiological to include a host of properly contextual elements as well. These "contextual" pleasures include the corporeal experience of space, such as the "feeling" of electronic music in a large night-club space, or the engagement with natural and wilderness environments. Also important are a range of corporeal and performative practices, such as dancing and interacting with strangers, which were reportedly facilitated with the use of different drugs. This emphasis on the dynamics of space, embodiment and practice as they impact the contextual experience of pleasure, has the potential to open up new ways of thinking about pleasure and its place in the mediation of all drug related behaviours. Greater understanding of these relationships should also facilitate the emergence of new, context specific, drug prevention and harm reduction initiatives.

  6. Contextualizing symbol, symbolizing context

    NASA Astrophysics Data System (ADS)

    Maudy, Septiani Yugni; Suryadi, Didi; Mulyana, Endang

    2017-08-01

    When students learn algebra for the first time, inevitably they are experiencing transition from arithmetic to algebraic thinking. Once students could apprehend this essential mathematical knowledge, they are cultivating their ability in solving daily life problems by applying algebra. However, as we dig into this transitional stage, we identified possible students' learning obstacles to be dealt with seriously in order to forestall subsequent hindrance in studying more advance algebra. We come to realize this recurring problem as we undertook the processes of re-personalization and re-contextualization in which we scrutinize the very basic questions: 1) what is variable, linear equation with one variable and their relationship with the arithmetic-algebraic thinking? 2) Why student should learn such concepts? 3) How to teach those concepts to students? By positioning ourselves as a seventh grade student, we address the possibility of children to think arithmetically when confronted with the problems of linear equation with one variable. To help them thinking algebraically, Bruner's modes of representation developed contextually from concrete to abstract were delivered to enhance their interpretation toward the idea of variables. Hence, from the outset we designed the context for student to think symbolically initiated by exploring various symbols that could be contextualized in order to bridge student traversing the arithmetic-algebraic fruitfully.

  7. Translation science and context.

    PubMed

    Titler, Marita G

    2010-01-01

    Evidence-based health care practices are available for a number of conditions such as asthma, smoking cessation, heart failure, and management of diabetes. However, these practices are not routinely implemented in care delivery and variations in practices abound. Implementing evidence-based practices (EBPs) is challenging, and difficulties implementing evidence may be largely explained by contextual factors. Thus, strategies are needed that address the complexity and systems of care, individual practitioners, senior leadership, and ultimately changing health care cultures to promote an evidence-based practice environment. To advance knowledge about promoting and sustaining adoption of EBPs in health care, translation science needs more studies that test translating research into practice (TRIP) interventions; studies are needed that investigate what TRIP interventions work, for whom, in what circumstances, in what types of settings, and studies that explain the underlying mechanisms of effective TRIP interventions. According to the Translation Research Model, adoption of innovations, such as EBPs, are influenced by the nature of the innovation (e.g., the type and strength of evidence; the clinical topic), and the manner in which it is communicated (disseminated) to members (e.g., physicians, nurses) of a social system (organization, nursing profession). This article discusses the importance of context in translation using this framework as a guide.

  8. A Semantic Web Based System for Context Metadata Management

    NASA Astrophysics Data System (ADS)

    Stefanov, Svetlin; Huang, Vincent

    With the increasing usage of embedded systems and sensors in our surroundings, a new type of information systems - context aware systems - are gaining importance. These user-centric systems acquire context information which describes the state of the user and the user environment, and offer adaptable and personalized services based on the user context information. The central part of a context aware system is the context model used for describing user context information. The context information originates from a multitude of heterogeneous sources, such as personal calendars, sensors attached to the users or to the user’s environment and Web based sources, such as social networking sites. The information from these sources is typically on different abstraction levels and is organized according to different data models. This work proposes a Semantic Web based context metadata management system. The first part of the work develops an ontology model for user context. The user context model integrates information from multiple and heterogeneous sources which are modeled largely by reusing existing well accepted ontologies. The second part of the work proposes a method to infer and reason about additional user context information based on the available context information using rules and ontologies. We instantiate and evaluate the proposed system by performing a social networking case study called meetFriends. In this application, information is collected from various sources such as sensors attached to the users and public web sources - YellowPages. The moods of the users are inferred from a set of rules. A meeting between two users can be set up based on the moods, locations and preferences of the users. The results indicate that Semantic Web technologies are well suited for integrating various data sources, processing of user context information, and enabling adaptable and personalized services.

  9. Generation disrupts memory for intrinsic context but not extrinsic context.

    PubMed

    Mulligan, Neil W

    2011-08-01

    Although generation typically enhances item memory, the effect is subject to a number of theoretically important limitations. One potential limitation concerns context memory but there has been debate about whether generation actually enhances or disrupts memory for contextual details. Five experiments assessed the effect of generation on context memory for perceptual attributes of the study stimulus (intrinsic context). The results indicate that despite enhancing item memory, generation disrupts memory for intrinsic context. This result generalized over different intrinsic details (print colour and font), different generation manipulations, and several methodological factors identified in earlier research as potential moderators of this negative generation effect. Despite the negative generation effect on intrinsic context, contextual details external to the target item (extrinsic context) are not disrupted. In a sixth experiment, a visually based generation task (letter transposition) enhanced context memory for the extrinsic detail of location. Coupled with earlier research, the results indicate that generation disrupts context memory for intrinsic details but either does not harm or enhances memory for extrinsic context.

  10. Context-Model-Based Instruction in Teaching EFL Writing: A Narrative Inquiry

    ERIC Educational Resources Information Center

    Lin, Zheng

    2016-01-01

    This study aims to re-story the provision of the context-model-based instruction in teaching EFL writing, focusing especially on students' development of the context model and learning to guide EFL writing with the context model. The research data have been collected from the audio recordings of the classroom instruction, the teacher-researcher's…

  11. Cognitive context detection using pupillary measurements

    NASA Astrophysics Data System (ADS)

    Mannaru, Pujitha; Balasingam, Balakumar; Pattipati, Krishna; Sibley, Ciara; Coyne, Joseph

    2016-05-01

    In this paper, we demonstrate the use of pupillary measurements as indices of cognitive workload. We analyze the pupillary data of twenty individuals engaged in a simulated Unmanned Aerial System (UAS) operation in order to understand and characterize the behavior of pupil dilation under varying task load (i.e., workload) levels. We present three metrics that can be employed as real-time indices of cognitive workload. In addition, we develop a predictive system utilizing the pupillary metrics to demonstrate cognitive context detection within simulated supervisory control of UAS. Further, we use pupillary data collected concurrently from the left and right eye and present comparative results of the use of separate vs. combined pupillary data for detecting cognitive context.

  12. Envy's pathology: Historical contexts.

    PubMed

    Minou, Lina

    2017-01-01

    This article is concerned with the physicality of envy primarily in early -modern, but also in eighteenth-century health contexts. The discussion brings together descriptions of the effects of envy on the body of the envier, mainly from works of physiology and health preservation, but also from literary and spiritual writings. These depictions of envy are studied beyond their symbolism and with a view to establish whether they are meaningful according to the medical theories of the time in which they occur. The discussion begins by acknowledging the status of envy as a 'disease' and looks to the specific ways in which the discourse of envy conveys this sense. I find that in the early modern discourse envy is always pathological, that is, it is experienced as disease and signifies disease in general and several diseases in particular. Moreover, envy is uniquely placed to convey pathology on account of its being connected to inherently pathogenic elements of the humoural theory. Specifically, envy is physiologically connected to melancholy, and the way it is presented comes close to attributes assigned to black bile. In addition, envy realizes pathology, the occurrence of disease in the body, by impairing the vital process of digestion and thus depriving the person from proper nourishment and sustenance. The analysis further considers how this impairment of the body fits with the physiological manifestation of envy as 'corrosion' and 'consumption'. Finding commonalities with other maladies mediated by these physiological signs the article concludes by considering the function of pathology in the conception of early modern envy.

  13. Disagreeing in context

    PubMed Central

    Marques, Teresa

    2015-01-01

    This paper argues for contextualism about predicates of personal taste and evaluative predicates in general, and offers a proposal of how apparently resilient disagreements are to be explained. The present proposal is complementary to others that have been made in the recent literature. Several authors, for instance (López de Sa, 2008; Sundell, 2011; Huvenes, 2012; Marques and García-Carpintero, 2014; Marques, 2014a), have recently defended semantic contextualism for those kinds of predicates from the accusation that it faces the problem of lost disagreement. These authors have proposed that a proper account of the resilient disagreement in the cases studied is to be achieved by an appeal to pragmatic processes, and to conflicting non-doxastic attitudes. It is argued here that the existing contextualist solutions are incomplete as they stand, and are subject to objections because of this. A supplementation of contextualism is offered, together with an explanation of why failed presuppositions of commonality (López de Sa), disputes over the appropriateness of a contextually salient standard (Sundell), and differences in non-doxastic attitudes (Sundell, Huvenes, Marques, and García-Carpintero) give rise to conflicts. This paper claims that conflicts of attitudes are the reason why people still have impressions of disagreement in spite of failed commonality presuppositions, that those conflicts drive metalinguistic disputes over the selection of appropriate standards, and hence conflicting non-doxastic attitudes demand an explanation that is independent of those context dependent pragmatic processes. The paper further argues that the missing explanation is 2-fold: first, disagreement prevails where the properties expressed by taste and value predicates are response-dependent properties, and, secondly, it prevails where those response-dependent properties are involved in evolved systems of coordination that respond to evolutionarily recurrent situations. PMID

  14. Disagreeing in context.

    PubMed

    Marques, Teresa

    2015-01-01

    This paper argues for contextualism about predicates of personal taste and evaluative predicates in general, and offers a proposal of how apparently resilient disagreements are to be explained. The present proposal is complementary to others that have been made in the recent literature. Several authors, for instance (López de Sa, 2008; Sundell, 2011; Huvenes, 2012; Marques and García-Carpintero, 2014; Marques, 2014a), have recently defended semantic contextualism for those kinds of predicates from the accusation that it faces the problem of lost disagreement. These authors have proposed that a proper account of the resilient disagreement in the cases studied is to be achieved by an appeal to pragmatic processes, and to conflicting non-doxastic attitudes. It is argued here that the existing contextualist solutions are incomplete as they stand, and are subject to objections because of this. A supplementation of contextualism is offered, together with an explanation of why failed presuppositions of commonality (López de Sa), disputes over the appropriateness of a contextually salient standard (Sundell), and differences in non-doxastic attitudes (Sundell, Huvenes, Marques, and García-Carpintero) give rise to conflicts. This paper claims that conflicts of attitudes are the reason why people still have impressions of disagreement in spite of failed commonality presuppositions, that those conflicts drive metalinguistic disputes over the selection of appropriate standards, and hence conflicting non-doxastic attitudes demand an explanation that is independent of those context dependent pragmatic processes. The paper further argues that the missing explanation is 2-fold: first, disagreement prevails where the properties expressed by taste and value predicates are response-dependent properties, and, secondly, it prevails where those response-dependent properties are involved in evolved systems of coordination that respond to evolutionarily recurrent situations.

  15. Envy's pathology: Historical contexts

    PubMed Central

    Minou, Lina

    2017-01-01

    This article is concerned with the physicality of envy primarily in early –modern, but also in eighteenth-century health contexts. The discussion brings together descriptions of the effects of envy on the body of the envier, mainly from works of physiology and health preservation, but also from literary and spiritual writings. These depictions of envy are studied beyond their symbolism and with a view to establish whether they are meaningful according to the medical theories of the time in which they occur. The discussion begins by acknowledging the status of envy as a ‘disease’ and looks to the specific ways in which the discourse of envy conveys this sense. I find that in the early modern discourse envy is always pathological, that is, it is experienced as disease and signifies disease in general and several diseases in particular. Moreover, envy is uniquely placed to convey pathology on account of its being connected to inherently pathogenic elements of the humoural theory. Specifically, envy is physiologically connected to melancholy, and the way it is presented comes close to attributes assigned to black bile. In addition, envy realizes pathology, the occurrence of disease in the body, by impairing the vital process of digestion and thus depriving the person from proper nourishment and sustenance. The analysis further considers how this impairment of the body fits with the physiological manifestation of envy as ‘corrosion’ and ‘consumption’. Finding commonalities with other maladies mediated by these physiological signs the article concludes by considering the function of pathology in the conception of early modern envy. PMID:28748219

  16. Context-Responsive Leadership: Examining Superintendent Leadership in Context

    ERIC Educational Resources Information Center

    Bredeson, Paul V.; Klar, Hans W.; Johansson, Olof

    2011-01-01

    It is widely acknowledged that context matters, that it affects leadership practices. A large body of descriptive studies documents common elements in the work of school superintendents. What is less well known is how superintendents' leadership may be expressed very differently given the varying contexts in which they work. The purpose of this…

  17. Non-context-free grammars generating context-free languages

    NASA Technical Reports Server (NTRS)

    Baker, B. S.

    1974-01-01

    If G is a grammar such that in each non-context-free rule of G, the right side contains a string of terminals longer than any terminal string appearing between two nonterminals in the left side, then the language generated by G is context free. Six previous results follow as corollaries of this theorem.

  18. Non-context-free grammars generating context-free languages

    NASA Technical Reports Server (NTRS)

    Baker, B. S.

    1974-01-01

    If G is a grammar such that in each non-context-free rule of G, the right side contains a string of terminals longer than any terminal string appearing between two nonterminals in the left side, then the language generated by G is context free. Six previous results follow as corollaries of this theorem.

  19. Hierarchical video summarization based on context clustering

    NASA Astrophysics Data System (ADS)

    Tseng, Belle L.; Smith, John R.

    2003-11-01

    A personalized video summary is dynamically generated in our video personalization and summarization system based on user preference and usage environment. The three-tier personalization system adopts the server-middleware-client architecture in order to maintain, select, adapt, and deliver rich media content to the user. The server stores the content sources along with their corresponding MPEG-7 metadata descriptions. In this paper, the metadata includes visual semantic annotations and automatic speech transcriptions. Our personalization and summarization engine in the middleware selects the optimal set of desired video segments by matching shot annotations and sentence transcripts with user preferences. Besides finding the desired contents, the objective is to present a coherent summary. There are diverse methods for creating summaries, and we focus on the challenges of generating a hierarchical video summary based on context information. In our summarization algorithm, three inputs are used to generate the hierarchical video summary output. These inputs are (1) MPEG-7 metadata descriptions of the contents in the server, (2) user preference and usage environment declarations from the user client, and (3) context information including MPEG-7 controlled term list and classification scheme. In a video sequence, descriptions and relevance scores are assigned to each shot. Based on these shot descriptions, context clustering is performed to collect consecutively similar shots to correspond to hierarchical scene representations. The context clustering is based on the available context information, and may be derived from domain knowledge or rules engines. Finally, the selection of structured video segments to generate the hierarchical summary efficiently balances between scene representation and shot selection.

  20. Laniakea in a Cosmological Context

    NASA Astrophysics Data System (ADS)

    Hernandez-Charpak, S. D.; Forero-Romero, J. E.

    2017-07-01

    Laniakea, our local supercluster, was defined by recent observationa of the local cosmic flow. In this work we present a study on large cosmological N-body simulations aimed at establishing the significance of Laniakea in a cosmological context. We find that superclusters similar in size and structure to Laniakea are relatively uncommon on a broader cosmological context.

  1. Interpreting Texts in Classroom Contexts.

    ERIC Educational Resources Information Center

    Unrau, Norman J.; Ruddell, Robert B.

    1995-01-01

    Describes a series of instructional episodes in an 11th-grade classroom discussing J.D. Salinger's short story "The Laughing Man." Presents and discusses the "Text and Context" model for the negotiation of interpretations in classroom contexts. Offers suggestions for developing interpretive classroom communities. (SR)

  2. Interval Recognition in Minimal Context.

    ERIC Educational Resources Information Center

    Shatzkin, Merton

    1984-01-01

    Music majors were asked to identify interval when it was either preceded or followed by a tone moving in the same direction. Difficulties in interval recognition in context appear to be an effect not just of placement within the context or of tonality, but of particular combinations of these aspects. (RM)

  3. Popular Culture, Methods, and Context.

    ERIC Educational Resources Information Center

    Harmer, Jeremy

    2003-01-01

    Responds to an earlier article that argues that the dominance of communicative language teaching (CLT) has led to the neglect of one crucial aspect of language pedagogy, namely the context in which that pedagogy takes place. Suggests that it is time to replace CLT as the central paradigm in language teaching with a context approach. (Author/VWL)

  4. Teaching Psychology: The Political Context

    ERIC Educational Resources Information Center

    Newland, John

    2008-01-01

    In this commentary, the author raises two critical aspects not adequately addressed in John Radford's (2008) wide ranging article on the teaching of psychology in higher education. The first aspect is the relevance of boundaries. The second aspect is the political context(s). These two issues, though artificially dissociated for current purposes,…

  5. Language Teaching and Its Contexts

    ERIC Educational Resources Information Center

    Byram, Michael

    2013-01-01

    The title of this new journal provides opportunity to review the many contexts which need to be taken into account in reflecting upon foreign language teaching. These contexts include the educational, the fact that much language teaching takes place within general educational and often compulsory educational settings and institutions. Learners…

  6. The Context Oriented Training Method.

    ERIC Educational Resources Information Center

    Cavrini, Andrea

    The Context Oriented Training (COT) method is introduced and explored in this paper. COT is a means of improving the training process, beginning with the observation and analysis of current corporate experiences in the field. The learning context lies between the development of professional competencies in training and the operational side in the…

  7. Collections Management, Collections Maintenance, and Conservation.

    ERIC Educational Resources Information Center

    American Association of Museums, Washington, DC.

    This national survey of the state of the nation's museum collections investigates collection care policies and practices, conservation issues, and private sector and federal support for museum needs. It consists of two major projects and four additional information gathering projects. The Museum Collection Survey is designed to examine all major…

  8. Collective Psychological Ownership and Intergroup Relations.

    PubMed

    Verkuyten, Maykel; Martinovic, Borja

    2017-09-01

    Whereas much social psychological research has studied the in-group and out-group implications of social categorization and collective identity ("we"), little research has examined the nature and relevance of collective psychological ownership ("ours") for intergroup relations. We make a case for considering collective psychological ownership as an important source of intergroup tensions. We do so by integrating theory and research from various social sciences, and we draw out implications for future social psychological research on intergroup relations. We discuss collective psychological ownership in relation to the psychology of possessions, marking behavior, intergroup threats, outgroup exclusion, and in-group responsibility. We suggest that the social psychological processes discussed apply to a range of ownership objects (territory, buildings, cultural artifacts) and various intergroup settings, including international, national, and local contexts, and in organizations and communities. We conclude by providing directions for future research in different intergroup contexts.

  9. Context-Enabled Business Intelligence

    SciTech Connect

    Troy Hiltbrand

    2012-04-01

    To truly understand context and apply it in business intelligence, it is vital to understand what context is and how it can be applied in addressing organizational needs. Context describes the facets of the environment that impact the way that end users interact with the system. Context includes aspects of location, chronology, access method, demographics, social influence/ relationships, end-user attitude/ emotional state, behavior/ past behavior, and presence. To be successful in making Business Intelligence content enabled, it is important to be able to capture the context of use user. With advances in technology, there are a number of ways in which this user based information can be gathered and exposed to enhance the overall end user experience.

  10. Collective Bargaining in Higher Education. The State of the Art.

    ERIC Educational Resources Information Center

    Julius, Daniel J., Ed.

    American higher education collective bargaining is addressed in 21 essays by administrators and academicians who are actively engaged in the process. Titles and authors are as follows: "The Context of Collective Bargaining in American Colleges and Universities" (Kenneth P. Mortimer); "Collective Bargaining in the Multi-Campus System" (Richard E.…

  11. Special Collections, Primary Resources, and Information Literacy Pedagogy

    ERIC Educational Resources Information Center

    Hubbard, Melissa A.; Lotts, Megan

    2013-01-01

    This article reports on collaboration between an information literacy (IL) instructor and a special collections librarian to create a hands-on special collections experience for entry-level IL students within the context of a credit-bearing class. Data collected during this experience found that exposing students to these materials can increase…

  12. Collection Directions: The Evolution of Library Collections and Collecting

    ERIC Educational Resources Information Center

    Dempsey, Lorcan; Malpas, Constance; Lavoie, Brian

    2014-01-01

    This article takes a broad view of the evolution of collecting behaviors in a network environment and suggests some future directions based on various simple models. The authors look at the changing dynamics of print collections, at the greater engagement with research and learning behaviors, and at trends in scholarly communication. The goal is…

  13. Collection Directions: The Evolution of Library Collections and Collecting

    ERIC Educational Resources Information Center

    Dempsey, Lorcan; Malpas, Constance; Lavoie, Brian

    2014-01-01

    This article takes a broad view of the evolution of collecting behaviors in a network environment and suggests some future directions based on various simple models. The authors look at the changing dynamics of print collections, at the greater engagement with research and learning behaviors, and at trends in scholarly communication. The goal is…

  14. Collecting Artists' Books.

    ERIC Educational Resources Information Center

    Dalberto, Janet

    1983-01-01

    Discussion of increase in library collections of artists' books (artwork conceived in book form and designed entirely by artists) highlights reasons to collect artists' books, major collections, establishing a collection, housing and preservation, organization, outreach, and networking. Collection policy and procedures of Virginia Commonwealth…

  15. Human collective reactions to threat.

    PubMed

    Dezecache, Guillaume

    2015-01-01

    A common assumption regarding mass emergency situations is that individuals in such contexts behave in a way that maximizes their likelihood to escape, at the expense, or with little concern for, the welfare and survival of their neighbors. Doing so, they might even compromise the effectiveness of group evacuation. This conception follows the views of early works on crowd psychology, a tradition born with Gustave Le Bon's The Crowd: a study of the Popular Mind, first published in 1895, and which has had a tremendous impact on scientific representations of people's behavior in mass emergency contexts. Indeed, this work has greatly contributed to the idea that, in such situations, people revert to a primitive, impulsive, irrational, and antisocial nature, causing the breakdown of social order. However, more empirically oriented studies have consistently reported little collective panic, as well as a great deal of solidarity and pro-social behavior during mass emergency situations. Because of institutional barriers, such views have remained largely unknown to cognitive psychologists. Yet these are important results in that they show that human individual and collective reactions to threat are primarily affiliative. Indeed, far from leading to the breakdown of the social fabrics, the presence of a common threat can strengthen social bonds. © 2015 John Wiley & Sons, Ltd.

  16. Social Context in School: Its Relation to Adolescents' Depressive Mood

    ERIC Educational Resources Information Center

    Boulard, Aurore; Quertemont, Etienne; Gauthier, Jean-Marie; Born, Michel

    2012-01-01

    This study examined the impact of various school-related factors on adolescents' depressive mood, including prosocial behavior, verbal aggression, and relationships with teachers. The data used in this study were collected in the context of a larger survey on victimization in secondary schools from the French Community of Belgium. Participants…

  17. Learning in Authentic Contexts: Projects Integrating Spatial Technologies and Fieldwork

    ERIC Educational Resources Information Center

    Huang, Kuo-Hung

    2011-01-01

    In recent years, professional practice has been an issue of concern in higher education. The purpose of this study is to design students' projects to facilitate collaborative learning in authentic contexts. Ten students majoring in Management Information Systems conducted fieldwork with spatial technologies to collect data and provided information…

  18. ESL Readers' Comprehension Performance: The Chinese Secondary Context

    ERIC Educational Resources Information Center

    Chau, Juliana; Wu, Winnie; Chen, Julia; Lughmani, Shari

    2012-01-01

    Recent research in reading comprehension in Western settings has focused on collecting evidence from reading tests that would measure relevant ESL reading constructs to inform reading instruction and assessment. Similar studies in non-Western contexts, however, remain under-reported. This study involved 958 senior secondary Hong Kong (Chinese)…

  19. ESL Readers' Comprehension Performance: The Chinese Secondary Context

    ERIC Educational Resources Information Center

    Chau, Juliana; Wu, Winnie; Chen, Julia; Lughmani, Shari

    2012-01-01

    Recent research in reading comprehension in Western settings has focused on collecting evidence from reading tests that would measure relevant ESL reading constructs to inform reading instruction and assessment. Similar studies in non-Western contexts, however, remain under-reported. This study involved 958 senior secondary Hong Kong (Chinese)…

  20. A Context-Based Strategy for Teaching Vocabulary

    ERIC Educational Resources Information Center

    Nelson, Deanna L.

    2008-01-01

    Students in Deanna L. Nelson's high school classroom study vocabulary gradually over a period of time. Students begin by collecting words from readings and listing them on a designated whiteboard. They prepare practice quizzes to exchange with peers and engage in frequent vocabulary discussions that emphasize recognition of context clues and other…

  1. Learning in Authentic Contexts: Projects Integrating Spatial Technologies and Fieldwork

    ERIC Educational Resources Information Center

    Huang, Kuo-Hung

    2011-01-01

    In recent years, professional practice has been an issue of concern in higher education. The purpose of this study is to design students' projects to facilitate collaborative learning in authentic contexts. Ten students majoring in Management Information Systems conducted fieldwork with spatial technologies to collect data and provided information…

  2. Washback of English National Examination in the Indonesian Context

    ERIC Educational Resources Information Center

    Furaidah; Saukah, Ali; Widiati, Utami

    2015-01-01

    This study examines how teachers teach English to prepare students for high-stakes English national examination in the Indonesian context. Data were collected from two high-achieving and three low-achieving schools with eleven teachers as the subjects of in-depth interviews and non-participatory classroom observations. The findings reveal that…

  3. Reinventing Urban Education. Multiculturalism and the Social Context of Schooling.

    ERIC Educational Resources Information Center

    Rivera-Batiz, Francisco L., Ed.

    The papers in this collection describe how education is being reinvented in urban school systems in the United States. Selections discuss the urban landscape, the social context of schooling, and the theory and practice of multiculturalism. Papers include: (1) "Introduction: Reinventing Urban Education" (Francisco L. Rivera-Batiz); (2) "The…

  4. Context Switch Effects and Context Experience in Rats' Conditioned Taste Aversion

    ERIC Educational Resources Information Center

    Leon, Samuel P.; Callejas-Aguilera, Jose E.; Rosas, Juan M.

    2012-01-01

    Context specificity of rats' conditioned taste aversion as a function of context experience was assessed in two experiments. Rats received a single pairing between a flavor X and a LiCl injection in a distinctive context (context A) being subsequently tested either in the same context or in a different but equally familiar context (context B).…

  5. Transfer from classical mechanics context to electricity and magnetism context

    NASA Astrophysics Data System (ADS)

    Gonzalez, Maria D.; Kanim, Stephen

    2008-10-01

    Some classical mechanics concepts, like density, vectors use, conservative fields, 3^rd Newton Law, velocity and acceleration physical and mathematical relations, are the basis for the development of related concepts that are central to the subsequent electricity and magnetism course. We believe that if students and instructors involved recognize the underlying features that are common to the two contexts, a better understanding and performance will be achieved. We are developing a pre- and post-test that is intended to measure the extent to which (1) students enter the electricity and magnetism course with a sufficient mechanics foundation; (2) there is a correlation between student responses to similar questions in mechanics and electrostatics contexts; and (3) mechanics understanding is strengthened through reintroduction of physics principles in a second context. We will give examples of ``paired'' questions and give data from administrations of the pre- and post-tests.

  6. Conceptions of Assessment When the Teaching Context and Learner Population Matter: Compulsory School versus Non-Compulsory Adult Education Contexts

    ERIC Educational Resources Information Center

    Remesal, Ana; Brown, Gavin T. L.

    2015-01-01

    This paper presents results of a study on teachers' conceptions of assessment carried out on a sample of 493 teachers of Spanish as foreign language from all over the world. At the moment of data collection, the participants were members of an international online teacher community and were teaching at different professional contexts: basic…

  7. Context-aware system design

    NASA Astrophysics Data System (ADS)

    Chan, Christine S.; Ostertag, Michael H.; Akyürek, Alper Sinan; Šimunić Rosing, Tajana

    2017-05-01

    The Internet of Things envisions a web-connected infrastructure of billions of sensors and actuation devices. However, the current state-of-the-art presents another reality: monolithic end-to-end applications tightly coupled to a limited set of sensors and actuators. Growing such applications with new devices or behaviors, or extending the existing infrastructure with new applications, involves redesign and redeployment. We instead propose a modular approach to these applications, breaking them into an equivalent set of functional units (context engines) whose input/output transformations are driven by general-purpose machine learning, demonstrating an improvement in compute redundancy and computational complexity with minimal impact on accuracy. In conjunction with formal data specifications, or ontologies, we can replace application-specific implementations with a composition of context engines that use common statistical learning to generate output, thus improving context reuse. We implement interconnected context-aware applications using our approach, extracting user context from sensors in both healthcare and grid applications. We compare our infrastructure to single-stage monolithic implementations with single-point communications between sensor nodes and the cloud servers, demonstrating a reduction in combined system energy by 22-45%, and multiplying the battery lifetime of power-constrained devices by at least 22x, with easy deployment across different architectures and devices.

  8. Arc-An OAI Service Provider for Digital Library Federation; Kepler-An OAI Data/Service Provider for the Individual; Information Objects and Rights Management: A Mediation-Based Approach to DRM Interoperability; Automated Name Authority Control and Enhanced Searching in the Levy Collection; Renardus Project Developments and the Wider Digital Library Context.

    ERIC Educational Resources Information Center

    Liu, Xiaoming; Maly, Kurt; Zubair, Mohammad; Nelson, Michael L.; Erickson, John S.; DiLauro, Tim; Choudhury, G. Sayeed; Patton, Mark; Warner, James W.; Brown, Elizabeth W.; Heery, Rachel; Carpenter, Leona; Day, Michael

    2001-01-01

    Includes five articles that discuss the OAI (Open Archive Initiative), an interface between data providers and service providers; information objects and digital rights management interoperability; digitizing library collections, including automated name authority control, metadata, and text searching engines; and building digital library services…

  9. Arc-An OAI Service Provider for Digital Library Federation; Kepler-An OAI Data/Service Provider for the Individual; Information Objects and Rights Management: A Mediation-Based Approach to DRM Interoperability; Automated Name Authority Control and Enhanced Searching in the Levy Collection; Renardus Project Developments and the Wider Digital Library Context.

    ERIC Educational Resources Information Center

    Liu, Xiaoming; Maly, Kurt; Zubair, Mohammad; Nelson, Michael L.; Erickson, John S.; DiLauro, Tim; Choudhury, G. Sayeed; Patton, Mark; Warner, James W.; Brown, Elizabeth W.; Heery, Rachel; Carpenter, Leona; Day, Michael

    2001-01-01

    Includes five articles that discuss the OAI (Open Archive Initiative), an interface between data providers and service providers; information objects and digital rights management interoperability; digitizing library collections, including automated name authority control, metadata, and text searching engines; and building digital library services…

  10. Integrating Risk Context into Risk Assessments: The Risk Context Scale

    ERIC Educational Resources Information Center

    Kroner, Daryl G.; Gray, Andrew L.; Goodrich, Ben

    2013-01-01

    The context in which offenders are released is an important component of conducting risk assessments. A sample of 257 supervised male parolees were followed in the community ("M" = 870 days) after an initial risk assessment. Drawing on community-based information, the purpose of this study was to evaluate the recently developed Risk…

  11. Integrating Risk Context into Risk Assessments: The Risk Context Scale

    ERIC Educational Resources Information Center

    Kroner, Daryl G.; Gray, Andrew L.; Goodrich, Ben

    2013-01-01

    The context in which offenders are released is an important component of conducting risk assessments. A sample of 257 supervised male parolees were followed in the community ("M" = 870 days) after an initial risk assessment. Drawing on community-based information, the purpose of this study was to evaluate the recently developed Risk…

  12. Developmental Context(s): Mediating Learning through Language Ideologies

    ERIC Educational Resources Information Center

    Razfar, Aria; Rumenapp, Joseph C.

    2011-01-01

    This paper argues for an expanded notion of context and the mediational tools that frame language learning. More specifically, we argue for a more explicit understanding of language ideologies as a key mediating tool and object in learning and development. Language ideologies bring coherence to the interaction of macro-historical processes,…

  13. Neighborhood context and residential mobility.

    PubMed

    Lee, B A; Oropesa, R S; Kanan, J W

    1994-05-01

    This paper extends the search for neighborhood contextual effects to residential mobility. We propose that neighborhood consists of subjective and objective domains, both of which are crosscut by substantive (social/physical) and temporal (current/change) dimensions. Measures of neighborhood characteristics consistent with our conceptualization are used to estimate the impact of context on mobility thoughts and on actual mobility in a sample of Nashville residents. Although individual statuses such as age and tenure remain important antecedents of mobility, subjective features of neighborhood context also play a role--albeit limited and indirect--in the decision to move or to stay.

  14. The social context of well-being.

    PubMed Central

    Helliwell, John F; Putnam, Robert D

    2004-01-01

    Large samples of data from the World Values Survey, the US Benchmark Survey and a comparable Canadian survey are used to estimate equations designed to explore the social context of subjective evaluations of well-being, of happiness, and of health. Social capital, as measured by the strength of family, neighbourhood, religious and community ties, is found to support both physical health and subjective well-being. Our new evidence confirms that social capital is strongly linked to subjective well-being through many independent channels and in several different forms. Marriage and family, ties to friends and neighbours, workplace ties, civic engagement (both individually and collectively), trustworthiness and trust: all appear independently and robustly related to happiness and life satisfaction, both directly and through their impact on health. PMID:15347534

  15. The social context of well-being.

    PubMed

    Helliwell, John F; Putnam, Robert D

    2004-09-29

    Large samples of data from the World Values Survey, the US Benchmark Survey and a comparable Canadian survey are used to estimate equations designed to explore the social context of subjective evaluations of well-being, of happiness, and of health. Social capital, as measured by the strength of family, neighbourhood, religious and community ties, is found to support both physical health and subjective well-being. Our new evidence confirms that social capital is strongly linked to subjective well-being through many independent channels and in several different forms. Marriage and family, ties to friends and neighbours, workplace ties, civic engagement (both individually and collectively), trustworthiness and trust: all appear independently and robustly related to happiness and life satisfaction, both directly and through their impact on health.

  16. Overview of the Student Collection on ComPADRE

    NASA Astrophysics Data System (ADS)

    Donnelly, David

    2006-12-01

    The Nucleus is the student collection in the ComPADRE digital library. The collection has been developed with two main goals: to provide valuable resources to physics and astronomy students, and to build an online student community. The author will present the salient features of the collection, and discuss their historical development. The author will also discuss the student collection in the context of the entire ComPADRE project. The relation of the collection to the other collections in ComPADRE will also be discussed.

  17. Classification of Tumor Histology via Morphometric Context.

    PubMed

    Chang, Hang; Borowsky, Alexander; Spellman, Paul; Parvin, Bahram

    2013-06-23

    Image-based classification of tissue histology, in terms of different components (e.g., normal signature, categories of aberrant signatures), provides a series of indices for tumor composition. Subsequently, aggregation of these indices in each whole slide image (WSI) from a large cohort can provide predictive models of clinical outcome. However, the performance of the existing techniques is hindered as a result of large technical and biological variations that are always present in a large cohort. In this paper, we propose two algorithms for classification of tissue histology based on robust representations of morphometric context, which are built upon nuclear level morphometric features at various locations and scales within the spatial pyramid matching (SPM) framework. These methods have been evaluated on two distinct datasets of different tumor types collected from The Cancer Genome Atlas (TCGA), and the experimental results indicate that our methods are (i) extensible to different tumor types; (ii) robust in the presence of wide technical and biological variations; (iii) invariant to different nuclear segmentation strategies; and (iv) scalable with varying training sample size. In addition, our experiments suggest that enforcing sparsity, during the construction of morphometric context, further improves the performance of the system.

  18. Migration of cells in a social context.

    PubMed

    Vedel, Søren; Tay, Savaş; Johnston, Darius M; Bruus, Henrik; Quake, Stephen R

    2013-01-02

    In multicellular organisms and complex ecosystems, cells migrate in a social context. Whereas this is essential for the basic processes of life, the influence of neighboring cells on the individual remains poorly understood. Previous work on isolated cells has observed a stereotypical migratory behavior characterized by short-time directional persistence with long-time random movement. We discovered a much richer dynamic in the social context, with significant variations in directionality, displacement, and speed, which are all modulated by local cell density. We developed a mathematical model based on the experimentally identified "cellular traffic rules" and basic physics that revealed that these emergent behaviors are caused by the interplay of single-cell properties and intercellular interactions, the latter being dominated by a pseudopod formation bias mediated by secreted chemicals and pseudopod collapse following collisions. The model demonstrates how aspects of complex biology can be explained by simple rules of physics and constitutes a rapid test bed for future studies of collective migration of individual cells.

  19. Bringing Context and Methodology Together.

    ERIC Educational Resources Information Center

    Bax, Stephen

    2003-01-01

    Responds to comments made by Jeremy Harmer about an earlier article written by the author that argued the dominance of communicative language teaching (CLT) has led to the neglect of one crucial aspect of language pedagogy, namely the context in which that pedagogy takes place. (Author/VWL)

  20. Digital Citizenship within Global Contexts

    ERIC Educational Resources Information Center

    Searson, Michael; Hancock, Marsali; Soheil, Nusrat; Shepherd, Gregory

    2015-01-01

    EduSummIT 2013 featured a working group that examined digital citizenship within a global context. Group members recognized that, given today's international, regional, political, and social dynamics, the notion of "global" might be more aspirational than practical. The development of informed policies and practices serving and involving…

  1. Social Contexts of Beginning Reading.

    ERIC Educational Resources Information Center

    Griffin, Mary Lee

    2001-01-01

    Examines social contexts of beginning readers through an exploration of three dimensions that have an impact upon beginning readers' reading events: peer relationships and their role in children's reading development, children's oral language and discourse, and constructivism and sociocultural perspectives on learning. Offers implications for…

  2. The Context of Media Study.

    ERIC Educational Resources Information Center

    O'Grady, Gerald

    Media study is centered on composing and understanding the codes of three image-making technologies--film, video, and computer. It locates these activities within the context of the changing materials, processes, and systems of these technologies; within contemporary developments in their creative and critical practices; and within the evolution…

  3. School Grading and Institutional Contexts

    ERIC Educational Resources Information Center

    Dardanoni, Valentino; Modica, Salvatore; Pennisi, Aline

    2011-01-01

    We study how the relationship between students' cognitive ability and their school grades depends on institutional contexts. In a simple abstract model, we show that unless competence standards are set at above-school level or the variation of competence across schools is low, students' competence valuation will be heterogeneous, with weaker…

  4. Context Orientated Teaching in Praxis

    ERIC Educational Resources Information Center

    Nikos, Klaoudatos; Stavros, Papastavridis

    2004-01-01

    In this paper, we describe the skeleton of two teaching units, based on a Model for teaching mathematics, Context Orientated Teaching (COT). The first teaching unit concerns the proof of a mathematical proposition, while the second one concerns the solution of an open problem. Both are taught in the 10th grade, under the specific conditions of the…

  5. Placing Computer Learning in Context.

    ERIC Educational Resources Information Center

    Mitrani, Marco; Swan, Karen

    The context of learning with computers is different from that of more traditional educational media because the computer is a new medium whose interactivity supports dynamic, evident, and malleable representations of abstract ideas. The model proposed addresses some mediating factors of the environment in which computers are used that affect…

  6. The Quest for Historical Context.

    ERIC Educational Resources Information Center

    Aronson, Marc

    2000-01-01

    Explains how the author put a young adult book on Sir Walter Raleigh into the proper historical context. Describes reading other authors about the Elizabethan period and discovering the passions that motivated explorers, and suggests further reading on Sir Walter Raleigh and this period in history. (LRW)

  7. Abortion, infanticide and moral context.

    PubMed

    Porter, Lindsey

    2013-05-01

    In 'After-birth abortion: why should the baby live?', Giubilini and Minerva argue that infanticide should be permitted for the same reasons as abortion. In particular, they argue that infanticide should be permitted even for reasons that do not primarily serve the interests (or would-be best interests) of the newborn. They claim that abortion is permissible for reasons that do not primarily serve the interests (or would-be interests) of the fetus because fetuses lack a right to life. They argue that newborns also lack a right to life, and they conclude that therefore, the same reasons that justify abortion can justify infanticide. This conclusion does not follow. The lack of a right to life is not decisive. Furthermore, the justificatory power of a given reason is a function of moral context. Generalisations about reasons across dissimilar moral contexts are invalid. However, a similar conclusion does follow-that fetus-killing and newborn-killing are morally identical in identical moral contexts-but this conclusion is trivial, since fetuses and newborns are never in identical moral contexts.

  8. Contexts of Social Studies Education.

    ERIC Educational Resources Information Center

    Lunstrum, John P.

    1990-01-01

    Examines the "Handbook of Research on Social Studies Teaching and Learning's" section on context effect. Reviews influences that shape social studies, including research, student groups, family environment, mass media (especially television), testing, curriculum mandates, and local-to-national community pressures. (CH)

  9. Towards Context Sensitive Information Inference.

    ERIC Educational Resources Information Center

    Song, D.; Bruza, P. D.

    2003-01-01

    Discusses information inference from a psychologistic stance and proposes an information inference mechanism that makes inferences via computations of information flow through an approximation of a conceptual space. Highlights include cognitive economics of information processing; context sensitivity; and query models for information retrieval.…

  10. The Context of Media Study.

    ERIC Educational Resources Information Center

    O'Grady, Gerald

    Media study is centered on composing and understanding the codes of three image-making technologies--film, video, and computer. It locates these activities within the context of the changing materials, processes, and systems of these technologies; within contemporary developments in their creative and critical practices; and within the evolution…

  11. Health Behavior in Ecological Context

    ERIC Educational Resources Information Center

    Simons-Morton, Bruce

    2013-01-01

    Health is best understood within an ecological context. Accordingly, health promotion involves processes that foster supportive environments and healthful behavior. Thus, effective health promotion programs are typically multilevel, focusing not only on the population at risk but also on the environmental conditions that contribute so importantly…

  12. Bringing Context and Methodology Together.

    ERIC Educational Resources Information Center

    Bax, Stephen

    2003-01-01

    Responds to comments made by Jeremy Harmer about an earlier article written by the author that argued the dominance of communicative language teaching (CLT) has led to the neglect of one crucial aspect of language pedagogy, namely the context in which that pedagogy takes place. (Author/VWL)

  13. Health Behavior in Ecological Context

    ERIC Educational Resources Information Center

    Simons-Morton, Bruce

    2013-01-01

    Health is best understood within an ecological context. Accordingly, health promotion involves processes that foster supportive environments and healthful behavior. Thus, effective health promotion programs are typically multilevel, focusing not only on the population at risk but also on the environmental conditions that contribute so importantly…

  14. Context Orientated Teaching in Praxis

    ERIC Educational Resources Information Center

    Nikos, Klaoudatos; Stavros, Papastavridis

    2004-01-01

    In this paper, we describe the skeleton of two teaching units, based on a Model for teaching mathematics, Context Orientated Teaching (COT). The first teaching unit concerns the proof of a mathematical proposition, while the second one concerns the solution of an open problem. Both are taught in the 10th grade, under the specific conditions of the…

  15. Teaching Context in Information Security

    ERIC Educational Resources Information Center

    Bishop, Matt

    2006-01-01

    This article investigates teaching the application of technical ideas by non-technical means, especially by using puzzles to engage students. After discussing the need to teach students to evaluate contexts in which decisions about computer security must be made, we suggest questions and scenarios drawn from political science, history, as well as…

  16. Motivational Interviewing in Relational Context

    ERIC Educational Resources Information Center

    Miller, William R.; Rose, Gary S.

    2010-01-01

    Responds to M. Stanton's comments on the current author's original article. One of the puzzles of motivational interviewing is why it works at all. How can it be that an individual interview or two yields change in a long-standing problem behavior even without any effort to alter social context? The time involved is such a tiny part of the…

  17. Teaching Context in Information Security

    ERIC Educational Resources Information Center

    Bishop, Matt

    2006-01-01

    This article investigates teaching the application of technical ideas by non-technical means, especially by using puzzles to engage students. After discussing the need to teach students to evaluate contexts in which decisions about computer security must be made, we suggest questions and scenarios drawn from political science, history, as well as…

  18. Motivational Interviewing in Relational Context

    ERIC Educational Resources Information Center

    Miller, William R.; Rose, Gary S.

    2010-01-01

    Responds to M. Stanton's comments on the current author's original article. One of the puzzles of motivational interviewing is why it works at all. How can it be that an individual interview or two yields change in a long-standing problem behavior even without any effort to alter social context? The time involved is such a tiny part of the…

  19. The Cultural Context of Administration.

    ERIC Educational Resources Information Center

    Ortiz, Flora Ida

    To explicate the relevance of cultural context to educational administration practices, this paper contrasts United States cultural attitudes and administrative practices with those of Latin America. Drawing on Leslie A. White's definition of culture, the author presents the Weberian model of administration as exemplary for the United States,…

  20. The Cultural Context of Administration.

    ERIC Educational Resources Information Center

    Ortiz, Flora Ida

    To explicate the relevance of cultural context to educational administration practices, this paper contrasts United States cultural attitudes and administrative practices with those of Latin America. Drawing on Leslie A. White's definition of culture, the author presents the Weberian model of administration as exemplary for the United States,…

  1. Digital Citizenship within Global Contexts

    ERIC Educational Resources Information Center

    Searson, Michael; Hancock, Marsali; Soheil, Nusrat; Shepherd, Gregory

    2015-01-01

    EduSummIT 2013 featured a working group that examined digital citizenship within a global context. Group members recognized that, given today's international, regional, political, and social dynamics, the notion of "global" might be more aspirational than practical. The development of informed policies and practices serving and involving…

  2. Collection Mode Lens System

    DOEpatents

    Fletcher, Daniel A.; Kino, Gordon S.

    2002-11-05

    A lens system including a collection lens and a microlens spaced from the collection lens adjacent the region to be observed. The diameter of the observablel region depends substantially on the radius of the microlens.

  3. Improved collecting apparatus

    SciTech Connect

    Duncan, C.P.

    1981-03-05

    An improved collecting apparatus for small aquatic or airborne organisms such as plankton, larval fish, insects, etc. The improvement constitutes an apertured removal container within which is retained a collecting bag, and which is secured at the apex of a conical collecting net. Such collectors are towed behind a vessel or vehicle with the open end of the conical net facing forward for trapping the aquatic or airborne organisms within the collecting bag, while allowing the water or air to pass through the apertures in the container. The container is readily removable from the collecting net whereby the collecting bag can be quickly removed and replaced for further sample collection. The collecting bag is provided with means for preventing the bag from being pulled into the container by the water or air following therethrough.

  4. 75 FR 7600 - Agency Information Collection Activities: Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-22

    ...) the accuracy of the agency's estimate of the burden of the proposed collection of information; (c...)--Revision The Substance Abuse and Mental Health Services Administration's (SAMHSA) Center for Mental Health... stages of program activity: (1) The context stage includes a review of program plans, such as...

  5. Effects of similarity on environmental context cueing.

    PubMed

    Smith, Steven M; Handy, Justin D; Angello, Genna; Manzano, Isabel

    2014-01-01

    Three experiments examined the prediction that context cues which are similar to study contexts can facilitate episodic recall, even if those cues are never seen before the recall test. Environmental context cueing effects have typically produced such small effect sizes that influences of moderating factors, such as the similarity between encoding and retrieval contexts, would be difficult to observe experimentally. Videos of environmental contexts, however, can be used to produce powerful context-dependent memory effects, particularly when only one memory target is associated with each video context, intentional item-context encoding is encouraged, and free recall tests are used. Experiment 1 showed that a not previously viewed video of the study context provided an effective recall cue, although it was not as effective as the originally viewed video context. Experiments 2 and 3 showed that videos of environments that were conceptually similar to encoding contexts (e.g., both were videos of ball field games) also cued recall, but not as well if the encoding contexts were given specific labels (e.g., "home run") incompatible with test contexts (e.g., a soccer scene). A fourth experiment that used incidental item-context encoding showed that video context reinstatement has a robust effect on paired associate memory, indicating that the video context reinstatement effect does not depend on interactive item-context encoding or free recall testing.

  6. Taking love seriously: the context of adolescent pregnancy in Colombia.

    PubMed

    de la Cuesta, C

    2001-07-01

    Findings from a qualitative research study of the context of adolescent pregnancy are presented. Participants were 21 pregnant adolescents from Medellín, Colombia, and nearby villages in the region. Data were collected by means of 21 qualitative interviews, and analysis followed grounded theory procedures. The study reveals that adolescent pregnancy occurs in the context of a "genuine love affair" in which ideas of romantic love and gender rules guide young women's behaviour. Regarding an adolescent as immature or in a process of becoming might hinder adolescents' distinctive culture and circumstances. Ideas of romantic love and gender rules were powerful influences on those who unintentionally got pregnant.

  7. Guide to data collection

    NASA Technical Reports Server (NTRS)

    1981-01-01

    Guidelines and recommendations are presented for the collection of software development data. Motivation and planning for, and implementation and management of, a data collection effort are discussed. Topics covered include types, sources, and availability of data; methods and costs of data collection; types of analyses supported; and warnings and suggestions based on software engineering laboratory (SEL) experiences. This document is intended as a practical guide for software managers and engineers, abstracted and generalized from 5 years of SEL data collection.

  8. Collection Development Project.

    ERIC Educational Resources Information Center

    Nuby, Mary

    Undertaken to provide data on the current status of collection development in selected academic libraries, this study also analyzed the structure of the collection development function at Chicago Academic Library Council (CALC) institutions and outlined a formal collection development policy for Chicago State University's Douglas Library.…

  9. Collection Assessment Manual.

    ERIC Educational Resources Information Center

    Hall, Blaine H.

    This manual is designed to help bibliographers, librarians, and other materials selectors plan and conduct systematic collection evaluations using both collection centered and client centered techniques. Topics covered in five chapters are: (1) planning the assessment; (2) collection-centered techniques, comprising the compilation of statistics,…

  10. Collection Development Project.

    ERIC Educational Resources Information Center

    Nuby, Mary

    Undertaken to provide data on the current status of collection development in selected academic libraries, this study also analyzed the structure of the collection development function at Chicago Academic Library Council (CALC) institutions and outlined a formal collection development policy for Chicago State University's Douglas Library.…

  11. Faculty Collective Bargaining.

    ERIC Educational Resources Information Center

    Nelson, Hershel H.

    Faculties in a number of institutions of higher education utilize collective bargaining agents to represent their interests. Collective bargaining is primarily a community college phenomenon. Of 212 institutions with certified bargaining agents, 150 are 2-year institutions. Motivating factors in choosing the collective bargaining process are: the…

  12. Student Loan Collection Procedures.

    ERIC Educational Resources Information Center

    National Association of College and University Business Officers, Washington, DC.

    This manual on the collection of student loans is intended for the use of business officers and loan collection personnel of colleges and universities of all sizes. The introductory chapter is an overview of sound collection practices and procedures. It discusses the making of a loan, in-school servicing of the accounts, the exit interview, the…

  13. Special Microform Collections.

    ERIC Educational Resources Information Center

    Stewart, R. C.; Byrnes, Margaret

    Focusing on the major collections in the microform reading room at the University of Michigan Library, this guide lists only those collections for which there are indexes or guides in the microform reference collection. Materials described include personal family and presidential papers, early American newspapers, bibliographies of books and…

  14. The Undergraduate Library Collection.

    ERIC Educational Resources Information Center

    Stewart, Rolland C.

    The development of undergraduate library collections is shown under two aspects: (1) the formation of the basic collection of the Undergraduate Library of the University of Michigan, and (2) the problems, practical and theoretial, encountered in the day-to-day effort to maintain the collection. The budget is the sire of all selection criteria.…

  15. Sample collection, biobanking, and analysis.

    PubMed

    Ahsman, Maurice J; Tibboel, Dick; Mathot, Ron A A; de Wildt, Saskia N

    2011-01-01

    Pediatric pharmacokinetic studies require sampling of biofluids from neonates and children. Limitations on sampling frequency and sample volume complicate the design of these studies. In addition, strict guidelines, designed to guarantee patient safety, are in place. This chapter describes the practical implications of sample collection and their storage, with special focus on the selection of the appropriate type of biofluid and withdrawal technique. In addition, we describe appropriate measures for storage of these specimens, for example, in the context of biobanking, and the requirements on drug assay methods that they pose. Pharmacokinetic studies in children are possible, but they require careful selection of an appropriate sampling method, specimen volume, and assay method. The checklist provided could help prospective researchers with the design of an appropriate study protocol and infrastructure.

  16. Collecting Data Outdoors: Making Connections to the Real World.

    ERIC Educational Resources Information Center

    Basile, Carole G.

    1999-01-01

    Describes a process of data collection with young children using the outdoors as a mathematical context. The process of data collection and processing introduces children to more abstract mathematics as they sort and classify data, create graphs, compare datasets, examine patterns, and interpret graphical representations. (ASK)

  17. Visualising Cultures: The "European Picture Book Collection" Moves "Down Under"

    ERIC Educational Resources Information Center

    Cotton, Penni; Daly, Nicola

    2015-01-01

    The potential for picture books in national collections to act as mirrors reflecting the reader's cultural identity, is widely accepted. This paper shows that the books in a New Zealand Picture Book Collection can also become windows into unfamiliar worlds for non-New Zealand readers, giving them the opportunity to learn more about a context in…

  18. Collective Learning: Interaction and a Shared Action Arena

    ERIC Educational Resources Information Center

    Doos, Marianne; Wilhelmson, Lena

    2011-01-01

    Purpose: The paper seeks to argue for a theoretical contribution that deals with the detection of collective learning. The aim is to examine and clarify the genesis processes of collective learning. The empirical basis is a telecoms context with task-driven networking across both internal and external organisational borders.…

  19. Visualising Cultures: The "European Picture Book Collection" Moves "Down Under"

    ERIC Educational Resources Information Center

    Cotton, Penni; Daly, Nicola

    2015-01-01

    The potential for picture books in national collections to act as mirrors reflecting the reader's cultural identity, is widely accepted. This paper shows that the books in a New Zealand Picture Book Collection can also become windows into unfamiliar worlds for non-New Zealand readers, giving them the opportunity to learn more about a context in…

  20. Collective Learning: Interaction and a Shared Action Arena

    ERIC Educational Resources Information Center

    Doos, Marianne; Wilhelmson, Lena

    2011-01-01

    Purpose: The paper seeks to argue for a theoretical contribution that deals with the detection of collective learning. The aim is to examine and clarify the genesis processes of collective learning. The empirical basis is a telecoms context with task-driven networking across both internal and external organisational borders.…

  1. High School Accountability: The Role of Perceived Collective Efficacy

    ERIC Educational Resources Information Center

    Goddard, Roger D.; LoGerfo, Laura; Hoy, Wayne K.

    2004-01-01

    This study examined the relationship between collective efficacy and high school student achievement in a state with an accountability system heavily focused on achievement, measured by mandatory assessments in multiple content areas. Using social cognitive theory, a theoretical model was developed linking school context and collective efficacy to…

  2. Instructional Context and Student Motivation, Learning, and Development: Commentary and Implications for School Psychologists

    ERIC Educational Resources Information Center

    Pendergast, Laura L.; Kaplan, Avi

    2015-01-01

    From an ecological perspective, learning and development in childhood and throughout the lifespan occur in the context of interactions within complex social networks. Collectively, the articles in this special issue illuminate three important themes related to teacher-student interactions within instructional contexts: relationships, competence,…

  3. Theorizing College Governance across Epistemic Differences: Awareness Contexts of College Administrators and Faculty

    ERIC Educational Resources Information Center

    Muzzin, Linda

    2016-01-01

    Awareness contexts are useful concepts in symbolic interactionist research, which focusses on how everyday realities are constructed. To provide a fresh perspective on governance in Canada's colleges, I sorted vignettes in interview data collected from administrators and faculty into four types of contexts originally derived from observation of…

  4. Context and Culture in Language Teaching and Learning. Languages for Intercultural Communication and Education.

    ERIC Educational Resources Information Center

    Byram, Michael, Ed.; Grundy, Peter, Ed.

    This collection of papers examines how the contexts in which language teaching occurs impact the aims and methods of language teaching. Ten papers focus on the following: "Introduction: Context and Culture in Language Teaching and Learning" (Mike Byram and Peter Grundy); "From Practice to Theory and Back Again" (Claire…

  5. Effects of Multiple Context and Cumulative Stress on Urban Children's Adjustment in Elementary School

    ERIC Educational Resources Information Center

    Morales, Julie R.; Guerra, Nancy G.

    2006-01-01

    Using longitudinal data collected over 2 years on a sample of 2,745 urban elementary school children (1st-6th graders, ages 6-11 years) from economically disadvantaged communities, effects of stressful experiences within 3 contexts (school, family, neighborhood), cumulative stress, and multiple context stress on 3 indices of children's adjustment…

  6. Instructional Context and Student Motivation, Learning, and Development: Commentary and Implications for School Psychologists

    ERIC Educational Resources Information Center

    Pendergast, Laura L.; Kaplan, Avi

    2015-01-01

    From an ecological perspective, learning and development in childhood and throughout the lifespan occur in the context of interactions within complex social networks. Collectively, the articles in this special issue illuminate three important themes related to teacher-student interactions within instructional contexts: relationships, competence,…

  7. Teaching EFL Writing: An Approach Based on the Learner's Context Model

    ERIC Educational Resources Information Center

    Lin, Zheng

    2017-01-01

    This study aims to examine qualitatively a new approach to teaching English as a foreign language (EFL) writing based on the learner's context model. It investigates the context model-based approach in class and identifies key characteristics of the approach delivered through a four-phase teaching and learning cycle. The model collects research…

  8. Categorizing the social context of the wildland urban interface: Adaptive capacity for wildfire and community "archetypes"

    Treesearch

    Tavis B. Paveglio; Cassandra Moseley; Matthew S. Carroll; Daniel R. Williams; Emily Jane Davis; A. Paige Fischer

    2015-01-01

    Understanding the local context that shapes collective response to wildfire risk continues to be a challenge for scientists and policymakers. This study utilizes and expands on a conceptual approach for understanding adaptive capacity to wildfire in a comparison of 18 past case studies. The intent is to determine whether comparison of local social context and community...

  9. Influence of Contexts on Vocabulary Testing

    ERIC Educational Resources Information Center

    Gao, Chun-mei

    2007-01-01

    In vocabulary testing, whether to adopt context is a heat-debated topic. In the article, an experiment is designed to investigate what is the effect of zero context and sentence context on the vocabulary testing? And how do the different kinds of context in vocabulary affect the subjects' performance? The experimental result demonstrates that…

  10. Social Context and Resources for Language Learning

    ERIC Educational Resources Information Center

    Palfreyman, David

    2006-01-01

    Until recently, research in applied linguistics has tended to treat learners in relative isolation from their context, and to study primarily classroom and other educational contexts. This paper in contrast focuses on the contexts which frame learning, and in particular the resources which these contexts provide. A model is outlined which includes…

  11. Context effects on auditory distraction

    PubMed Central

    Chen, Sufen; Sussman, Elyse S.

    2014-01-01

    The purpose of the study was to test the hypothesis that sound context modulates the magnitude of auditory distraction, indexed by behavioral and electrophysiological measures. Participants were asked to identify tone duration, while irrelevant changes occurred in tone frequency, tone intensity, and harmonic structure. Frequency deviants were randomly intermixed with standards (Uni-Condition), with intensity deviants (Bi-Condition), and with both intensity and complex deviants (Tri-Condition). Only in the Tri-Condition did the auditory distraction effect reflect the magnitude difference among the frequency and intensity deviants. The mixture of the different types of deviants in the Tri-Condition modulated the perceived level of distraction, demonstrating that the sound context can modulate the effect of deviance level on processing irrelevant acoustic changes in the environment. These findings thus indicate that perceptual contrast plays a role in change detection processes that leads to auditory distraction. PMID:23886958

  12. Children's Racial Categorization in Context

    PubMed Central

    Pauker, Kristin; Williams, Amanda; Steele, Jennifer R.

    2015-01-01

    The ability to discriminate visually based on race emerges early in infancy: 3-month-olds can perceptually differentiate faces by race and 6-month-olds can perceptually categorize faces by race. Between ages 6 and 8 years, children can sort others into racial groups. But to what extent are these abilities influenced by context? In this article, we review studies on children's racial categorization and discuss how our conclusions are affected by how we ask the questions (i.e., our methods and stimuli), where we ask them (i.e., the diversity of the child's surrounding environment), and whom we ask (i.e., the diversity of the children we study). Taken together, we suggest that despite a developmental readiness to categorize others by race, the use of race as a psychologically salient basis for categorization is far from inevitable and is shaped largely by the experimental setting and the greater cultural context. PMID:27110279

  13. School context, gender, and delinquency.

    PubMed

    Fiqueira-McDonough, J

    1986-02-01

    This study compares two high schools serving the same community and compares student bodies with similar background characteristics. The purpose is to examine how control/strain variables predict delinquency in two distinct school contexts. It was found that minor delinquency occurred more often in the environment dominated by competitive academic achievement, routine handling of discipline, and unpredictable supervision. Examination of the model paths suggest that this environment is also conservative and unlikely to offer legitimate opportunities to girls with gender-egalitarian orientation. The school context characterized by a broader definition of success, more specialized discipline, and predictable supervision promotes stronger bonds with its students and lower levels of delinquency for both genders.

  14. Effects of extended context discrimination training and context extinction on transfer of context dependency of conditioned flavor aversion.

    PubMed

    Iguchi, Yoshio; Fukumoto, Kazuya; Sawa, Kosuke; Ishii, Kiyoshi

    2014-03-01

    We trained rats in a context discrimination paradigm by pairing a sucrose solution with lithium chloride in one context (conditioning context) and simple exposure to the same fluid in a second (neutral) context to establish a context-dependent aversion to the conditioned fluid. We then investigated whether transfer of the context dependency to a test fluid (a sodium chloride solution) was affected by two post-discrimination training treatments, an extended context discrimination training, and non-reinforced exposure to the conditioning context (context extinction). We found that the context-dependent flavor aversion that had been specific to sucrose transferred to the test fluid after the extensive training (Experiment 1). Context extinction eliminated the transfer effect that had been observed immediately after the context discrimination training (Experiment 2). In addition, an aversion acquired by sucrose through a simple conditioning of sucrose-LiCl pairings did not generalize to the test fluid (Experiment 3). These results emphasize the importance of a Pavlovian excitatory association between the conditioning context and nausea as a primary source of transfer of the context dependency, rather than a generalization of aversion acquired by the conditioned fluid to the test fluid.

  15. Solar energy collection system

    NASA Technical Reports Server (NTRS)

    Selcuk, M. K. (Inventor)

    1977-01-01

    An improved solar energy collection system, having enhanced energy collection and conversion capabilities, is delineated. The system is characterized by a plurality of receivers suspended above a heliostat field comprising a multiplicity of reflector surfaces, each being adapted to direct a concentrated beam of solar energy to illuminate a target surface for a given receiver. A magnitude of efficiency, suitable for effectively competing with systems employed in collecting and converting energy extracted from fossil fuels, is indicated.

  16. Managing Success: Collective Bargaining.

    ERIC Educational Resources Information Center

    Godshall, Clark J.

    2002-01-01

    Describes four ways school business officials achieve success with collective bargaining: Maintaining relationships, separating the relationship from the problem, building credibility and cooperation, and "futuring." (PKP)

  17. Context Aware Middleware Architectures: Survey and Challenges

    PubMed Central

    Li, Xin; Eckert, Martina; Martinez, José-Fernán; Rubio, Gregorio

    2015-01-01

    Context aware applications, which can adapt their behaviors to changing environments, are attracting more and more attention. To simplify the complexity of developing applications, context aware middleware, which introduces context awareness into the traditional middleware, is highlighted to provide a homogeneous interface involving generic context management solutions. This paper provides a survey of state-of-the-art context aware middleware architectures proposed during the period from 2009 through 2015. First, a preliminary background, such as the principles of context, context awareness, context modelling, and context reasoning, is provided for a comprehensive understanding of context aware middleware. On this basis, an overview of eleven carefully selected middleware architectures is presented and their main features explained. Then, thorough comparisons and analysis of the presented middleware architectures are performed based on technical parameters including architectural style, context abstraction, context reasoning, scalability, fault tolerance, interoperability, service discovery, storage, security & privacy, context awareness level, and cloud-based big data analytics. The analysis shows that there is actually no context aware middleware architecture that complies with all requirements. Finally, challenges are pointed out as open issues for future work. PMID:26307988

  18. Context Aware Middleware Architectures: Survey and Challenges.

    PubMed

    Li, Xin; Eckert, Martina; Martinez, José-Fernán; Rubio, Gregorio

    2015-08-20

    Context aware applications, which can adapt their behaviors to changing environments, are attracting more and more attention. To simplify the complexity of developing applications, context aware middleware, which introduces context awareness into the traditional middleware, is highlighted to provide a homogeneous interface involving generic context management solutions. This paper provides a survey of state-of-the-art context aware middleware architectures proposed during the period from 2009 through 2015. First, a preliminary background, such as the principles of context, context awareness, context modelling, and context reasoning, is provided for a comprehensive understanding of context aware middleware. On this basis, an overview of eleven carefully selected middleware architectures is presented and their main features explained. Then, thorough comparisons and analysis of the presented middleware architectures are performed based on technical parameters including architectural style, context abstraction, context reasoning, scalability, fault tolerance, interoperability, service discovery, storage, security & privacy, context awareness level, and cloud-based big data analytics. The analysis shows that there is actually no context aware middleware architecture that complies with all requirements. Finally, challenges are pointed out as open issues for future work.

  19. A Tasteful Collection.

    ERIC Educational Resources Information Center

    Canadian Architect, 2003

    2003-01-01

    Describes the design of the Canadian Wine Library at the University of British Columbia, including the educational context and design goals. Includes information on the architects, manufacturers/suppliers, and construction team; a general building description; and commentary on the design. Also includes the floor plan and photographs. (EV)

  20. A Tasteful Collection.

    ERIC Educational Resources Information Center

    Canadian Architect, 2003

    2003-01-01

    Describes the design of the Canadian Wine Library at the University of British Columbia, including the educational context and design goals. Includes information on the architects, manufacturers/suppliers, and construction team; a general building description; and commentary on the design. Also includes the floor plan and photographs. (EV)

  1. Clinical supervision training across contexts.

    PubMed

    Tai, Joanna; Bearman, Margaret; Edouard, Vicki; Kent, Fiona; Nestel, Debra; Molloy, Elizabeth

    2016-08-01

    Clinicians require specific skills to teach or supervise students in the workplace; however, there are barriers to accessing faculty member development, such as time, cost and suitability. The Clinical Supervision Support Across Contexts (ClinSSAC) programme was designed to provide accessible interprofessional educator training to clinical supervisors across a wide range of clinical settings. In Australia there are increasing numbers of health care students, creating pressure on existing placements. Students are now increasingly learning in community settings, where clinicians have traditionally had less access to faculty member development. An interprofessional team collaborated in the development and implementation of ClinSSAC. A total of 978 clinicians participated in a face-to-face, interactive, introductory module to clinical supervision; 672 people accessed the equivalent online core module, with 23 per cent completing all activities. Additional profession-and discipline-specific modules were also developed. Formal project evaluation found that most participants rated the workshops as helpful or very helpful for their roles as clinical supervisors. Interdisciplinary learning from the workshops was reported to enable cross-discipline supervision. Large participant numbers and favourable ratings indicate a continuing need for basic training in education. Key factors to workshop success included expert facilitators, the interprofessional context and interactive model. The online modules were an important adjunct, and provided context-specific resources, but the low online completion rate suggests protected face-to-face time for faculty member development is still required. Programmes such as ClinSSAC have the capacity to promote interprofessional education and practice. There are barriers to accessing faculty member development, such as time, cost and suitability. © 2015 John Wiley & Sons Ltd.

  2. Space as an inspiring context

    NASA Astrophysics Data System (ADS)

    Stancu, Cristina

    2017-04-01

    Using space as context to inspire science education tapps into the excitement of generations of discovering the unknown resulting in unprecedented public participation. Educators are finding exciting and age appropiate materials for their class that explore science, technology, engineering and mathematics. Possible misconceptions are highlighted so that teachers may plan lessons to facilitate correct conceptual understanding. With a range of hands-on learning experiences, Web materials and online ,opportunities for students, educators are invited to take a closer look to actual science missions. This session leverages resources, materials and expertise to address a wide range of traditional and nontraditional audiences while providing consistent messages and information on various space agencies programs.

  3. Weeding Library Collections.

    ERIC Educational Resources Information Center

    Slote, Stanley J.

    This work, based on two recent research projects in the weeding of library collections and the identification of core collections, provides a comprehensive summary of the literature and research on these topics. It also presents practical guidance in weeding for the professional librarian or for the library school student. The book is divided into…

  4. Collection Development Plan.

    ERIC Educational Resources Information Center

    Minnesota State Law Library, St. Paul.

    This collection development plan of the Minnesota State Law Library includes detailed information on policies and annotations. After an overview of the Library's collection, general policy guidelines on the following are discussed: material selection; principles of selection; exclusions; gifts; interlibrary loan; cooperation; replacements;…

  5. UNO's Afghanistan Collection.

    ERIC Educational Resources Information Center

    McKernan, M. D.

    This paper explores the background history and sources of the Afghanistan collection at the University Library, University of Nebraska at Omaha (UNO). Credit for the impetus behind the development of the collection is given to Chris Jung, a former UNO geography/geology faculty member; Ronald Roskens, then UNO chancellor; and the Afghanistan…

  6. Qualitative Collection Evaluation.

    ERIC Educational Resources Information Center

    Craver, Kathleen W.

    1985-01-01

    Describes qualitative evaluation of library holdings in a high school science collection that involved two methods: impressionistic method (relies on professional judgement of subject specialists, librarians, or scholars to evaluate collection); list-checking (compared holdings with "American Association for the Advancement of Science Book…

  7. Collecting Best Practices

    ERIC Educational Resources Information Center

    Tedford, Jennifer

    2008-01-01

    How many beginning teachers struggle to create new lessons despite the fact that experienced teachers have already designed effective lessons for the same content? Shulman (1987) used the term "collective amnesia" to describe the failure of school leaders to design professional development that included the collection of its best…

  8. UNO's Afghanistan Collection.

    ERIC Educational Resources Information Center

    McKernan, M. D.

    This paper explores the background history and sources of the Afghanistan collection at the University Library, University of Nebraska at Omaha (UNO). Credit for the impetus behind the development of the collection is given to Chris Jung, a former UNO geography/geology faculty member; Ronald Roskens, then UNO chancellor; and the Afghanistan…

  9. Collecting Best Practices

    ERIC Educational Resources Information Center

    Tedford, Jennifer

    2008-01-01

    How many beginning teachers struggle to create new lessons despite the fact that experienced teachers have already designed effective lessons for the same content? Shulman (1987) used the term "collective amnesia" to describe the failure of school leaders to design professional development that included the collection of its best…

  10. Debt collection project report

    SciTech Connect

    Not Available

    1980-05-01

    In October 1979 the Office of Management and Budget initiated a review of debt collection within the Federal Government. A DOE Debt Collection Project Team was established, and seven activites were selected for review. These were Albuquerque Operations Office; Bonneville Power Administration; Chicago Operations and Regional Office; Naval Petroleum Reserves, California; Oak Ridge Operations Office; Washington Financial Services Division; and Western Area Power Administration. The team visited each of these activities to collect data on the size, age, and types of receivables managed and procedures for billing, aging, and handling overdue accounts. Various deficiencies were found to exist at several of the DOE entities that are not consistent with good management practices in the performance of their debt collection functions. Also, the Debt Collection Project Team identified a wide variation in the procedures followed by DOE activities in the management of accounts receivable, and a wide variation in the effectiveness of the debt management functions. 1 figure, 17 tables. (RWR)

  11. Urine collection device

    NASA Technical Reports Server (NTRS)

    Michaud, R. B. (Inventor)

    1981-01-01

    A urine collection device for females is described. It is comprised of a collection element defining a urine collection chamber and an inlet opening into the chamber and is adapted to be disposed in surrounding relation to the urethral opening of the user. A drainage conduit is connected to the collection element in communication with the chamber whereby the chamber and conduit together comprise a urine flow pathway for carrying urine generally away from the inlet. A first body of wicking material is mounted adjacent the collection element and extends at least partially into the flow pathway. The device preferably also comprise a vaginal insert element including a seal portion for preventing the entry of urine into the vagina.

  12. Context representation and fusion: advancements and opportunities.

    PubMed

    Khattak, Asad Masood; Akbar, Noman; Aazam, Mohammad; Ali, Taqdir; Khan, Adil Mehmood; Jeon, Seokhee; Hwang, Myunggwon; Lee, Sungyoung

    2014-05-30

    The acceptance and usability of context-aware systems have given them the edge of wide use in various domains and has also attracted the attention of researchers in the area of context-aware computing. Making user context information available to such systems is the center of attention. However, there is very little emphasis given to the process of context representation and context fusion which are integral parts of context-aware systems. Context representation and fusion facilitate in recognizing the dependency/relationship of one data source on another to extract a better understanding of user context. The problem is more critical when data is emerging from heterogeneous sources of diverse nature like sensors, user profiles, and social interactions and also at different timestamps. Both the processes of context representation and fusion are followed in one way or another; however, they are not discussed explicitly for the realization of context-aware systems. In other words most of the context-aware systems underestimate the importance context representation and fusion. This research has explicitly focused on the importance of both the processes of context representation and fusion and has streamlined their existence in the overall architecture of context-aware systems' design and development. Various applications of context representation and fusion in context-aware systems are also highlighted in this research. A detailed review on both the processes is provided in this research with their applications. Future research directions (challenges) are also highlighted which needs proper attention for the purpose of achieving the goal of realizing context-aware systems.

  13. Context Representation and Fusion: Advancements and Opportunities

    PubMed Central

    Khattak, Asad Masood; Akbar, Noman; Aazam, Mohammad; Ali, Taqdir; Khan, Adil Mehmood; Jeon, Seokhee; Hwang, Myunggwon; Lee, Sungyoung

    2014-01-01

    The acceptance and usability of context-aware systems have given them the edge of wide use in various domains and has also attracted the attention of researchers in the area of context-aware computing. Making user context information available to such systems is the center of attention. However, there is very little emphasis given to the process of context representation and context fusion which are integral parts of context-aware systems. Context representation and fusion facilitate in recognizing the dependency/relationship of one data source on another to extract a better understanding of user context. The problem is more critical when data is emerging from heterogeneous sources of diverse nature like sensors, user profiles, and social interactions and also at different timestamps. Both the processes of context representation and fusion are followed in one way or another; however, they are not discussed explicitly for the realization of context-aware systems. In other words most of the context-aware systems underestimate the importance context representation and fusion. This research has explicitly focused on the importance of both the processes of context representation and fusion and has streamlined their existence in the overall architecture of context-aware systems’ design and development. Various applications of context representation and fusion in context-aware systems are also highlighted in this research. A detailed review on both the processes is provided in this research with their applications. Future research directions (challenges) are also highlighted which needs proper attention for the purpose of achieving the goal of realizing context-aware systems. PMID:24887042

  14. Collective decision-making in microbes

    PubMed Central

    Ross-Gillespie, Adin; Kümmerli, Rolf

    2014-01-01

    Microbes are intensely social organisms that routinely cooperate and coordinate their activities to express elaborate population level phenotypes. Such coordination requires a process of collective decision-making, in which individuals detect and collate information not only from their physical environment, but also from their social environment, in order to arrive at an appropriately calibrated response. Here, we present a conceptual overview of collective decision-making as it applies to all group-living organisms; we introduce key concepts and principles developed in the context of animal and human group decisions; and we discuss, with appropriate examples, the applicability of each of these concepts in microbial contexts. In particular, we discuss the roles of information pooling, control skew, speed vs. accuracy trade-offs, local feedbacks, quorum thresholds, conflicts of interest, and the reliability of social information. We conclude that collective decision-making in microbes shares many features with collective decision-making in higher taxa, and we call for greater integration between this fledgling field and other allied areas of research, including in the humanities and the physical sciences. PMID:24624121

  15. The shading cue in context

    PubMed Central

    Wagemans, Johan; van Doorn, Andrea J; Koenderink, Jan J

    2010-01-01

    The shading cue is supposed to be a major factor in monocular stereopsis. However, the hypothesis is hardly corroborated by available data. For instance, the conventional stimulus used in perception research, which involves a circular disk with monotonic luminance gradient on a uniform surround, is theoretically ‘explained’ by any quadric surface, including spherical caps or cups (the conventional response categories), cylindrical ruts or ridges, and saddle surfaces. Whereas cylindrical ruts or ridges are reported when the outline is changed from circular to square, saddle surfaces are never reported. We introduce a method that allows us to differentiate between such possible responses. We report observations on a number of variations of the conventional stimulus, including variations of shape and quality of the boundary, and contexts that allow the observer to infer illumination direction. We find strong and expected influences of outline shape, but, perhaps surprisingly, we fail to find any influence of context, and only partial influence of outline quality. Moreover, we report appreciable differences within the generic population. We trace some of the idiosyncrasies (as compared to shape from shading algorithms) of the human observer to generic properties of the environment, in particular the fact that many objects are limited in size and elliptically convex over most of their boundaries. PMID:23145221

  16. Reward, context, and human behaviour.

    PubMed

    Blaukopf, Clare L; DiGirolamo, Gregory J

    2007-05-29

    Animal models of reward processing have revealed an extensive network of brain areas that process different aspects of reward, from expectation and prediction to calculation of relative value. These results have been confirmed and extended in human neuroimaging to encompass secondary rewards more unique to humans, such as money. The majority of the extant literature covers the brain areas associated with rewards whilst neglecting analysis of the actual behaviours that these rewards generate. This review strives to redress this imbalance by illustrating the importance of looking at the behavioural outcome of rewards and the context in which they are produced. Following a brief review of the literature of reward-related activity in the brain, we examine the effect of reward context on actions. These studies reveal how the presence of reward vs. reward and punishment, or being conscious vs. unconscious of reward-related actions, differentially influence behaviour. The latter finding is of particular importance given the extent to which animal models are used in understanding the reward systems of the human mind. It is clear that further studies are needed to learn about the human reaction to reward in its entirety, including any distinctions between conscious and unconscious behaviours. We propose that studies of reward entail a measure of the animal's (human or nonhuman) knowledge of the reward and knowledge of its own behavioural outcome to achieve that reward.

  17. Focus+context metro maps.

    PubMed

    Wang, Yu-Shuen; Chi, Ming-Te

    2011-12-01

    We introduce a focus+context method to visualize a complicated metro map of a modern city on a small displaying area. The context of our work is with regard the popularity of mobile devices. The best route to the destination, which can be obtained from the arrival time of trains, is highlighted. The stations on the route enjoy larger spaces, whereas the other stations are rendered smaller and closer to fit the whole map into a screen. To simplify the navigation and route planning for visitors, we formulate various map characteristics such as octilinear transportation lines and regular station distances into energy terms. We then solve for the optimal layout in a least squares sense. In addition, we label the names of stations that are on the route of a passenger according to human preferences, occlusions, and consistencies of label positions using the graph cuts method. Our system achieves real-time performance by being able to report instant information because of the carefully designed energy terms. We apply our method to layout a number of metro maps and show the results and timing statistics to demonstrate the feasibility of our technique. © 2011 IEEE

  18. Motor interference in interactive contexts

    PubMed Central

    Chinellato, Eris; Castiello, Umberto; Sartori, Luisa

    2015-01-01

    Action observation and execution share overlapping neural substrates, so that simultaneous activation by observation and execution modulates motor performance. Previous literature on simple prehension tasks has revealed that motor influence can be two-sided: facilitation for observed and performed congruent actions and interference for incongruent actions. But little is known of the specific modulations of motor performance in complex forms of interaction. Is it possible that the very same observed movement can lead either to interference or facilitation effects on a temporally overlapping congruent executed action, depending on the context? To answer this question participants were asked to perform a reach-to-grasp movement adopting a precision grip (PG) while: (i) observing a fixation cross, (ii) observing an actor performing a PG with interactive purposes, (iii) observing an actor performing a PG without interactive purposes. In particular, in the interactive condition the actor was shown trying to pour some sugar on a large cup located out of her reach but close to the participant watching the video, thus eliciting in reaction a complementary whole-hand grasp. Notably, fine-grained kinematic analysis for this condition revealed a specific delay in the grasping and reaching components and an increased trajectory deviation despite the observed and executed movement’s congruency. Moreover, early peaks of trajectory deviation seem to indicate that socially relevant stimuli are acknowledged by the motor system very early. These data suggest that interactive contexts can determine a prompt modulation of stimulus–response compatibility effects. PMID:26113835

  19. Context-Aware Recommender Systems

    NASA Astrophysics Data System (ADS)

    Adomavicius, Gediminas; Tuzhilin, Alexander

    The importance of contextual information has been recognized by researchers and practitioners in many disciplines, including e-commerce personalization, information retrieval, ubiquitous and mobile computing, data mining, marketing, and management. While a substantial amount of research has already been performed in the area of recommender systems, most existing approaches focus on recommending the most relevant items to users without taking into account any additional contextual information, such as time, location, or the company of other people (e.g., for watching movies or dining out). In this chapter we argue that relevant contextual information does matter in recommender systems and that it is important to take this information into account when providing recommendations. We discuss the general notion of context and how it can be modeled in recommender systems. Furthermore, we introduce three different algorithmic paradigms - contextual prefiltering, post-filtering, and modeling - for incorporating contextual information into the recommendation process, discuss the possibilities of combining several contextaware recommendation techniques into a single unifying approach, and provide a case study of one such combined approach. Finally, we present additional capabilities for context-aware recommenders and discuss important and promising directions for future research.

  20. Keywords in the Australian Context

    ERIC Educational Resources Information Center

    Doecke, Brenton; Howie, Mark; Sawyer, Wayne

    2006-01-01

    Borrowing the title of Raymond Williams' famous study, the following reflections--sometimes collective and sometimes individual--are based on a series of "Keywords", specifically: "fear" "community" and "creativity". By reflecting on the meanings these words have for us today, we attempt to capture their…

  1. Understanding Grief within a Cultural Context

    MedlinePlus

    ... Grief Within a Cultural Context Request Permissions Understanding Grief Within a Cultural Context Approved by the Cancer. ... son becomes the family leader. Personal differences in grief and mourning People adopt the beliefs and values ...

  2. False Context Fear Memory in Rats

    ERIC Educational Resources Information Center

    Bae, Sarah; Holmes, Nathan M.; Westbrook, R. Frederick

    2015-01-01

    Four experiments used rats to study false context fear memories. In Experiment 1, rats were pre-exposed to a distinctive chamber (context A) or to a control environment (context C), shocked after a delay in a second chamber (context B) and tested either in B or A. Rats pre-exposed to A froze just as much as control rats in B but more than control…

  3. Context-Free Languages of Countable Words

    NASA Astrophysics Data System (ADS)

    Ésik, Zoltán; Iván, Szabolcs

    We define context-free grammars with Büchi acceptance condition generating languages of countable words. We establish several closure properties and decidability results for the class of Büchi context-free languages generated by these grammars. We also define context-free grammars with Müller acceptance condition and show that there is a language generated by a grammar with Müller acceptance condition which is not a Büchi context-free language.

  4. False Context Fear Memory in Rats

    ERIC Educational Resources Information Center

    Bae, Sarah; Holmes, Nathan M.; Westbrook, R. Frederick

    2015-01-01

    Four experiments used rats to study false context fear memories. In Experiment 1, rats were pre-exposed to a distinctive chamber (context A) or to a control environment (context C), shocked after a delay in a second chamber (context B) and tested either in B or A. Rats pre-exposed to A froze just as much as control rats in B but more than control…

  5. Re-ranking with context for high-performance biomedical information retrieval.

    PubMed

    Yin, Xiaoshi; Huang, Jimmy Xiangji; Li, Zhoujun

    2012-01-01

    In this paper, we present a context-sensitive approach to re-ranking retrieved documents for further improving the effectiveness of high-performance biomedical literature retrieval systems. For each topic, a two-dimensional positive context is learnt from the top N retrieved documents and a group of negative contexts are learnt from the last N' documents in initial retrieval ranked list. The contextual space contains lexical context and conceptual context. The probabilities that retrieved documents are generated within the contextual space are then computed for document re-ranking. Empirical evaluation on the TREC Genomics full-text collection and three high-performance biomedical literature retrieval runs demonstrates that the context-sensitive re-ranking approach yields better retrieval performance.

  6. A preventive context for enuresis.

    PubMed

    Friman, P C

    1986-08-01

    , and family resources. Although treatment is evolving, some interventions are highly rigorous and appear to focus primarily on dryness (e.g., the original dry-bed training). Treatment for enuresis has not yet been conceptualized into an encompassing context of health as have other medical maneuvers (e.g., physical examinations are now part of health maintenance). Enuresis is a presenting complaint that is not of itself a threat to health. Prevention, therefore, is its most appropriate context, and the pediatrician is the primary promoter of that context.

  7. The Importance of Context in Task Selection

    ERIC Educational Resources Information Center

    Weiland, Travis

    2017-01-01

    Context is at the core of any statistical investigation, yet many statistics tasks barely require students to go beyond superficial consideration of the contexts the tasks are situated in. In this article, I discuss a framework for evaluating the level of interaction with context a task requires of students and how to modify tasks to increase the…

  8. A First Step Forward: Context Assessment

    ERIC Educational Resources Information Center

    Conner, Ross F.; Fitzpatrick, Jody L.; Rog, Debra J.

    2012-01-01

    In this chapter, we revisit and expand the context framework of Debra Rog, informed by three cases and by new aspects that we have identified. We then propose a way to move the framework into action, making context explicit. Based on the framework's components, we describe and illustrate a process we label context assessment (CA), which provides a…

  9. Hierarchical Context Modeling for Video Event Recognition.

    PubMed

    Wang, Xiaoyang; Ji, Qiang

    2016-10-11

    Current video event recognition research remains largely target-centered. For real-world surveillance videos, targetcentered event recognition faces great challenges due to large intra-class target variation, limited image resolution, and poor detection and tracking results. To mitigate these challenges, we introduced a context-augmented video event recognition approach. Specifically, we explicitly capture different types of contexts from three levels including image level, semantic level, and prior level. At the image level, we introduce two types of contextual features including the appearance context features and interaction context features to capture the appearance of context objects and their interactions with the target objects. At the semantic level, we propose a deep model based on deep Boltzmann machine to learn event object representations and their interactions. At the prior level, we utilize two types of prior-level contexts including scene priming and dynamic cueing. Finally, we introduce a hierarchical context model that systematically integrates the contextual information at different levels. Through the hierarchical context model, contexts at different levels jointly contribute to the event recognition. We evaluate the hierarchical context model for event recognition on benchmark surveillance video datasets. Results show that incorporating contexts in each level can improve event recognition performance, and jointly integrating three levels of contexts through our hierarchical model achieves the best performance.

  10. The Importance of Context in Task Selection

    ERIC Educational Resources Information Center

    Weiland, Travis

    2017-01-01

    Context is at the core of any statistical investigation, yet many statistics tasks barely require students to go beyond superficial consideration of the contexts the tasks are situated in. In this article, I discuss a framework for evaluating the level of interaction with context a task requires of students and how to modify tasks to increase the…

  11. The Embedded Narrative: Navigating through Multiple Contexts

    ERIC Educational Resources Information Center

    Zilber, Tammar B.; Tuval-Mashiach, Rivka; Lieblich, Amia

    2008-01-01

    Narrative psychology theoreticians emphasized the importance of context to the construction, communication, and understanding of individuals' life stories. Still, the various contexts in which, and in reference to which, life stories are told, the methodological implications of the importance of context, and the possible interpretive moves…

  12. Context Management Platform for Tourism Applications

    PubMed Central

    Buján, David; Martín, David; Torices, Ortzi; López-de-Ipiña, Diego; Lamsfus, Carlos; Abaitua, Joseba; Alzua-Sorzabal, Aurkene

    2013-01-01

    The notion of context has been widely studied and there are several authors that have proposed different definitions of context. However, context has not been widely studied in the framework of human mobility and the notion of context has been imported directly from other computing fields without specifically addressing the tourism domain requirements. In order to store and manage context information a context data model and a context management platform are needed. Ontologies have been widely used in context modelling, but many of them are designed to be applied in general ubiquitous computing environments, do not contain specific concepts related to the tourism domain or some approaches do not contain enough concepts to represent context information related to the visitor on the move. That is why we propose a new approach to provide a better solution to model context data in tourism environments, adding more value to our solution reusing data about tourist resources from an Open Data repository and publishing it as Linked Data. We also propose the architecture for a context information management platform based on this context data model. PMID:23797739

  13. Stress Disrupts Context-Dependent Memory

    ERIC Educational Resources Information Center

    Schwabe, Lars; Bohringer, Andreas; Wolf, Oliver T.

    2009-01-01

    Memory is facilitated when the retrieval context resembles the learning context. The brain structures underlying contextual influences on memory are susceptible to stress. Whether stress interferes with context-dependent memory is still unknown. We exposed healthy adults to stress or a control procedure before they learned an object-location task…

  14. Stress Disrupts Context-Dependent Memory

    ERIC Educational Resources Information Center

    Schwabe, Lars; Bohringer, Andreas; Wolf, Oliver T.

    2009-01-01

    Memory is facilitated when the retrieval context resembles the learning context. The brain structures underlying contextual influences on memory are susceptible to stress. Whether stress interferes with context-dependent memory is still unknown. We exposed healthy adults to stress or a control procedure before they learned an object-location task…

  15. Context management platform for tourism applications.

    PubMed

    Buján, David; Martín, David; Torices, Ortzi; López-de-Ipiña, Diego; Lamsfus, Carlos; Abaitua, Joseba; Alzua-Sorzabal, Aurkene

    2013-06-24

    The notion of context has been widely studied and there are several authors that have proposed different definitions of context. However, context has not been widely studied in the framework of human mobility and the notion of context has been imported directly from other computing fields without specifically addressing the tourism domain requirements. In order to store and manage context information a context data model and a context management platform are needed. Ontologies have been widely used in context modelling, but many of them are designed to be applied in general ubiquitous computing environments, do not contain specific concepts related to the tourism domain or some approaches do not contain enough concepts to represent context information related to the visitor on the move. That is why we propose a new approach to provide a better solution to model context data in tourism environments, adding more value to our solution reusing data about tourist resources from an Open Data repository and publishing it as Linked Data. We also propose the architecture for a context information management platform based on this context data model.

  16. Consulting in Collection Development.

    ERIC Educational Resources Information Center

    Ash, Lee

    1980-01-01

    Considers the role of the consultant in the areas of library collection development and weeding, and offers suggestions on determining the need for a consultant, obtaining one, and what to do when the consultant arrives. (FM)

  17. Sweat collection capsule

    NASA Technical Reports Server (NTRS)

    Delaplaine, R. W.; Greenleaf, J. E.

    1979-01-01

    Capsule, with filter paper insert, is used to collect sweat for rate monitoring, chromatographic analysis, or active sweat gland location within specified area. Construction of capsule allows change of inserts while device remains strapped in place.

  18. Online Data Collection.

    ERIC Educational Resources Information Center

    Topp, Neal W.; Pawloski, Bob

    2002-01-01

    Describes the eventful history of online data collection and presents a review of current literature following by a list of pros and cons to be considered when stepping into online surveying. (Contains 14 references.) (Author/YDS)

  19. Weeding Your Collection.

    ERIC Educational Resources Information Center

    Kerby, Ramona

    2002-01-01

    Offers guidelines for weeding as part of school library collection development. Highlights include developing a weeding policy; and the CREW (Continuous Review Evaluation and Weeding) method, including reasons for weeding, scheduling, and guidelines for fiction and for nonfiction. (LRW)

  20. Context and the human microbiome.

    PubMed

    McDonald, Daniel; Birmingham, Amanda; Knight, Rob

    2015-11-04

    Human microbiome reference datasets provide epidemiological context for researchers, enabling them to uncover new insights into their own data through meta-analyses. In addition, large and comprehensive reference sets offer a means to develop or test hypotheses and can pave the way for addressing practical study design considerations such as sample size decisions. We discuss the importance of reference sets in human microbiome research, limitations of existing resources, technical challenges to employing reference sets, examples of their usage, and contributions of the American Gut Project to the development of a comprehensive reference set. Through engaging the general public, the American Gut Project aims to address many of the issues present in existing reference resources, characterizing health and disease, lifestyle, and dietary choices of the participants while extending its efforts globally through international collaborations.

  1. Galaxies in the Cosmological Context

    NASA Astrophysics Data System (ADS)

    Lucia, Gabriella De

    In the last decades, a number of observational experiments have converged to establish the cold dark matter model as the "de facto" standard model for structure formation. While the cosmological paradigm appears to be firmly established, a theory of galaxy formation remains elusive, and our understanding of the physical processes that determine the observed variety of galaxy properties and their evolution as a function of cosmic time and environment is far from complete. Although much progress has been made, both on the theoretical and observational side, understanding how galaxies form and evolve remains one of the most outstanding questions of modern astrophysics. This chapter provides an introduction to ideas and concepts that underpin modern models of galaxy formation and evolution, in the currently favoured cosmological context.

  2. [The contradictory contexts of interdisciplinarity].

    PubMed

    Schilling, T; Haverich, A

    2012-04-01

    The benefits of interdisciplinary approaches in patient care, research and education are quite obvious and set the trend for more interdisciplinary structures. In order to achieve sustained success, however, there are numerous risks of interdisciplinary collaboration that have to be considered. Interdisciplinarity leads to an increasing degree of specialization and consequently to a greater experience of specialists in highly specific procedures. Nevertheless, this is accompanied by a loss of experience of those who do not perform these procedures anymore. Not least, due to the high specialization, the surgeon's profession is changing from generalist to specialist. Hence, the education of young physicians, students and researchers has to be adapted to this reality. It remains unanswered if these changes contribute to the decline in the number of applicants in surgery. In conclusion, the risks of the contradictory contexts of interdisciplinarity can be counteracted with simple principles of fair and cooperative partnership.

  3. Epigenetics in an ecotoxicological context.

    PubMed

    Vandegehuchte, Michiel B; Janssen, Colin R

    2014-04-01

    Epigenetics can play a role in interactions between chemicals and exposed species, between species and abiotic ecosystem components or between species of the same or another population in a community. Technological progress and advanced insights into epigenetic processes have led to the description of epigenetic features (mainly DNA methylation) in many ecologically relevant species: algae, plants, several invertebrates and fish. Epigenetic changes in plants, insects and cladocerans have been reported to be induced by various environmental stress factors including nutrition or water deficiency, grazing, light or temperature alterations, social environment, and dissolved organic matter concentrations. As regards chemicals, studies in rats and mice exposed to specific pesticides, hydrocarbons, dioxins, and endocrine disrupting chemicals demonstrated the induction of epigenetic changes, suggesting the need for further research with these substances in an ecotoxicological context. In fish and plants, exposure to polyaromatic hydrocarbons, metals, and soluble fractions of solid waste affected the epigenetic status. A novel concept in ecotoxicological epigenetics is the induction of transgenerational stress resistance upon chemical exposure, as demonstrated in rice exposed to metals. Evaluating epigenetics in ecotoxicological field studies is a second relatively new approach. A cryptic lineage of earthworms had developed arsenic tolerance in the field, concurrent with specific DNA methylation patterns. Flatfish caught in the framework of environmental monitoring had developed tumours, exhibiting specific DNA methylation patterns. Two main potential implications of epigenetics in an ecotoxicological context are (1) the possibility of transgenerationally inherited, chemical stress-induced epigenetic changes with associated phenotypes and (2) epigenetically induced adaptation to stress upon long-term chemical exposure. Key knowledge gaps are concerned with the causality of

  4. Sweat collection capsule

    NASA Technical Reports Server (NTRS)

    Greenleaf, J. E.; Delaplaine, R. W. (Inventor)

    1980-01-01

    A sweat collection capsule permitting quantitative collection of sweat is described. The device consists of a frame held immobile on the skin, a closure secured to the frame and absorbent material located next to the skin in a cavity formed by the frame and the closure. The absorbent material may be removed from the device by removing the closure from the frame while the frame is held immobile on the skin.

  5. Sparse matrix test collections

    SciTech Connect

    Duff, I.

    1996-12-31

    This workshop will discuss plans for coordinating and developing sets of test matrices for the comparison and testing of sparse linear algebra software. We will talk of plans for the next release (Release 2) of the Harwell-Boeing Collection and recent work on improving the accessibility of this Collection and others through the World Wide Web. There will only be three talks of about 15 to 20 minutes followed by a discussion from the floor.

  6. Collective field accelerator

    DOEpatents

    Luce, John S.

    1978-01-01

    A collective field accelerator which operates with a vacuum diode and utilizes a grooved cathode and a dielectric anode that operates with a relativistic electron beam with a .nu./.gamma. of .about. 1, and a plurality of dielectric lenses having an axial magnetic field thereabout to focus the collectively accelerated electrons and ions which are ejected from the anode. The anode and lenses operate as unoptimized r-f cavities which modulate and focus the beam.

  7. A Survey of Collectives

    NASA Technical Reports Server (NTRS)

    Tumer, Kagan; Wolpert, David

    2004-01-01

    Due to the increasing sophistication and miniaturization of computational components, complex, distributed systems of interacting agents are becoming ubiquitous. Such systems, where each agent aims to optimize its own performance, but where there is a well-defined set of system-level performance criteria, are called collectives. The fundamental problem in analyzing/designing such systems is in determining how the combined actions of self-interested agents leads to 'coordinated' behavior on a iarge scale. Examples of artificial systems which exhibit such behavior include packet routing across a data network, control of an array of communication satellites, coordination of multiple deployables, and dynamic job scheduling across a distributed computer grid. Examples of natural systems include ecosystems, economies, and the organelles within a living cell. No current scientific discipline provides a thorough understanding of the relation between the structure of collectives and how well they meet their overall performance criteria. Although still very young, research on collectives has resulted in successes both in understanding and designing such systems. It is eqected that as it matures and draws upon other disciplines related to collectives, this field will greatly expand the range of computationally addressable tasks. Moreover, in addition to drawing on them, such a fully developed field of collective intelligence may provide insight into already established scientific fields, such as mechanism design, economics, game theory, and population biology. This chapter provides a survey to the emerging science of collectives.

  8. Spectral imagery collection experiment

    NASA Astrophysics Data System (ADS)

    Romano, Joao M.; Rosario, Dalton; Farley, Vincent; Sohr, Brian

    2010-04-01

    The Spectral and Polarimetric Imagery Collection Experiment (SPICE) is a collaborative effort between the US Army ARDEC and ARL for the collection of mid-wave and long-wave infrared imagery using hyperspectral, polarimetric, and broadband sensors. The objective of the program is to collect a comprehensive database of the different modalities over the course of 1 to 2 years to capture sensor performance over a wide variety of adverse weather conditions, diurnal, and seasonal changes inherent to Picatinny's northern New Jersey location. Using the Precision Armament Laboratory (PAL) tower at Picatinny Arsenal, the sensors will autonomously collect the desired data around the clock at different ranges where surrogate 2S3 Self-Propelled Howitzer targets are positioned at different viewing perspectives at 549 and 1280m from the sensor location. The collected database will allow for: 1) Understand of signature variability under the different weather conditions; 2) Development of robust algorithms; 3) Development of new sensors; 4) Evaluation of hyperspectral and polarimetric technologies; and 5) Evaluation of fusing the different sensor modalities. In this paper, we will present the SPICE data collection objectives, the ongoing effort, the sensors that are currently deployed, and how this work will assist researches on the development and evaluation of sensors, algorithms, and fusion applications.

  9. Context based configuration management system

    NASA Technical Reports Server (NTRS)

    Gawdiak, Yuri O. (Inventor); Gurram, Mohana M. (Inventor); Maluf, David A. (Inventor); Mederos, Luis A. (Inventor)

    2010-01-01

    A computer-based system for configuring and displaying information on changes in, and present status of, a collection of events associated with a project. Classes of icons for decision events, configurations and feedback mechanisms, and time lines (sequential and/or simultaneous) for related events are displayed. Metadata for each icon in each class is displayed by choosing and activating the corresponding icon. Access control (viewing, reading, writing, editing, deleting, etc.) is optionally imposed for metadata and other displayed information.

  10. Conscientiousness in life course context: a commentary.

    PubMed

    Costanzo, Philip R

    2014-05-01

    In this commentary, the common themes from the interesting articles in this special section of Developmental Psychology are considered as they illuminate the potential ontogenetic sources of the conscientiousness-well-being-longevity interconnections that have emerged in recent research. In particular, consideration is given to the changing nature of the expression of conscientiousness over the life course and the importance of the causally linked chain of developmental events associated with the sustenance of this trait from early childhood to later life. Methodological as well as conceptual issues are part of the common thematic analysis provided. In addition, several more or less neglected issues are addressed in the commentary. These include an examination of the potential roles of self-presentation social context and social aggregation in the developmentally emergent conscientiousness-well-being relationship. Further, the potential downside of the moral tinge of the conscientiousness construct is considered, as is the cultural variation in the benefits of conscientiousness to well-being. Finally, the applied significance of research on the conscientiousness-well-being link to health promotion over the life course is addressed. The commentary concludes with reflections on the transformation of 1970s trait-like conceptions as unbending tautological predictors of behavior into the situationally and developmentally nuanced conceptions of conscientiousness provided in these collected articles.

  11. Social capital in an outdoor recreation context.

    PubMed

    Mann, Marilynne; Leahy, Jessica

    2010-02-01

    This study examined social capital development in three all-terrain vehicles (ATV) clubs in Maine using an adapted version of Lin's (2001) social capital theory model. The structural components of social capital identified included collective assets and individual assets in the form of normative behavior and trust relationships. Also identified were counter-norms for individual ATV riders identified as having divergent norms from club members. The second component of social capital is access to and mobilization of network contacts and resources. Access networks in the context of the ATV clubs studied were identified as community and landowner relations while mobilization of resources was existent in club membership attempts toward self-governance and efforts of the statewide "umbrella" organization. Instrumental outcomes benefit society and expressive outcomes benefit the individual. Both types of returns are present in the data suggesting that ATV clubs are creating social capital. This is important information to clubs who desire to market themselves, improve their reputations, and enhance their volunteer association. It is of further interest to state governments who fund clubs through trail grants as proof that a return on investment is being realized. Theoretical and applied implications for these and other types of recreation-based volunteer associations (e.g., clubs, friends groups, advocacy groups) are presented.

  12. Privacy and Property in the Biobank Context

    PubMed Central

    2010-01-01

    A research biobank is a collection of personal health and lifestyle information, including genetic samples of yet unknown but possibly large information potential about the participant. For the participants, the risk of taking part is not bodily harm but infringements of their privacy and the harmful consequences such infringements might have. But what do we mean by privacy? Which harms are we talking about? To address such questions we need to get a grip on what privacy is all about and aim for a fruitful perspective on the issues of property and privacy rights in the context of biobanking. This paper argues that the limits and handling of private matters is determined in specific social relations. The crucial point is thus to determine which information and activities are or are not the legitimate concern of others. Privacy and property rights should be seen as balanced by duties, that is as inherently relational interests extending into the public sphere, rather than to see these rights as the control of an object—for instance the participant’s biobank material. PMID:20799053

  13. Use of Context in Video Processing

    NASA Astrophysics Data System (ADS)

    Wu, Chen; Aghajan, Hamid

    Interpreting an event or a scene based on visual data often requires additional contextual information. Contextual information may be obtained from different sources. In this chapter, we discuss two broad categories of contextual sources: environmental context and user-centric context. Environmental context refers to information derived from domain knowledge or from concurrently sensed effects in the area of operation. User-centric context refers to information obtained and accumulated from the user. Both types of context can include static or dynamic contextual elements. Examples from a smart home environment are presented to illustrate how different types of contextual data can be applied to aid the decision-making process.

  14. Concepts of context in music therapy

    PubMed Central

    Rolvsjord, Randi; Stige, Brynjulf

    2015-01-01

    In contemporary music therapy as well as in related interdisciplinary fields, the importance of context in relation to theory, research, and practice has been emphasized. However, the word context seems to be used in several different ways and conceptualizations of contextual approaches vary too. The objective of this theoretical article is to clarify traditions of language use in relation to context in music therapy. In reviewing and discussing the literature, we focus on the field of mental health care. When discussing issues related to context, this literature partly focuses on the surroundings of music therapy practice, partly on the ecology of reciprocal influences within and between situations or systems. On this basis, three types of context awareness in music therapy are identified: music therapy in context; music therapy as context; and music therapy as interacting contexts. The identified types of context awareness are exemplified through references to music therapy literature and then discussed in relation to two very different metaphors, namely context as frame and context as link. Implications for practice, research, and theory development in music therapy are suggested. PMID:26157199

  15. Conceptual implicit memory and environmental context.

    PubMed

    Mulligan, Neil W

    2011-09-01

    Changes in environmental context between encoding and retrieval often affect explicit memory but research on implicit memory is equivocal. One proposal is that conceptual but not perceptual priming is influenced by context manipulations. However, findings with conceptual priming may be compromised by explicit contamination. The present study examined the effects of environmental context on conceptual explicit (category-cued recall) and implicit memory (category production). Explicit recall was reduced by context change. The implicit test results depended on test awareness (assessed with a post-test questionnaire). Among test-unaware participants, priming was equivalent for same-context and different-context groups, whereas for the test-aware, the same-context group produced more priming. Thus, when explicit contamination is controlled, changes in environmental context do not impair conceptual priming. Context dependency appears to be a general difference between implicit and explicit memory rather than a difference between conceptual and perceptual implicit memory. Finally, measures of mood indicated no changes in affect across contexts, arguing against mood mediation for the context effects in explicit recall.

  16. Concepts of context in music therapy.

    PubMed

    Rolvsjord, Randi; Stige, Brynjulf

    2015-01-02

    In contemporary music therapy as well as in related interdisciplinary fields, the importance of context in relation to theory, research, and practice has been emphasized. However, the word context seems to be used in several different ways and conceptualizations of contextual approaches vary too. The objective of this theoretical article is to clarify traditions of language use in relation to context in music therapy. In reviewing and discussing the literature, we focus on the field of mental health care. When discussing issues related to context, this literature partly focuses on the surroundings of music therapy practice, partly on the ecology of reciprocal influences within and between situations or systems. On this basis, three types of context awareness in music therapy are identified: music therapy in context; music therapy as context; and music therapy as interacting contexts. The identified types of context awareness are exemplified through references to music therapy literature and then discussed in relation to two very different metaphors, namely context as frame and context as link. Implications for practice, research, and theory development in music therapy are suggested.

  17. Context-specific adaptation of saccade gain

    NASA Technical Reports Server (NTRS)

    Shelhamer, Mark; Clendaniel, Richard A.

    2002-01-01

    Previous studies established that vestibular reflexes can have two adapted states (e.g., gain) simultaneously, and that a context cue (e.g., vertical eye position) can switch between the two states. The present study examined this phenomenon of context-specific adaptationfor horizontal saccades, using a variety of contexts. Our overall goal was to assess the efficacy of different context cues in switching between adapted states. A standard double-step paradigm was used to adapt saccade gain. In each experiment, we asked for a simultaneous gain decrease in one context and gain increase in another context, and then determined if a change in the context would invoke switching between the adapted states. Horizontal eye position worked well as a context cue: saccades with the eyes deviated to the right could be made to have higher gains while saccades with the eyes deviated to the left could be made to have lower gains. Vertical eye position was less effective. This suggests that the more closely related a context cue is to the response being adapted, the more effective it is. Roll tilt of the head, and upright versus supine orientations, were somewhat effective in context switching; these paradigms contain orientation of gravity with respect to the head as part of the context.

  18. Language context modulates reading route: an electrical neuroimaging study

    PubMed Central

    Buetler, Karin A.; de León Rodríguez, Diego; Laganaro, Marina; Müri, René; Spierer, Lucas; Annoni, Jean-Marie

    2014-01-01

    Introduction: The orthographic depth hypothesis (Katz and Feldman, 1983) posits that different reading routes are engaged depending on the type of grapheme/phoneme correspondence of the language being read. Shallow orthographies with consistent grapheme/phoneme correspondences favor encoding via non-lexical pathways, where each grapheme is sequentially mapped to its corresponding phoneme. In contrast, deep orthographies with inconsistent grapheme/phoneme correspondences favor lexical pathways, where phonemes are retrieved from specialized memory structures. This hypothesis, however, lacks compelling empirical support. The aim of the present study was to investigate the impact of orthographic depth on reading route selection using a within-subject design. Method: We presented the same pseudowords (PWs) to highly proficient bilinguals and manipulated the orthographic depth of PW reading by embedding them among two separated German or French language contexts, implicating respectively, shallow or deep orthography. High density electroencephalography was recorded during the task. Results: The topography of the ERPs to identical PWs differed 300–360 ms post-stimulus onset when the PWs were read in different orthographic depth context, indicating distinct brain networks engaged in reading during this time window. The brain sources underlying these topographic effects were located within left inferior frontal (German > French), parietal (French > German) and cingular areas (German > French). Conclusion: Reading in a shallow context favors non-lexical pathways, reflected in a stronger engagement of frontal phonological areas in the shallow versus the deep orthographic context. In contrast, reading PW in a deep orthographic context recruits less routine non-lexical pathways, reflected in a stronger engagement of visuo-attentional parietal areas in the deep versus shallow orthographic context. These collective results support a modulation of reading route by orthographic

  19. Setting the stage subliminally: unconscious context effects.

    PubMed

    Van Opstal, Filip; Calderon, Cristian Buc; Gevers, Wim; Verguts, Tom

    2011-12-01

    An important approach to understand how the brain gives rise to consciousness is to probe the depth of unconscious processing, thus to define the key features that cause conscious awareness. Here, we investigate the possibility for subliminal stimuli to shape the context for unconscious processing. Context effects have generally been assumed to require consciousness. In the present experiment, unconscious context processing was investigated by looking at the impact of the context on the response activation elicited by a subliminal prime. We compared the effects of the same subliminal prime on target processing when the prime was embedded in different unconscious contexts. Results showed that the same prime can evoke opposite responses depending on the unconscious context in which it is presented. Taken together, the results of this study show that context effects can be unconscious. Copyright © 2011 Elsevier Inc. All rights reserved.

  20. Context quantization by kernel Fisher discriminant.

    PubMed

    Xu, Mantao; Wu, Xiaolin; Fränti, Pasi

    2006-01-01

    Optimal context quantizers for minimum conditional entropy can be constructed by dynamic programming in the probability simplex space. The main difficulty, operationally, is the resulting complex quantizer mapping function in the context space, in which the conditional entropy coding is conducted. To overcome this difficulty, we propose new algorithms for designing context quantizers in the context space based on the multiclass Fisher discriminant and the kernel Fisher discriminant (KFD). In particular, the KFD can describe linearly nonseparable quantizer cells by projecting input context vectors onto a high-dimensional curve, in which these cells become better separable. The new algorithms outperform the previous linear Fisher discriminant method for context quantization. They approach the minimum empirical conditional entropy context quantizer designed in the probability simplex space, but with a practical implementation that employs a simple scalar quantizer mapping function rather than a large lookup table.