Alternative parallel ring protocols
NASA Technical Reports Server (NTRS)
Mukkamala, R.; Foudriat, E. C.; Maly, Kurt J.; Kale, V.
1990-01-01
Communication protocols are know to influence the utilization and performance of communication network. The effect of two token ring protocols on a gigabit network with multiple ring structure is investigated. In the first protocol, a mode sends at most one message on receiving a token. In the second protocol, a mode sends all the waiting messages when a token is received. The behavior of these protocols is shown to be highly dependent on the number of rings as well as the load in the network.
Performance comparison of token ring protocols for hard-real-time communication
NASA Technical Reports Server (NTRS)
Kamat, Sanjay; Zhao, Wei
1992-01-01
The ability to guarantee the deadlines of synchronous messages while maintaining a good aggregate throughput is an important consideration in the design of distributed real-time systems. In this paper, we study two token ring protocols, the priority driven protocol and the timed token protocol, for their suitability for hard real-time systems. Both these protocols use a token to control access to the transmission medium. In a priority driven protocol, messages are assigned priorities and the protocol ensures that messages are transmitted in the order of their priorities. Timed token protocols do not provide for priority arbitration but ensure that the maximum access delay for a station is bounded. For both protocols, we first derive the schedulability conditions under which the transmission deadlines of a given set of synchronous messages can be guaranteed. Subsequently, we use these schedulability conditions to quantitatively compare the average case behavior of the protocols. This comparison demonstrates that each of the protocols has its domain of superior performance and neither dominates the other for the entire range of operating conditions.
Simulating Local Area Network Protocols with the General Purpose Simulation System (GPSS)
1990-03-01
generation 15 3.1.2 Frame delivery . 15 3.2 Model artifices 16 3.3 Model variables 17 3.4 Simulation results 18 4. EXTERNAL PROCEDURES USED IN SIMULATION 19...46 15. Token Ring: Frame generation process 47 16. Token Ring: Frame delivery process 48 17 . Token Ring: Mean transfer delay vs mean throughput 49...assumed to be zero were replaced by the maximum values specified in the ANSI 802.3 standard (viz &MI=6, &M2=3, &M3= 17 , &D1=18, &D2=3, &D4=4, &D7=3, and
Access Protocol For An Industrial Optical Fibre LAN
NASA Astrophysics Data System (ADS)
Senior, John M.; Walker, William M.; Ryley, Alan
1987-09-01
A structure for OSI levels 1 and 2 of a local area network suitable for use in a variety of industrial environments is reported. It is intended that the LAN will utilise optical fibre technology at the physical level and a hybrid of dynamically optimisable token passing and CSMA/CD techniques at the data link (IEEE 802 medium access control - logical link control) level. An intelligent token passing algorithm is employed which dynamically allocates tokens according to the known upper limits on the requirements of each device. In addition a system of stochastic tokens is used to increase efficiency when the stochastic traffic is significant. The protocol also allows user-defined priority systems to be employed and is suitable for distributed or centralised implementation. The results of computer simulated performance characteristics for the protocol using a star-ring topology are reported which demonstrate its ability to perform efficiently with the device and traffic loads anticipated within an industrial environment.
A 250-Mbit/s ring local computer network using 1.3-microns single-mode optical fibers
NASA Technical Reports Server (NTRS)
Eng, S. T.; Tell, R.; Andersson, T.; Eng, B.
1985-01-01
A 250-Mbit/s three-station fiber-optic ring local computer network was built and successfully demonstrated. A conventional token protocol was employed for bus arbitration to maximize the bus efficiency under high loading conditions, and a non-return-to-zero (NRS) data encoding format was selected for simplicity and maximum utilization of the ECL-circuit bandwidth.
Network protocols for real-time applications
NASA Technical Reports Server (NTRS)
Johnson, Marjory J.
1987-01-01
The Fiber Distributed Data Interface (FDDI) and the SAE AE-9B High Speed Ring Bus (HSRB) are emerging standards for high-performance token ring local area networks. FDDI was designed to be a general-purpose high-performance network. HSRB was designed specifically for military real-time applications. A workshop was conducted at NASA Ames Research Center in January, 1987 to compare and contrast these protocols with respect to their ability to support real-time applications. This report summarizes workshop presentations and includes an independent comparison of the two protocols. A conclusion reached at the workshop was that current protocols for the upper layers of the Open Systems Interconnection (OSI) network model are inadequate for real-time applications.
A fiber optic tactical voice/data network based on FDDI
NASA Technical Reports Server (NTRS)
Bergman, L. A.; Hartmayer, R.; Marelid, S.; Wu, W. H.; Edgar, G.; Cassell, P.; Mancini, R.; Kiernicki, J.; Paul, L. J.; Jeng, J.
1988-01-01
An asynchronous high-speed fiber optic local area network is described that supports ordinary data packet traffic simultaneously with synchronous Tl voice traffic over a common FDDI token ring channel. A voice interface module was developed that parses, buffers, and resynchronizes the voice data to the packet network. The technique is general, however, and can be applied to any deterministic class of networks, including multi-tier backbones. A conventional single token access protocol was employed at the lowest layer, with fixed packet sizes for voice and variable for data. In addition, the higher layer packet data protocols are allowed to operate independently of those for the voice thereby permitting great flexibility in reconfiguring the network. Voice call setup and switching functions were performed external to the network with PABX equipment.
Guaranteeing synchronous message deadlines with the timed token medium access control protocol
NASA Technical Reports Server (NTRS)
Agrawal, Gopal; Chen, Baio; Zhao, Wei; Davari, Sadegh
1992-01-01
We study the problem of guaranteeing synchronous message deadlines in token ring networks where the timed token medium access control protocol is employed. Synchronous capacity, defined as the maximum time for which a node can transmit its synchronous messages every time it receives the token, is a key parameter in the control of synchronous message transmission. To ensure the transmission of synchronous messages before their deadlines, synchronous capacities must be properly allocated to individual nodes. We address the issue of appropriate allocation of the synchronous capacities. Several synchronous capacity allocation schemes are analyzed in terms of their ability to satisfy deadline constraints of synchronous messages. We show that an inappropriate allocation of the synchronous capacities could cause message deadlines to be missed even if the synchronous traffic is extremely low. We propose a scheme called the normalized proportional allocation scheme which can guarantee the synchronous message deadlines for synchronous traffic of up to 33 percent of available utilization. To date, no other synchronous capacity allocation scheme has been reported to achieve such substantial performance. Another major contribution of this paper is an extension to the previous work on the bounded token rotation time. We prove that the time elapsed between any consecutive visits to a particular node is bounded by upsilon TTRT, where TTRT is the target token rotation time set up at system initialization time. The previous result by Johnson and Sevcik is a special case where upsilon = 2. We use this result in the analysis of various synchronous allocation schemes. It can also be applied in other similar studies.
Queueing models for token and slotted ring networks. Thesis
NASA Technical Reports Server (NTRS)
Peden, Jeffery H.
1990-01-01
Currently the end-to-end delay characteristics of very high speed local area networks are not well understood. The transmission speed of computer networks is increasing, and local area networks especially are finding increasing use in real time systems. Ring networks operation is generally well understood for both token rings and slotted rings. There is, however, a severe lack of queueing models for high layer operation. There are several factors which contribute to the processing delay of a packet, as opposed to the transmission delay, e.g., packet priority, its length, the user load, the processor load, the use of priority preemption, the use of preemption at packet reception, the number of processors, the number of protocol processing layers, the speed of each processor, and queue length limitations. Currently existing medium access queueing models are extended by adding modeling techniques which will handle exhaustive limited service both with and without priority traffic, and modeling capabilities are extended into the upper layers of the OSI model. Some of the model are parameterized solution methods, since it is shown that certain models do not exist as parameterized solutions, but rather as solution methods.
Implementation of Ada protocols on Mil-STD-1553 B data bus
NASA Technical Reports Server (NTRS)
Ruhman, Smil; Rosemberg, Flavia
1986-01-01
Standardization activity of data communication in avionic systems started in 1968 for the purpose of total system integration and the elimination of heavy wire bundles carrying signals between various subassemblies. The growing complexity of avionic systems is straining the capabilities of MIL-STD-1553 B (first issued in 1973), but a much greater challenge to it is posed by Ada, the standard language adopted for real-time, computer embedded-systems. Hardware implementation of Ada communication protocols in a contention/token bus or token ring network is proposed. However, during the transition period when the current command/response multiplex data bus is still flourishing and the development environment for distributed multi-computer Ada systems is as yet lacking, a temporary accomodation of the standard language with the standard bus could be very useful and even highly desirable. By concentrating all status informtion and decisions at the bus controller, it was found to be possible to construct an elegant and efficient harware impelementation of the Ada protocols at the bus interface. This solution is discussed.
Modeling of the Space Station Freedom data management system
NASA Technical Reports Server (NTRS)
Johnson, Marjory J.
1990-01-01
The Data Management System (DMS) is the information and communications system onboard Space Station Freedom (SSF). Extensive modeling of the DMS is being conducted throughout NASA to aid in the design and development of this vital system. Activities discussed at NASA Ames Research Center to model the DMS network infrastructure are discussed with focus on the modeling of the Fiber Distributed Data Interface (FDDI) token-ring protocol and experimental testbedding of networking aspects of the DMS.
Improving Information Management at Mare Island Naval Shipyard.
1987-03-01
copy reports [Ref. 8: pp. 1-41. C. PRIME TOKEN RING The prime ring is a token-type computer network linking five PRIME computers electronically . Each...the PRIME net are for news (a bulletin board), electronic mail, word processing, and data filing. d 4 o, " ,, " "." ’-" r...communications application) This is a group of general-purpose programs that includes word processing. electronic mail, and spreadsheet applications. Access is
The multidriver: A reliable multicast service using the Xpress Transfer Protocol
NASA Technical Reports Server (NTRS)
Dempsey, Bert J.; Fenton, John C.; Weaver, Alfred C.
1990-01-01
A reliable multicast facility extends traditional point-to-point virtual circuit reliability to one-to-many communication. Such services can provide more efficient use of network resources, a powerful distributed name binding capability, and reduced latency in multidestination message delivery. These benefits will be especially valuable in real-time environments where reliable multicast can enable new applications and increase the availability and the reliability of data and services. We present a unique multicast service that exploits features in the next-generation, real-time transfer layer protocol, the Xpress Transfer Protocol (XTP). In its reliable mode, the service offers error, flow, and rate-controlled multidestination delivery of arbitrary-sized messages, with provision for the coordination of reliable reverse channels. Performance measurements on a single-segment Proteon ProNET-4 4 Mbps 802.5 token ring with heterogeneous nodes are discussed.
LANES - LOCAL AREA NETWORK EXTENSIBLE SIMULATOR
NASA Technical Reports Server (NTRS)
Gibson, J.
1994-01-01
The Local Area Network Extensible Simulator (LANES) provides a method for simulating the performance of high speed local area network (LAN) technology. LANES was developed as a design and analysis tool for networking on board the Space Station. The load, network, link and physical layers of a layered network architecture are all modeled. LANES models to different lower-layer protocols, the Fiber Distributed Data Interface (FDDI) and the Star*Bus. The load and network layers are included in the model as a means of introducing upper-layer processing delays associated with message transmission; they do not model any particular protocols. FDDI is an American National Standard and an International Organization for Standardization (ISO) draft standard for a 100 megabit-per-second fiber-optic token ring. Specifications for the LANES model of FDDI are taken from the Draft Proposed American National Standard FDDI Token Ring Media Access Control (MAC), document number X3T9.5/83-16 Rev. 10, February 28, 1986. This is a mature document describing the FDDI media-access-control protocol. Star*Bus, also known as the Fiber Optic Demonstration System, is a protocol for a 100 megabit-per-second fiber-optic star-topology LAN. This protocol, along with a hardware prototype, was developed by Sperry Corporation under contract to NASA Goddard Space Flight Center as a candidate LAN protocol for the Space Station. LANES can be used to analyze performance of a networking system based on either FDDI or Star*Bus under a variety of loading conditions. Delays due to upper-layer processing can easily be nullified, allowing analysis of FDDI or Star*Bus as stand-alone protocols. LANES is a parameter-driven simulation; it provides considerable flexibility in specifying both protocol an run-time parameters. Code has been optimized for fast execution and detailed tracing facilities have been included. LANES was written in FORTRAN 77 for implementation on a DEC VAX under VMS 4.6. It consists of two programs, a simulation program and a user-interface program. The simulation program requires the SLAM II simulation library from Pritsker and Associates, W. Lafayette IN; the user interface is implemented using the Ingres database manager from Relational Technology, Inc. Information about running the simulation program without the user-interface program is contained in the documentation. The memory requirement is 129,024 bytes. LANES was developed in 1988.
Fiber optic voice/data network
NASA Technical Reports Server (NTRS)
Bergman, Larry A. (Inventor)
1989-01-01
An asynchronous, high-speed, fiber optic local area network originally developed for tactical environments with additional benefits for other environments such as spacecraft, and the like. The network supports ordinary data packet traffic simultaneously with synchronous T1 voice traffic over a common token ring channel; however, the techniques and apparatus of this invention can be applied to any deterministic class of packet data networks, including multitier backbones, that must transport stream data (e.g., video, SAR, sensors) as well as data. A voice interface module parses, buffers, and resynchronizes the voice data to the packet network employing elastic buffers on both the sending and receiving ends. Voice call setup and switching functions are performed external to the network with ordinary PABX equipment. Clock information is passed across network boundaries in a token passing ring by preceeding the token with an idle period of non-transmission which allows the token to be used to re-establish a clock synchronized to the data. Provision is made to monitor and compensate the elastic receiving buffers so as to prevent them from overflowing or going empty.
Acknowledgment Tokens and Speakership Incipiency Revisited.
ERIC Educational Resources Information Center
Zimmerman, Don H.
1993-01-01
Drummond and Hopper's article in this issue, "Back Channels Revisited," is argued to have decontextualized Jefferson's acknowledgement token phenomenon. The need for careful coding protocols for research on conversational practices is discussed. (eight references) (LB)
Cislan-2 extension final document by University of Twente (Netherlands)
NASA Astrophysics Data System (ADS)
Niemegeers, Ignas; Baumann, Frank; Beuwer, Wim; Jordense, Marcel; Pras, Aiko; Schutte, Leon; Tracey, Ian
1992-01-01
Results of worked performed under the so called Cislan extension contract are presented. The adaptation of the Cislan 2 prototype design to an environment of interconnected Local Area Networks (LAN's) instead of a single 802.5 token ring LAN is considered. In order to extend the network architecture, the Interconnection Function (IF) protocol layer was subdivided into two protocol layers: a new IF layer, and below the Medium Enhancement (ME) protocol layer. Some small enhancements to the distributed bandwidth allocation protocol were developed, which in fact are also applicable to the 'normal' Cislan 2 system. The new services and protocols are described together with some scenarios and requirements for the new internetting Cislan 2 system. How to overcome the degradation of the quality of speech due to packet loss on the LAN subsystem was studied. Experiments were planned in order to measure this speech quality degradation. Simulations were performed of two Cislan subsystems, the bandwidth allocation protocol and the clock synchronization mechanism. Results on both simulations, performed on SUN workstations using QNAP as a simulation tool, are given. Results of the simulations of the clock synchronization mechanism, and results of the simulation of the distributed bandwidth allocation protocol are given.
TORC3: Token-ring clearing heuristic for currency circulation
NASA Astrophysics Data System (ADS)
Humes, Carlos, Jr.; Lauretto, Marcelo S.; Nakano, Fábio; Pereira, Carlos A. B.; Rafare, Guilherme F. G.; Stern, Julio Michael
2012-10-01
Clearing algorithms are at the core of modern payment systems, facilitating the settling of multilateral credit messages with (near) minimum transfers of currency. Traditional clearing procedures use batch processing based on MILP - mixed-integer linear programming algorithms. The MILP approach demands intensive computational resources; moreover, it is also vulnerable to operational risks generated by possible defaults during the inter-batch period. This paper presents TORC3 - the Token-Ring Clearing Algorithm for Currency Circulation. In contrast to the MILP approach, TORC3 is a real time heuristic procedure, demanding modest computational resources, and able to completely shield the clearing operation against the participating agents' risk of default.
Implementation of a tactical voice/data network over FDDI. [Fiber Distributed Data Interface
NASA Technical Reports Server (NTRS)
Bergman, L. A.; Halloran, F.; Martinez, J.
1988-01-01
An asynchronous high-speed fiber-optic local-area network is described that simultaneously supports packet data traffic with synchronous TI voice traffic over a standard asynchronous FDDI (fiber distributed data interface) token-ring channel. A voice interface module was developed that parses, buffers, and resynchronizes the voice data to the packet network. The technique is general, however, and can be applied to any deterministic class of networks, including multitier backbones. In addition, the higher layer packet data protocols may operate independently of those for the voice, thereby permitting great flexibility in reconfiguring the network. Voice call setup and switching functions are performed external to the network with PABX equipment.
Backup key generation model for one-time password security protocol
NASA Astrophysics Data System (ADS)
Jeyanthi, N.; Kundu, Sourav
2017-11-01
The use of one-time password (OTP) has ushered new life into the existing authentication protocols used by the software industry. It introduced a second layer of security to the traditional username-password authentication, thus coining the term, two-factor authentication. One of the drawbacks of this protocol is the unreliability of the hardware token at the time of authentication. This paper proposes a simple backup key model that can be associated with the real world applications’user database, which would allow a user to circumvent the second authentication stage, in the event of unavailability of the hardware token.
Throughput analysis of the IEEE 802.4 token bus standard under heavy load
NASA Technical Reports Server (NTRS)
Pang, Joseph; Tobagi, Fouad
1987-01-01
It has become clear in the last few years that there is a trend towards integrated digital services. Parallel to the development of public Integrated Services Digital Network (ISDN) is service integration in the local area (e.g., a campus, a building, an aircraft). The types of services to be integrated depend very much on the specific local environment. However, applications tend to generate data traffic belonging to one of two classes. According to IEEE 802.4 terminology, the first major class of traffic is termed synchronous, such as packetized voice and data generated from other applications with real-time constraints, and the second class is called asynchronous which includes most computer data traffic such as file transfer or facsimile. The IEEE 802.4 token bus protocol which was designed to support both synchronous and asynchronous traffic is examined. The protocol is basically a timer-controlled token bus access scheme. By a suitable choice of the design parameters, it can be shown that access delay is bounded for synchronous traffic. As well, the bandwidth allocated to asynchronous traffic can be controlled. A throughput analysis of the protocol under heavy load with constant channel occupation of synchronous traffic and constant token-passing times is presented.
Microcomputer Applications with PC LAN (Local Area Network) in Battleships.
1988-12-01
NETWORKS 5 C. TRANSMISSION TECHNIQUES 6 D. MEDIUM ACCESS CONTROL METHODS 6 1. CSMA CD 6 2. Control Token 7 3. Slotted Ring 7 E...network model in the Turkish Battleships will employ the broadband technique. D. MEDIUM ACCESS CONTROL METHODS The access method is one of the most...better performance at heavier loads. 3. Slotted Ring This method is used with a ring network. The ring is initialized to contain a fixed number of
AIRNET: A real-time comunications network for aircraft
NASA Technical Reports Server (NTRS)
Weaver, Alfred C.; Cain, Brendan G.; Colvin, M. Alexander; Simoncic, Robert
1990-01-01
A real-time local area network was developed for use on aircraft and space vehicles. It uses token ring technology to provide high throughput, low latency, and high reliability. The system was implemented on PCs and PC/ATs operating on PCbus, and on Intel 8086/186/286/386s operating on Multibus. A standard IEEE 802.2 logical link control interface was provided to (optional) upper layer software; this permits the controls designer to utilize standard communications protocols (e.g., ISO, TCP/IP) if time permits, or to utilize a very fast link level protocol directly if speed is critical. Both unacknowledged datagram and reliable virtual circuit services are supported. A station operating an 8 MHz Intel 286 as a host can generate a sustained load of 1.8 megabits per second per station, and a 100-byte message can be delivered from the transmitter's user memory to the receiver's user memory, including all operating system and network overhead, in under 4 milliseconds.
Experimental high-speed network
NASA Astrophysics Data System (ADS)
McNeill, Kevin M.; Klein, William P.; Vercillo, Richard; Alsafadi, Yasser H.; Parra, Miguel V.; Dallas, William J.
1993-09-01
Many existing local area networking protocols currently applied in medical imaging were originally designed for relatively low-speed, low-volume networking. These protocols utilize small packet sizes appropriate for text based communication. Local area networks of this type typically provide raw bandwidth under 125 MHz. These older network technologies are not optimized for the low delay, high data traffic environment of a totally digital radiology department. Some current implementations use point-to-point links when greater bandwidth is required. However, the use of point-to-point communications for a total digital radiology department network presents many disadvantages. This paper describes work on an experimental multi-access local area network called XFT. The work includes the protocol specification, and the design and implementation of network interface hardware and software. The protocol specifies the Physical and Data Link layers (OSI layers 1 & 2) for a fiber-optic based token ring providing a raw bandwidth of 500 MHz. The protocol design and implementation of the XFT interface hardware includes many features to optimize image transfer and provide flexibility for additional future enhancements which include: a modular hardware design supporting easy portability to a variety of host system buses, a versatile message buffer design providing 16 MB of memory, and the capability to extend the raw bandwidth of the network to 3.0 GHz.
An overview of SAFENET and its implications for aerospace applications
NASA Technical Reports Server (NTRS)
Collins, George C.; Bown, Rodney L.
1991-01-01
The survivable, adaptable fiber optic embeddable network (SAFENET) is a draft standard for local area networking (LAN) developed by the Navy which, when adopted, will become a military standard. The standard is being developed for procurement specifications of computer resources to be used on ships and aircraft and has some of the real-time concerns that network standards for space vehicles have. Architecture and survivability are considered. It is noted that the token-ring LAN must implement the IEEE 802.5 recommended practice for dual ring reconfiguration, which is currently being reviewed for inclusion into the IEEE standard. A trunk coupling unit is used at each station to isolate a station from the ring in case of failure. Up to five stations can be bypassed in this fashion. Communication architecture has an OSI profile but differs from the standard concept of the seven layers by allowing alternate suits and breaking the layers into three groupings of services to allow for physical interfacing. It also provides several paths, even if only one profile is used. Management and synchronization protocols are discussed and security issues are addressed. Implications for aerospace applications are considered and it is projected that interoperability with the Navy and other U.S. Government systems may require SAFENET specifications for NASA systems.
FDDI network test adaptor error injection circuit
NASA Technical Reports Server (NTRS)
Eckenrode, Thomas (Inventor); Stauffer, David R. (Inventor); Stempski, Rebecca (Inventor)
1994-01-01
An apparatus for injecting errors into a FDDI token ring network is disclosed. The error injection scheme operates by fooling a FORMAC into thinking it sent a real frame of data. This is done by using two RAM buffers. The RAM buffer normally accessed by the RBC/DPC becomes a SHADOW RAM during error injection operation. A dummy frame is loaded into the shadow RAM in order to fool the FORMAC. This data is just like the data that would be used if sending a normal frame, with the restriction that it must be shorter than the error injection data. The other buffer, the error injection RAM, contains the error injection frame. The error injection data is sent out to the media by switching a multiplexor. When the FORMAC is done transmitting the data, the multiplexor is switched back to the normal mode. Thus, the FORMAC is unaware of what happened and the token ring remains operational.
A study of topologies and protocols for fiber optic local area network
NASA Technical Reports Server (NTRS)
Yeh, C.; Gerla, M.; Rodrigues, P.
1985-01-01
The emergence of new applications requiring high data traffic necessitates the development of high speed local area networks. Optical fiber is selected as the transmission medium due to its inherent advantages over other possible media and the dual optical bus architecture is shown to be the most suitable topology. Asynchronous access protocols, including token, random, hybrid random/token, and virtual token schemes, are developed and analyzed. Exact expressions for insertion delay and utilization at light and heavy load are derived, and intermediate load behavior is investigated by simulation. A new tokenless adaptive scheme whose control depends only on the detection of activity on the channel is shown to outperform round-robin schemes under uneven loads and multipacket traffic and to perform optimally at light load. An approximate solution to the queueing delay for an oscillating polling scheme under chaining is obtained and results are compared with simulation. Solutions to the problem of building systems with a large number of stations are presented, including maximization of the number of optical couplers, and the use of passive star/bus topologies, bridges and gateways.
Study and simulation of low rate video coding schemes
NASA Technical Reports Server (NTRS)
Sayood, Khalid; Chen, Yun-Chung; Kipp, G.
1992-01-01
The semiannual report is included. Topics covered include communication, information science, data compression, remote sensing, color mapped images, robust coding scheme for packet video, recursively indexed differential pulse code modulation, image compression technique for use on token ring networks, and joint source/channel coder design.
21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.
Code of Federal Regulations, 2010 CFR
2010-04-01
... practitioner's hard token or any other authentication factor required by the practitioner's two-factor authentication protocol is lost, stolen, or compromised. Such access must be terminated immediately upon...
Hopper, Lydia M; Kurtycz, Laura M; Ross, Stephen R; Bonnie, Kristin E
2015-01-01
In the wild, primates are selective over the routes that they take when foraging and seek out preferred or ephemeral food. Given this, we tested how a group of captive chimpanzees weighed the relative benefits and costs of foraging for food in their environment when a less-preferred food could be obtained with less effort than a more-preferred food. In this study, a social group of six zoo-housed chimpanzees (Pan troglodytes) could collect PVC tokens and exchange them with researchers for food rewards at one of two locations. Food preference tests had revealed that, for these chimpanzees, grapes were a highly-preferred food while carrot pieces were a less-preferred food. The chimpanzees were tested in three phases, each comprised of 30 thirty-minute sessions. In phases 1 and 3, if the chimpanzees exchanged a token at the location they collected them they received a carrot piece (no travel) or they could travel ≥10 m to exchange tokens for grapes at a second location. In phase 2, the chimpanzees had to travel for both rewards (≥10 m for carrot pieces, ≥15 m for grapes). The chimpanzees learned how to exchange tokens for food rewards, but there was individual variation in the time it took for them to make their first exchange and to discover the different exchange locations. Once all the chimpanzees were proficient at exchanging tokens, they exchanged more tokens for grapes (phase 3). However, when travel was required for both rewards (phase 2), the chimpanzees were less likely to work for either reward. Aside from the alpha male, all chimpanzees exchanged tokens for both reward types, demonstrating their ability to explore the available options. Contrary to our predictions, low-ranked individuals made more exchanges than high-ranked individuals, most likely because, in this protocol, chimpanzees could not monopolize the tokens or access to exchange locations. Although the chimpanzees showed a preference for exchanging tokens for their more-preferred food, they appeared to develop strategies to reduce the cost associated with obtaining the grapes, including scrounging rewards and tokens from group mates and carrying more than one token when travelling to the farther exchange location. By testing the chimpanzees in their social group we were able to tease apart the social and individual influences on their decision making and the interplay with the physical demands of the task, which revealed that the chimpanzees were willing to travel farther for better.
Kurtycz, Laura M.; Ross, Stephen R.; Bonnie, Kristin E.
2015-01-01
In the wild, primates are selective over the routes that they take when foraging and seek out preferred or ephemeral food. Given this, we tested how a group of captive chimpanzees weighed the relative benefits and costs of foraging for food in their environment when a less-preferred food could be obtained with less effort than a more-preferred food. In this study, a social group of six zoo-housed chimpanzees (Pan troglodytes) could collect PVC tokens and exchange them with researchers for food rewards at one of two locations. Food preference tests had revealed that, for these chimpanzees, grapes were a highly-preferred food while carrot pieces were a less-preferred food. The chimpanzees were tested in three phases, each comprised of 30 thirty-minute sessions. In phases 1 and 3, if the chimpanzees exchanged a token at the location they collected them they received a carrot piece (no travel) or they could travel ≥10 m to exchange tokens for grapes at a second location. In phase 2, the chimpanzees had to travel for both rewards (≥10 m for carrot pieces, ≥15 m for grapes). The chimpanzees learned how to exchange tokens for food rewards, but there was individual variation in the time it took for them to make their first exchange and to discover the different exchange locations. Once all the chimpanzees were proficient at exchanging tokens, they exchanged more tokens for grapes (phase 3). However, when travel was required for both rewards (phase 2), the chimpanzees were less likely to work for either reward. Aside from the alpha male, all chimpanzees exchanged tokens for both reward types, demonstrating their ability to explore the available options. Contrary to our predictions, low-ranked individuals made more exchanges than high-ranked individuals, most likely because, in this protocol, chimpanzees could not monopolize the tokens or access to exchange locations. Although the chimpanzees showed a preference for exchanging tokens for their more-preferred food, they appeared to develop strategies to reduce the cost associated with obtaining the grapes, including scrounging rewards and tokens from group mates and carrying more than one token when travelling to the farther exchange location. By testing the chimpanzees in their social group we were able to tease apart the social and individual influences on their decision making and the interplay with the physical demands of the task, which revealed that the chimpanzees were willing to travel farther for better. PMID:25802805
A CBLT and MCST capable VME slave interface
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wuerthwein, F.; Strohman, C.; Honscheid, K.
1996-12-31
We report on the development of a VME slave interface for the CLEO III detector implemented in an ALTERA EPM7256 CPLD. This includes the first implementation of the chained block transfer protocol (CBLT) and multi-cast cycles (MCST) as defined by the VME-P task group of VIPA. Within VME64 there is no operation that guarantees efficient readout of large blocks of data that are sparsely distributed among a series of slave modules in a VME crate. This has led the VME-P task group of VIPA to specify protocols that enable a master to address many slaves at a single address. Whichmore » slave is to drive the data bus is determined by a token passing mechanism that uses the *IACKOUT, *IACKIN daisy chain. This protocol requires no special features from the master besides conformance to VME64. Non-standard features are restricted to the VME slave interface. The CLEO III detector comprises {approximately}400,000 electronic channels that have to be digitized, sparsified, and stored within 20{mu}s in order to incur less than 2% dead time at an anticipated trigger rate of 1000Hz. 95% of these channels are accounted for by only two detector subsystems, the silicon microstrip detector (125,000 channels), and the ring imaging Cerenkov detector (RICH) (230,400 channels). After sparsification either of these two detector subsystems is expected to provide event fragments on the order of 10KBytes, spread over 4, and 8 VME crates, respectively. We developed a chip set that sparsifies, tags, and stores the incoming digital data on the data boards, and includes a VME slave interface that implements MCST and CUT protocols. In this poster, we briefly describe this chip set and then discuss the VME slave interface in detail.« less
Secure Hardware Design for Trust
2014-03-01
approach. The Grain VHDL code was obtained from [13] and implemented in the same fashion as shown in Figure 5. Approved for Public Release...CRC implementation for USB token protocol was chosen was the main candidate. The VHDL source code was generated from [14] using the standard CRC5...10 6.1 Logic Encryption Implementation of AES
Substitution effects in a generalized token economy with pigeons.
Andrade, Leonardo F; Hackenberg, Timothy D
2017-01-01
Pigeons made repeated choices between earning and exchanging reinforcer-specific tokens (green tokens exchangeable for food, red tokens exchangeable for water) and reinforcer-general tokens (white tokens exchangeable for food or water) in a closed token economy. Food and green food tokens could be earned on one panel; water and red water tokens could be earned on a second panel; white generalized tokens could be earned on either panel. Responses on one key produced tokens according to a fixed-ratio schedule, whereas responses on a second key produced exchange periods, during which all previously earned tokens could be exchanged for the appropriate commodity. Most conditions were conducted in a closed economy, and pigeons distributed their token allocation in ways that permitted food and water consumption. When the price of all tokens was equal and low, most pigeons preferred the generalized tokens. When token-production prices were manipulated, pigeons reduced production of the tokens that increased in price while increasing production of the generalized tokens that remained at a fixed price. The latter is consistent with a substitution effect: Generalized tokens increased and were exchanged for the more expensive reinforcer. When food and water were made freely available outside the session, token production and exchange was sharply reduced but was not eliminated, even in conditions when it no longer produced tokens. The results join with other recent data in showing sustained generalized functions of token reinforcers, and demonstrate the utility of token-economic methods for assessing demand for and substitution among multiple commodities in a laboratory context. © 2016 Society for the Experimental Analysis of Behavior.
SUBSTITUTION EFFECTS IN A GENERALIZED TOKEN ECONOMY WITH PIGEONS
Andrade, Leonardo F.; Hackenberg, Timothy D.
2016-01-01
Pigeons made repeated choices between earning and exchanging reinforcer-specific tokens (green tokens exchangeable for food, red tokens exchangeable for water) and reinforcer-general tokens (white tokens exchangeable for food or water) in a closed token economy. Food and green food tokens could be earned on one panel; water and red water tokens could be earned on a second panel; white generalized tokens could be earned on either panel. Responses on one key produced tokens according to a fixed-ratio schedule, whereas responses on a second key produced exchange periods, during which all previously earned tokens could be exchanged for the appropriate commodity. Most conditions were conducted in a closed economy, and pigeons distributed their token allocation in ways that permitted food and water consumption. When the price of all tokens was equal and low, most pigeons preferred the generalized tokens. When token-production prices were manipulated, pigeons reduced production of the tokens that increased in price while increasing production of the generalized tokens that remained at a fixed price. The latter is consistent with a substitution effect: Generalized tokens increased and were exchanged for the more expensive reinforcer. When food and water were made freely available outside the session, token production and exchange was sharply reduced but was not eliminated, even in conditions when it no longer produced tokens. The results join with other recent data in showing sustained generalized functions of token reinforcers, and demonstrate the utility of token-economic methods for assessing demand for and substitution among multiple commodities in a laboratory context. PMID:28000221
2011-01-01
Background Tokenization is an important component of language processing yet there is no widely accepted tokenization method for English texts, including biomedical texts. Other than rule based techniques, tokenization in the biomedical domain has been regarded as a classification task. Biomedical classifier-based tokenizers either split or join textual objects through classification to form tokens. The idiosyncratic nature of each biomedical tokenizer’s output complicates adoption and reuse. Furthermore, biomedical tokenizers generally lack guidance on how to apply an existing tokenizer to a new domain (subdomain). We identify and complete a novel tokenizer design pattern and suggest a systematic approach to tokenizer creation. We implement a tokenizer based on our design pattern that combines regular expressions and machine learning. Our machine learning approach differs from the previous split-join classification approaches. We evaluate our approach against three other tokenizers on the task of tokenizing biomedical text. Results Medpost and our adapted Viterbi tokenizer performed best with a 92.9% and 92.4% accuracy respectively. Conclusions Our evaluation of our design pattern and guidelines supports our claim that the design pattern and guidelines are a viable approach to tokenizer construction (producing tokenizers matching leading custom-built tokenizers in a particular domain). Our evaluation also demonstrates that ambiguous tokenizations can be disambiguated through POS tagging. In doing so, POS tag sequences and training data have a significant impact on proper text tokenization. PMID:21658288
Macaque monkeys can learn token values from human models through vicarious reward.
Bevacqua, Sara; Cerasti, Erika; Falcone, Rossella; Cervelloni, Milena; Brunamonti, Emiliano; Ferraina, Stefano; Genovesio, Aldo
2013-01-01
Monkeys can learn the symbolic meaning of tokens, and exchange them to get a reward. Monkeys can also learn the symbolic value of a token by observing conspecifics but it is not clear if they can learn passively by observing other actors, e.g., humans. To answer this question, we tested two monkeys in a token exchange paradigm in three experiments. Monkeys learned token values through observation of human models exchanging them. We used, after a phase of object familiarization, different sets of tokens. One token of each set was rewarded with a bit of apple. Other tokens had zero value (neutral tokens). Each token was presented only in one set. During the observation phase, monkeys watched the human model exchange tokens and watched them consume rewards (vicarious rewards). In the test phase, the monkeys were asked to exchange one of the tokens for food reward. Sets of three tokens were used in the first experiment and sets of two tokens were used in the second and third experiments. The valuable token was presented with different probabilities in the observation phase during the first and second experiments in which the monkeys exchanged the valuable token more frequently than any of the neutral tokens. The third experiments examined the effect of unequal probabilities. Our results support the view that monkeys can learn from non-conspecific actors through vicarious reward, even a symbolic task like the token-exchange task.
Performance issues in management of the Space Station Information System
NASA Technical Reports Server (NTRS)
Johnson, Marjory J.
1988-01-01
The onboard segment of the Space Station Information System (SSIS), called the Data Management System (DMS), will consist of a Fiber Distributed Data Interface (FDDI) token-ring network. The performance of the DMS in scenarios involving two kinds of network management is analyzed. In the first scenario, how the transmission of routine management messages impacts performance of the DMS is examined. In the second scenario, techniques for ensuring low latency of real-time control messages in an emergency are examined.
Some Protocols For Optical-Fiber Digital Communications
NASA Technical Reports Server (NTRS)
Yeh, Cavour; Gerla, Mario
1989-01-01
One works best in heavy traffic, another, in light traffic. Three protocols proposed for digital communications among stations connected by passive taps to pair of uni-directional optical-fiber buses. Mediate round-robin, bounded-delay access to buses by all stations and particularly suited to fast transmission. Partly because transmission medium passive (no relay stations) and partly because protocols distribute control of network among all stations with provision for addition and deletion of stations (no control stations), communication network able to resist and recover from failures. Implicit token propagates in one direction on one bus and in opposite direction on other bus, minimizing interval of silence between end of one round and beginning of next.
Second-Order Schedules of Token Reinforcement with Pigeons: Implications for Unit Price
ERIC Educational Resources Information Center
Bullock, Christopher E.; Hackenberg, Timothy D.
2006-01-01
Four pigeons were exposed to second-order schedules of token reinforcement, with stimulus lights serving as token reinforcers. Tokens were earned according to a fixed-ratio (token-production) schedule, with the opportunity to exchange tokens for food (exchange period) occurring after a fixed number had been produced (exchange-production ratio).…
Overjustification effects in token economies.
Fisher, E B
1979-01-01
This study tested the relevance to clinical token economies of the overjustification hypothesis that tangible reward interferes with intrinsic interest in target behaviors and causes such behaviors to be less probable following a period of reinforcement than preceding such a period. The study was carried out in an ongoing token economy for chronic psychiatric patients. Alternated over an 8-week period were weeks of token and no-token reward for one of the program's target behaviors, toothbrushing. Two different amounts of token reward were employed in order to examine whether reward magnitude might influence the presence or extent of overjustification effects. Little evidence was found for the presence of overjustification effects in token economies. However, maintenance of toothbrushing was greater in no-token weeks following weeks of low amounts of token reward than in no-token weeks following weeks of higher amounts of reward. The importance of such complex functional relationships is discussed. PMID:511808
Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies
Uhlemann, Elisabeth
2018-01-01
Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications. PMID:29570676
Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies.
Balador, Ali; Uhlemann, Elisabeth; Calafate, Carlos T; Cano, Juan-Carlos
2018-03-23
Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications.
Tan, Lavinia; Hackenberg, Timothy D
2015-11-01
Pigeons' demand and preference for specific and generalized tokens was examined in a token economy. Pigeons could produce and exchange different colored tokens for food, for water, or for food or water. Token production was measured across three phases, which examined: (1) across-session price increases (typical demand curve method); (2) within-session price increases (progressive-ratio, PR, schedule); and (3) concurrent pairwise choices between the token types. Exponential demand curves were fitted to the response data and accounted for over 90% total variance. Demand curve parameter values, Pmax , Omax and α showed that demand was ordered in the following way: food tokens, generalized tokens, water tokens, both in Phase 1 and in Phase 3. This suggests that the preferences were predictable on the basis of elasticity and response output from the demand analysis. Pmax and Omax values failed to consistently predict breakpoints and peak response rates in the PR schedules in Phase 2, however, suggesting limits on a unitary conception of reinforcer efficacy. The patterns of generalized token production and exchange in Phase 3 suggest that the generalized tokens served as substitutes for the specific food and water tokens. Taken together, the present findings demonstrate the utility of behavioral economic concepts in the analysis of generalized reinforcement. © Society for the Experimental Analysis of Behavior.
Rehabilitation Associate Training for Employed Staff. Token Systems (RA-10).
ERIC Educational Resources Information Center
Davis, Michael J.
This learning module, which is intended for use in in-service training for vocational rehabilitation counselors, provides information and practice for developing token economies. The following topics are discussed: tokens and the rationale for using them; advantages of token economies; procedures for using a token system (specifying behaviors that…
Reinforcer Accumulation in a Token-Reinforcement Context with Pigeons
ERIC Educational Resources Information Center
Yankelevitz, Rachelle L.; Bullock, Christopher E.; Hackenberg, Timothy D.
2008-01-01
Four pigeons were exposed to a token-reinforcement procedure with stimulus lights serving as tokens. Responses on one key (the token-production key) produced tokens that could be exchanged for food during an exchange period. Exchange periods could be produced by satisfying a ratio requirement on a second key (the exchange-production key). The…
Crawford, H.J.; Lindenstruth, V.
1999-06-29
A method of managing digital resources of a digital system includes the step of reserving token values for certain digital resources in the digital system. A selected token value in a free-buffer-queue is then matched to an incoming digital resource request. The selected token value is then moved to a valid-request-queue. The selected token is subsequently removed from the valid-request-queue to allow a digital agent in the digital system to process the incoming digital resource request associated with the selected token. Thereafter, the selected token is returned to the free-buffer-queue. 6 figs.
Crawford, Henry J.; Lindenstruth, Volker
1999-01-01
A method of managing digital resources of a digital system includes the step of reserving token values for certain digital resources in the digital system. A selected token value in a free-buffer-queue is then matched to an incoming digital resource request. The selected token value is then moved to a valid-request-queue. The selected token is subsequently removed from the valid-request-queue to allow a digital agent in the digital system to process the incoming digital resource request associated with the selected token. Thereafter, the selected token is returned to the free-buffer-queue.
Fun While Learning and Earning. A Look Into Chattanooga Public Schools' Token Reinforcement Program.
ERIC Educational Resources Information Center
Smith, William F.; Sanders, Frank J.
A token reinforcement program was used by the Piney Woods Research and Demonstration Center in Chattanooga, Tennessee. Children who were from economically deprived homes received tokens for positive behavior. The tokens were redeemable for recess privileges, ice cream, candy, and other such reinforcers. All tokens were spent on the day earned so…
Token Economy: A Systematic Review of Procedural Descriptions.
Ivy, Jonathan W; Meindl, James N; Overley, Eric; Robson, Kristen M
2017-09-01
The token economy is a well-established and widely used behavioral intervention. A token economy is comprised of six procedural components: the target response(s), a token that functions as a conditioned reinforcer, backup reinforcers, and three interconnected schedules of reinforcement. Despite decades of applied research, the extent to which the procedures of a token economy are described in complete and replicable detail has not been evaluated. Given the inherent complexity of a token economy, an analysis of the procedural descriptions may benefit future token economy research and practice. Articles published between 2000 and 2015 that included implementation of a token economy within an applied setting were identified and reviewed with a focus on evaluating the thoroughness of procedural descriptions. The results show that token economy components are regularly omitted or described in vague terms. Of the articles included in this analysis, only 19% (18 of 96 articles reviewed) included replicable and complete descriptions of all primary components. Missing or vague component descriptions could negatively affect future research or applied practice. Recommendations are provided to improve component descriptions.
Architectural impact of FDDI network on scheduling hard real-time traffic
NASA Technical Reports Server (NTRS)
Agrawal, Gopal; Chen, Baio; Zhao, Wei; Davari, Sadegh
1991-01-01
The architectural impact on guaranteeing synchronous message deadlines in FDDI (Fiber Distributed Data Interface) token ring networks is examined. The FDDI network does not have facility to support (global) priority arbitration which is a useful facility for scheduling hard real time activities. As a result, it was found that the worst case utilization of synchronous traffic in an FDDI network can be far less than that in a centralized single processor system. Nevertheless, it is proposed and analyzed that a scheduling method can guarantee deadlines of synchronous messages having traffic utilization up to 33 pct., the highest to date.
Beran, Michael J.; Evans, Theodore A.
2012-01-01
Token exchange inherently introduces an element of delay between behavior and reward and so token studies may help us better understand delay of gratification and self-control. To examine this possibility, we presented three language-trained chimpanzees with repeated choices involving different foods that could be eaten immediately or lexigram (graphic symbol) tokens that represented (and could be traded for) foods later. When both options were foods, chimpanzees always chose more preferred foods over less preferred foods. When both options were lexigram tokens representing those same foods, performance remained the same as chimpanzees selected the higher value token and then traded it for food. Then, when faced with choosing a token that could be traded later or choosing a food item that could be eaten immediately, most chimpanzees learned to make whatever response led to the more preferred food. They did this even when that meant selecting a high value lexigram token that could be traded only two to three minutes later instead of a medium value, but immediately available, food item. Thus, chimpanzees flexibly selected tokens even though such selections necessarily delayed gratification and required forgoing immediately available food. This finding illustrates the utility of symbolic token exchange for assessing self-control in nonhuman animals. PMID:22674686
Stock optimizing in choice when a token deposit is the operant.
Widholm, J J; Silberberg, A; Hursh, S R; Imam, A A; Warren-Boulton, F R
2001-11-01
Each of 2 monkeys typically earned their daily food ration by depositing tokens in one of two slots. Tokens deposited in one slot dropped into a bin where they were kept (token kept). Deposits to a second slot dropped into a bin where they could be obtained again (token returned). In Experiment 1, a fixed-ratio (FR) 5 schedule that provided two food pellets was associated with each slot. Both monkeys preferred the token-returned slot. In Experiment 2, both subjects chose between unequal FR schedules with the token-returned slot always associated with the leaner schedule. When the FRs were 2 versus 3 and 2 versus 6, preferences were maintained for the token-returned slot; however, when the ratios were 2 versus 12, preference shifted to the token-kept slot. In Experiment 3, both monkeys chose between equal-valued concurrent variable-interval variable-interval schedules. Both monkeys preferred the slot that returned tokens. In Experiment 4, both monkeys chose between FRs that typically differed in size by a factor of 10. Both monkeys preferred the FR schedule that provided more food per trial. These data show that monkeys will choose so as to increase the number of reinforcers earned (stock optimizing) even when this preference reduces the rate of reinforcement (all reinforcers divided by session time).
Kakuda, Wataru; Abo, Masahiro; Uruma, Go; Kaito, Nobuyoshi; Watanabe, Motoi
2010-01-01
To examine the safety and feasibility of therapeutic application of low-frequency repetitive transcranial magnetic stimulation (rTMS) combined with language therapy for post-stroke patients with sensory-dominant aphasia. Two post-stroke Japanese patients with sensory-dominant aphasia were studied. In both patients, 10 sessions of 20-minute low-frequency rTMS with 1 Hz to the Wernicke's area were provided throughout 6-day hospitalization, followed by weekly outpatient rTMS treatment for 3 months. The language therapy was also provided through the period of in- and out-patient treatment. Language function was evaluated using the Token test and the Standard Language Test of Aphasia (SLTA) at the start and end of the in-patient treatment and the end of the outpatient treatment. The therapeutic protocol was well tolerated throughout the in- and out-patient treatments, without any adverse effects. The scores of the Token test and certain sub-categories of SLTA increased in both patients after the in-patient rTMS treatment. Persistent improvement of the score was noted over the 3-month post-discharge period. The proposed protocol of long-term application of low-frequency rTMS to the Wernicke's area and language therapy is considered a safe and feasible therapeutic approach for post-stroke patients with sensory-dominant aphasia.
Numerical judgments by chimpanzees (Pan troglodytes) in a token economy.
Beran, Michael J; Evans, Theodore A; Hoyle, Daniel
2011-04-01
We presented four chimpanzees with a series of tasks that involved comparing two token sets or comparing a token set to a quantity of food. Selected tokens could be exchanged for food items on a one-to-one basis. Chimpanzees successfully selected the larger numerical set for comparisons of 1 to 5 items when both sets were visible and when sets were presented through one-by-one addition of tokens into two opaque containers. Two of four chimpanzees used the number of tokens and food items to guide responding in all conditions, rather than relying on token color, size, total amount, or duration of set presentation. These results demonstrate that judgments of simultaneous and sequential sets of stimuli are made by some chimpanzees on the basis of the numerousness of sets rather than other non-numerical dimensions. The tokens were treated as equivalent to food items on the basis of their numerousness, and the chimpanzees maximized reward by choosing the larger number of items in all situations.
TOKEN REINFORCEMENT: A REVIEW AND ANALYSIS
Hackenberg, Timothy D
2009-01-01
Token reinforcement procedures and concepts are reviewed and discussed in relation to general principles of behavior. The paper is divided into four main parts. Part I reviews and discusses previous research on token systems in relation to common behavioral functions—reinforcement, temporal organization, antecedent stimulus functions, and aversive control—emphasizing both the continuities with other contingencies and the distinctive features of token systems. Part II describes the role of token procedures in the symmetrical law of effect, the view that reinforcers (gains) and punishers (losses) can be measured in conceptually analogous terms. Part III considers the utility of token reinforcement procedures in cross-species analysis of behavior more generally, showing how token procedures can be used to bridge the methodological gulf separating research with humans from that with other animals. Part IV discusses the relevance of token systems to the field of behavioral economics. Token systems have the potential to significantly advance research and theory in behavioral economics, permitting both a more refined analysis of the costs and benefits underlying standard economic models, and a common currency more akin to human monetary systems. Some implications for applied research and for broader theoretical integration across disciplines will also be considered. PMID:19794838
Kaufman, Kenneth F.; O'Leary, K. Daniel
1972-01-01
Sixteen pupils in a psychiatric hospital were assigned to two tutorial reading classes and balanced on six pupil characteristics and teacher preferences for the children. The effects of reward and cost procedures in a token program were assessed using both within- and between-subject comparisons in the following phases: (1) Baseline; (2) Token I, teacher evaluated and reinforced children for appropriate behavior; (3) Withdrawal of Tokens; (4) Token II, same as Token I; (5) Token III, same as Token I and II, but switched order of class meeting time; and (6) Self-Evaluation, students rated their own behavior and received prizes based on their rating, rather than the teacher's rating. The token program was markedly successful in reducing disruptive behavior and in increasing reading skills in both the Reward and Cost Classes, but there were no significant differences in the effects of the reward versus the cost procedure. While cost may be seen as a punishment procedure, there were no adverse side effects observed in the Cost Class at any time when the token program was in effect. The order of the classes was unrelated to the level of disruptive behavior or academic progress. The Self-Evaluative Phase, in which the students rated their own behavior, was included as an alternative to the abrupt withdrawal of tokens. In this phase, disruptive behavior remained at the previous low level. PMID:16795351
Unit Price and Choice in a Token-Reinforcement Context
ERIC Educational Resources Information Center
Foster, Theresa A.; Hackenberg, Timothy D.
2004-01-01
Pigeons were exposed to multiple and concurrent second-order schedules of token reinforcement, with stimulus lights serving as token reinforcers. Tokens were produced and exchanged for food according to various fixed-ratio schedules, yielding equal and unequal unit prices (responses per unit food delivery). On one schedule (termed the "standard…
NASA Astrophysics Data System (ADS)
Pathak, Rohit; Joshi, Satyadhar
Within a span of over a decade, India has become one of the most favored destinations across the world for Business Process Outsourcing (BPO) operations. India has rapidly achieved the status of being the most preferred destination for BPO for companies located in the US and Europe. Security and privacy are the two major issues needed to be addressed by the Indian software industry to have an increased and long-term outsourcing contract from the US. Another important issue is about sharing employee’s information to ensure that data and vital information of an outsourcing company is secured and protected. To ensure that the confidentiality of a client’s information is maintained, BPOs need to implement some data security measures. In this paper, we propose a new protocol for specifically for BPO Secure Multi-Party Computation (SMC). As there are many computations and surveys which involve confidential data from many parties or organizations and the concerned data is property of the organization, preservation and security of this data is of prime importance for such type of computations. Although the computation requires data from all the parties, but none of the associated parties would want to reveal their data to the other parties. We have proposed a new efficient and scalable protocol to perform computation on encrypted information. The information is encrypted in a manner that it does not affect the result of the computation. It uses modifier tokens which are distributed among virtual parties, and finally used in the computation. The computation function uses the acquired data and modifier tokens to compute right result from the encrypted data. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved. Also we have analyzed the specific case of Indian BPO.
Authenticating Secure Tokens Using Slow Memory Access
1999-01-01
Cryptology— CRYPTO ’97 Proceedings, Springer- Verlag, 1997, pp. 513–525. [CP93] D . Chaum and T. Pederson, “Wallet Databases with Observers,” Advances in...96 Proceedings, Springer-Verlag, 1996, pp. 1–15. [BDL97] D . Boneh, R.A. Demillo, R.J. Lip- ton, “On the Importance of Check- ing Cryptographic...Protocols for Faults,” Advances in Cryptology—EUROCRYPT ’97 Proceedings, Springer-Verlag, 1997, pp. 37–51. [BGW98] M. Briceno, I. Goldberg, D . Wagner
Living in the Classroom: The Currency-Based Token Economy.
ERIC Educational Resources Information Center
Payne, James S.; And Others
Various types of token economies and contingency contract systems are emerging throughout private and public educational programs. The basic idea of this book is that a token economy based on currency creates a real-life situation for children in the classroom. The goal of this book is to help the teacher establish a currency-based token economy…
Risky Choice in Pigeons: Preference for Amount Variability Using a Token-Reinforcement System
ERIC Educational Resources Information Center
Lagorio, Carla H.; Hackenberg, Timothy D.
2012-01-01
Pigeons were given repeated choices between variable and fixed numbers of token reinforcers (stimulus lamps arrayed above the response keys), with each earned token exchangeable for food. The number of tokens provided by the fixed-amount option remained constant within blocks of sessions, but varied parametrically across phases, assuming values of…
ERIC Educational Resources Information Center
Huq, Rizwan-ul; Amir, Alia
2015-01-01
In classroom settings, students' competence is regularly evaluated through a default practice named Initiation-Response-Feedback (IRF) or Initiation-Response-Evaluation (IRE). In the feedback or evaluation turn, the teacher normally uses acknowledgement tokens (such as uhm, yeah, okay). These tokens perform an active role of maintaining…
Validity and Reliability of the Arabic Token Test for Children
ERIC Educational Resources Information Center
Alkhamra, Rana A.; Al-Jazi, Aya B.
2016-01-01
Background: The Token Test for Children (2nd edition) (TTFC) is a measure for assessing receptive language. In this study we describe the translation process, validity and reliability of the Arabic Token Test for Children (A-TTFC). Aims: The aim of this study is to translate, validate and establish the reliability of the Arabic Token Test for…
Designing an IMAC system using TeraNet
NASA Astrophysics Data System (ADS)
Mun, In K.; Hilal, S. K.; Andrews, M. C.; Gidron, Rafael
1992-07-01
Even though considerable progresses have been made with communication technology, one of the more difficult problems facing in installing a comprehensive clinically effective Image Management and Communication (IMAC) system for a hospital is the communication problem. Most existing systems are based on Ethernet or Token-ring net. Some of the newer systems are being installed using FDDL. All these systems have inherent problems like communication speed, control of bandwidth usage, or/and poor performance under heavy traffic. In order to overcome these difficulties, we are designing a complete IMAC system based on a novel network known as TeraNet, being developed at Center for Telecommunication Research, Columbia University.
ERIC Educational Resources Information Center
Heitzman, Andrew J.
The New York State Center for Migrant Studies conducted this 1968 study which investigated effects of token reinforcers on reading and arithmetic skills learnings of migrant primary school students during a 6-week summer school session. Students (Negro and Caucasian) received plastic tokens to reward skills learning responses. Tokens were traded…
One-Time Password Tokens | High-Performance Computing | NREL
One-Time Password Tokens One-Time Password Tokens For connecting to NREL's high-performance computing (HPC) systems, learn how to set up a one-time password (OTP) token for remote and privileged a one-time pass code from the HPC Operations team. At the sign-in screen Enter your HPC Username in
Money and trust among strangers
Camera, Gabriele; Casari, Marco; Bigoni, Maria
2013-01-01
What makes money essential for the functioning of modern society? Through an experiment, we present evidence for the existence of a relevant behavioral dimension in addition to the standard theoretical arguments. Subjects faced repeated opportunities to help an anonymous counterpart who changed over time. Cooperation required trusting that help given to a stranger today would be returned by a stranger in the future. Cooperation levels declined when going from small to large groups of strangers, even if monitoring and payoffs from cooperation were invariant to group size. We then introduced intrinsically worthless tokens. Tokens endogenously became money: subjects took to reward help with a token and to demand a token in exchange for help. Subjects trusted that strangers would return help for a token. Cooperation levels remained stable as the groups grew larger. In all conditions, full cooperation was possible through a social norm of decentralized enforcement, without using tokens. This turned out to be especially demanding in large groups. Lack of trust among strangers thus made money behaviorally essential. To explain these results, we developed an evolutionary model. When behavior in society is heterogeneous, cooperation collapses without tokens. In contrast, the use of tokens makes cooperation evolutionarily stable. PMID:23980139
Money and trust among strangers.
Camera, Gabriele; Casari, Marco; Bigoni, Maria
2013-09-10
What makes money essential for the functioning of modern society? Through an experiment, we present evidence for the existence of a relevant behavioral dimension in addition to the standard theoretical arguments. Subjects faced repeated opportunities to help an anonymous counterpart who changed over time. Cooperation required trusting that help given to a stranger today would be returned by a stranger in the future. Cooperation levels declined when going from small to large groups of strangers, even if monitoring and payoffs from cooperation were invariant to group size. We then introduced intrinsically worthless tokens. Tokens endogenously became money: subjects took to reward help with a token and to demand a token in exchange for help. Subjects trusted that strangers would return help for a token. Cooperation levels remained stable as the groups grew larger. In all conditions, full cooperation was possible through a social norm of decentralized enforcement, without using tokens. This turned out to be especially demanding in large groups. Lack of trust among strangers thus made money behaviorally essential. To explain these results, we developed an evolutionary model. When behavior in society is heterogeneous, cooperation collapses without tokens. In contrast, the use of tokens makes cooperation evolutionarily stable.
ERIC Educational Resources Information Center
Ali, Sundus Muhsin; Hussein, Khalid Shakir
2014-01-01
This paper presents an attempt to verify the comparative power of two statistical features: Type/Token, and Hapax legomena/Token ratios (henceforth TTR and HTR). A corpus of ten novels is compiled. Then sixteen samples (each is 5,000 tokens in length) are taken randomly out of these novels as representative blocks. The researchers observe the way…
ERIC Educational Resources Information Center
Carnett, Amarie; Raulston, Tracy; Lang, Russell; Tostanoski, Amy; Lee, Allyson; Sigafoos, Jeff; Machalicek, Wendy
2014-01-01
We compared the effects of a token economy intervention that either did or did not include the perseverative interests of a 7-year-old boy with autism. An alternating treatment design revealed that the perseverative interest-based tokens were more effective at decreasing challenging behavior and increasing on-task behavior than tokens absent the…
A simple, effective media access protocol system for integrated, high data rate networks
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, K.; Overstreet, C. M.; Khanna, S.; Zhang, L.
1992-01-01
The operation and performance of a dual media access protocol for integrated, gigabit networks are described. Unlike other dual protocols, each protocol supports a different class of traffic. The Carrier Sensed Multiple Access-Ring Network (CSMA/RN) protocol and the Circulating Reservation Packet (CRP) protocol support asynchronous and synchronous traffic, respectively. The two protocols operate with minimal impact upon each other. Performance information demonstrates that they support a complete range of integrated traffic loads, do not require call setup/termination or a special node for synchronous traffic control, and provide effective pre-use and recovery. The CRP also provides guaranteed access and fairness control for the asynchronous system. The paper demonstrates that the CSMA-CRP system fulfills many of the requirements for gigabit LAN-MAN networks most effectively and simply. To accomplish this, CSMA-CRP features are compared against similar ring and bus systems, such as Cambridge Fast Ring, Metaring, Cyclic Reservation Multiple Access, and Distributed Dual Queue Data Bus (DQDB).
Responses to a simple barter task in chimpanzees, Pan troglodytes.
Brosnan, Sarah F; de Waal, Frans B M
2005-07-01
Chimpanzees (Pan troglodytes) frequently participate in social exchange involving multiple goods and services of variable value, yet they have not been tested in a formalized situation to see whether they can barter using multiple tokens and rewards. We set up a simple barter economy with two tokens and two associated rewards and tested chimpanzees on their ability to obtain rewards by returning the matching token in situations in which their access to tokens was unlimited or limited. Chimpanzees easily learned to associate value with the tokens, as expected, and did barter, but followed a simple strategy of favoring the higher-value token, regardless of the reward proffered, instead of a more complex but more effective strategy of returning the token that matched the reward. This response is similar to that shown by capuchin monkeys in our previous study. We speculate that this response, while not ideal, may be sufficient to allow for stability of the social exchange system in these primates, and that the importance of social barter to both species may have led to this convergence of strategies.
Dickerson, Faith B; Tenhula, Wendy N; Green-Paden, Lisa D
2005-06-15
The token economy is a treatment intervention based on principles of operant conditioning and social learning. Developed in the 1950s and 1960s for long-stay hospital patients, the token economy has fallen out of favor since that time. The current review was undertaken as part of the 2003 update of the schizophrenia treatment recommendations of the Patient Outcomes Research Team (PORT). A total of 13 controlled studies of the token economy were reviewed. As a group, the studies provide evidence of the token economy's effectiveness in increasing the adaptive behaviors of patients with schizophrenia. Most of the studies are limited, however, by methodological shortcomings and by the historical context in which they were performed. More research is needed to determine the specific benefits of the token economy when administered in combination with contemporary psychosocial and psychopharmacological treatments.
Tokenism in patient engagement.
Hahn, David L; Hoffmann, Amanda E; Felzien, Maret; LeMaster, Joseph W; Xu, Jinping; Fagnan, Lyle J
2017-06-01
Patient engagement throughout research is a way to generate more relevant patient-important research questions, methods and results with the ultimate aim of facilitating translation of research into practice. Tokenism is defined as the practice of making perfunctory or symbolic efforts to engage communities or patients. We wanted to explore how tokenism might influence engaging patients in research to help researchers work towards more genuine engagement. The Community Clinician Advisory Group and Patient and Clinician Engagement program held a workshop at the 2015 North American Primary Care Research Group meeting titled 'How Do We Move beyond Tokenism in Patient Engagement?' Patients, clinicians and academic researchers contributed examples of genuine and token engagement characteristics based on personal experience and knowledge. Data were iteratively collated and categorized into domains and items. Examples of genuine and token engagement were categorized into three domains: Methods/Structure of engagement, Intent and Relationship building. Members with experience in patient-engaged research projects felt that longitudinal engagement was a key element to effectively translating research into local community and practice. The group (i) highly valued genuine intent and relationship building as elements to combat tokenism; (ii) noted that early genuine attempts at engagement may superficially resemble tokenism as researchers build enduring and trusting relationships with patient/community partners and (iii) emphasized the importance of seeking and utilizing patient experiences throughout research. These observations may contribute to more formal methods to help researchers (and reviewers) evaluate where engagement processes sit along the 'genuine-token' continuum. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
High speed bus technology development
NASA Astrophysics Data System (ADS)
Modrow, Marlan B.; Hatfield, Donald W.
1989-09-01
The development and demonstration of the High Speed Data Bus system, a 50 Million bits per second (Mbps) local data network intended for avionics applications in advanced military aircraft is described. The Advanced System Avionics (ASA)/PAVE PILLAR program provided the avionics architecture concept and basic requirements. Designs for wire and fiber optic media were produced and hardware demonstrations were performed. An efficient, robust token-passing protocol was developed and partially demonstrated. The requirements specifications, the trade-offs made, and the resulting designs for both a coaxial wire media system and a fiber optics design are examined. Also, the development of a message-oriented media access protocol is described, from requirements definition through analysis, simulation and experimentation. Finally, the testing and demonstrations conducted on the breadboard and brassboard hardware is presented.
Efficient authentication scheme based on near-ring root extraction problem
NASA Astrophysics Data System (ADS)
Muthukumaran, V.; Ezhilmaran, D.
2017-11-01
An authentication protocolis the type of computer communication protocol or cryptography protocol specifically designed for transfer of authentication data between two entities. We have planned a two new entity authentication scheme on the basis of root extraction problem near-ring in this article. We suggest that this problem is suitably difficult to serve as a cryptographic assumption over the platform of near-ring N. The security issues also discussed.
A High-Performance Reconfigurable Fabric for Cognitive Information Processing
2010-12-01
receives a data token from its control input (shown as a horizontal arrow above). The value of this data token is used to select an input port. The...dual of a merge. It receives a data token from its control input (shown as a horizontal arrow above). The value of this data token is used to select...Computer-Aided Design of Intergrated Circuits and Systems, Vol. 26, No. 2, February 2007. [12] Cadence Design Systems. Clock Domain Crossing: Closing the
A Secure and Reliable High-Performance Field Programmable Gate Array for Information Processing
2012-03-01
receives a data token from its control input (shown as a horizontal arrow above). The value of this data token is used to select an input port. The input...dual of a merge. It receives a data token from its control input (shown as a horizontal arrow above). The value of this data token is used to select...Transactions on Computer-Aided Design of Intergrated Circuits and Systems, Vol. 26, No. 2, February 2007. [12] Cadence Design Systems, “Clock Domain
System and method for key generation in security tokens
DOE Office of Scientific and Technical Information (OSTI.GOV)
Evans, Philip G.; Humble, Travis S.; Paul, Nathanael R.
Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).
Tokens: Facts and Interpretation.
ERIC Educational Resources Information Center
Schmandt-Besserat, Denise
1986-01-01
Summarizes some of the major pieces of evidence concerning the archeological clay tokens, specifically the technique for their manufacture, their geographic distribution, chronology, and the context in which they are found. Discusses the interpretation of tokens as the first example of visible language, particularly as an antecedent of Sumerian…
Token Reinforcement: A Review and Analysis
ERIC Educational Resources Information Center
Hackenberg, Timothy D.
2009-01-01
Token reinforcement procedures and concepts are reviewed and discussed in relation to general principles of behavior. The paper is divided into four main parts. Part I reviews and discusses previous research on token systems in relation to common behavioral functions--reinforcement, temporal organization, antecedent stimulus functions, and…
Milan, M A; McKee, J M
1976-01-01
Two experiments were conducted (1) to explore the application of token reinforcement procedures in a maximum security correctional institution for adult male felons and (2) to determine to what extent the reinforcement procedures disrupted the day-to-day lives of inmate participants. In Experiment 1, an expanded reversal design revealed that the combination of praise and token reinforcement was more effective than the combinations of praise and noncontingent token award or direct commands on four common institutional activities. The latter two combinations were not found to be any more effective than praise alone. Experiment 2, which also employed a reversal design, indicated that the high levels of performance observed during the token reinforcement phases of Experiment 1 could be attained without subjecting participants to undue hardship in the form of increased deprivation of either social intercourse or the opportunity to engage in recreational and entertainment activities. Client safeguards are discussed in detail. PMID:977516
Appropriate Use Policy | High-Performance Computing | NREL
users of the National Renewable Energy Laboratory (NREL) High Performance Computing (HPC) resources government agency, National Laboratory, University, or private entity, the intellectual property terms (if issued a multifactor token which may be a physical token or a virtual token used with one-time password
A Token Manual for Behavior Analysis Classrooms.
ERIC Educational Resources Information Center
Bushell, Don, Jr.
This dual language manual, written in both Spanish and English, will help the teacher in a Behavior Analysis classroom utilize the Token System to motivate, reinforce, and foster independence in pupils' learning activities. The rationale and procedures for earning, giving, and exchanging tokens is clearly explained. The use of helpful accessories…
ERIC Educational Resources Information Center
Alstot, Andrew E.
2012-01-01
Token economies have a long research and applied history within clinical settings and classroom education (Kazdin, 1982). However, despite reported successes in improving physical activity behaviors (Alstot, 2012), research examining token reinforcement implemented specifically in physical education is virtually nonexistent. Therefore, the purpose…
TOKEN DESEGREGATION AND BEYOND.
ERIC Educational Resources Information Center
MORLAND, J. KENNETH
TOKEN INTEGRATION IN THE SOUTH HAD ESSENTIALLY THE SAME GOAL THAT MASSIVE RESISTANCE HAD, IT TRIED TO PRESERVE THE ALREADY ESTABLISHED SEGREGATION. THOUGH IT MET THE DEMANDS OF THE SUPREME COURT BY ALLOWING SOME INTEGRATION, IT STILL MAINTAINED DE FACTO SEGREGATION. METHODS OF KEEPING SCHOOL INTEGRATION AT A TOKEN LEVEL INCLUDED PUPIL PLACEMENT…
Stedmon, Alex W; Eachus, Peter; Baillie, Les; Tallis, Huw; Donkor, Richard; Edlin-White, Robert; Bracewell, Robert
2015-03-01
Individuals trying to conceal knowledge from interrogators are likely to experience raised levels of stress that can manifest itself across biological, physiological, psychological and behavioural factors, providing an opportunity for detection. Using established research paradigms an innovative scalable interrogation was designed in which participants were given a 'token' that represented information they had to conceal from interviewers. A control group did not receive a token and therefore did not have to deceive the investigators. The aim of this investigation was to examine differences between deceivers and truth-tellers across the four factors by collecting data for cortisol levels, sweat samples, heart-rate, respiration, skin temperature, subjective stress ratings and video and audio recordings. The results provided an integrated understanding of responses to interrogation by those actively concealing information and those acting innocently. Of particular importance, the results also suggest, for the first time in an interrogation setting, that stressed individuals may secrete a volatile steroid based marker that could be used for stand-off detection. The findings are discussed in relation to developing a scalable interrogation protocol for future research in this area. Copyright © 2014 Elsevier Ltd and The Ergonomics Society. All rights reserved.
ERIC Educational Resources Information Center
Alstot, Andrew E.
2015-01-01
Token economies have been shown useful in a variety of settings to improve physical activity-related behaviors. However, few researchers in empirical research have examined the effects of token reinforcement targeting motor skill performance implemented specifically in physical education with typically developing children. Therefore, the purpose…
A Weight-Reduction Program for Schizophrenic Patients on a Token Economy Unit: Two Case Studies
ERIC Educational Resources Information Center
Upper, Dennis; Newton, Judith G.
1971-01-01
Overweight patients on a token economy psychiatric ward were reinforced with tokens, off ward privileges and social approval for meeting a weight loss criterion of three pounds per week. The progress of two subjects, both chronic paranoid schizophrenics, is described. The procedure appears to be effective. (Author)
Assessing the Value of Choice in a Token System
ERIC Educational Resources Information Center
Sran, Sandeep K.; Borrero, John C.
2010-01-01
Responding of 4 children was assessed under conditions in which (a) no programmed contingencies were arranged for target behavior, (b) responding produced tokens that could be exchanged for a single highly preferred edible item, and (c) responding produced a token that could be exchanged for a variety of preferred edible items. After assessing the…
Applied Behavior Analysis and the Imprisoned Adult Felon Project 1: The Cellblock Token Economy.
ERIC Educational Resources Information Center
Milan, Michael A.; And Others
This report provides a technical-level analysis, discussion, and summary of five experiments in applied behavior analysis. Experiment 1 examined the token economy as a basis for motivating inmate behavior; Experiment 2 examined the relationship between magnitude of token reinforcement and level of inmate performance; Experiment 3 introduced a…
Hegemony or Concordance? The Rhetoric of Tokenism in "Oprah" Winfrey's Rags-to-Riches Biography.
ERIC Educational Resources Information Center
Cloud, Dana L.
1996-01-01
Examines biographies of talk show host and producer Oprah Winfrey in which conventional narratives construct a token "Oprah" persona whose story reinforces the ideology of the American Dream, implying its accessibility to black Americans despite barriers inherent in a racist society. Develops theories of tokenism, biography,…
I Am Working for ___: Successfully Using Token Reward Systems
ERIC Educational Resources Information Center
Diamond, Gwendolyn P.; Da Fonte, M. Alexandra; Boesch, Miriam C.
2015-01-01
The use of these systems can enhance students' participation in instructional activities. However, to use token systems effectively, the system must be individualized and tailored to meet the needs of the child. In order to individualize the token system for each student, teachers should (1) identify an array of back-up reinforcers for the…
Displaying Now-Understanding: The Finnish Change-of-State Token "aa"
ERIC Educational Resources Information Center
Koivisto, Aino
2015-01-01
This article discusses the use of the Finnish change-of-state token "aa" that has previously not been identified. The central claim is that even though "aa" indicates a cognitive shift experienced by the speaker, it does not function as a receipt of new information. Instead, the token "aa" indicates that the speaker…
Foster, T A; Hackenberg, T D; Vaidya, M
2001-09-01
Pigeons' key pecks produced food under second-order schedules of token reinforcement, with light-emitting diodes serving as token reinforcers. In Experiment 1, tokens were earned according to a fixed-ratio 50 schedule and were exchanged for food according to either fixed-ratio or variable-ratio exchange schedules, with schedule type varied across conditions. In Experiment 2, schedule type was varied within sessions using a multiple schedule. In one component, tokens were earned according to a fixed-ratio 50 schedule and exchanged according to a variable-ratio schedule. In the other component, tokens were earned according to a variable-ratio 50 schedule and exchanged according to a fixed-ratio schedule. In both experiments, the number of responses per exchange was varied parametrically across conditions, ranging from 50 to 400 responses. Response rates decreased systematically with increases in the fixed-ratio exchange schedules, but were much less affected by changes in the variable-ratio exchange schedules. Response rates were consistently higher under variable-ratio exchange schedules than tinder comparable fixed-ratio exchange schedules, especially at higher exchange ratios. These response-rate differences were due both to greater pre-ratio pausing and to lower local rates tinder the fixed-ratio exchange schedules. Local response rates increased with proximity to food under the higher fixed-ratio exchange schedules, indicative of discriminative control by the tokens.
The Token Economy for Children with Intellectual Disability and/or Autism: A Review
ERIC Educational Resources Information Center
Matson, Johnny L.; Boisjoli, Jessica A.
2009-01-01
One of the most important technologies of behavior modifiers and applied behavior analysts over the last 40 years has been the token economy. These procedures are useful in that they help provide a structured therapeutic environment, and mimic other naturally occurring reinforcement systems such as the use of money. Token economies, at least from…
The Effects of Numerical Imbalance and Gender on Tokens: An Examination of Kanter's Theory.
ERIC Educational Resources Information Center
Fairhurst, Gail Theus; Snavely, Bretta Kay
A study examined the effects of gender on social interaction under numerically imbalanced conditions. Specifically, the study tested R. M. Kanter's assumption that all tokens (individuals who enter a work environment where their gender is numerically scarce) respond in a similar manner to token conditions, although evidence exists that males and…
Evaluating the Role of Contingency in Differentially Reinforced Tic Suppression
ERIC Educational Resources Information Center
Himle, Michael B.; Woods, Douglas W.; Bunaciu, Liviu
2008-01-01
The current study evaluated the effects of tokens delivered on differential reinforcement of zero-rate behavior (DRO) schedules or noncontingently on tic suppression in 4 children with tics. Tic frequency was lower in 3 of 4 children when tokens were delivered contingent on the absence of tics than when tokens were delivered noncontingently.…
A pixel read-out architecture implementing a two-stage token ring, zero suppression and compression
NASA Astrophysics Data System (ADS)
Heuvelmans, S.; Boerrigter, M.
2011-01-01
Increasing luminosity in high energy physics experiments leads to new challenges in the design of data acquisition systems for pixel detectors. With the upgrade of the LHCb experiment, the data processing will be changed; hit data from every collision will be transported off the pixel chip, without any trigger selection. A read-out architecture is proposed which is able to obtain low hit data loss on limited silicon area by using the logic beneath the pixels as a data buffer. Zero suppression and redundancy reduction ensure that the data rate off chip is minimized. A C++ model has been created for simulation of functionality and data loss, and for system development. A VHDL implementation has been derived from this model.
1990-09-01
H,O-Z) logical ofa (20,3) ,zf real*8 tofa (20,3),ca(20,3),ya(20,.3),wofa(20,3) integer oa(20,3),sa(20,3),seeda(20,3) common /ba/ofa,sattofaica,oa,seeda...if (zf) oa(nq,j) - oa(nq,j)+1 goto 1 end if tofa (nq,j) = temp s2 - dmod(sp*seeda(nq,j),B) wofa(nq,j) = max(0.000001,s2/B*ya(nq,j)) seeda(nq,j) - s2...3) *,asc(2) ,plensc(2) ,BWTc(2) ,Tpric(2,8) ,aac(2,8) ,plenac(2,8) *tofs (20), tofa (20, 3) ,wofs(20),wofa (20, 3) integer tails(20),taila(20,3),ss(20
ERIC Educational Resources Information Center
Linneweber, Judith
2016-01-01
This paper presents a two-session teaching unit on German change-of-state tokens such as "oh," "ach" and "achso." Goal is to teach students the appropriate reaction through change-of-state tokens in various situations. Students are provided with authentic data based on empirical research in conversation analysis (CA).…
Morpheme matching based text tokenization for a scarce resourced language.
Rehman, Zobia; Anwar, Waqas; Bajwa, Usama Ijaz; Xuan, Wang; Chaoying, Zhou
2013-01-01
Text tokenization is a fundamental pre-processing step for almost all the information processing applications. This task is nontrivial for the scarce resourced languages such as Urdu, as there is inconsistent use of space between words. In this paper a morpheme matching based approach has been proposed for Urdu text tokenization, along with some other algorithms to solve the additional issues of boundary detection of compound words, affixation, reduplication, names and abbreviations. This study resulted into 97.28% precision, 93.71% recall, and 95.46% F1-measure; while tokenizing a corpus of 57000 words by using a morpheme list with 6400 entries.
Morpheme Matching Based Text Tokenization for a Scarce Resourced Language
Rehman, Zobia; Anwar, Waqas; Bajwa, Usama Ijaz; Xuan, Wang; Chaoying, Zhou
2013-01-01
Text tokenization is a fundamental pre-processing step for almost all the information processing applications. This task is nontrivial for the scarce resourced languages such as Urdu, as there is inconsistent use of space between words. In this paper a morpheme matching based approach has been proposed for Urdu text tokenization, along with some other algorithms to solve the additional issues of boundary detection of compound words, affixation, reduplication, names and abbreviations. This study resulted into 97.28% precision, 93.71% recall, and 95.46% F1-measure; while tokenizing a corpus of 57000 words by using a morpheme list with 6400 entries. PMID:23990871
Lexical diversity and productivity in Cantonese-speaking children with specific language impairment.
Stokes, S F; Fletcher, P
2000-01-01
Recent studies of lexical diversity in English-speaking children with specific language impairment (ESLI) have produced conflicting results. Differences between SLI and age-matched (AM) groups on verb types, and overall types have been reported, as have differences between SLI and language-matched (LM) groups on verb types and/or verb tokens, and noun types and noun tokens. At the same time there have been other claims that there is no difference between SLI and LM groups in terms of lexical diversity. This comparison of the lexical diversity of Cantonese-speaking children with SLI (CSLI) and their language-matched peers controlled the length of the samples and the number of tokens as the basis for comparison. There was no difference between the groups in use of verb tokens or types, but there were significant differences in noun tokens and types and 'other' open class tokens and types. Although there was no difference between the groups in the use of a specific grammatical marker (aspect markers), the way in which the CSLI children deployed these markers was severely restricted in comparison with their LM peers. A limited capacity model of language production is invoked to explain the findings.
Dai, Hong-Jie; Lai, Po-Ting; Chang, Yung-Chun; Tsai, Richard Tzong-Han
2015-01-01
The functions of chemical compounds and drugs that affect biological processes and their particular effect on the onset and treatment of diseases have attracted increasing interest with the advancement of research in the life sciences. To extract knowledge from the extensive literatures on such compounds and drugs, the organizers of BioCreative IV administered the CHEMical Compound and Drug Named Entity Recognition (CHEMDNER) task to establish a standard dataset for evaluating state-of-the-art chemical entity recognition methods. This study introduces the approach of our CHEMDNER system. Instead of emphasizing the development of novel feature sets for machine learning, this study investigates the effect of various tag schemes on the recognition of the names of chemicals and drugs by using conditional random fields. Experiments were conducted using combinations of different tokenization strategies and tag schemes to investigate the effects of tag set selection and tokenization method on the CHEMDNER task. This study presents the performance of CHEMDNER of three more representative tag schemes-IOBE, IOBES, and IOB12E-when applied to a widely utilized IOB tag set and combined with the coarse-/fine-grained tokenization methods. The experimental results thus reveal that the fine-grained tokenization strategy performance best in terms of precision, recall and F-scores when the IOBES tag set was utilized. The IOBES model with fine-grained tokenization yielded the best-F-scores in the six chemical entity categories other than the "Multiple" entity category. Nonetheless, no significant improvement was observed when a more representative tag schemes was used with the coarse or fine-grained tokenization rules. The best F-scores that were achieved using the developed system on the test dataset of the CHEMDNER task were 0.833 and 0.815 for the chemical documents indexing and the chemical entity mention recognition tasks, respectively. The results herein highlight the importance of tag set selection and the use of different tokenization strategies. Fine-grained tokenization combined with the tag set IOBES most effectively recognizes chemical and drug names. To the best of the authors' knowledge, this investigation is the first comprehensive investigation use of various tag set schemes combined with different tokenization strategies for the recognition of chemical entities.
Unforgeable Noise-Tolerant Quantum Tokens
NASA Astrophysics Data System (ADS)
Yao, Norman; Pastawski, Fernando; Jiang, Liang; Lukin, Mikhail; Cirac, Ignacio
2012-06-01
The realization of devices which harness the laws of quantum mechanics represents an exciting challenge at the interface of modern technology and fundamental science. An exemplary paragon of the power of such quantum primitives is the concept of ``quantum money.'' A dishonest holder of a quantum bank-note will invariably fail in any forging attempts; indeed, under assumptions of ideal measurements and decoherence-free memories such security is guaranteed by the no-cloning theorem. In any practical situation, however, noise, decoherence and operational imperfections abound. Thus, the development of secure ``quantum money''-type primitives capable of tolerating realistic infidelities is of both practical and fundamental importance. Here, we propose a novel class of such protocols and demonstrate their tolerance to noise; moreover, we prove their rigorous security by determining tight fidelity thresholds. Our proposed protocols require only the ability to prepare, store and measure single qubit quantum memories, making their experimental realization accessible with current technologies.
Optimised to Fail: Card Readers for Online Banking
NASA Astrophysics Data System (ADS)
Drimer, Saar; Murdoch, Steven J.; Anderson, Ross
The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used together with the customer’s debit card to generate one-time codes for both login and transaction authentication. The CAP protocol is not public, and was rolled out without any public scrutiny. We reverse engineered the UK variant of card readers and smart cards and here provide the first public description of the protocol. We found numerous weaknesses that are due to design errors such as reusing authentication tokens, overloading data semantics, and failing to ensure freshness of responses. The overall strategic error was excessive optimisation. There are also policy implications. The move from signature to PIN for authorising point-of-sale transactions shifted liability from banks to customers; CAP introduces the same problem for online banking. It may also expose customers to physical harm.
Solving LR Conflicts Through Context Aware Scanning
NASA Astrophysics Data System (ADS)
Leon, C. Rodriguez; Forte, L. Garcia
2011-09-01
This paper presents a new algorithm to compute the exact list of tokens expected by any LR syntax analyzer at any point of the scanning process. The lexer can, at any time, compute the exact list of valid tokens to return only tokens in this set. In the case than more than one matching token is in the valid set, the lexer can resort to a nested LR parser to disambiguate. Allowing nested LR parsing requires some slight modifications when building the LR parsing tables. We also show how LR parsers can parse conflictive and inherently ambiguous languages using a combination of nested parsing and context aware scanning. These expanded lexical analyzers can be generated from high level specifications.
Weak reward source memory in depression reflects blunted activation of VTA/SN and parahippocampus
Dobbins, Ian G.; Pizzagalli, Diego A.
2014-01-01
Reward responses in the medial temporal lobes and dopaminergic midbrain boost episodic memory formation in healthy adults, and weak memory for emotionally positive material in depression suggests this mechanism may be dysfunctional in major depressive disorder (MDD). To test this hypothesis, we performed a study in which unmedicated adults with MDD and healthy controls encoded drawings paired with reward or zero tokens during functional magnetic resonance imaging. In a recognition test, participants judged whether drawings were previously associated with the reward token (‘reward source’) or the zero token (‘zero source’). Unlike controls, depressed participants failed to show better memory for drawings from the reward source vs the zero source. Consistent with predictions, controls also showed a stronger encoding response to reward tokens vs zero tokens in the right parahippocampus and dopaminergic midbrain, whereas the MDD group showed the opposite pattern—stronger responses to zero vs reward tokens—in these regions. Differential activation of the dopaminergic midbrain by reward vs zero tokens was positively correlated with the reward source memory advantage in controls, but not depressed participants. These data suggest that weaker memory for positive material in depression reflects blunted encoding responses in the dopaminergic midbrain and medial temporal lobes. PMID:24078019
Robust and Reusable Fuzzy Extractors
NASA Astrophysics Data System (ADS)
Boyen, Xavier
The use of biometric features as key material in security protocols has often been suggested to relieve their owner from the need to remember long cryptographic secrets. The appeal of biometric data as cryptographic secrets stems from their high apparent entropy, their availability to their owner, and their relative immunity to loss. In particular, they constitute a very effective basis for user authentication, especially when combined with complementary credentials such as a short memorized password or a physical token. However, the use of biometrics in cryptography does not come without problems. Some difficulties are technical, such as the lack of uniformity and the imperfect reproducibility of biometrics, but some challenges are more fundamental.
"Reliability Of Fiber Optic Lans"
NASA Astrophysics Data System (ADS)
Code n, Michael; Scholl, Frederick; Hatfield, W. Bryan
1987-02-01
Fiber optic Local Area Network Systems are being used to interconnect increasing numbers of nodes. These nodes may include office computer peripherals and terminals, PBX switches, process control equipment and sensors, automated machine tools and robots, and military telemetry and communications equipment. The extensive shared base of capital resources in each system requires that the fiber optic LAN meet stringent reliability and maintainability requirements. These requirements are met by proper system design and by suitable manufacturing and quality procedures at all levels of a vertically integrated manufacturing operation. We will describe the reliability and maintainability of Codenoll's passive star based systems. These include LAN systems compatible with Ethernet (IEEE 802.3) and MAP (IEEE 802.4), and software compatible with IBM Token Ring (IEEE 802.5). No single point of failure exists in this system architecture.
A Lightweight Continuous Authentication Protocol for the Internet of Things.
Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-04-05
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.
Part-of-Speech Tagging for Twitter: Annotation, Features, and Experiments
2010-01-01
mostly American English1 tweets from October 27, 2010, automatically tokenized them using a Twitter tok - enizer (O’Connor et al., 2010b),2 and pre...for which our tagset, annotation guidelines, and tokenization rules were deficient or ambiguous. Based on these considerations we revised the tok ...tagger. 6Possessive endings only appear when a user or the tok - enizer has separated the possessive ending from a possessor; the tokenizer only does
Quantum gambling using mesoscopic ring qubits
NASA Astrophysics Data System (ADS)
Pakuła, Ireneusz
2007-07-01
Quantum Game Theory provides us with new tools for practising games and some other risk related enterprices like, for example, gambling. The two party gambling protocol presented by Goldenberg {\\it et al} is one of the simplest yet still hard to implement applications of Quantum Game Theory. We propose potential physical realisation of the quantum gambling protocol with use of three mesoscopic ring qubits. We point out problems in implementation of such game.
Protocol for Cohesionless Sample Preparation for Physical Experimentation
2016-05-01
protocol for specimen preparation that will enable the use of soil strength curves based on expedient field classification testing (e.g., grain-size...void ratio and relative compaction, which compares field compaction to a laboratory maximum density. Gradation charts for the two materials used in...the failure stress. Ring shear testing was performed using the GCTS Residual-Ring Shear System SRS-150 in order to measure the peak torsional
Measured, modeled, and causal conceptions of fitness
Abrams, Marshall
2012-01-01
This paper proposes partial answers to the following questions: in what senses can fitness differences plausibly be considered causes of evolution?What relationships are there between fitness concepts used in empirical research, modeling, and abstract theoretical proposals? How does the relevance of different fitness concepts depend on research questions and methodological constraints? The paper develops a novel taxonomy of fitness concepts, beginning with type fitness (a property of a genotype or phenotype), token fitness (a property of a particular individual), and purely mathematical fitness. Type fitness includes statistical type fitness, which can be measured from population data, and parametric type fitness, which is an underlying property estimated by statistical type fitnesses. Token fitness includes measurable token fitness, which can be measured on an individual, and tendential token fitness, which is assumed to be an underlying property of the individual in its environmental circumstances. Some of the paper's conclusions can be outlined as follows: claims that fitness differences do not cause evolution are reasonable when fitness is treated as statistical type fitness, measurable token fitness, or purely mathematical fitness. Some of the ways in which statistical methods are used in population genetics suggest that what natural selection involves are differences in parametric type fitnesses. Further, it's reasonable to think that differences in parametric type fitness can cause evolution. Tendential token fitnesses, however, are not themselves sufficient for natural selection. Though parametric type fitnesses are typically not directly measurable, they can be modeled with purely mathematical fitnesses and estimated by statistical type fitnesses, which in turn are defined in terms of measurable token fitnesses. The paper clarifies the ways in which fitnesses depend on pragmatic choices made by researchers. PMID:23112804
Speech task and timing considerations in MRI research
NASA Astrophysics Data System (ADS)
Epstein, Melissa A.; Stone, Maureen
2003-04-01
In order to create dynamic magnetic resonance images, subjects must repeat tokens as much as 30 times in a row, therefore, their precision is critical for image quality. Word repetition rate can be 1 or 1.5 s, and is matched to the rate of image recording. Unlike reciting tokens to the beat of a metronome, subjects must say each token during an extended period of noise that lasts about 75% of the repetition period. Furthermore, some tokens may be more difficult to say repetitively in these conditions. Therefore, this study simulated the acoustics of a MRI recording session to examine the effects of subject, token, and repetition rate on temporal precision. Subjects repeat up to ten mono- to trisyllabic words 30 times each at two repetition rates. Measurements are made of onsets and offsets of one or more phonemes within each word. Preliminary results (five subjects) indicate that there is an effect of subject and word. Further subjects are being measured to corroborate these results and to determine if one repetition rate is better than another and to test subject reliability.
TokenPasser: A petri net specification tool. Thesis
NASA Technical Reports Server (NTRS)
Mittmann, Michael
1991-01-01
In computer program design it is essential to know the effectiveness of different design options in improving performance, and dependability. This paper provides a description of a CAD tool for distributed hierarchical Petri nets. After a brief review of Petri nets, Petri net languages, and Petri net transducers, and descriptions of several current Petri net tools, the specifications and design of the TokenPasser tool are presented. TokenPasser is a tool to allow design of distributed hierarchical systems based on Petri nets. A case study for an intelligent robotic system is conducted, a coordination structure with one dispatcher controlling three coordinators is built to model a proposed robotic assembly system. The system is implemented using TokenPasser, and the results are analyzed to allow judgment of the tool.
Grafe, Victor G.; Hoch, James E.
1993-01-01
A sequencing and data fanout mechanism is provided for a dataflow processor is activated by an input token which causes a sequence of operations to occur by initiating a first instruction to act on data contained within the token and then executing a sequential thread of instructions identified by either a repeat count and an offset within the token, or by an offset within each preceding instruction.
Heterogeneous Concurrent Modeling and Design in Java (Volume 2: Ptolemy II Software Architecture)
2008-04-01
file (EPS) suitable for inclusion in word processors. The image in figure 7.3 is such an EPS file imported into FrameMaker . At this time, the EPS...can be imported into word processors. This figure was imported into FrameMaker . 152 Ptolemy II Plot Package 7.2.4 Modifying the format You can control...FixToken class 57 FrameMaker 149 full name 4 function closures 59 function dependency 48 FunctionDependency class 48 FunctionToken 122 FunctionToken
PARAMETRIC ANALYSIS OF DELAYED PRIMARY AND CONDITIONED REINFORCERS
Leon, Yanerys; Borrero, John C.; DeLeon, Iser G.
2016-01-01
We examined the effects of delayed reinforcement on the responding of individuals with intellectual disabilities. Three conditions were evaluated: (a) food reinforcement, (b) token reinforcement with a postsession exchange opportunity, and (c) token reinforcement with a posttrial exchange opportunity. Within each condition, we assessed responding given (a) a no-reinforcement baseline, (b) immediate reinforcement, and (c) delayed reinforcement, in which responses produced a reinforcer after 1 of 6 delays. Results suggest that delayed food produced greater response persistence than did delayed tokens. PMID:27174440
Borst, Grégoire; Simon, Grégory; Vidal, Julie; Houdé, Olivier
2013-01-01
The present high-density event-related potential (ERP) study on 13 adults aimed to determine whether number conservation relies on the ability to inhibit the overlearned length-equals-number strategy and then imagine the shortening of the row that was lengthened. Participants performed the number-conservation task and, after the EEG session, the mental imagery task. In the number-conservation task, first two rows with the same number of tokens and the same length were presented on a computer screen (COV condition) and then, the tokens in one of the two rows were spread apart (INT condition). Participants were instructed to determine whether the two rows had an identical number of tokens. In the mental imagery task, two rows with different lengths but the same number of tokens were presented and participants were instructed to imagine the tokens in the longer row aligning with the tokens in the shorter row. In the number-conservation task, we found that the amplitudes of the centro-parietal N2 and fronto-central P3 were higher in the INT than in the COV conditions. In addition, the differences in response times between the two conditions were correlated with the differences in the amplitudes of the fronto-central P3. In light of previous results reported on the number-conservation task in adults, the present results suggest that inhibition might be necessary to succeed the number-conservation task in adults even when the transformation of the length of one of the row is displayed. Finally, we also reported correlations between the speed at which participants could imagine the shortening of one of the row in the mental imagery task, the speed at which participants could determine that the two rows had the same number of tokens after the tokens in one of the row were spread apart and the latency of the late positive parietal component in the number-conservation task. Therefore, performing the number-conservation task might involve mental transformation processes in adults. PMID:24409135
31 CFR 1021.311 - Filing obligations.
Code of Federal Regulations, 2011 CFR
2011-07-01
...) Transactions in currency involving cash in include, but are not limited to: (1) Purchases of chips, tokens, and..., but are not limited to: (1) Redemptions of chips, tokens, tickets, and other gaming instruments; (2...
Synthesis of all-hydrocarbon stapled α-helical peptides by ring-closing olefin metathesis.
Kim, Young-Woo; Grossmann, Tom N; Verdine, Gregory L
2011-06-01
This protocol provides a detailed procedure for the preparation of stapled α-helical peptides, which have proven their potential as useful molecular probes and as next-generation therapeutics. Two crucial features of this protocol are (i) the construction of peptide substrates containing hindered α-methyl, α-alkenyl amino acids and (ii) the ring-closing olefin metathesis (RCM) of the resulting resin-bound peptide substrates. The stapling systems described in this protocol, namely bridging one or two turns of an α-helix, are highly adaptable to most peptide sequences, resulting in favorable RCM kinetics, helix stabilization and promotion of cellular uptake.
Detailed description of the Mayo/IBM PACS
NASA Astrophysics Data System (ADS)
Gehring, Dale G.; Persons, Kenneth R.; Rothman, Melvyn L.; Salutz, James R.; Morin, Richard L.
1991-07-01
The Mayo Clinic and IBM/Rochester have jointly developed a picture archiving system (PACS) for use with Mayo's MRI and Neuro-CT imaging modalities. The system was developed to replace the imaging system's vendor-supplied magnetic tape archiving capability. The system consists of seven MR imagers and nine CT scanners, each interfaced to the PACS via IBM Personal System/2(tm) (PS/2) computers, which act as gateways from the imaging modality to the PACS network. The PAC system operates on the token-ring component of Mayo's city-wide local area network. Also on the PACS network are four optical storage subsystems used for image archival, three optical subsystems used for image retrieval, an IBM Application System/400(tm) (AS/400) computer used for database management and multiple PS/2-based image display systems and their image servers.
ERIC Educational Resources Information Center
Edwards, Clifford H.
1977-01-01
Eight low-productive sixth grade students were used in this token reinforcement study. Teacher direct reinforcement and liked-peer indirect reinforcement were both found to increase productivity. (CP)
Effects of Combining Methylphenidate and a Classroom Token System in Modifying Hyperactive Behavior
ERIC Educational Resources Information Center
Christensen, Donald E.
1975-01-01
The combined effects of methylphenidate (Ritalin) and a token reinforcement program in controlling the classroom behavior of 16 hyperactive, institutionalized retarded youngsters (9- to 15-years-old) was investigated. (Author)
A Lightweight Continuous Authentication Protocol for the Internet of Things
Chuang, Yo-Hsuan; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-01-01
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments. PMID:29621168
Unforgeable noise-tolerant quantum tokens
Pastawski, Fernando; Yao, Norman Y.; Jiang, Liang; Lukin, Mikhail D.; Cirac, J. Ignacio
2012-01-01
The realization of devices that harness the laws of quantum mechanics represents an exciting challenge at the interface of modern technology and fundamental science. An exemplary paragon of the power of such quantum primitives is the concept of “quantum money” [Wiesner S (1983) ACM SIGACT News 15:78–88]. A dishonest holder of a quantum bank note will invariably fail in any counterfeiting attempts; indeed, under assumptions of ideal measurements and decoherence-free memories such security is guaranteed by the no-cloning theorem. In any practical situation, however, noise, decoherence, and operational imperfections abound. Thus, the development of secure “quantum money”-type primitives capable of tolerating realistic infidelities is of both practical and fundamental importance. Here, we propose a novel class of such protocols and demonstrate their tolerance to noise; moreover, we prove their rigorous security by determining tight fidelity thresholds. Our proposed protocols require only the ability to prepare, store, and measure single quantum bit memories, making their experimental realization accessible with current technologies.
Ingham, R J
1983-01-01
Howie and Woods (1982) have provided data that, they claim, indicate that a token reinforcement system is redundant in instating and shaping fluent speech within a stuttering treatment program developed by Ingham and Andrews (1973a, b). However, there were substantial procedural differences between the treatment programs referred to in both studies, as well as methodological weaknesses in Howie and Woods' study. These factors provide ample sources of explanation for Howie and Woods' failure to demonstrate benefits from their token reinforcement system.
Enhanced just-in-time plus protocol for optical burst switching networks
NASA Astrophysics Data System (ADS)
Rodrigues, Joel J. P. C.; Gregório, José M. B.; Vasilakos, Athanasios V.
2010-07-01
We propose a new one-way resource reservation protocol for optical burst switching (OBS) networks, called Enhanced Just-in-Time Plus (E-JIT+). The protocol is described in detail, and its formal specification is presented, following an extended finite state machine approach. The performance evaluation of E-JIT+ is analyzed in comparison with other proposed OBS protocols (JIT+ and E-JIT) for the following network topologies: rings; degree-two, degree-three, and degree-four chordal rings; mesh-torus; NSFNET; ARPANET; FCCN-NET; and the European Optical Network. We evaluate and compare the performance of the different protocols in terms of burst loss probability, taking into account the most important OBS network parameters. It was shown that E-JIT+ performs better than available one-way resource reservation protocols for all the evaluated network topologies. Moreover, the scalability of E-JIT+ was observed, and when the network traffic increases, the burst loss probability also increases, leading to a worse network performance.
Martínez-Castilla, Pastora; Peppé, Susan
2008-01-01
This study aimed to find out what intonation features reliably represent the emotions of "liking" as opposed to "disliking" in the Spanish language, with a view to designing a prosody assessment procedure for use with children with speech and language disorders. 18 intonationally different prosodic realisations (tokens) of one word (limón) were recorded by one native Spanish speaker. The tokens were deemed representative of two categories of emotion: liking or disliking of the taste "lemon". 30 native Spanish speakers assigned them to the two categories and rated their expressiveness on a six-point scale. For all tokens except two, agreement between judges as to category was highly significant, some tokens attracting 100% agreement. The intonation contours most related to expressiveness levels were: for "liking", an inverted U form contour with exaggerated pitch peak within the tonic syllable; and for "disliking", a flat melodic contour with a slight fall.
A slotted access control protocol for metropolitan WDM ring networks
NASA Astrophysics Data System (ADS)
Baziana, P. A.; Pountourakis, I. E.
2009-03-01
In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.
Direct SSH Gateway Access to Peregrine | High Performance Computing |
can access peregrine-ssh.nrel.gov, you must have: An active NREL HPC user account (see User Accounts ) An OTP Token (see One Time Password Tokens) Logging into peregrine-ssh.nrel.gov With your HPC account
Effects of price manipulations on consumer behavior in sheltered workshop token economy.
Schroeder, S R; Barrera, F J
1976-09-01
The consumer behavior of institutionalized retarded clients in a sheltered workshop token economy were evaluated by changing prices in the workshop store. In the first experiment we found that clients displayed elasticity of demand in that raising the prices of frequently purchased goods reduced the frequency and amount spent on more expendable items. Results from the second experiment showed that this change in spending pattern was not due to the relative modal unit price of item classes. The regulation of demand for consumer goods is a potentially useful way to maintain economic balance and effectiveness of a token economy.
2017-01-01
Statistical approaches to emergent knowledge have tended to focus on the process by which experience of individual episodes accumulates into generalizable experience across episodes. However, there is a seemingly opposite, but equally critical, process that such experience affords: the process by which, from a space of types (e.g. onions—a semantic class that develops through exposure to individual episodes involving individual onions), we can perceive or create, on-the-fly, a specific token (a specific onion, perhaps one that is chopped) in the absence of any prior perceptual experience with that specific token. This article reviews a selection of statistical learning studies that lead to the speculation that this process—the generation, on the basis of semantic memory, of a novel episodic representation—is itself an instance of a statistical, in fact associative, process. The article concludes that the same processes that enable statistical abstraction across individual episodes to form semantic memories also enable the generation, from those semantic memories, of representations that correspond to individual tokens, and of novel episodic facts about those tokens. Statistical learning is a window onto these deeper processes that underpin cognition. This article is part of the themed issue ‘New frontiers for statistical learning in the cognitive sciences’. PMID:27872378
Altmann, Gerry T M
2017-01-05
Statistical approaches to emergent knowledge have tended to focus on the process by which experience of individual episodes accumulates into generalizable experience across episodes. However, there is a seemingly opposite, but equally critical, process that such experience affords: the process by which, from a space of types (e.g. onions-a semantic class that develops through exposure to individual episodes involving individual onions), we can perceive or create, on-the-fly, a specific token (a specific onion, perhaps one that is chopped) in the absence of any prior perceptual experience with that specific token. This article reviews a selection of statistical learning studies that lead to the speculation that this process-the generation, on the basis of semantic memory, of a novel episodic representation-is itself an instance of a statistical, in fact associative, process. The article concludes that the same processes that enable statistical abstraction across individual episodes to form semantic memories also enable the generation, from those semantic memories, of representations that correspond to individual tokens, and of novel episodic facts about those tokens. Statistical learning is a window onto these deeper processes that underpin cognition.This article is part of the themed issue 'New frontiers for statistical learning in the cognitive sciences'. © 2016 The Author(s).
Take a Break: A Token Economy in the Fifth Grade.
ERIC Educational Resources Information Center
Hail, John M.
2000-01-01
Describes the use of a token economy in a fifth-grade classroom that teaches students economic concepts and helps develop their decision-making skills. States that students learn about scarcity, savings, price, inflation, insurance, rent, and utilities. Includes additional resources. (CMK)
Code of Federal Regulations, 2011 CFR
2011-01-01
...-for-the-price-of-one” and similar marketing programs, or to air transportation purchased for a... employees or others receiving air transportation against whom token service charges are levied are considered nonrevenue passengers. Infants for whom a token fare is charged are also considered nonrevenue...
Token reinforcement, choice, and self-control in pigeons.
Jackson, K; Hackenberg, T D
1996-01-01
Pigeons were exposed to self-control procedures that involved illumination of light-emitting diodes (LEDs) as a form of token reinforcement. In a discrete-trials arrangement, subjects chose between one and three LEDs; each LED was exchangeable for 2-s access to food during distinct posttrial exchange periods. In Experiment 1, subjects generally preferred the immediate presentation of a single LED over the delayed presentation of three LEDs, but differences in the delay to the exchange period between the two options prevented a clear assessment of the relative influence of LED delay and exchange-period delay as determinants of choice. In Experiment 2, in which delays to the exchange period from either alternative were equal in most conditions, all subjects preferred the delayed three LEDs more often than in Experiment-1. In Experiment 3, subjects preferred the option that resulted in a greater amount of food more often if the choices also produced LEDs than if they did not. In Experiment 4, preference for the delayed three LEDs was obtained when delays to the exchange period were equal, but reversed in favor of an immediate single LED when the latter choice also resulted in quicker access to exchange periods. The overall pattern of results suggests that (a) delay to the exchange period is a more critical determinant of choice than is delay to token presentation; (b) tokens may function as conditioned reinforcers, although their discriminative properties may be responsible for the self-control that occurs under token reinforcer arrangements; and (c) previously reported differences in the self-control choices of humans and pigeons may have resulted at least in part from the procedural conventions of using token reinforcers with human subjects and food reinforcers with pigeon subjects. PMID:8755699
Research Supporting Satellite Communications Technology
NASA Technical Reports Server (NTRS)
Horan Stephen; Lyman, Raphael
2005-01-01
This report describes the second year of research effort under the grant Research Supporting Satellite Communications Technology. The research program consists of two major projects: Fault Tolerant Link Establishment and the design of an Auto-Configurable Receiver. The Fault Tolerant Link Establishment protocol is being developed to assist the designers of satellite clusters to manage the inter-satellite communications. During this second year, the basic protocol design was validated with an extensive testing program. After this testing was completed, a channel error model was added to the protocol to permit the effects of channel errors to be measured. This error generation was used to test the effects of channel errors on Heartbeat and Token message passing. The C-language source code for the protocol modules was delivered to Goddard Space Flight Center for integration with the GSFC testbed. The need for a receiver autoconfiguration capability arises when a satellite-to-ground transmission is interrupted due to an unexpected event, the satellite transponder may reset to an unknown state and begin transmitting in a new mode. During Year 2, we completed testing of these algorithms when noise-induced bit errors were introduced. We also developed and tested an algorithm for estimating the data rate, assuming an NRZ-formatted signal corrupted with additive white Gaussian noise, and we took initial steps in integrating both algorithms into the SDR test bed at GSFC.
Image acquisition unit for the Mayo/IBM PACS project
NASA Astrophysics Data System (ADS)
Reardon, Frank J.; Salutz, James R.
1991-07-01
The Mayo Clinic and IBM Rochester, Minnesota, have jointly developed a picture archiving, distribution and viewing system for use with Mayo's CT and MRI imaging modalities. Images are retrieved from the modalities and sent over the Mayo city-wide token ring network to optical storage subsystems for archiving, and to server subsystems for viewing on image review stations. Images may also be retrieved from archive and transmitted back to the modalities. The subsystems that interface to the modalities and communicate to the other components of the system are termed Image Acquisition Units (LAUs). The IAUs are IBM Personal System/2 (PS/2) computers with specially developed software. They operate independently in a network of cooperative subsystems and communicate with the modalities, archive subsystems, image review server subsystems, and a central subsystem that maintains information about the content and location of images. This paper provides a detailed description of the function and design of the Image Acquisition Units.
Intra-building telecommunications cabling standards for Sandia National Laboratories, New Mexico
DOE Office of Scientific and Technical Information (OSTI.GOV)
Adams, R.L.
1993-08-01
This document establishes a working standard for all telecommunications cable installations at Sandia National Laboratories, New Mexico. It is based on recent national commercial cabling standards. The topics addressed are Secure and Open/Restricted Access telecommunications environments and both twisted-pair and optical-fiber components of communications media. Some of the state-of-the-art technologies that will be supported by the intrabuilding cable infrastructure are Circuit and Packet Switched Networks (PBX/5ESS Voice and Low-Speed Data), Local Area Networks (Ethernet, Token Ring, Fiber and Copper Distributed Data Interface), and Wide Area Networks (Asynchronous Transfer Mode). These technologies can be delivered to every desk and can transportmore » data at rates sufficient to support all existing applications (such as Voice, Text and graphics, Still Images, Full-motion Video), as well as applications to be defined in the future.« less
Performance characteristics of the Mayo/IBM PACS
NASA Astrophysics Data System (ADS)
Persons, Kenneth R.; Gehring, Dale G.; Pavicic, Mark J.; Ding, Yingjai
1991-07-01
The Mayo Clinic and IBM (at Rochester, Minnesota) have jointly developed a picture archiving system for use with Mayo's MRI and Neuro CT imaging modalities. The communications backbone of the PACS is a portion of the Mayo institutional network: a series of 4-Mbps token rings interconnected by bridges and fiber optic extensions. The performance characteristics of this system are important to understand because they affect the response time a PACS user can expect, and the response time for non-PACS users competing for resources on the institutional network. The performance characteristics of each component and the average load levels of the network were measured for various load distributions. These data were used to quantify the response characteristics of the existing system and to tune a model developed by North Dakota State University Department of Computer Science for predicting response times of more complex topologies.
Grow your own: case study of a capital alternative.
Pulaski, M J
1999-01-01
The physician-administrator team can take all that is good from the physician practice management company (PPMC) model and apply a variation of self-financing called a "tithe" in order to facilitate their group's growth. Essentially, a group can create its own PPMC for local consolidation purposes, contracting with payers, spreading risk contracts over a larger base of providers, getting access to ancillary services, centralized business office services, bulk purchasing and many other of the advantages extolled by PPMCs. Organization has value, especially in times of specific industry consolidation. Although most everyone agrees that the medical industry is undergoing tremendous consolidation, consolidation will not likely occur "top-down." Rather, it will occur more slowly--one group at a time, one locale at a time. If a group positions itself as a local consolidation leader and amalgamates other groups onto its "token ring," then all participants--especially those who initiate this consolidation--will reap the benefits.
Pelé, Marie; Dufour, Valérie; Thierry, Bernard; Call, Josep
2009-11-01
Great apes appear to be the nonhuman primates most capable of recognizing trading opportunities and engaging in transfers of commodities with conspecifics. Spontaneous exchange of goods between them has not yet been reported. We tested gorillas (Gorilla gorilla), orangutans (Pongo pygmaeus), bonobos (Pan paniscus), and chimpanzees (Pan troglodytes) in a token-exchange task involving two conspecifics and a human experimenter. Tested in pairs, subjects had to exchange tokens with a partner to obtain food from the experimenter. We observed 4, 5, 264, and 328 transfers of tokens in gorillas, chimpanzees, orangutans, and bonobos, respectively. Most gifts were indirect in gorillas, chimpanzees, and bonobos, whereas most were direct in orangutans. The analysis showed no evidence of calculated reciprocity in interactions. A main finding of the study was the high rate of repeated gifts and begging gestures recorded in orangutans. This raises the question of the meaning of pointing in great apes and their ability to understand the communicative intent of others.
Fekete, Beáta; Palkó, Márta; Haukka, Matti; Fülöp, Ferenc
2017-04-13
From 2-aminonorbornene hydroxamic acids, a simple and efficient method for the preparation of pyrrolo[1,2- a ]pyrimidine enantiomers is reported. The synthesis is based on domino ring-closure followed by microwave-induced retro Diels-Alder (RDA) protocols, where the chirality of the desired products is transferred from norbornene derivatives. The stereochemistry of the synthesized compounds was proven by X-ray crystallography. The absolute configuration of the product is determined by the configuration of the starting amino hydroxamic acid.
Kayaalp, Mehmet; Browne, Allen C; Callaghan, Fiona M; Dodd, Zeyno A; Divita, Guy; Ozturk, Selcuk; McDonald, Clement J
2014-01-01
Objective To understand the factors that influence success in scrubbing personal names from narrative text. Materials and methods We developed a scrubber, the NLM Name Scrubber (NLM-NS), to redact personal names from narrative clinical reports, hand tagged words in a set of gold standard narrative reports as personal names or not, and measured the scrubbing success of NLM-NS and that of four other scrubbing/name recognition tools (MIST, MITdeid, LingPipe, and ANNIE/GATE) against the gold standard reports. We ran three comparisons which used increasingly larger name lists. Results The test reports contained more than 1 million words, of which 2388 were patient and 20 160 were provider name tokens. NLM-NS failed to scrub only 2 of the 2388 instances of patient name tokens. Its sensitivity was 0.999 on both patient and provider name tokens and missed fewer instances of patient name tokens in all comparisons with other scrubbers. MIST produced the best all token specificity and F-measure for name instances in our most relevant study (study 2), with values of 0.997 and 0.938, respectively. In that same comparison, NLM-NS was second best, with values of 0.986 and 0.748, respectively, and MITdeid was a close third, with values of 0.985 and 0.796 respectively. With the addition of the Clinical Center name list to their native name lists, Ling Pipe, MITdeid, MIST, and ANNIE/GATE all improved substantially. MITdeid and Ling Pipe gained the most—reaching patient name sensitivity of 0.995 (F-measure=0.705) and 0.989 (F-measure=0.386), respectively. Discussion The privacy risk due to two name tokens missed by NLM-NS was statistically negligible, since neither individual could be distinguished among more than 150 000 people listed in the US Social Security Registry. Conclusions The nature and size of name lists have substantial influences on scrubbing success. The use of very large name lists with frequency statistics accounts for much of NLM-NS scrubbing success. PMID:24026308
Doty, D W; McInnis, T; Paul, G L
1974-01-01
Response-cost procedures within a token economy with extremely regressed residents excluded many residents from access to positive reinforcement. Procedures allowing residents to "purchase eligibility" to obtain backup reinforcers through contingent payment on standing fines, combined with proportional fine payoff schedules contingent upon time without new fines, increased payment on fines, reduced incidence of new fines, and increased utilization of backup reinforcers. These modifications removed adverse side effects while retaining the benefits associated with response costs. Failures or adverse effects of elements of token systems should not occasion abandonment of token economies, but rather encourage their continual evaluation and modification.
The Token Ineffectual: The Woman in Academe.
ERIC Educational Resources Information Center
Conoley, Jane Close
The issue of professional women in academia is attracting increasing attention in the literature. A female psychologist, who was the only woman faculty member in a 35-member psychology department for three years, personally experienced and identified issues such as tokenism, isolation, representativeness, exploitation, family and occupational…
NASA Astrophysics Data System (ADS)
Behlim, Sadaf Iqbal; Syed, Tahir Qasim; Malik, Muhammad Yameen; Vigneron, Vincent
2016-11-01
Grouping image tokens is an intermediate step needed to arrive at meaningful image representation and summarization. Usually, perceptual cues, for instance, gestalt properties inform token grouping. However, they do not take into account structural continuities that could be derived from other tokens belonging to similar structures irrespective of their location. We propose an image representation that encodes structural constraints emerging from local binary patterns (LBP), which provides a long-distance measure of similarity but in a structurally connected way. Our representation provides a grouping of pixels or larger image tokens that is free of numeric similarity measures and could therefore be extended to nonmetric spaces. The representation lends itself nicely to ubiquitous image processing applications such as connected component labeling and segmentation. We test our proposed representation on the perceptual grouping or segmentation task on the popular Berkeley segmentation dataset (BSD500) that with respect to human segmented images achieves an average F-measure of 0.559. Our algorithm achieves a high average recall of 0.787 and is therefore well-suited to other applications such as object retrieval and category-independent object recognition. The proposed merging heuristic based on levels of singular tree component has shown promising results on the BSD500 dataset and currently ranks 12th among all benchmarked algorithms, but contrary to the others, it requires no data-driven training or specialized preprocessing.
Angulo, Jesús; Nieto, Pedro M; Martín-Lomas, Manuel
2003-07-07
For a synthetic hexasaccharide model it is shown that the conformational flexibility of the L-iduronate ring in glycosaminoglycans can be adequately described by using the PME methodology together with simulation protocols suitable for highly charged systems.
A Conceptual Framework for Creating Culturally Responsive Token Economies
ERIC Educational Resources Information Center
LeBlanc, Gess
2016-01-01
Numerous studies indicate that token economy systems continue to be used by teachers as a means to either increase or decrease behaviours observed in their classrooms. However, studies find that student demographic characteristics such as ethnicity, race, and gender inform teachers' identification of target behaviours. In response to these…
Risky Choice in Pigeons and Humans: A Cross-Species Comparison
ERIC Educational Resources Information Center
Lagorio, Carla H.; Hackenberg, Timothy D.
2010-01-01
Pigeon and human subjects were given repeated choices between variable and adjusting delays to token reinforcement that titrated in relation to a subject's recent choice patterns. Indifference curves were generated under two different procedures: "immediate exchange," in which a token earned during each trial was exchanged immediately for access…
Self-Esteem and Sharing in Fourth-Grade Children.
ERIC Educational Resources Information Center
Miller, Shirley M.; And Others
1981-01-01
Children (N=64) in a fourth-grade class were given 20 tokens for drawing a picture and then had the option of donating any or all of the tokens to either "needy children" or for "a class prize." Sharing with needy children was positively correlated with self-esteem. (Author)
Operant Conditioning - Token Economy.
ERIC Educational Resources Information Center
Montgomery, Jacqueline; McBurney, Raymond D.
Described is an Operant Conditioning-Token Economy Program, teaching patients to be responsible for their own behavior, to make choices, and to be motivated to change. The program was instigated with mentally ill patients in a state hospital and was later used with institutionalized mentally handicapped groups. After two years, only four of the…
Establishing and Balancing a Classroom Token Economy.
ERIC Educational Resources Information Center
Center, David B.; Arnault, Lynne
The paper presents a classroom token economy system for providing classroom structure, eliminating or controlling a variety of problem behaviors, and for demonstration and teaching purposes. The first section addresses income production (payment for productive work using classroom work periods as payment periods). A percentage method in paying for…
ERIC Educational Resources Information Center
Yoder, Janice D.; And Others
As women enter nontraditional occupations and training programs, tokenism may develop and its side-effects of visibility, contrast, and assimilation may appear. Each of these effects was encountered by the first class of women cadets at the United States Military Academy, West Point, in 1976, who received great visibility from the news media. This…
Readout of the atomtronic quantum interference device
NASA Astrophysics Data System (ADS)
Haug, Tobias; Tan, Joel; Theng, Mark; Dumke, Rainer; Kwek, Leong-Chuan; Amico, Luigi
2018-01-01
A Bose-Einstein condensate confined in ring shaped lattices interrupted by a weak link and pierced by an effective magnetic flux defines the atomic counterpart of the superconducting quantum interference device: the atomtronic quantum interference device (AQUID). In this paper, we report on the detection of current states in the system through a self-heterodyne protocol. Following the original proposal of the NIST and Paris groups, the ring-condensate many-body wave function interferes with a reference condensate expanding from the center of the ring. We focus on the rf AQUID which realizes effective qubit dynamics. Both the Bose-Hubbard and Gross-Pitaevskii dynamics are studied. For the Bose-Hubbard dynamics, we demonstrate that the self-heterodyne protocol can be applied, but higher-order correlations in the evolution of the interfering condensates are measured to readout of the current states of the system. We study how states with macroscopic quantum coherence can be told apart analyzing the noise in the time of flight of the ring condensate.
Suedmeyer, Wm Kirk; Henry, Carolyn; McCaw, Dudley; Boucher, Magalie
2007-12-01
A 5-yr-old female African rose-ringed parakeet (Psittacula krameri) presented with an ulcerated mass in the medial postpatagial area of the right wing. Biopsy specimens of the mass demonstrated a well-differentiated squamous cell carcinoma. Photodynamic therapy resulted in tumor cell necrosis and initial reduction in tumor burden, but complete remission was not achieved. Based on this and other avian cases, it appears that photodynamic therapy designed to eradicate squamous cell carcinoma in avian species using protocols modeled after canine, feline, and human photodynamic therapy protocols may not be useful. It is hypothesized that differences in light penetration, photosensitizing agent pharmacokinetics, and wound healing properties in avian species necessitate alteration of photodynamic therapy protocols if this treatment modality is to be effective in avian oncology.
ERIC Educational Resources Information Center
Romani, Patrick W.; Alcorn, Aimee S.; Miller, Jonathan R.; Clark, Gwendolyn
2017-01-01
The purpose of the current two-experiment study was to examine the use of a preference assessment for dimensions of reinforcement to inform an effective token economy arrangement. Three participants diagnosed with developmental disabilities who engaged in negatively reinforced problem behavior participated in this study. During Experiment 1, a…
Northern Cheyenne Follow Through Project. Lame Deer, Montana 59043.
ERIC Educational Resources Information Center
Montana State Dept. of Public Instruction, Helena.
Focusing on the basic skills of reading, math, and handwriting, the Northern Cheyenne Follow Through Project utilizes six concepts. First, token delivery of contract system for motivation involves having the child earn tokens or work on a contract as he accomplishes tasks in specific skills. During the spend period, he may trade for desired…
Authentic Multiculturalism and Nontraditional Students: Voices from the "Contact Zone."
ERIC Educational Resources Information Center
Flores, Juan
New multicultural anthologies too often end up looking suspiciously like the color palate of a paint-by-numbers kit. Canonical tokenism is quickly seen as a ruse by minority students and teachers who are circumspect and adept at uncovering counterfeits. As an alternative to tokenism, one recommendation is to use Patricia Bizzell's "contact…
Phonetic Variability in Residual Speech Sound Disorders: Exploration of Subtypes
ERIC Educational Resources Information Center
Preston, Jonathan L.; Koenig, Laura L.
2011-01-01
Purpose: To explore whether subgroups of children with residual speech sound disorders (R-SSDs) can be identified through multiple measures of token-to-token phonetic variability (changes in one spoken production to the next). Method: Children with R-SSDs were recorded during a rapid multisyllabic picture naming task and an oral diadochokinetic…
Effects of Interspersed Brief Problems on Students' Endurance at Completing Math Work
ERIC Educational Resources Information Center
Montarello, Staci; Martens, Brian K.
2005-01-01
An alternating treatments design was used to compare the effects of baseline, interspersed brief problems, and interspersed brief problems plus token reinforcement on students' endurance while completing math worksheets. By pairing the completion of brief problems with token reinforcement, the role of problem completion as a conditioned reinforcer…
Contextual Variability in American English Dark-L
ERIC Educational Resources Information Center
Oxley, Judith; Roussel, Nancye; Buckingham, Hugh
2007-01-01
This paper presents a four-subject study that examines the relative influence of syllable position and stress, together with vowel context on the colouring of the dark-l characteristic of speakers of General American English. Most investigators report lighter /l/ tokens in syllable onsets and darker tokens in coda positions. The present study…
Monkeys fail to reciprocate in an exchange task.
Pelé, Marie; Thierry, Bernard; Call, Josep; Dufour, Valérie
2010-09-01
Exchanges form the basis of human economies. Animals too can engage in reciprocal interactions but they do not barter goods like humans, which raises the question of the abilities necessary for trading to occur. Previous studies have shown that non-human primates can exchange food with human partners. Here, we tested the ability of brown capuchin monkeys and Tonkean macaques to reciprocate in a task requiring two conspecifics to exchange tokens in order to obtain rewards from an experimenter. We recorded 56 transfers between subjects in capuchin monkeys and 10 in Tonkean macaques. All transfers were passive in both species. Capuchins preferentially picked up tokens valuable for them in the partner's compartment. They tended to manipulate the partner-valued tokens more often than the no-value ones, leading to more opportunities for these tokens to end up within reach of the partner. Despite optimal conditions where values of goods were defined and known by partners, however, none of the pairs tested engaged in short-term reciprocal interactions. These results indicate that calculated reciprocity was difficult if not impossible in the animals tested.
de Paula, Jonas Jardim; Bertola, Laiss; Ávila, Rafaela Teixeira; Moreira, Lafaiete; Coutinho, Gabriel; de Moraes, Edgar Nunes; Bicalho, Maria Aparecida Camargos; Nicolato, Rodrigo; Diniz, Breno Satler; Malloy-Diniz, Leandro Fernandes
2013-01-01
Background and Objectives The neuropsychological exam plays a central role in the assessment of elderly patients with cognitive complaints. It is particularly relevant to differentiate patients with mild dementia from those subjects with mild cognitive impairment. Formal education is a critical factor in neuropsychological performance; however, there are few studies that evaluated the psychometric properties, especially criterion related validity, neuropsychological tests for patients with low formal education. The present study aims to investigate the validity of an unstructured neuropsychological assessment protocol for this population and develop cutoff values for clinical use. Methods and Results A protocol composed by the Rey-Auditory Verbal Learning Test, Frontal Assessment Battery, Category and Letter Fluency, Stick Design Test, Clock Drawing Test, Digit Span, Token Test and TN-LIN was administered to 274 older adults (96 normal aging, 85 mild cognitive impairment and 93 mild Alzheimer`s disease) with predominantly low formal education. Factor analysis showed a four factor structure related to Executive Functions, Language/Semantic Memory, Episodic Memory and Visuospatial Abilities, accounting for 65% of explained variance. Most of the tests showed a good sensitivity and specificity to differentiate the diagnostic groups. The neuropsychological protocol showed a significant ecological validity as 3 of the cognitive factors explained 31% of the variance on Instrumental Activities of Daily Living. Conclusion The study presents evidence of the construct, criteria and ecological validity for this protocol. The neuropsychological tests and the proposed cutoff values might be used for the clinical assessment of older adults with low formal education. PMID:24066031
Mirzamani, S Mahmood; Ashoori, Mohammad; Sereshki, Narges Adib
2011-01-01
This study investigates the effect of social and token economy reinforcements on academic achievement of 9th grade boy students with intellectual disabilities in an experimental science class in Tehran Province. The method used for this study was experimental by pre-test, post- test with a control group. The boy students with intellectual disabilities from three junior high schools participated in this study. The sample consisted of thirty, 9th grade boy students with intellectual disabilities in the selected schools; the schools were chosen by the multi-stage cluster method. To measure the progress of students in the science class, a teacher made test and the Wechsler intelligence test for matching the groups for IQ were used. To ensure validity, the content validity criteria depended tests calculated by the Lashe method and teachers' perspective were used. The reliability coefficient was obtained by the reliability coefficient of related tests; the percent agreement method and the obtained data were analyzed using one-way variance analysis and Shefe prosecution test. The results showed that there was a significant increase in academic achievement of students with intellectual disabilities when using token economy than using social reinforcements compared with the control group. Also, when using social reinforcements, the academic achievement of students was more than the control group. Token economy and social reinforcements increased the academic achievement of students with intellectual disabilities in the science class; and also the effect of token economy reinforcements was more than social reinforcements on the subjects.
Gabay, Yafit; Karni, Avi; Banai, Karen
2017-01-01
Speech perception can improve substantially with practice (perceptual learning) even in adults. Here we compared the effects of four training protocols that differed in whether and how task difficulty was changed during a training session, in terms of the gains attained and the ability to apply (transfer) these gains to previously un-encountered items (tokens) and to different talkers. Participants trained in judging the semantic plausibility of sentences presented as time-compressed speech and were tested on their ability to reproduce, in writing, the target sentences; trail-by-trial feedback was afforded in all training conditions. In two conditions task difficulty (low or high compression) was kept constant throughout the training session, whereas in the other two conditions task difficulty was changed in an adaptive manner (incrementally from easy to difficult, or using a staircase procedure). Compared to a control group (no training), all four protocols resulted in significant post-training improvement in the ability to reproduce the trained sentences accurately. However, training in the constant-high-compression protocol elicited the smallest gains in deciphering and reproducing trained items and in reproducing novel, untrained, items after training. Overall, these results suggest that training procedures that start off with relatively little signal distortion (“easy” items, not far removed from standard speech) may be advantageous compared to conditions wherein severe distortions are presented to participants from the very beginning of the training session. PMID:28545039
The Role of Saccade Targeting in the Transsaccadic Integration of Object Types and Tokens
ERIC Educational Resources Information Center
Gajewski, Daniel A.; Henderson, John M.
2005-01-01
The presence of location-dependent and location-independent benefits on object identification in an eye movement contingent preview paradigm has been taken as support for the transsaccadic integration of object types and object tokens (J. M. Henderson, 1994). A recent study, however, suggests a critical role for saccade targeting in the generation…
ERIC Educational Resources Information Center
Schmandt-Besserat, Denise
Writing appears to have originated from a modest system of counters or tokens used to keep track of economic goods and transactions. This system of recording appeared in 8000 B. C. in Mesopotamia, or what is now Iraq. The tokens' consistency in shape and size during the next 4,000 years attests to the stability of the agricultural economy and way…
ERIC Educational Resources Information Center
Mallett, Justin R.
2013-01-01
This study analyzed how Kanter's theory of tokenism and its related concepts of performance pressure, social isolation and role entrapment can be used to understand the socialization of African American students at a small Midwestern college. Sixteen African American students were interviewed in focus groups to examine various aspects of their…
Survivability Extensions for Dynamic Ultralog Environments
2004-12-07
8217 on line number 2018 doDo: Wrong number of tokens for ’Do’ on line number 2049 doDo: Wrong number of tokens for ’Do’ on line number 2069 doDo...discuss survivability as defined in the " bible of computational complexity", namely, the book "Computers and Intractability, a Guide to the Theory of
The Dilemma of Individual Autonomy versus Choosing Rightly
ERIC Educational Resources Information Center
Yehezkely, Chen
2015-01-01
Many important goals or values of education are tokens of either one of these two meta-goals-values: raising our children to be autonomous, or raising them to choose rightly. Thus, the conflicts between many educational goals-values are tokens of the meta-conflict between these two, and the questions of priority that such conflicts invite are…
25 CFR 542.14 - What are the minimum internal control standards for the cage?
Code of Federal Regulations, 2012 CFR
2012-04-01
... deposit (cash, check, chips); however, (vi) Provided all of the information in paragraph (c)(2)(i) through... equivalents, chips, and tokens shall be accepted from customers for the purpose of a customer deposit. (7) The... Commission upon request. (e) Chip and token standards. The Tribal gaming regulatory authority, or the gaming...
25 CFR 542.14 - What are the minimum internal control standards for the cage?
Code of Federal Regulations, 2013 CFR
2013-04-01
... deposit (cash, check, chips); however, (vi) Provided all of the information in paragraph (c)(2)(i) through... equivalents, chips, and tokens shall be accepted from customers for the purpose of a customer deposit. (7) The... Commission upon request. (e) Chip and token standards. The Tribal gaming regulatory authority, or the gaming...
Validation of the Common Objects Token (COT) Test for Children with Cochlear Implants
ERIC Educational Resources Information Center
Anderson, Ilona; Martin, Jane; Costa, Anne; Jamieson, Lyn; Bailey, Elspeth; Plant, Geoff; Pitterl, Markus
2005-01-01
Changes in selection criteria have meant that children are being provided with cochlear implants (CI) at increasingly younger ages. However, there is a paucity of measures that are appropriate for testing complex listening skills--most tests are too cognitively complex for such young children. The Common Objects Token (COT) Test was developed as a…
Parrish, Audrey E.; Perdue, Bonnie M.; Evans, Theodore A.; Beran, Michael J.
2013-01-01
There has been extensive research investigating self-control in humans and nonhuman animals, yet we know surprisingly little about how one’s social environment influences self-control. The present study examined the self-control of chimpanzees in a task that required active engagement with conspecifics. The task consisted of transferring a token back and forth with a partner animal in order to accumulate food rewards, one item per token transfer. Self-control was required because at any point in the trial, either chimpanzee could obtain their accumulated rewards, but doing so discontinued the food accumulation and ended the trial for both individuals. Chimpanzees readily engaged the task and accumulated the majority of available rewards before ending each trial, and they did so across a number of conditions that varied the identity of the partner, the presence/absence of the experimenter, and the means by which they could obtain rewards. A second experiment examined chimpanzees’ self-control when given the choice between immediately available food items and a potentially larger amount of rewards that could be obtained by engaging the token transfer task with a partner. Chimpanzees were flexible in their decision-making in this test, typically choosing the option representing the largest amount of food, even if it involved delayed accumulation of the rewards via the token transfer task. These results demonstrate that chimpanzees can exhibit self-control in situations involving social interactions, and they encourage further research into this important aspect of the self-control scenario. PMID:23381691
Chimpanzees’ socially maintained food preferences indicate both conservatism and conformity
Hopper, Lydia M.; Schapiro, Steven J.; Lambeth, Susan P.; Brosnan, Sarah F.
2015-01-01
Chimpanzees remain fixed on a single strategy, even if a novel, more efficient, strategy is introduced. Previous studies reporting such findings have incorporated paradigms in which chimpanzees learn one behavioural method and then are shown a new one that the chimpanzees invariably do not adopt. This study provides the first evidence that chimpanzees show such conservatism even when the new method employs the identical required behaviour as the first, but for a different reward. Groups of chimpanzees could choose to exchange one of two types of inedible tokens, with each token type being associated with a different food reward: one type was rewarded with a highly preferred food (grape) and the other type was rewarded with a less preferred food (carrot). Individuals first observed a model chimpanzee from their social group trained to choose one of the two types of tokens. In one group, this token earned a carrot, while in the other, control, group the token earned a grape. In both groups, chimpanzees conformed to the trained model’s choice. This was especially striking for those gaining the pieces of carrot, the less favoured reward. This resulted in a population-level trend of food choices, even when counter to their original, individual, preferences. Moreover, the chimpanzees’ food preferences did not change over time, demonstrating that these results were not due to a simple shift in preferences. We discuss social factors apparent in the interactions and suggest that, despite seeming to be inefficient, in chimpanzees, conformity may benefit them, possibly by assisting with the maintenance of group relations. PMID:27011390
Jin, Guangxu; Zhao, Hong; Zhou, Xiaobo; Wong, Stephen T C
2011-07-01
Prediction of synergistic effects of drug combinations has traditionally been relied on phenotypic response data. However, such methods cannot be used to identify molecular signaling mechanisms of synergistic drug combinations. In this article, we propose an enhanced Petri-Net (EPN) model to recognize the synergistic effects of drug combinations from the molecular response profiles, i.e. drug-treated microarray data. We addressed the downstream signaling network of the targets for the two individual drugs used in the pairwise combinations and applied EPN to the identified targeted signaling network. In EPN, drugs and signaling molecules are assigned to different types of places, while drug doses and molecular expressions are denoted by color tokens. The changes of molecular expressions caused by treatments of drugs are simulated by two actions of EPN: firing and blasting. Firing is to transit the drug and molecule tokens from one node or place to another, and blasting is to reduce the number of molecule tokens by drug tokens in a molecule node. The goal of EPN is to mediate the state characterized by control condition without any treatment to that of treatment and to depict the drug effects on molecules by the drug tokens. We applied EPN to our generated pairwise drug combination microarray data. The synergistic predictions using EPN are consistent with those predicted using phenotypic response data. The molecules responsible for the synergistic effects with their associated feedback loops display the mechanisms of synergism. The software implemented in Python 2.7 programming language is available from request. stwong@tmhs.org.
Ashoori, Mohammad; Sereshki, Narges Adib
2011-01-01
Objective This study investigates the effect of social and token economy reinforcements on academic achievement of 9th grade boy students with intellectual disabilities in an experimental science class in Tehran Province. Method The method used for this study was experimental by pre-test, post- test with a control group. The boy students with intellectual disabilities from three junior high schools participated in this study. The sample consisted of thirty, 9th grade boy students with intellectual disabilities in the selected schools; the schools were chosen by the multi-stage cluster method. To measure the progress of students in the science class, a teacher made test and the Wechsler intelligence test for matching the groups for IQ were used. To ensure validity, the content validity criteria depended tests calculated by the Lashe method and teachers' perspective were used. The reliability coefficient was obtained by the reliability coefficient of related tests; the percent agreement method and the obtained data were analyzed using one-way variance analysis and Shefe prosecution test. Results The results showed that there was a significant increase in academic achievement of students with intellectual disabilities when using token economy than using social reinforcements compared with the control group. Also, when using social reinforcements, the academic achievement of students was more than the control group. Conclusion Token economy and social reinforcements increased the academic achievement of students with intellectual disabilities in the science class; and also the effect of token economy reinforcements was more than social reinforcements on the subjects. PMID:22952517
ERIC Educational Resources Information Center
Endress, Ansgar D.; Hauser, Marc D.
2011-01-01
Rules, and exceptions to such rules, are ubiquitous in many domains, including language. Here we used simple artificial grammars to investigate the influence of 2 factors on the acquisition of rules and their exceptions, namely type frequency (the relative numbers of different exceptions to different regular items) and token frequency (the number…
ERIC Educational Resources Information Center
Bieber, Carrie; Gurski, John C.
In an attempt to confirm earlier results with a group of mentally retarded females, 12 mentally retarded institutionalized adults (8 male, 4 female) were trained to either reduce (Loud group) or increase (Soft group) their voice volumes with a combination of visual feedback and token reinforcement. The feedback unit provided a binary light on-off…
ERIC Educational Resources Information Center
Soares, Denise A.; Harrison, Judith R.; Vannest, Kimberly J.; McClelland, Susan S.
2016-01-01
Recent meta-analyses of the effectiveness of token economies (TEs) report insufficient quality in the research or mixed effects in the results. This study examines the contemporary (post-Public Law 94-142) peer-reviewed published single-case research evaluating the effectiveness of TEs. The results are stratified across quality of demonstrated…
ERIC Educational Resources Information Center
Taleghani-Nikazm, Carmen
2016-01-01
This paper offers an instructional unit on the response token "achja" in everyday German conversation. The paper first provides a description of "achja" and its distinctive prosodic features based on empirical research in conversation analysis. The goal of the paper is to provide instructors of German with information and…
ERIC Educational Resources Information Center
Galbreath, Joy; Feldman, David
The relationship of reading comprehension accuracy and a contingently administered token reinforcement program used with an elementary level learning disabled student in the classroom was examined. The S earned points for each correct answer made after oral reading sessions. At the conclusion of the class he could exchange his points for rewards.…
ERIC Educational Resources Information Center
Shogren, Karrie A.; Lang, Russell; Machalicek, Wendy; Rispoli, Mandy J.; O'Reilly, Mark
2011-01-01
The purpose of this study was to evaluate and compare the effectiveness of a token economy and a self-management intervention in an inclusive kindergarten classroom. Two 5-year-old children with Asperger syndrome who were struggling to follow classroom rules participated in the study. An ABACABAC (A = baseline, B = token economy, C =…
The Development of a Token Reinforcement System for a Specific Lesson. Technical Report #11.
ERIC Educational Resources Information Center
Au, Kathryn
This paper presents a brief description of a token reinforcement system developed for a kindergarten language class in the Kamehameha Early Education Program (KEEP). Visual reinforcers (colored plastic tabs) were placed next to the names of individual children (each time they made a correct response) on a large chart in the front of the room. Five…
A PILOT BASIC EDUCATION PROGRAM FOR SCHOOL DROPOUTS INCORPORATING A TOKEN REINFORCEMENT SYSTEM.
ERIC Educational Resources Information Center
CLARK, MARILYN; AND OTHERS
A 2-MONTH BASIC EDUCATION PROGRAM TESTED WHETHER A TOKEN REINFORCEMENT MIGHT BE AN EFFECTIVE INCENTIVE TO STIMULATE A DESIRED EDUCATIONAL BEHAVIOR. THE SUBJECTS (SS) WERE TWO MATCHED GROUPS OF FIVE 16- TO 21-YEAR-OLD GIRLS WHO WERE SCHOOL DROPOUTS EMPLOYED IN A NEIGHBORHOOD YOUTH CORPS (NYC) PROGRAM. A CLASSROOM GROUP WAS GIVEN A BASIC EDUCATION…
The Role of Type and Token Frequency in Using Past Tense Morphemes Correctly
ERIC Educational Resources Information Center
Nicoladis, Elena; Palmer, Andrea; Marentette, Paula
2007-01-01
Type and token frequency have been thought to be important in the acquisition of past tense morphology, particularly in differentiating regular and irregular forms. In this study we tested the role of frequency in two ways: (1) in bilingual children, who typically use and hear either language less often than monolingual children and (2)…
ERIC Educational Resources Information Center
Willinger, Ulrike; Schmoeger, Michaela; Deckert, Matthias; Eisenwort, Brigitte; Loader, Benjamin; Hofmair, Annemarie; Auff, Eduard
2017-01-01
Specific language impairment (SLI) comprises impairments in receptive and/or expressive language. Aim of this study was to evaluate a screening for SLI. 61 children with SLI (SLI-children, age-range 4-6 years) and 61 matched typically developing controls were tested for receptive language ability (Token Test-TT) and for intelligence (Wechsler…
Conservatism and "copy-if-better" in chimpanzees (Pan troglodytes).
van Leeuwen, Edwin J C; Call, Josep
2017-05-01
Social learning is predicted to evolve in socially living animals provided the learning process is not random but biased by certain socio-ecological factors. One bias of particular interest for the emergence of (cumulative) culture is the tendency to forgo personal behaviour in favour of relatively better variants observed in others, also known as the "copy-if-better" strategy. We investigated whether chimpanzees employ copy-if-better in a simple token-exchange paradigm controlling for individual and random social learning. After being trained on one token-type, subjects were confronted with a conspecific demonstrator who either received the same food reward as the subject (control condition) or a higher value food reward than the subject (test condition) for exchanging another token-type. In general, the chimpanzees persisted in exchanging the token-type they were trained on individually, indicating a form of conservatism consistent with previous studies. However, the chimpanzees were more inclined to copy the demonstrator in the test compared to the control condition, indicating a tendency to employ a copy-if-better strategy. We discuss the validity of our results by considering alternative explanations and relate our findings to the emergence of cumulative culture.
Yamada, Naoki; Kakuda, Wataru; Yamamoto, Kazuma; Momosaki, Ryo; Abo, Masahiro
2016-09-01
We clarified the safety, feasibility, and efficacy of atomoxetine administration combined with intensive speech therapy (ST) for patients with post-stroke aphasia. In addition, we investigated the effect of atomoxetine treatment on neural activity of surrounding lesioned brain areas. Four adult patients with motor-dominant aphasia and a history of left hemispheric stroke were studied. We have registered on the clinical trials database (ID: JMA-IIA00215). Daily atomoxetine administration of 40 mg was initiated two weeks before admission and raised to 80 mg 1 week before admission. During the subsequent 13-day hospitalization, administration of atomoxetine was raised to 120 mg and daily intensive ST (120 min/day, one-on-one training) was provided. Language function was assessed using the Japanese version of The Western Aphasia Battery (WAB) and the Token test two weeks prior to admission, on the day of admission, and at discharge. At two weeks prior to admission and at discharge, each patient's cortical blood flow was measured using (123)I-IMP-single photon emission computed tomography (SPECT). This protocol was successfully completed by all patients without any adverse effects. Four patients showed improved language function with the median of the Token Test increasing from 141 to 149, and the repetition score of WAB increasing from 88 to 99. In addition, cortical blood flow surrounding lesioned brain areas was found to increase following intervention in all patients. Atomoxetine administration and intensive ST were safe and feasible for post-stroke aphasia, suggesting their potential usefulness in the treatment of this patient population.
Yang, Jie; Zhao, Bo; Xi, Yue; Sun, Si; Yang, Zhen; Ye, Ying; Jiang, Kun; Wei, Ye
2018-02-16
A useful Cu-catalyzed cycloaddition protocol for the construction of benzene rings has been achieved. The reactions, utilizing readily available oximes and maleimides as starting materials, proceed under mild reaction conditions to generate a series of structurally interesting fused-phthalimides that are difficult to be prepared by conventional methods.
A Copy of a Book Is Not a Token of a Type
ERIC Educational Resources Information Center
Socher, David
2010-01-01
Masons butter their bricks, gardeners deadhead their roses, and who am I to quibble over terms? However, philosophers routinely speak of "tokens" and "types", as if, so it seems to me, they are bringing a greater measure of precision to the table. Here I shall quibble. I shall try to lead the reader to realize that those philosophers are neither…
ERIC Educational Resources Information Center
Hughes, Robert W.; Hurlstone, Mark J.; Marsh, John E.; Vachon, Francois; Jones, Dylan M.
2013-01-01
The influence of top-down cognitive control on 2 putatively distinct forms of distraction was investigated. Attentional capture by a task-irrelevant auditory deviation (e.g., a female-spoken token following a sequence of male-spoken tokens)--as indexed by its disruption of a visually presented recall task--was abolished when focal-task engagement…
1990-09-19
It is not often that I find myself agreeing with the NHS Chief Executive but at last week's 'Strategy for nursing' conference his criticisms of health service management were well placed. According to Duncan Nichol, managers continue to pay lip service to recruitment and retention issues. He claimed there was no real commitment to initiatives such as flexible working hours and crèche facilities and he accused employers of tokenism.
Rasch Modeling of Revised Token Test Performance: Validity and Sensitivity to Change
ERIC Educational Resources Information Center
Hula, William; Doyle, Patrick J.; McNeil, Malcolm R.; Mikolic, Joseph M.
2006-01-01
The purpose of this research was to examine the validity of the 55-item Revised Token Test (RTT) and to compare traditional and Rasch-based scores in their ability to detect group differences and change over time. The 55-item RTT was administered to 108 left- and right-hemisphere stroke survivors, and the data were submitted to Rasch analysis.…
ERIC Educational Resources Information Center
McNeil, Malcolm R.; Pratt, Sheila R.; Szuminsky, Neil; Sung, Jee Eun; Fossett, Tepanta R. D.; Fassbinder, Wiltrud; Lim, Kyoung Yuel
2015-01-01
Purpose: This study assessed the reliability and validity of intermodality associations and differences in persons with aphasia (PWA) and healthy controls (HC) on a computerized listening and 3 reading versions of the Revised Token Test (RTT; McNeil & Prescott, 1978). Method: Thirty PWA and 30 HC completed the test versions, including a…
The extended TRIP supporting VoIP routing reservation with distributed QoS
NASA Astrophysics Data System (ADS)
Wang, Furong; Wu, Ye
2004-04-01
In this paper, an existing protocol, i.e. TRIP (Telephony Routing over IP) is developed to provide distributed QoS when making resource reservations for VoIP services such as H.323, SIP. Enhanced LSs (location servers) are deployed in ITADs (IP Telephony Administrative Domains) to take in charge of intra-domain routing policy because of small propagation price. It is an easy way to find an IP telephone route for intra-domain VoIP media association and simultaneously possess intra-domain load balancing features. For those routing reservations bridging domains, inter-domain routing policy is responsible for finding the shortest inter-domain route with enough resources. I propose the routing preference policy based on QoS price when the session traffic is shaped by a token bucket, related QoS messages, and message cooperation.
The high speed interconnect system architecture and operation
NASA Astrophysics Data System (ADS)
Anderson, Steven C.
The design and operation of a fiber-optic high-speed interconnect system (HSIS) being developed to meet the requirements of future avionics and flight-control hardware with distributed-system architectures are discussed. The HSIS is intended for 100-Mb/s operation of a local-area network with up to 256 stations. It comprises a bus transmission system (passive star couplers and linear media linked by active elements) and network interface units (NIUs). Each NIU is designed to perform the physical, data link, network, and transport functions defined by the ISO OSI Basic Reference Model (1982 and 1983) and incorporates a fiber-optic transceiver, a high-speed protocol based on the SAE AE-9B linear token-passing data bus (1986), and a specialized application interface unit. The operating modes and capabilities of HSIS are described in detail and illustrated with diagrams.
Experimental GMPLS-Based Provisioning for Future All-Optical DPRing-Based MAN
NASA Astrophysics Data System (ADS)
Mu�oz, Ra�l; V�ctor Mart�nez Rivera, Ricardo; Sorribes, Jordi; Junyent Giralt, Gabriel
2005-10-01
Given the abundance and strategic importance of ring fiber plants in metropolitan area networks (MANs), and the accelerating growth of Internet traffic, it is crucial to extend the existing Internet protocol (IP)-based generalized multiprotocol label switching (GMPLS) framework to provision dynamic wavelength division multiplexing (WDM) optical rings. Nevertheless, the emerging GMPLS-based lightpath provisioning does not cover the intricacies of optical rings. No GMPLS standard exists for optical add-drop multiplexer (OADM) rings, relying instead upon proprietary static solution. The objective of this paper is to propose and evaluate novel GMPLS-based lightpath signaling and wavelength reservation schemes specifically designed for dedicated protection ring (DPRing)-based MANs. Performance evaluation has been carried out in a GMPLS-based testbed named ADRENALINE.
Vitevitch, Michael S.
2008-01-01
A comparison of the lexical characteristics of 88 auditory misperceptions (i.e., slips of the ear) showed no difference in word-frequency, neighborhood density, and neighborhood frequency between the actual and the perceived utterances. Another comparison of slip of the ear tokens (i.e., actual and perceived utterances) and words in general (i.e., randomly selected from the lexicon) showed that slip of the ear tokens had denser neighborhoods and higher neighborhood frequency than words in general, as predicted from laboratory studies. Contrary to prediction, slip of the ear tokens were higher in frequency of occurrence than words in general. Additional laboratory-based investigations examined the possible source of the contradictory word frequency finding, highlighting the importance of using naturalistic and experimental data to develop models of spoken language processing. PMID:12866911
Robust Routing Protocol For Digital Messages
NASA Technical Reports Server (NTRS)
Marvit, Maclen
1994-01-01
Refinement of ditigal-message-routing protocol increases fault tolerance of polled networks. AbNET-3 is latest of generic AbNET protocols for transmission of messages among computing nodes. AbNET concept described in "Multiple-Ring Digital Communication Network" (NPO-18133). Specifically aimed at increasing fault tolerance of network in broadcast mode, in which one node broadcasts message to and receives responses from all other nodes. Communication in network of computers maintained even when links fail.
On Reducing Delay in Mesh-Based P2P Streaming: A Mesh-Push Approach
NASA Astrophysics Data System (ADS)
Liu, Zheng; Xue, Kaiping; Hong, Peilin
The peer-assisted streaming paradigm has been widely employed to distribute live video data on the internet recently. In general, the mesh-based pull approach is more robust and efficient than the tree-based push approach. However, pull protocol brings about longer streaming delay, which is caused by the handshaking process of advertising buffer map message, sending request message and scheduling of the data block. In this paper, we propose a new approach, mesh-push, to address this issue. Different from the traditional pull approach, mesh-push implements block scheduling algorithm at sender side, where the block transmission is initiated by the sender rather than by the receiver. We first formulate the optimal upload bandwidth utilization problem, then present the mesh-push approach, in which a token protocol is designed to avoid block redundancy; a min-cost flow model is employed to derive the optimal scheduling for the push peer; and a push peer selection algorithm is introduced to reduce control overhead. Finally, we evaluate mesh-push through simulation, the results of which show mesh-push outperforms the pull scheduling in streaming delay, and achieves comparable delivery ratio at the same time.
ERIC Educational Resources Information Center
Hopewell, Kim; McLaughlin, T. F.; Derby, K. Mark
2011-01-01
Introduction: The purpose of the study was to evaluate the effectiveness of reading racetracks and direct instruction flashcards with two students with behavior disorders. A token economy with a response cost component was also implemented to increase on-task behavior during data collection. Method: The participants were two eight-year-old males.…
ERIC Educational Resources Information Center
Swink, Shannon; Stuart, Andrew
2012-01-01
The effect of gender on the N1-P2 auditory complex was examined while listening and speaking with altered auditory feedback. Fifteen normal hearing adult males and 15 females participated. N1-P2 components were evoked while listening to self-produced nonaltered and frequency shifted /a/ tokens and during production of /a/ tokens during nonaltered…
Effects of Text Length on Lexical Diversity Measures: Using Short Texts with Less than 200 Tokens
ERIC Educational Resources Information Center
Koizumi, Rie; In'nami, Yo
2012-01-01
Despite the importance of lexical diversity (LD) in L2 speaking and writing performance, LD assessment measures are known to be affected by the number of words analyzed in the text. This study aims to identify LD measures that are least affected by text length and can be used for the analysis of short L2 texts (50-200 tokens). We compared the…
Iuzzini-Seigel, Jenya; Hogan, Tiffany P; Green, Jordan R
2017-05-24
The current research sought to determine (a) if speech inconsistency is a core feature of childhood apraxia of speech (CAS) or if it is driven by comorbid language impairment that affects a large subset of children with CAS and (b) if speech inconsistency is a sensitive and specific diagnostic marker that can differentiate between CAS and speech delay. Participants included 48 children ranging between 4;7 to 17;8 (years;months) with CAS (n = 10), CAS + language impairment (n = 10), speech delay (n = 10), language impairment (n = 9), or typical development (n = 9). Speech inconsistency was assessed at phonemic and token-to-token levels using a variety of stimuli. Children with CAS and CAS + language impairment performed equivalently on all inconsistency assessments. Children with language impairment evidenced high levels of speech inconsistency on the phrase "buy Bobby a puppy." Token-to-token inconsistency of monosyllabic words and the phrase "buy Bobby a puppy" was sensitive and specific in differentiating children with CAS and speech delay, whereas inconsistency calculated on other stimuli (e.g., multisyllabic words) was less efficacious in differentiating between these disorders. Speech inconsistency is a core feature of CAS and is efficacious in differentiating between children with CAS and speech delay; however, sensitivity and specificity are stimuli dependent.
Dissociation of first- and second-order motion systems by perceptual learning
Chubb, Charles
2013-01-01
Previous studies investigating transfer of perceptual learning between luminance-defined (LD) motion and texture-contrast-defined (CD) motion tasks have found little or no transfer from LD to CD motion tasks but nearly perfect transfer from CD to LD motion tasks. Here, we introduce a paradigm that yields a clean double dissociation: LD training yields no transfer to the CD task, but more interestingly, CD training yields no transfer to the LD task. Participants were trained in two variants of a global motion task. In one (LD) variant, motion was defined by tokens that differed from the background in mean luminance. In the other (CD) variant, motion was defined by tokens that had mean luminance equal to the background but differed from the background in texture contrast. The task was to judge whether the signal tokens were moving to the right or to the left. Task difficulty was varied by manipulating the proportion of tokens that moved coherently across the four frames of the stimulus display. Performance in each of the LD and CD variants of the task was measured as training proceeded. In each task, training produced substantial improvement in performance in the trained task; however, in neither case did this improvement show any significant transfer to the nontrained task. PMID:22477056
Random and Directed Walk-Based Top-k Queries in Wireless Sensor Networks
Fu, Jun-Song; Liu, Yun
2015-01-01
In wireless sensor networks, filter-based top-k query approaches are the state-of-the-art solutions and have been extensively researched in the literature, however, they are very sensitive to the network parameters, including the size of the network, dynamics of the sensors’ readings and declines in the overall range of all the readings. In this work, a random walk-based top-k query approach called RWTQ and a directed walk-based top-k query approach called DWTQ are proposed. At the beginning of a top-k query, one or several tokens are sent to the specific node(s) in the network by the base station. Then, each token walks in the network independently to record and process the readings in a random or directed way. A strategy of choosing the “right” way in DWTQ is carefully designed for the token(s) to arrive at the high-value regions as soon as possible. When designing the walking strategy for DWTQ, the spatial correlations of the readings are also considered. Theoretical analysis and simulation results indicate that RWTQ and DWTQ both are very robust against these parameters discussed previously. In addition, DWTQ outperforms TAG, FILA and EXTOK in transmission cost, energy consumption and network lifetime. PMID:26016914
The relation between categorical perception of speech stimuli and reading skills in children
NASA Astrophysics Data System (ADS)
Breier, Joshua; Fletcher, Jack; Klaas, Patricia; Gray, Lincoln
2005-09-01
Children ages 7 to 14 years listened to seven tokens, /ga/ to /ka/ synthesized in equal steps from 0 to 60 ms along the voice onset time (VOT) continuum, played in continuous rhythm. All possible changes (21) between the seven tokens were presented seven times at random intervals, maintaining the rhythm. Children were asked to press a button as soon as they detected a change. Maps of the seven tokens, constructed from multidimensional scaling of reaction times, indicated two salient dimensions: one phonological and the other acoustic/phonetic. Better reading, spelling, and phonological processing skills were associated with greater relative weighting of the phonological as compared to the acoustic dimension, suggesting that children with reading difficulty and associated deficits may underweight the phonological and/or overweight the acoustic information in speech signals. This task required no training and only momentary memory of the tokens. That an analysis of a simple task coincides with more complex reading tests suggests a low-level deficit (or shift in listening strategy). Compared to control children, children with reading disabilities may pay more attention to subtle details in these signals and less attention to the global pattern or attribute. [Supported by NIH Grant 1 RO1 HD35938 to JIB.
An Improvement to a Multi-Client Searchable Encryption Scheme for Boolean Queries.
Jiang, Han; Li, Xue; Xu, Qiuliang
2016-12-01
The migration of e-health systems to the cloud computing brings huge benefits, as same as some security risks. Searchable Encryption(SE) is a cryptography encryption scheme that can protect the confidentiality of data and utilize the encrypted data at the same time. The SE scheme proposed by Cash et al. in Crypto2013 and its follow-up work in CCS2013 are most practical SE Scheme that support Boolean queries at present. In their scheme, the data user has to generate the search tokens by the counter number one by one and interact with server repeatedly, until he meets the correct one, or goes through plenty of tokens to illustrate that there is no search result. In this paper, we make an improvement to their scheme. We allow server to send back some information and help the user to generate exact search token in the search phase. In our scheme, there are only two round interaction between server and user, and the search token has [Formula: see text] elements, where n is the keywords number in query expression, and [Formula: see text] is the minimum documents number that contains one of keyword in query expression, and the computation cost of server is [Formula: see text] modular exponentiation operation.
Optimal speech motor control and token-to-token variability: a Bayesian modeling approach.
Patri, Jean-François; Diard, Julien; Perrier, Pascal
2015-12-01
The remarkable capacity of the speech motor system to adapt to various speech conditions is due to an excess of degrees of freedom, which enables producing similar acoustical properties with different sets of control strategies. To explain how the central nervous system selects one of the possible strategies, a common approach, in line with optimal motor control theories, is to model speech motor planning as the solution of an optimality problem based on cost functions. Despite the success of this approach, one of its drawbacks is the intrinsic contradiction between the concept of optimality and the observed experimental intra-speaker token-to-token variability. The present paper proposes an alternative approach by formulating feedforward optimal control in a probabilistic Bayesian modeling framework. This is illustrated by controlling a biomechanical model of the vocal tract for speech production and by comparing it with an existing optimal control model (GEPPETO). The essential elements of this optimal control model are presented first. From them the Bayesian model is constructed in a progressive way. Performance of the Bayesian model is evaluated based on computer simulations and compared to the optimal control model. This approach is shown to be appropriate for solving the speech planning problem while accounting for variability in a principled way.
Development of protected endorsement for online banking using mobile phones
NASA Astrophysics Data System (ADS)
Narayana, Galla; Venkateswarlu, Tammineni; Kumar, G. S. P.; Padmavathamma, Mokkala; Sreekanth, G.; Delhibabu, K.; Prasad, A. R.
2013-03-01
Securing Online Banking transactions for customer is the primary goal of financial institutions that provides Internet banking facility. Mobile phones play an important role in our society as more and more functions having been integrated within mobile phones, such as Internet browsing, mobile banking, and shopping. Mobiles phones can be used to secure ATM card pins by sending to the customer directly rather than in emails or by other means which has a possibility of hacking. In this paper we have proposed method of generating a Private Key Security Token by bank authentication servers which uses IMSI registers and IMEI number of client's mobile registered. The key is generated by implementing RIPE MD160 and Hex Encode Algorithm. Token received is valid only for that client mobile only and can be generated upon request by customer dynamically. The client is given a PIN and a Master Key when registered to the Online Banking Services. If in case a client's mobile is lost, authentication is done using Unique Master Key, else the Private Key Token is used there by making transactions secured and simple without the need of carrying any USB Tokens. The additional functionality provides the client more security on their transactions. Due to this Phishing attacks by the hackers is avoided.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, Wenzhong; Yi, Ji; Chen, Siyu
Purpose: Doppler optical coherence tomography (OCT) is widely used for measuring retinal blood flow. Existing Doppler OCT methods require the eyeball axial length, in which empirical values are usually used. However, variations in the axial length can create a bias unaccounted for in the retinal blood flow measurement. The authors plan to develop a Doppler OCT method that can measure the total retinal blood flow rate without requiring the eyeball axial length. Methods: The authors measured the retinal blood flow rate using a dual-ring scanning protocol. The small and large scanning rings entered the eye at different incident angles (smallmore » ring: 4°; large ring: 6°), focused on different locations on the retina, and detected the projected velocities/phase shifts along the probing beams. The authors calculated the ratio of the projected velocities between the two rings, and then used this ratio to estimate absolute flow velocity. The authors tested this method in both Intralipid phantoms and in vivo rats. Results: In the Intralipid flow phantom experiments, the preset and measured flow rates were consistent with the coefficient of determination as 0.97. Linear fitting between preset and measured flow rates determined the fitting slope as 1.07 and the intercept as −0.28. In in vivo rat experiments, the measured average total retinal blood flow was 7.02 ± 0.31μl/min among four wild-type rats. The authors’ measured flow rates were consistent with results in the literature. Conclusions: By using a dual-ring scanning protocol with carefully controlled incident angle difference between the two scanning rings in Doppler OCT, the authors demonstrated that it is feasible to measure the absolute retinal blood flow without knowing the eyeball axial length.« less
Liu, Wenzhong; Yi, Ji; Chen, Siyu; Jiao, Shuliang; Zhang, Hao F.
2015-01-01
Purpose: Doppler optical coherence tomography (OCT) is widely used for measuring retinal blood flow. Existing Doppler OCT methods require the eyeball axial length, in which empirical values are usually used. However, variations in the axial length can create a bias unaccounted for in the retinal blood flow measurement. The authors plan to develop a Doppler OCT method that can measure the total retinal blood flow rate without requiring the eyeball axial length. Methods: The authors measured the retinal blood flow rate using a dual-ring scanning protocol. The small and large scanning rings entered the eye at different incident angles (small ring: 4°; large ring: 6°), focused on different locations on the retina, and detected the projected velocities/phase shifts along the probing beams. The authors calculated the ratio of the projected velocities between the two rings, and then used this ratio to estimate absolute flow velocity. The authors tested this method in both Intralipid phantoms and in vivo rats. Results: In the Intralipid flow phantom experiments, the preset and measured flow rates were consistent with the coefficient of determination as 0.97. Linear fitting between preset and measured flow rates determined the fitting slope as 1.07 and the intercept as −0.28. In in vivo rat experiments, the measured average total retinal blood flow was 7.02 ± 0.31μl/min among four wild-type rats. The authors’ measured flow rates were consistent with results in the literature. Conclusions: By using a dual-ring scanning protocol with carefully controlled incident angle difference between the two scanning rings in Doppler OCT, the authors demonstrated that it is feasible to measure the absolute retinal blood flow without knowing the eyeball axial length. PMID:26328984
Liu, Wenzhong; Yi, Ji; Chen, Siyu; Jiao, Shuliang; Zhang, Hao F
2015-09-01
Doppler optical coherence tomography (OCT) is widely used for measuring retinal blood flow. Existing Doppler OCT methods require the eyeball axial length, in which empirical values are usually used. However, variations in the axial length can create a bias unaccounted for in the retinal blood flow measurement. The authors plan to develop a Doppler OCT method that can measure the total retinal blood flow rate without requiring the eyeball axial length. The authors measured the retinal blood flow rate using a dual-ring scanning protocol. The small and large scanning rings entered the eye at different incident angles (small ring: 4°; large ring: 6°), focused on different locations on the retina, and detected the projected velocities/phase shifts along the probing beams. The authors calculated the ratio of the projected velocities between the two rings, and then used this ratio to estimate absolute flow velocity. The authors tested this method in both Intralipid phantoms and in vivo rats. In the Intralipid flow phantom experiments, the preset and measured flow rates were consistent with the coefficient of determination as 0.97. Linear fitting between preset and measured flow rates determined the fitting slope as 1.07 and the intercept as -0.28. In in vivo rat experiments, the measured average total retinal blood flow was 7.02 ± 0.31 μl/min among four wild-type rats. The authors' measured flow rates were consistent with results in the literature. By using a dual-ring scanning protocol with carefully controlled incident angle difference between the two scanning rings in Doppler OCT, the authors demonstrated that it is feasible to measure the absolute retinal blood flow without knowing the eyeball axial length.
Teoh, Andrew B J; Goh, Alwyn; Ngo, David C L
2006-12-01
Biometric analysis for identity verification is becoming a widespread reality. Such implementations necessitate large-scale capture and storage of biometric data, which raises serious issues in terms of data privacy and (if such data is compromised) identity theft. These problems stem from the essential permanence of biometric data, which (unlike secret passwords or physical tokens) cannot be refreshed or reissued if compromised. Our previously presented biometric-hash framework prescribes the integration of external (password or token-derived) randomness with user-specific biometrics, resulting in bitstring outputs with security characteristics (i.e., noninvertibility) comparable to cryptographic ciphers or hashes. The resultant BioHashes are hence cancellable, i.e., straightforwardly revoked and reissued (via refreshed password or reissued token) if compromised. BioHashing furthermore enhances recognition effectiveness, which is explained in this paper as arising from the Random Multispace Quantization (RMQ) of biometric and external random inputs.
Human Visual Search Does Not Maximize the Post-Saccadic Probability of Identifying Targets
Morvan, Camille; Maloney, Laurence T.
2012-01-01
Researchers have conjectured that eye movements during visual search are selected to minimize the number of saccades. The optimal Bayesian eye movement strategy minimizing saccades does not simply direct the eye to whichever location is judged most likely to contain the target but makes use of the entire retina as an information gathering device during each fixation. Here we show that human observers do not minimize the expected number of saccades in planning saccades in a simple visual search task composed of three tokens. In this task, the optimal eye movement strategy varied, depending on the spacing between tokens (in the first experiment) or the size of tokens (in the second experiment), and changed abruptly once the separation or size surpassed a critical value. None of our observers changed strategy as a function of separation or size. Human performance fell far short of ideal, both qualitatively and quantitatively. PMID:22319428
Marsh, John E; Vachon, François; Sörqvist, Patrik
2017-03-01
Individuals with schizophrenia typically show increased levels of distractibility. This has been attributed to impaired working memory capacity (WMC), since lower WMC is typically associated with higher distractibility, and schizophrenia is typically associated with impoverished WMC. Here, participants performed verbal and spatial serial recall tasks that were accompanied by to-be-ignored speech tokens. For the few trials wherein one speech token was replaced with a different token, impairment was produced to task scores (a deviation effect). Participants subsequently completed a schizotypy questionnaire and a WMC measure. Higher schizotypy scores were associated with lower WMC (as measured with operation span, OSPAN), but WMC and schizotypy scores explained unique variance in relation to the mean magnitude of the deviation effect. These results suggest that schizotypy is associated with heightened domain-general distractibility, but that this is independent of its relationship with WMC.
Students' Ideas and Radical Constructivism
NASA Astrophysics Data System (ADS)
Sánchez Gómez, Pedro J.
2016-08-01
In this article, I study, from the point of view of the analytic philosophy of mind, the compatibility of students' ideas studies (SIS) with radical constructivism (RC). I demonstrate that RC is based on a psychology of narrow mental states; that is, the idea that the mental content of an individual can be fully characterised without any reference external to her or him. I show that this fact imposes some severe restrictions to SIS to be incorporated into RC. In particular, I argue that only qualitative studies can comply with the requirement of narrowness. Nevertheless, I propose that quantitative works can be employed as sources of types in order to study token actual students. I use this type-token dichotomy to put forward an outline of a theory of the relation between school contents and mental contents. In this view, token mental contents regarding a given topic can be defined, and probed, only by resorting to typical school contents.
Monsonis Centelles, Sandra; Hoefsloot, Huub C J; Khakimov, Bekzod; Ebrahimi, Parvaneh; Lind, Mads V; Kristensen, Mette; de Roo, Niels; Jacobs, Doris M; van Duynhoven, John; Cannet, Claire; Fang, Fang; Humpfer, Eberhard; Schäfer, Hartmut; Spraul, Manfred; Engelsen, Søren B; Smilde, Age K
2017-08-01
Lipoprotein profiling of human blood by 1 H nuclear magnetic resonance (NMR) spectroscopy is a rapid and promising approach to monitor health and disease states in medicine and nutrition. However, lack of standardization of measurement protocols has prevented the use of NMR-based lipoprotein profiling in metastudies. In this study, a standardized NMR measurement protocol was applied in a ring test performed across three different laboratories in Europe on plasma and serum samples from 28 individuals. Data was evaluated in terms of (i) spectral differences, (ii) differences in LPD predictions obtained using an existing prediction model, and (iii) agreement of predictions with cholesterol concentrations in high- and low-density lipoproteins (HDL and LDL) particles measured by standardized clinical assays. ANOVA-simultaneous component analysis (ASCA) of the ring test spectral ensemble that contains methylene and methyl peaks (1.4-0.6 ppm) showed that 97.99% of the variance in the data is related to subject, 1.62% to sample type (serum or plasma), and 0.39% to laboratory. This interlaboratory variation is in fact smaller than the maximum acceptable intralaboratory variation on quality control samples. It is also shown that the reproducibility between laboratories is good enough for the LPD predictions to be exchangeable when the standardized NMR measurement protocol is followed. With the successful implementation of this protocol, which results in reproducible prediction of lipoprotein distributions across laboratories, a step is taken toward bringing NMR more into scope of prognostic and diagnostic biomarkers, reducing the need for less efficient methods such as ultracentrifugation or high-performance liquid chromatography (HPLC).
Compression of digital images over local area networks. Appendix 1: Item 3. M.S. Thesis
NASA Technical Reports Server (NTRS)
Gorjala, Bhargavi
1991-01-01
Differential Pulse Code Modulation (DPCM) has been used with speech for many years. It has not been as successful for images because of poor edge performance. The only corruption in DPC is quantizer error but this corruption becomes quite large in the region of an edge because of the abrupt changes in the statistics of the signal. We introduce two improved DPCM schemes; Edge correcting DPCM and Edge Preservation Differential Coding. These two coding schemes will detect the edges and take action to correct them. In an Edge Correcting scheme, the quantizer error for an edge is encoded using a recursive quantizer with entropy coding and sent to the receiver as side information. In an Edge Preserving scheme, when the quantizer input falls in the overload region, the quantizer error is encoded and sent to the receiver repeatedly until the quantizer input falls in the inner levels. Therefore these coding schemes increase the bit rate in the region of an edge and require variable rate channels. We implement these two variable rate coding schemes on a token wing network. Timed token protocol supports two classes of messages; asynchronous and synchronous. The synchronous class provides a pre-allocated bandwidth and guaranteed response time. The remaining bandwidth is dynamically allocated to the asynchronous class. The Edge Correcting DPCM is simulated by considering the edge information under the asynchronous class. For the simulation of the Edge Preserving scheme, the amount of information sent each time is fixed, but the length of the packet or the bit rate for that packet is chosen depending on the availability capacity. The performance of the network, and the performance of the image coding algorithms, is studied.
A Study of Gaps in Cyber Defense Automation
2016-10-13
converting all characters to lowercase. Next, the normalized file is tokenized using an n -length window. These n -tokens are then hashed into a Bloom filter...expensive and not readily available to most developers. However, with a complexity of O(N2), where N is the number of files (or the number of...prioritized by statistics that measure the impact of each feature on the website’s chances of becoming compromised, and the top N features are submitted to
Spin-Orbit-Coupled Interferometry with Ring-Trapped Bose-Einstein Condensates
NASA Astrophysics Data System (ADS)
Helm, J. L.; Billam, T. P.; Rakonjac, A.; Cornish, S. L.; Gardiner, S. A.
2018-02-01
We propose a method of atom interferometry using a spinor Bose-Einstein condensate with a time-varying magnetic field acting as a coherent beam splitter. Our protocol creates long-lived superpositional counterflow states, which are of fundamental interest and can be made sensitive to both the Sagnac effect and magnetic fields on the sub-μ G scale. We split a ring-trapped condensate, initially in the mf=0 hyperfine state, into superpositions of internal mf=±1 states and condensate superflow, which are spin-orbit coupled. After interrogation, the relative phase accumulation can be inferred from a population transfer to the mf=±1 states. The counterflow generation protocol is adiabatically deterministic and does not rely on coupling to additional optical fields or mechanical stirring techniques. Our protocol can maximize the classical Fisher information for any rotation, magnetic field, or interrogation time and so has the maximum sensitivity available to uncorrelated particles. Precision can increase with the interrogation time and so is limited only by the lifetime of the condensate.
Use of a hardware token for Grid authentication by the MICE data distribution framework
NASA Astrophysics Data System (ADS)
Nebrensky, JJ; Martyniak, J.
2017-10-01
The international Muon Ionization Cooling Experiment (MICE) is designed to demonstrate the principle of muon ionisation cooling for the first time. Data distribution and archiving, batch reprocessing, and simulation are all carried out using the EGI Grid infrastructure, in particular the facilities provided by GridPP in the UK. To prevent interference - especially accidental data deletion - these activities are separated by different VOMS roles. Data acquisition, in particular, can involve 24/7 operation for a number of weeks and so for moving the data out of the MICE Local Control Room at the experiment a valid, VOMS-enabled, Grid proxy must be made available continuously over that time. The MICE "Data Mover" agent is now using a robot certificate stored on a hardware token (Feitian ePass2003) from which a cron job generates a “plain” proxy to which the VOMS authorisation extensions are added in a separate transaction. A valid short-lifetime proxy is thus continuously available to the Data Mover process. The Feitian ePass2003 was chosen because it was both significantly cheaper and easier to actually purchase than the token commonly referred to in the community at that time; however there was no software support for the hardware. This paper describes the software packages, process and commands used to deploy the token into production.
A token centric part-of-speech tagger for biomedical text.
Barrett, Neil; Weber-Jahnke, Jens
2014-05-01
Difficulties with part-of-speech (POS) tagging of biomedical text is accessing and annotating appropriate training corpora. These difficulties may result in POS taggers trained on corpora that differ from the tagger's target biomedical text (cross-domain tagging). In such cases where training and target corpora differ tagging accuracy decreases. This paper presents a POS tagger for cross-domain tagging called TcT. TcT estimates a tag's likelihood for a given token by combining token collocation probabilities and the token's tag probabilities calculated using a Naive Bayes classifier. We compared TcT to three POS taggers used in the biomedical domain (mxpost, Brill and TnT). We trained each tagger on a non-biomedical corpus and evaluated it on biomedical corpora. TcT was more accurate in cross-domain tagging than mxpost, Brill and TnT (respective averages 83.9, 81.0, 79.5 and 78.8). Our analysis of tagger performance suggests that lexical differences between corpora have more effect on tagging accuracy than originally considered by previous research work. Biomedical POS tagging algorithms may be modified to improve their cross-domain tagging accuracy without requiring extra training or large training data sets. Future work should reexamine POS tagging methods for biomedical text. This differs from the work to date that has focused on retraining existing POS taggers. Copyright © 2014 Elsevier B.V. All rights reserved.
SegAuth: A Segment-based Approach to Behavioral Biometric Authentication
Li, Yanyan; Xie, Mengjun; Bian, Jiang
2016-01-01
Many studies have been conducted to apply behavioral biometric authentication on/with mobile devices and they have shown promising results. However, the concern about the verification accuracy of behavioral biometrics is still common given the dynamic nature of behavioral biometrics. In this paper, we address the accuracy concern from a new perspective—behavior segments, that is, segments of a gesture instead of the whole gesture as the basic building block for behavioral biometric authentication. With this unique perspective, we propose a new behavioral biometric authentication method called SegAuth, which can be applied to various gesture or motion based authentication scenarios. SegAuth can achieve high accuracy by focusing on each user’s distinctive gesture segments that frequently appear across his or her gestures. In SegAuth, a time series derived from a gesture/motion is first partitioned into segments and then transformed into a set of string tokens in which the tokens representing distinctive, repetitive segments are associated with higher genuine probabilities than those tokens that are common across users. An overall genuine score calculated from all the tokens derived from a gesture is used to determine the user’s authenticity. We have assessed the effectiveness of SegAuth using 4 different datasets. Our experimental results demonstrate that SegAuth can achieve higher accuracy consistently than existing popular methods on the evaluation datasets. PMID:28573214
SegAuth: A Segment-based Approach to Behavioral Biometric Authentication.
Li, Yanyan; Xie, Mengjun; Bian, Jiang
2016-10-01
Many studies have been conducted to apply behavioral biometric authentication on/with mobile devices and they have shown promising results. However, the concern about the verification accuracy of behavioral biometrics is still common given the dynamic nature of behavioral biometrics. In this paper, we address the accuracy concern from a new perspective-behavior segments, that is, segments of a gesture instead of the whole gesture as the basic building block for behavioral biometric authentication. With this unique perspective, we propose a new behavioral biometric authentication method called SegAuth, which can be applied to various gesture or motion based authentication scenarios. SegAuth can achieve high accuracy by focusing on each user's distinctive gesture segments that frequently appear across his or her gestures. In SegAuth, a time series derived from a gesture/motion is first partitioned into segments and then transformed into a set of string tokens in which the tokens representing distinctive, repetitive segments are associated with higher genuine probabilities than those tokens that are common across users. An overall genuine score calculated from all the tokens derived from a gesture is used to determine the user's authenticity. We have assessed the effectiveness of SegAuth using 4 different datasets. Our experimental results demonstrate that SegAuth can achieve higher accuracy consistently than existing popular methods on the evaluation datasets.
Dale, Rachel; Quervel-Chaumette, Mylène; Huber, Ludwig; Range, Friederike; Marshall-Pescini, Sarah
2016-01-01
Prosociality has received increasing interest by non-human animal researchers since the initial discoveries that suggested it is not a uniquely human trait. However, thus far studies, even within the same species, have not garnered conclusive results. A prominent suggestion for this disparity is the effect methodology can have on prosocial responses in animals. We recently found evidence of prosociality in domestic dogs towards familiar conspecifics using a bar-pulling paradigm, in which a subject could pull a rope to deliver food to its partner. Therefore, the current study aimed to assess whether dogs would show a similar response in a different paradigm, based on the token exchange task paradigm frequently used with primates. In this task, dogs had the option to touch a token with their nose that delivered a reward to an adjacent receiver enclosure, which contained a familiar conspecific, a stranger or no dog at all. Crucially, we also included a social facilitation control condition, whereby the partner (stranger/familiar) was present but unable to access the food. We found that the familiarity effect remained consistent across tasks, with dogs of both the bar-pulling and token choice experiments providing more food to familiar partners than in a non-social control and providing less food to stranger partners than this same control. However, in contrast to our previous bar-pulling experiment, we could not exclude social facilitation as an underlying motive in the current task. We propose this difference in results between tasks may be related to increased task complexity in the token choice paradigm, making it harder for dogs to discriminate between the test and social facilitation conditions. Overall our findings suggest that subtle methodological changes can have an impact on prosocial behaviours in dogs and highlights the importance of controlling for social facilitation effects in such experiments.
2015-07-27
A World Health Organization expert meeting on Ebola vaccines proposed urgent safety and efficacy studies in response to the outbreak in West Africa. One approach to communicable disease control is ring vaccination of individuals at high risk of infection due to their social or geographical connection to a known case. This paper describes the protocol for a novel cluster randomised controlled trial design which uses ring vaccination.In the Ebola ça suffit ring vaccination trial, rings are randomised 1:1 to (a) immediate vaccination of eligible adults with single dose vaccination or (b) vaccination delayed by 21 days. Vaccine efficacy against disease is assessed in participants over equivalent periods from the day of randomisation. Secondary objectives include vaccine effectiveness at the level of the ring, and incidence of serious adverse events. Ring vaccination trials are adaptive, can be run until disease elimination, allow interim analysis, and can go dormant during inter-epidemic periods. © Ebola ça suffit ring vaccination trial consortium 2015.
Privacy Enhancements for Inexact Biometric Templates
NASA Astrophysics Data System (ADS)
Ratha, Nalini; Chikkerur, Sharat; Connell, Jonathan; Bolle, Ruud
Traditional authentication schemes utilize tokens or depend on some secret knowledge possessed by the user for verifying his or her identity. Although these techniques are widely used, they have several limitations. Both tokenand knowledge-based approaches cannot differentiate between an authorized user and an impersonator having access to the tokens or passwords. Biometrics-based authentication schemes overcome these limitations while offering usability advantages in the area of password management. However, despite its obvious advantages, the use of biometrics raises several security and privacy concerns.
A Study of Gaps in Cyber Defense Automation
2015-10-18
to lowercase. Next, the normalized file is tokenized using an n -length window. These n -tokens are then hashed into a Bloom filter for that file. In the...readily available to most developers. However, with a complexity of O(N2) where N is the number of files (or the number of functions if using function...that measure the impact of each feature on the website’s chances of becoming compromised, and the top N features are submitted to the classification
Training Japanese listeners to identify English /r/ and /l/: A first report
Logan, John S.; Lively, Scott E.; Pisoni, David B.
2012-01-01
Native speakers of Japanese learning English generally have difficulty differentiating the phonemes /r/ and /l/, even after years of experience with English. Previous research that attempted to train Japanese listeners to distinguish this contrast using synthetic stimuli reported little success, especially when transfer to natural tokens containing /r/ and /l/ was tested. In the present study, a different training procedure that emphasized variability among stimulus tokens was used. Japanese subjects were trained in a minimal pair identification paradigm using multiple natural exemplars contrasting /r/ and /l/ from a variety of phonetic environments as stimuli. A pretest–posttest design containing natural tokens was used to assess the effects of training. Results from six subjects showed that the new procedure was more robust than earlier training techniques. Small but reliable differences in performance were obtained between pretest and posttest scores. The results demonstrate the importance of stimulus variability and task-related factors in training nonnative speakers to perceive novel phonetic contrasts that are not distinctive in their native language. PMID:2016438
The Lazarillo’s game: Sharing resources with asymmetric conditions
2017-01-01
The Lazarillo of Tormes’ picaresque novel introduces a story where two subjects sequentially extract (one, two or three) tokens from a common pool in an asymmetric information framework (the first player cannot observe her partners’ actions). By introducing a reward for both subjects in case that in every period at least one subject had taken one single token, we define an interesting coordination game. We conduct an experiment with 120 undergraduate students to study their behavior in this framework. We find that if the second player is allowed to take more tokens than her partner, then the frequency of cooperators does not seem to be affected by the informational asymmetry. Nevertheless, this asymmetry (i) incentives the second player to use her ‘power of extraction’ while the social externality is still available, (ii) yields to more asymmetric profit distributions when subjects win the social externality and (iii) delays the breach period in case of coordination failure. Furthermore, the first choice of the first player is determinant for getting the reward. PMID:28704408
Self-evaluation by adolescents in a psychiatric hospital school token program1
Santogrossi, David A.; O'Leary, K. Daniel; Romanczyk, Raymond G.; Kaufman, Kenneth F.
1973-01-01
Nine adolescent boys with a history of high rates of disruptive classroom behavior were selected from a psychiatric hospital school and placed in a remedial reading class after school in which various factors in a token reinforcement program involving self-evaluation were investigated. The effects of self-evaluation, in the form of a rating the students gave themselves about the appropriateness of their classroom behavior, were first assessed. While the students' ratings of their own behavior correlated highly with the teacher's ratings and evaluations made by independent observers, the self-evaluations did not lead to a reduction in disruptive behavior. A token reinforcement program, in which the teacher rated the students' level of appropriate behavior and in which the students traded earned rating points for prizes, clearly led to a reduction of disruptive behavior. When the students were given the opportunity to evaluate their own behavior and to receive rewards in exchange for the evaluation, they returned to their former rates of disruptive behavior. PMID:16795409
Zeng, Wei-Fang; Kang, Yuan-Yuan; Liu, Ming; Li, Yan; Wang, Ji-Guang
2013-06-01
The present study aimed to evaluate the accuracy of the automated oscillometric upper-arm blood pressure (BP) monitor A&D UA-1020 with two different-shaped cuffs for home BP monitoring according to the British Hypertension Society (BHS) Protocol. We recruited individuals for each of the two cuffs (D-ring and cylindrical) until there were 85 eligible participants (255 pairs of comparisons) and their BP could meet the BP distribution requirements specified by the BHS Protocol. For each participant, we sequentially measured the systolic and diastolic BP using a mercury sphygmomanometer (two observers) and the UA-1020 device (one supervisor). For the D-ring cuff, the device achieved grade A. The percentage of BP differences within 5, 10, and 15 mmHg was 67, 87, and 96%, respectively, for systolic BP, and 70, 90, and 99%, respectively, for diastolic BP. The average (±SD) of the device-observer differences was -0.2±7.3 mmHg (P=0.64) and 1.7±5.8 mmHg (P<0.0001) for systolic and diastolic BP, respectively. For the cylindrical cuff, the device also achieved grade A. The percentage of BP differences within 5, 10, and 15 mmHg was 67, 88, and 97%, respectively, for systolic BP and 64, 89, and 98%, respectively, for diastolic BP. The average of the device-observer differences was -0.1±7.0 mmHg (P=0.89) and 2.0±6.3 mmHg (P<0.0001) for systolic and diastolic BP, respectively. The UA-1020 device has passed the requirements of the BHS Protocol with both the D-ring and the cylindrical cuffs, and hence can be recommended for home use in adults.
Proteinaceous Light Diffusers and Dynamic 3D Skin Texture in Cephalopods
2014-02-24
Spring Harbor Protocols 2012(9):pdb.prot069625. Mäthger LM, Bell GRR, Kuzirian AM, Allen JJ, Hanlon RT. 2012. How does the blue - ringed octopus ...Hapalochlaena lunulata) flash its blue rings ? J Exp Biol 215(21):3752-3757. Wardill TJ, Gonzalez-Bellido PT, Crook RJ, Hanlon RT. 2012. Neural...hydrostat (similar to a human tongue, elephant trunk, or octopus arm). For each research project, sufficient modeling of the structures and spectrometry
2003-04-01
usage times. End users may range from today’s typical users, such as home and business users, to futuristic users such as automobiles , appliances, hand...has the ability to drop a reprogrammable quantity of wavelengths into the node. The second technological requirement is a protocol that automatically...goal of the R-OADM is to have the ability to drop a reprogrammable number of wavelengths. If it is determined that at peak usage the node must receive M
Anonymous authenticated communications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Beaver, Cheryl L; Schroeppel, Richard C; Snyder, Lillian A
2007-06-19
A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.
Superfluid qubit systems with ring shaped optical lattices
Amico, Luigi; Aghamalyan, Davit; Auksztol, Filip; Crepaz, Herbert; Dumke, Rainer; Kwek, Leong Chuan
2014-01-01
We study an experimentally feasible qubit system employing neutral atomic currents. Our system is based on bosonic cold atoms trapped in ring-shaped optical lattice potentials. The lattice makes the system strictly one dimensional and it provides the infrastructure to realize a tunable ring-ring interaction. Our implementation combines the low decoherence rates of neutral cold atoms systems, overcoming single site addressing, with the robustness of topologically protected solid state Josephson flux qubits. Characteristic fluctuations in the magnetic fields affecting Josephson junction based flux qubits are expected to be minimized employing neutral atoms as flux carriers. By breaking the Galilean invariance we demonstrate how atomic currents through the lattice provide an implementation of a qubit. This is realized either by artificially creating a phase slip in a single ring, or by tunnel coupling of two homogeneous ring lattices. The single qubit infrastructure is experimentally investigated with tailored optical potentials. Indeed, we have experimentally realized scaled ring-lattice potentials that could host, in principle, n ~ 10 of such ring-qubits, arranged in a stack configuration, along the laser beam propagation axis. An experimentally viable scheme of the two-ring-qubit is discussed, as well. Based on our analysis, we provide protocols to initialize, address, and read-out the qubit. PMID:24599096
A structural SVM approach for reference parsing.
Zhang, Xiaoli; Zou, Jie; Le, Daniel X; Thoma, George R
2011-06-09
Automated extraction of bibliographic data, such as article titles, author names, abstracts, and references is essential to the affordable creation of large citation databases. References, typically appearing at the end of journal articles, can also provide valuable information for extracting other bibliographic data. Therefore, parsing individual reference to extract author, title, journal, year, etc. is sometimes a necessary preprocessing step in building citation-indexing systems. The regular structure in references enables us to consider reference parsing a sequence learning problem and to study structural Support Vector Machine (structural SVM), a newly developed structured learning algorithm on parsing references. In this study, we implemented structural SVM and used two types of contextual features to compare structural SVM with conventional SVM. Both methods achieve above 98% token classification accuracy and above 95% overall chunk-level accuracy for reference parsing. We also compared SVM and structural SVM to Conditional Random Field (CRF). The experimental results show that structural SVM and CRF achieve similar accuracies at token- and chunk-levels. When only basic observation features are used for each token, structural SVM achieves higher performance compared to SVM since it utilizes the contextual label features. However, when the contextual observation features from neighboring tokens are combined, SVM performance improves greatly, and is close to that of structural SVM after adding the second order contextual observation features. The comparison of these two methods with CRF using the same set of binary features show that both structural SVM and CRF perform better than SVM, indicating their stronger sequence learning ability in reference parsing.
Exploiting core knowledge for visual object recognition.
Schurgin, Mark W; Flombaum, Jonathan I
2017-03-01
Humans recognize thousands of objects, and with relative tolerance to variable retinal inputs. The acquisition of this ability is not fully understood, and it remains an area in which artificial systems have yet to surpass people. We sought to investigate the memory process that supports object recognition. Specifically, we investigated the association of inputs that co-occur over short periods of time. We tested the hypothesis that human perception exploits expectations about object kinematics to limit the scope of association to inputs that are likely to have the same token as a source. In several experiments we exposed participants to images of objects, and we then tested recognition sensitivity. Using motion, we manipulated whether successive encounters with an image took place through kinematics that implied the same or a different token as the source of those encounters. Images were injected with noise, or shown at varying orientations, and we included 2 manipulations of motion kinematics. Across all experiments, memory performance was better for images that had been previously encountered with kinematics that implied a single token. A model-based analysis similarly showed greater memory strength when images were shown via kinematics that implied a single token. These results suggest that constraints from physics are built into the mechanisms that support memory about objects. Such constraints-often characterized as 'Core Knowledge'-are known to support perception and cognition broadly, even in young infants. But they have never been considered as a mechanism for memory with respect to recognition. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
CSMA/RN: A universal protocol for gigabit networks
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank
1990-01-01
Networks must provide intelligent access for nodes to share the communications resources. In the range of 100 Mbps to 1 Gbps, the demand access class of protocols were studied extensively. Many use some form of slot or reservation system and many the concept of attempt and defer to determine the presence or absence of incoming information. The random access class of protocols like shared channel systems (Ethernet), also use the concept of attempt and defer in the form of carrier sensing to alleviate the damaging effects of collisions. In CSMA/CD, the sensing of interference is on a global basis. All systems discussed above have one aspect in common, they examine activity on the network either locally or globally and react in an attempt and whatever mechanism. Of the attempt + mechanisms discussed, one is obviously missing; that is attempt and truncate. Attempt and truncate was studied in a ring configuration called the Carrier Sensed Multiple Access Ring Network (CSMA/RN). The system features of CSMA/RN are described including a discussion of the node operations for inserting and removing messages and for handling integrated traffic. The performance and operational features based on analytical and simulation studies which indicate that CSMA/RN is a useful and adaptable protocol over a wide range of network conditions are discussed. Finally, the research and development activities necessary to demonstrate and realize the potential of CSMA/RN as a universal, gigabit network protocol is outlined.
A comparison of vowel normalization procedures for language variation research
NASA Astrophysics Data System (ADS)
Adank, Patti; Smits, Roel; van Hout, Roeland
2004-11-01
An evaluation of vowel normalization procedures for the purpose of studying language variation is presented. The procedures were compared on how effectively they (a) preserve phonemic information, (b) preserve information about the talker's regional background (or sociolinguistic information), and (c) minimize anatomical/physiological variation in acoustic representations of vowels. Recordings were made for 80 female talkers and 80 male talkers of Dutch. These talkers were stratified according to their gender and regional background. The normalization procedures were applied to measurements of the fundamental frequency and the first three formant frequencies for a large set of vowel tokens. The normalization procedures were evaluated through statistical pattern analysis. The results show that normalization procedures that use information across multiple vowels (``vowel-extrinsic'' information) to normalize a single vowel token performed better than those that include only information contained in the vowel token itself (``vowel-intrinsic'' information). Furthermore, the results show that normalization procedures that operate on individual formants performed better than those that use information across multiple formants (e.g., ``formant-extrinsic'' F2-F1). .
Advance reservation access control using software-defined networking and tokens
Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar; ...
2017-03-09
Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present in this paper a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization.more » We use SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. Finally, we conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network.« less
Modifying Speech to Children based on their Perceived Phonetic Accuracy
Julien, Hannah M.; Munson, Benjamin
2014-01-01
Purpose We examined the relationship between adults' perception of the accuracy of children's speech, and acoustic detail in their subsequent productions to children. Methods Twenty-two adults participated in a task in which they rated the accuracy of 2- and 3-year-old children's word-initial /s/and /∫/ using a visual analog scale (VAS), then produced a token of the same word as if they were responding to the child whose speech they had just rated. Result The duration of adults' fricatives varied as a function of their perception of the accuracy of children's speech: longer fricatives were produced following productions that they rated as inaccurate. This tendency to modify duration in response to perceived inaccurate tokens was mediated by measures of self-reported experience interacting with children. However, speakers did not increase the spectral distinctiveness of their fricatives following the perception of inaccurate tokens. Conclusion These results suggest that adults modify temporal features of their speech in response to perceiving children's inaccurate productions. These longer fricatives are potentially both enhanced input to children, and an error-corrective signal. PMID:22744140
Advance reservation access control using software-defined networking and tokens
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar
Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present in this paper a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization.more » We use SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. Finally, we conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network.« less
Advance reservation access control using software-defined networking and tokens
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar
Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present here a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization. We usemore » SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. We conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network. (C) 2017 Elsevier B.V. All rights reserved.« less
Font group identification using reconstructed fonts
NASA Astrophysics Data System (ADS)
Cutter, Michael P.; van Beusekom, Joost; Shafait, Faisal; Breuel, Thomas M.
2011-01-01
Ideally, digital versions of scanned documents should be represented in a format that is searchable, compressed, highly readable, and faithful to the original. These goals can theoretically be achieved through OCR and font recognition, re-typesetting the document text with original fonts. However, OCR and font recognition remain hard problems, and many historical documents use fonts that are not available in digital forms. It is desirable to be able to reconstruct fonts with vector glyphs that approximate the shapes of the letters that form a font. In this work, we address the grouping of tokens in a token-compressed document into candidate fonts. This permits us to incorporate font information into token-compressed images even when the original fonts are unknown or unavailable in digital format. This paper extends previous work in font reconstruction by proposing and evaluating an algorithm to assign a font to every character within a document. This is a necessary step to represent a scanned document image with a reconstructed font. Through our evaluation method, we have measured a 98.4% accuracy for the assignment of letters to candidate fonts in multi-font documents.
Repetition blindness and illusory conjunctions: errors in binding visual types with visual tokens.
Kanwisher, N
1991-05-01
Repetition blindness (Kanwisher, 1986, 1987) has been defined as the failure to detect or recall repetitions of words presented in rapid serial visual presentation (RSVP). The experiments presented here suggest that repetition blindness (RB) is a more general visual phenomenon, and examine its relationship to feature integration theory (Treisman & Gelade, 1980). Experiment 1 shows RB for letters distributed through space, time, or both. Experiment 2 demonstrates RB for repeated colors in RSVP lists. In Experiments 3 and 4, RB was found for repeated letters and colors in spatial arrays. Experiment 5 provides evidence that the mental representations of discrete objects (called "visual tokens" here) that are necessary to detect visual repetitions (Kanwisher, 1987) are the same as the "object files" (Kahneman & Treisman, 1984) in which visual features are conjoined. In Experiment 6, repetition blindness for the second occurrence of a repeated letter resulted only when the first occurrence was attended to. The overall results suggest that a general dissociation between types and tokens in visual information processing can account for both repetition blindness and illusory conjunctions.
A comparison of vowel normalization procedures for language variation research.
Adank, Patti; Smits, Roel; van Hout, Roeland
2004-11-01
An evaluation of vowel normalization procedures for the purpose of studying language variation is presented. The procedures were compared on how effectively they (a) preserve phonemic information, (b) preserve information about the talker's regional background (or sociolinguistic information), and (c) minimize anatomical/physiological variation in acoustic representations of vowels. Recordings were made for 80 female talkers and 80 male talkers of Dutch. These talkers were stratified according to their gender and regional background. The normalization procedures were applied to measurements of the fundamental frequency and the first three formant frequencies for a large set of vowel tokens. The normalization procedures were evaluated through statistical pattern analysis. The results show that normalization procedures that use information across multiple vowels ("vowel-extrinsic" information) to normalize a single vowel token performed better than those that include only information contained in the vowel token itself ("vowel-intrinsic" information). Furthermore, the results show that normalization procedures that operate on individual formants performed better than those that use information across multiple formants (e.g., "formant-extrinsic" F2-F1).
VO-Dance an IVOA tools to easy publish data into VO and it's extension on planetology request
NASA Astrophysics Data System (ADS)
Smareglia, R.; Capria, M. T.; Molinaro, M.
2012-09-01
Data publishing through the self standing portals can be joined to VO resource publishing, i.e. astronomical resources deployed through VO compliant services. Since the IVOA (International Virtual Observatory Alliance) provides many protocols and standards for the various data flavors (images, spectra, catalogues … ), and since the data center has as a goal to grow up in number of hosted archives and services providing, the idea arose to find a way to easily deploy and maintain VO resources. VO-Dance is a java web application developed at IA2 that addresses this idea creating, in a dynamical way, VO resources out of database tables or views. It is structured to be potentially DBMS and platform independent and consists of 3 main tokens, an internal DB to store resources description and model metadata information, a restful web application to deploy the resources to the VO community. It's extension to planetology request is under study to best effort INAF software development and archive efficiency.
TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
NASA Astrophysics Data System (ADS)
Nauman, Mohammad; Ali, Tamleek
Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to mitigate the risks associated with naïve username/password based authentication. However, these approaches have two major limitations: they are not applicable to services where authentication occurs outside the domain of the mobile device - such as web-based services; and they often overly tax the limited computational capabilities of mobile devices. In this paper, we propose a protocol for keystroke dynamics analysis which allows web-based applications to make use of remote attestation and delegated keystroke analysis. The end result is an efficient keystroke-based user identification mechanism that strengthens traditional password protected services while mitigating the risks of user profiling by collaborating malicious web services.
Standardized limbal epithelial stem cell graft generation and transplantation.
Zakaria, Nadia; Koppen, Carina; Van Tendeloo, Viggo; Berneman, Zwi; Hopkinson, Andrew; Tassignon, Marie-José
2010-10-01
To describe a standardized, xenogenic-free protocol for the manufacture of limbal epithelial stem cell grafts and a "no touch" surgical technique for its standardized transplantation. Antwerp University Hospital, Antwerp, Belgium. The limbo-amnion composite graft is generated by cultivating limbal epithelial stem cells on a standardized (thermolysin treated and spongy layer removed) amniotic membrane, stretched within an interlockable amnion ring. The cells are cultured in CnT-20 medium with the addition of 1% human AB serum for a period of 2 weeks. Fibrin glue is applied to the surgically prepared recipient's cornea and in one fluid motion, the composite graft within the amnion ring construct is transferred from culture and positioned onto the graft bed. The required size is cut out at the level of the limbus by means of a trephine and/or microsurgical scissors. The lightweight, plastic interlockable ring offered stability to the graft during culture, transport, and transplantation. The use of the standardized amniotic membrane, within the amnion ring construct, improves reproducibility of the results and therefore heralds elective surgery. Rapid transplantation of a wrinkle-free graft, using a sutureless, “no touch" technique was achieved and this allowed precise tailoring of the graft to the recipient bed. This is the first time a standardized, clinical grade protocol has been described for manufacturing limbal epithelial grafts with an efficient surgical technique that prevents postsurgical graft shrinkage and improves corneal integration. The quick, sutureless, and manipulation-free technique ensured transplantation of viable, proliferating limbal epithelial stem cells.
Dynamics of infant cortical auditory evoked potentials (CAEPs) for tone and speech tokens.
Cone, Barbara; Whitaker, Richard
2013-07-01
Cortical auditory evoked potentials (CAEPs) to tones and speech sounds were obtained in infants to: (1) further knowledge of auditory development above the level of the brainstem during the first year of life; (2) establish CAEP input-output functions for tonal and speech stimuli as a function of stimulus level and (3) elaborate the data-base that establishes CAEP in infants tested while awake using clinically relevant stimuli, thus providing methodology that would have translation to pediatric audiological assessment. Hypotheses concerning CAEP development were that the latency and amplitude input-output functions would reflect immaturity in encoding stimulus level. In a second experiment, infants were tested with the same stimuli used to evoke the CAEPs. Thresholds for these stimuli were determined using observer-based psychophysical techniques. The hypothesis was that the behavioral thresholds would be correlated with CAEP input-output functions because of shared cortical response areas known to be active in sound detection. 36 infants, between the ages of 4 and 12 months (mean=8 months, s.d.=1.8 months) and 9 young adults (mean age 21 years) with normal hearing were tested. First, CAEPs amplitude and latency input-output functions were obtained for 4 tone bursts and 7 speech tokens. The tone bursts stimuli were 50 ms tokens of pure tones at 0.5, 1.0, 2.0 and 4.0 kHz. The speech sound tokens, /a/, /i/, /o/, /u/, /m/, /s/, and /∫/, were created from natural speech samples and were also 50 ms in duration. CAEPs were obtained for tone burst and speech token stimuli at 10 dB level decrements in descending order from 70 dB SPL. All CAEP tests were completed while the infants were awake and engaged in quiet play. For the second experiment, observer-based psychophysical methods were used to establish perceptual threshold for the same speech sound and tone tokens. Infant CAEP component latencies were prolonged by 100-150 ms in comparison to adults. CAEP latency-intensity input output functions were steeper in infants compared to adults. CAEP amplitude growth functions with respect to stimulus SPL are adult-like at this age, particularly for the earliest component, P1-N1. Infant perceptual thresholds were elevated with respect to those found in adults. Furthermore, perceptual thresholds were higher, on average, than levels at which CAEPs could be obtained. When CAEP amplitudes were plotted with respect to perceptual threshold (dB SL), the infant CAEP amplitude growth slopes were steeper than in adults. Although CAEP latencies indicate immaturity in neural transmission at the level of the cortex, amplitude growth with respect to stimulus SPL is adult-like at this age, particularly for the earliest component, P1-N1. The latency and amplitude input-output functions may provide additional information as to how infants perceive stimulus level. The reasons for the discrepancy between electrophysiologic and perceptual threshold may be due to immaturity in perceptual temporal resolution abilities and the broad-band listening strategy employed by infants. The findings from the current study can be translated to the clinical setting. It is possible to use tonal or speech sound tokens to evoke CAEPs in an awake, passively alert infant, and thus determine whether these sounds activate the auditory cortex. This could be beneficial in the verification of hearing aid or cochlear implant benefit. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Evaluation of emergency medical text processor, a system for cleaning chief complaint text data.
Travers, Debbie A; Haas, Stephanie W
2004-11-01
Emergency Medical Text Processor (EMT-P) version 1, a natural language processing system that cleans emergency department text (e.g., chst pn, chest pai), was developed to maximize extraction of standard terms (e.g., chest pain). The authors compared the number of standard terms extracted from raw chief complaint (CC) data with that for CC data cleaned with EMT-P and evaluated the accuracy of EMT-P. This cross-sectional observation study included CC text entries for all emergency department visits to three tertiary care centers in 2001. Terms were extracted from CC entries before and after cleaning with EMT-P. Descriptive statistics included number and percentage of all entries (tokens) and all unique entries (types) that matched a standard term from the Unified Medical Language System (UMLS). An expert panel rated the accuracy of the CC-UMLS term matches; inter-rater reliability was measured with kappa. The authors collected 203,509 CC entry tokens, of which 63,946 were unique entry types. For the raw data, 89,337 tokens (44%) and 5,081 types (8%) matched a standard term. After EMT-P cleaning, 168,050 tokens (83%) and 44,430 types (69%) matched a standard term. The expert panel reached consensus on 201 of the 222 CC-UMLS term matches reviewed (kappa=0.69-0.72). Ninety-six percent of the 201 matches were rated equivalent or related. Thirty-eight percent of the nonmatches were found to match UMLS concepts. EMT-P version 1 is relatively accurate, and cleaning with EMT-P improved the CC-UMLS term match rate over raw data. The authors identified areas for improvement in future EMT-P versions and issues to be resolved in developing a standard CC terminology.
A carrier sensed multiple access protocol for high data base rate ring networks
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank
1990-01-01
The results of the study of a simple but effective media access protocol for high data rate networks are presented. The protocol is based on the fact that at high data rates networks can contain multiple messages simultaneously over their span, and that in a ring, nodes used to detect the presence of a message arriving from the immediate upstream neighbor. When an incoming signal is detected, the node must either abort or truncate a message it is presently sending. Thus, the protocol with local carrier sensing and multiple access is designated CSMA/RN. The performance of CSMA/RN with TTattempt and truncate is studied using analytic and simulation models. Three performance factors, wait or access time, service time and response or end-to-end travel time are presented. The service time is basically a function of the network rate, it changes by a factor of 1 between no load and full load. Wait time, which is zero for no load, remains small for load factors up to 70 percent of full load. Response time, which adds travel time while on the network to wait and service time, is mainly a function of network length, especially for longer distance networks. Simulation results are shown for CSMA/RN where messages are removed at the destination. A wide range of local and metropolitan area network parameters including variations in message size, network length, and node count are studied. Finally, a scaling factor based upon the ratio of message to network length demonstrates that the results, and hence, the CSMA/RN protocol, are applicable to wide area networks.
Multiple-Ring Digital Communication Network
NASA Technical Reports Server (NTRS)
Kirkham, Harold
1992-01-01
Optical-fiber digital communication network to support data-acquisition and control functions of electric-power-distribution networks. Optical-fiber links of communication network follow power-distribution routes. Since fiber crosses open power switches, communication network includes multiple interconnected loops with occasional spurs. At each intersection node is needed. Nodes of communication network include power-distribution substations and power-controlling units. In addition to serving data acquisition and control functions, each node acts as repeater, passing on messages to next node(s). Multiple-ring communication network operates on new AbNET protocol and features fiber-optic communication.
Detection of LiveLock in BPMN Using Process Expression
NASA Astrophysics Data System (ADS)
Tantitharanukul, Nasi; Jumpamule, Watcharee
Although the Business Process Modeling Notation (BPMN) is a popular tool for modeling business process in conceptual level, the result diagram may contain structural problem. One of the structural problems is livelock. In this problem, one token proceeds to end event, while other token is still in process with no progression. In this paper, we introduce an expression liked method to detect livelock in the BPMN diagram. Our approach utilizes the power of the declarative ability of expression to determine all of the possible process chains, and indicate whether there are livelock or not. As a result, we have shown that our method can detect livelock, if any.
An intelligent allocation algorithm for parallel processing
NASA Technical Reports Server (NTRS)
Carroll, Chester C.; Homaifar, Abdollah; Ananthram, Kishan G.
1988-01-01
The problem of allocating nodes of a program graph to processors in a parallel processing architecture is considered. The algorithm is based on critical path analysis, some allocation heuristics, and the execution granularity of nodes in a program graph. These factors, and the structure of interprocessor communication network, influence the allocation. To achieve realistic estimations of the executive durations of allocations, the algorithm considers the fact that nodes in a program graph have to communicate through varying numbers of tokens. Coarse and fine granularities have been implemented, with interprocessor token-communication duration, varying from zero up to values comparable to the execution durations of individual nodes. The effect on allocation of communication network structures is demonstrated by performing allocations for crossbar (non-blocking) and star (blocking) networks. The algorithm assumes the availability of as many processors as it needs for the optimal allocation of any program graph. Hence, the focus of allocation has been on varying token-communication durations rather than varying the number of processors. The algorithm always utilizes as many processors as necessary for the optimal allocation of any program graph, depending upon granularity and characteristics of the interprocessor communication network.
Icon arrays help younger children's proportional reasoning.
Ruggeri, Azzurra; Vagharchakian, Laurianne; Xu, Fei
2018-06-01
We investigated the effects of two context variables, presentation format (icon arrays or numerical frequencies) and time limitation (limited or unlimited time), on the proportional reasoning abilities of children aged 7 and 10 years, as well as adults. Participants had to select, between two sets of tokens, the one that offered the highest likelihood of drawing a gold token, that is, the set of elements with the greater proportion of gold tokens. Results show that participants performed better in the unlimited time condition. Moreover, besides a general developmental improvement in accuracy, our results show that younger children performed better when proportions were presented as icon arrays, whereas older children and adults were similarly accurate in the two presentation format conditions. Statement of contribution What is already known on this subject? There is a developmental improvement in proportional reasoning accuracy. Icon arrays facilitate reasoning in adults with low numeracy. What does this study add? Participants were more accurate when they were given more time to make the proportional judgement. Younger children's proportional reasoning was more accurate when they were presented with icon arrays. Proportional reasoning abilities correlate with working memory, approximate number system, and subitizing skills. © 2018 The British Psychological Society.
Amici, Federica; Visalberghi, Elisabetta; Call, Josep
2014-01-01
Prosociality can be defined as any behaviour performed to alleviate the needs of others or to improve their welfare. Prosociality has probably played an essential role in the evolution of cooperative behaviour and several studies have already investigated it in primates to understand the evolutionary origins of human prosociality. Two main tasks have been used to test prosociality in a food context. In the Platforms task, subjects can prosocially provide food to a partner by selecting a prosocial platform over a selfish one. In the Tokens task, subjects can prosocially provide food to a partner by selecting a prosocial token over a selfish one. As these tasks have provided mixed results, we used both tasks to test prosociality in great apes, capuchin monkeys and spider monkeys. Our results provided no compelling evidence of prosociality in a food context in any of the species tested. Additionally, our study revealed serious limitations of the Tokens task as it has been previously used. These results highlight the importance of controlling for confounding variables and of using multiple tasks to address inconsistencies present in the literature. PMID:25209941
Analyzing Language in Suicide Notes and Legacy Tokens.
Egnoto, Michael J; Griffin, Darrin J
2016-03-01
Identifying precursors that will aid in the discovery of individuals who may harm themselves or others has long been a focus of scholarly research. This work set out to determine if it is possible to use the legacy tokens of active shooters and notes left from individuals who completed suicide to uncover signals that foreshadow their behavior. A total of 25 suicide notes and 21 legacy tokens were compared with a sample of over 20,000 student writings for a preliminary computer-assisted text analysis to determine what differences can be coded with existing computer software to better identify students who may commit self-harm or harm to others. The results support that text analysis techniques with the Linguistic Inquiry and Word Count (LIWC) tool are effective for identifying suicidal or homicidal writings as distinct from each other and from a variety of student writings in an automated fashion. Findings indicate support for automated identification of writings that were associated with harm to self, harm to others, and various other student writing products. This work begins to uncover the viability or larger scale, low cost methods of automatic detection for individuals suffering from harmful ideation.
Apparent motion determined by surface layout not by disparity or three-dimensional distance.
He, Z J; Nakayama, K
1994-01-13
The most meaningful events ecologically, including the motion of objects, occur in relation to or on surfaces. We run along the ground, cars travel on roads, balls roll across lawns, and so on. Even though there are other motions, such as flying of birds, it is likely that motion along surfaces is more frequent and more significant biologically. To examine whether events occurring in relation to surfaces have a preferred status in terms of visual representation, we asked whether the phenomenon of apparent motion would show a preference for motion attached to surfaces. We used a competitive three-dimensional motion paradigm and found that there is a preference to see motion between tokens placed within the same disparity as opposed to different planes. Supporting our surface-layout hypothesis, the effect of disparity was eliminated either by slanting the tokens so that they were all seen within the same surface plane or by inserting a single slanted background surface upon which the tokens could rest. Additionally, a highly curved stereoscopic surface led to the perception of a more circuitous motion path defined by that surface, instead of the shortest path in three-dimensional space.
Color and context: an ERP study on intrinsic and extrinsic feature binding in episodic memory.
Ecker, Ullrich K H; Zimmer, Hubert D; Groh-Bordin, Christian
2007-09-01
Episodic memory for intrinsic item and extrinsic context information is postulated to rely on two distinct types of representation: object and episodic tokens. These provide the basis for familiarity and recollection, respectively. Electrophysiological indices of these processes (ERP old-new effects) were used together with behavioral data to test these assumptions. We manipulated an intrinsic object feature (color; Experiment 1) and a contextual feature (background; Experiments 1 and 2). In an inclusion task (Experiment 1), the study-test manipulation of color affected object recognition performance and modulated ERP old-new effects associated with both familiarity and recollection. In contrast, a contextual manipulation had no effect, although both intrinsic and extrinsic information was available in a direct feature (source memory) test. When made task relevant (exclusion task; Experiment 2), however, context affected the ERP recollection effect, while still leaving the ERP familiarity effect uninfluenced. We conclude that intrinsic features bound in object tokens are involuntarily processed during object recognition, thus influencing familiarity, whereas context features bound in episodic tokens are voluntarily accessed, exclusively influencing recollection. Figures depicting all the electrodes analyzed are available in an online supplement at www.psychonomic.org/archive.
Formant transitions in the fluent speech of Farsi-speaking people who stutter.
Dehqan, Ali; Yadegari, Fariba; Blomgren, Michael; Scherer, Ronald C
2016-06-01
Second formant (F2) transitions can be used to infer attributes of articulatory transitions. This study compared formant transitions during fluent speech segments of Farsi (Persian) speaking people who stutter and normally fluent Farsi speakers. Ten Iranian males who stutter and 10 normally fluent Iranian males participated. Sixteen different "CVt" tokens were embedded within the phrase "Begu CVt an". Measures included overall F2 transition frequency extents, durations, and derived overall slopes, initial F2 transition slopes at 30ms and 60ms, and speaking rate. (1) Mean overall formant frequency extent was significantly greater in 14 of the 16 CVt tokens for the group of stuttering speakers. (2) Stuttering speakers exhibited significantly longer overall F2 transitions for all 16 tokens compared to the nonstuttering speakers. (3) The overall F2 slopes were similar between the two groups. (4) The stuttering speakers exhibited significantly greater initial F2 transition slopes (positive or negative) for five of the 16 tokens at 30ms and six of the 16 tokens at 60ms. (5) The stuttering group produced a slower syllable rate than the non-stuttering group. During perceptually fluent utterances, the stuttering speakers had greater F2 frequency extents during transitions, took longer to reach vowel steady state, exhibited some evidence of steeper slopes at the beginning of transitions, had overall similar F2 formant slopes, and had slower speaking rates compared to nonstuttering speakers. Findings support the notion of different speech motor timing strategies in stuttering speakers. Findings are likely to be independent of the language spoken. Educational objectives This study compares aspects of F2 formant transitions between 10 stuttering and 10 nonstuttering speakers. Readers will be able to describe: (a) characteristics of formant frequency as a specific acoustic feature used to infer speech movements in stuttering and nonstuttering speakers, (b) two methods of measuring second formant (F2) transitions: the visual criteria method and fixed time criteria method, (c) characteristics of F2 transitions in the fluent speech of stuttering speakers and how those characteristics appear to differ from normally fluent speakers, and (d) possible cross-linguistic effects on acoustic analyses of stuttering. Copyright © 2016 Elsevier Inc. All rights reserved.
Transmission of FDDI signals over low-frequency media
NASA Astrophysics Data System (ADS)
Ater, Dan
1992-03-01
The `FDDI' designation is gaining an increasing place in the local area network (LAN) jargon along with the `Ethernet' and `Token Ring.' The four letters stand for fiber-optic distributed data interface, but as in the case of other LANs the meaning of the name looses its importance as the properties of the network become familiar to the community of the users, implementors, and designers. Further, more new properties are added to the original set, sometimes beyond the boundaries hinted by the name. This paper presents the actual stage of an attempt to change the `F' (fiber-optic) to `M' (metal) specifically to unshielded twisted pair (UTP). The sense in doing so is the fact that a huge installed basis of metallic wires for telephone and data transmission already exists, and reaches an immense number of desktops. This paper describes: (1) An hierarchical network architecture emphasizing the segment to be implemented over UTP. (2) A systemic approach to the definition of the parameters for the physical medium dependent (PMD) module that should interface the MDDI (FDDI over metallic media) to the UTP cable plant. (3) Measurement results available at the time of the presentation.
Real-time hierarchically distributed processing network interaction simulation
NASA Technical Reports Server (NTRS)
Zimmerman, W. F.; Wu, C.
1987-01-01
The Telerobot Testbed is a hierarchically distributed processing system which is linked together through a standard, commercial Ethernet. Standard Ethernet systems are primarily designed to manage non-real-time information transfer. Therefore, collisions on the net (i.e., two or more sources attempting to send data at the same time) are managed by randomly rescheduling one of the sources to retransmit at a later time interval. Although acceptable for transmitting noncritical data such as mail, this particular feature is unacceptable for real-time hierarchical command and control systems such as the Telerobot. Data transfer and scheduling simulations, such as token ring, offer solutions to collision management, but do not appropriately characterize real-time data transfer/interactions for robotic systems. Therefore, models like these do not provide a viable simulation environment for understanding real-time network loading. A real-time network loading model is being developed which allows processor-to-processor interactions to be simulated, collisions (and respective probabilities) to be logged, collision-prone areas to be identified, and network control variable adjustments to be reentered as a means of examining and reducing collision-prone regimes that occur in the process of simulating a complete task sequence.
Aukema, Kelly G.; Kasinkas, Lisa; Aksan, Alptekin
2014-01-01
The most problematic hydrocarbons in hydraulic fracturing (fracking) wastewaters consist of fused, isolated, bridged, and spiro ring systems, and ring systems have been poorly studied with respect to biodegradation, prompting the testing here of six major ring structural subclasses using a well-characterized bacterium and a silica encapsulation system previously shown to enhance biodegradation. The direct biological oxygenation of spiro ring compounds was demonstrated here. These and other hydrocarbon ring compounds have previously been shown to be present in flow-back waters and waters produced from hydraulic fracturing operations. Pseudomonas sp. strain NCIB 9816-4, containing naphthalene dioxygenase, was selected for its broad substrate specificity, and it was demonstrated here to oxidize fundamental ring structures that are common in shale-derived waters but not previously investigated with this or related enzymes. Pseudomonas sp. NCIB 9816-4 was tested here in the presence of a silica encasement, a protocol that has previously been shown to protect bacteria against the extremes of salinity present in fracking wastewaters. These studies demonstrate the degradation of highly hydrophobic compounds by a silica-encapsulated model bacterium, demonstrate what it may not degrade, and contribute to knowledge of the full range of hydrocarbon ring compounds that can be oxidized using Pseudomonas sp. NCIB 9816-4. PMID:24907321
2014-06-10
Childhood Myelodysplastic Syndromes; de Novo Myelodysplastic Syndromes; Previously Treated Myelodysplastic Syndromes; Refractory Anemia; Refractory Anemia With Excess Blasts; Refractory Anemia With Ringed Sideroblasts; Refractory Cytopenia With Multilineage Dysplasia; Secondary Myelodysplastic Syndromes; Unspecified Childhood Solid Tumor, Protocol Specific
Sulak, Patricia J; Smith, Virginia; Coffee, Andrea; Witt, Iris; Kuehl, Alicia L; Kuehl, Thomas J
2008-09-01
To assess bleeding patterns with continuous use of the transvaginal contraceptive ring. We did a prospective analysis of daily menstrual flow during a 21/7 cycle followed by 6 months of continuous use and institution of a randomized protocol to manage breakthrough bleeding/spotting. Seventy-four women completed the baseline 21/7 phase and were randomized equally into two groups during the continuous phase. Group 1 was instructed to replace the ring monthly on the same calendar day with no ring-free days. Group 2 was instructed to use the same process, but if breakthrough bleeding/spotting occurred for 5 days or more, they were to remove the ring for 4 days, store it, and then reinsert that ring. Sixty-five women completed the continuous phase with reduced average flow scores in the continuous phase compared with the 21/7 phase (P<.02). Most patients had no to minimal bleeding during continuous use, with group 2 experiencing a statistically greater percentage of days without breakthrough bleeding or spotting (95%) compared with group 1 (89%) (P=.016). Instituting a 4-day hormone-free interval was more (P<.001) effective in resolving breakthrough bleeding/spotting than continuing ring use. A reduction in bleeding occurred during continuous use with replacement of the transvaginal ring compared with baseline 21/7 use. Continuous vaginal ring use resulted in an acceptable bleeding profile in most patients, reduction in flow, reduction in pelvic pain, and a high continuation rate.
NASA Astrophysics Data System (ADS)
Ammendola, R.; Biagioni, A.; Chiozzi, S.; Cretaro, P.; Cotta Ramusino, A.; Di Lorenzo, S.; Fantechi, R.; Fiorini, M.; Frezza, O.; Gianoli, A.; Lamanna, G.; Lo Cicero, F.; Lonardo, A.; Martinelli, M.; Neri, I.; Paolucci, P. S.; Pastorelli, E.; Piandani, R.; Piccini, M.; Pontisso, L.; Rossetti, D.; Simula, F.; Sozzi, M.; Vicini, P.
2017-03-01
This project aims to exploit the parallel computing power of a commercial Graphics Processing Unit (GPU) to implement fast pattern matching in the Ring Imaging Cherenkov (RICH) detector for the level 0 (L0) trigger of the NA62 experiment. In this approach, the ring-fitting algorithm is seedless, being fed with raw RICH data, with no previous information on the ring position from other detectors. Moreover, since the L0 trigger is provided with a more elaborated information than a simple multiplicity number, it results in a higher selection power. Two methods have been studied in order to reduce the data transfer latency from the readout boards of the detector to the GPU, i.e., the use of a dedicated NIC device driver with very low latency and a direct data transfer protocol from a custom FPGA-based NIC to the GPU. The performance of the system, developed through the FPGA approach, for multi-ring Cherenkov online reconstruction obtained during the NA62 physics runs is presented.
Biosensing based on magnetically induced self-assembly of particles in magnetic colloids.
Yang, Ye; Morimoto, Yoshitaka; Takamura, Tsukasa; Sandhu, Adarsh
2012-03-01
Superparamagnetic beads and nonmagnetic beads of different sizes were assembled to form a "ring-structure" in a magnetorheological (MR) fluid solution by the application of external magnetic fields. For superparamagnetic beads and non-magnetic beads functionalized with probe and target molecules, respectively, the ring-structure was maintained even after removing the external magnetic field due to biomolecular bonding. Several experiments are described, including the formation process of ring-structures with and without molecular interactions, the accelerating effect of external magnetic fields, and the effect of biotin concentration on the structures of the rings. We define the small nonmagnetic particles as "petals" because the whole structure looks like a flower. The number of remnant ring petals was a function of the concentration of target molecules in the concentration range of 0.0768 ng/ml-3.8419 ng/ml which makes this protocol a promising method for biosensing. Not only was the formation process rapid, but the resulting two-dimensional colloidal system also offers a simple method for reducing reagent consumption and waste generation.
ERIC Educational Resources Information Center
Dessy, Raymond E.
1982-01-01
Local area networks are common communication conduits allowing various terminals, computers, discs, printers, and other electronic devices to intercommunicate over short distances. Discusses the vocabulary of such networks including RS-232C point-to-point and IEEE-488 multidrop protocols; error detection; message packets; multiplexing; star, ring,…
Simple-random-sampling-based multiclass text classification algorithm.
Liu, Wuying; Wang, Lin; Yi, Mianzhu
2014-01-01
Multiclass text classification (MTC) is a challenging issue and the corresponding MTC algorithms can be used in many applications. The space-time overhead of the algorithms must be concerned about the era of big data. Through the investigation of the token frequency distribution in a Chinese web document collection, this paper reexamines the power law and proposes a simple-random-sampling-based MTC (SRSMTC) algorithm. Supported by a token level memory to store labeled documents, the SRSMTC algorithm uses a text retrieval approach to solve text classification problems. The experimental results on the TanCorp data set show that SRSMTC algorithm can achieve the state-of-the-art performance at greatly reduced space-time requirements.
All-optical LAN architectures based on arrayed waveguide grating multiplexers
NASA Astrophysics Data System (ADS)
Woesner, Hagen
1998-10-01
The paper presents optical LAN topologies which are made possible using an Arrayed Waveguide Grating Multiplexer (AWGM) instead of a passive star coupler to interconnect stations in an all-optical LAN. Due to the collision-free nature of an AWGM it offers the n-fold bandwidth compared to the star coupler. Virtual ring topologies appear (one ring on each wavelength) if the number of stations attached to the AWGM is a prime number. A method to construct larger networks using Cayley graphs is shown. An access protocol to avoid collisions on the proposed network is outlined.
Audiovisual perceptual learning with multiple speakers.
Mitchel, Aaron D; Gerfen, Chip; Weiss, Daniel J
2016-05-01
One challenge for speech perception is between-speaker variability in the acoustic parameters of speech. For example, the same phoneme (e.g. the vowel in "cat") may have substantially different acoustic properties when produced by two different speakers and yet the listener must be able to interpret these disparate stimuli as equivalent. Perceptual tuning, the use of contextual information to adjust phonemic representations, may be one mechanism that helps listeners overcome obstacles they face due to this variability during speech perception. Here we test whether visual contextual cues to speaker identity may facilitate the formation and maintenance of distributional representations for individual speakers, allowing listeners to adjust phoneme boundaries in a speaker-specific manner. We familiarized participants to an audiovisual continuum between /aba/ and /ada/. During familiarization, the "b-face" mouthed /aba/ when an ambiguous token was played, while the "D-face" mouthed /ada/. At test, the same ambiguous token was more likely to be identified as /aba/ when paired with a stilled image of the "b-face" than with an image of the "D-face." This was not the case in the control condition when the two faces were paired equally with the ambiguous token. Together, these results suggest that listeners may form speaker-specific phonemic representations using facial identity cues.
Park, Jae Soon; Lee, Kyunghee
2012-12-01
Meager research has been carried out to determine the effectiveness of the token economy among patients behaving violently in mental hospitals. The purpose of this study was to examine the effectiveness of the Short-Term Token Economy (STTE) on violent behavior among chronic psychiatric in-patients. A nonequivalent control group design method was utilized. Participants in an experimental group (n=22) and control group (n=22) took part in this study from January to April, 2008. Observation on aggressive behavior among male in-patients in one hospital as a baseline was made during the week before the behavior modification program and measurement of aggressive behavior was done using the Overt Aggression Scale (OAS), which includes verbal attacks, property damage and physical attacks. The aggressive behavior scores of the experimental group decreased, those of the control group, scores showed an increase after the eight-week behavior modification program utilizing STTE. The results of the study indicate that STTE is effective in reducing the incidence of aggressive behavior among male in-patients in psychiatric hospitals. The outcome of this study should be helpful in reducing the use of coercive measures or psychoactive medication in controlling the violent behavior among in-patients in hospitals.
NASA Astrophysics Data System (ADS)
Wai Kuan, Yip; Teoh, Andrew B. J.; Ngo, David C. L.
2006-12-01
We introduce a novel method for secure computation of biometric hash on dynamic hand signatures using BioPhasor mixing and[InlineEquation not available: see fulltext.] discretization. The use of BioPhasor as the mixing process provides a one-way transformation that precludes exact recovery of the biometric vector from compromised hashes and stolen tokens. In addition, our user-specific[InlineEquation not available: see fulltext.] discretization acts both as an error correction step as well as a real-to-binary space converter. We also propose a new method of extracting compressed representation of dynamic hand signatures using discrete wavelet transform (DWT) and discrete fourier transform (DFT). Without the conventional use of dynamic time warping, the proposed method avoids storage of user's hand signature template. This is an important consideration for protecting the privacy of the biometric owner. Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs) of[InlineEquation not available: see fulltext.] and[InlineEquation not available: see fulltext.] for random and skilled forgeries for stolen token (worst case) scenario, and[InlineEquation not available: see fulltext.] for both forgeries in the genuine token (optimal) scenario.
Time-Extended Payoffs for Collectives of Autonomous Agents
NASA Technical Reports Server (NTRS)
Tumer, Kagan; Agogino, Adrian K.
2002-01-01
A collective is a set of self-interested agents which try to maximize their own utilities, along with a a well-defined, time-extended world utility function which rates the performance of the entire system. In this paper, we use theory of collectives to design time-extended payoff utilities for agents that are both aligned with the world utility, and are "learnable", i.e., the agents can readily see how their behavior affects their utility. We show that in systems where each agent aims to optimize such payoff functions, coordination arises as a byproduct of the agents selfishly pursuing their own goals. A game theoretic analysis shows that such payoff functions have the net effect of aligning the Nash equilibrium, Pareto optimal solution and world utility optimum, thus eliminating undesirable behavior such as agents working at cross-purposes. We then apply collective-based payoff functions to the token collection in a gridworld problem where agents need to optimize the aggregate value of tokens collected across an episode of finite duration (i.e., an abstracted version of rovers on Mars collecting scientifically interesting rock samples, subject to power limitations). We show that, regardless of the initial token distribution, reinforcement learning agents using collective-based payoff functions significantly outperform both natural extensions of single agent algorithms and global reinforcement learning solutions based on "team games".
Transcranial current stimulation focality using disc and ring electrode configurations: FEM analysis
NASA Astrophysics Data System (ADS)
Datta, Abhishek; Elwassif, Maged; Battaglia, Fortunato; Bikson, Marom
2008-06-01
We calculated the electric fields induced in the brain during transcranial current stimulation (TCS) using a finite-element concentric spheres human head model. A range of disc electrode configurations were simulated: (1) distant-bipolar; (2) adjacent-bipolar; (3) tripolar; and three ring designs, (4) belt, (5) concentric ring, and (6) double concentric ring. We compared the focality of each configuration targeting cortical structures oriented normal to the surface ('surface-radial' and 'cross-section radial'), cortical structures oriented along the brain surface ('surface-tangential' and 'cross-section tangential') and non-oriented cortical surface structures ('surface-magnitude' and 'cross-section magnitude'). For surface-radial fields, we further considered the 'polarity' of modulation (e.g. superficial cortical neuron soma hyper/depolarizing). The distant-bipolar configuration, which is comparable with commonly used TCS protocols, resulted in diffuse (un-focal) modulation with bi-directional radial modulation under each electrode and tangential modulation between electrodes. Increasing the proximity of the two electrodes (adjacent-bipolar electrode configuration) increased focality, at the cost of more surface current. At similar electrode distances, the tripolar-electrodes configuration produced comparable peak focality, but reduced radial bi-directionality. The concentric-ring configuration resulted in the highest spatial focality and uni-directional radial modulation, at the expense of increased total surface current. Changing ring dimensions, or use of two concentric rings, allow titration of this balance. The concentric-ring design may thus provide an optimized configuration for targeted modulation of superficial cortical neurons.
De-identification of clinical notes via recurrent neural network and conditional random field.
Liu, Zengjian; Tang, Buzhou; Wang, Xiaolong; Chen, Qingcai
2017-11-01
De-identification, identifying information from data, such as protected health information (PHI) present in clinical data, is a critical step to enable data to be shared or published. The 2016 Centers of Excellence in Genomic Science (CEGS) Neuropsychiatric Genome-scale and RDOC Individualized Domains (N-GRID) clinical natural language processing (NLP) challenge contains a de-identification track in de-identifying electronic medical records (EMRs) (i.e., track 1). The challenge organizers provide 1000 annotated mental health records for this track, 600 out of which are used as a training set and 400 as a test set. We develop a hybrid system for the de-identification task on the training set. Firstly, four individual subsystems, that is, a subsystem based on bidirectional LSTM (long-short term memory, a variant of recurrent neural network), a subsystem-based on bidirectional LSTM with features, a subsystem based on conditional random field (CRF) and a rule-based subsystem, are used to identify PHI instances. Then, an ensemble learning-based classifiers is deployed to combine all PHI instances predicted by above three machine learning-based subsystems. Finally, the results of the ensemble learning-based classifier and the rule-based subsystem are merged together. Experiments conducted on the official test set show that our system achieves the highest micro F1-scores of 93.07%, 91.43% and 95.23% under the "token", "strict" and "binary token" criteria respectively, ranking first in the 2016 CEGS N-GRID NLP challenge. In addition, on the dataset of 2014 i2b2 NLP challenge, our system achieves the highest micro F1-scores of 96.98%, 95.11% and 98.28% under the "token", "strict" and "binary token" criteria respectively, outperforming other state-of-the-art systems. All these experiments prove the effectiveness of our proposed method. Copyright © 2017. Published by Elsevier Inc.
Boeing's STAR-FODB test results
NASA Astrophysics Data System (ADS)
Fritz, Martin E.; de la Chapelle, Michael; Van Ausdal, Arthur W.
1995-05-01
Boeing has successfully concluded a 2 1/2 year, two phase developmental contract for the STAR-Fiber Optic Data Bus (FODB) that is intended for future space-based applications. The first phase included system analysis, trade studies, behavior modeling, and architecture and protocal selection. During this phase we selected AS4074 Linear Token Passing Bus (LTPB) protocol operating at 200 Mbps, along with the passive, star-coupled fiber media. The second phase involved design, build, integration, and performance and environmental test of brassboard hardware. The resulting brassboard hardware successfully passed performance testing, providing 200 Mbps operation with a 32 X 32 star-coupled medium. This hardware is suitable for a spaceflight experiment to validate ground testing and analysis and to demonstrate performace in the intended environment. The fiber bus interface unit (FBIU) is a multichip module containing transceiver, protocol, and data formatting chips, buffer memory, and a station management controller. The FBIU has been designed for low power, high reliability, and radiation tolerance. Nine FBIUs were built and integrated with the fiber optic physical layer consisting of the fiber cable plant (FCP) and star coupler assembly (SCA). Performance and environmental testing, including radiation exposure, was performed on selected FBIUs and the physical layer. The integrated system was demonstrated with a full motion color video image transfer across the bus while simultaneously performing utility functions with a fiber bus control module (FBCM) over a telemetry and control (T&C) bus, in this case AS1773.
Tang, Jessica A; Scheer, Justin K; Ames, Christopher P; Buckley, Jenni M
2012-02-23
Pure moment testing has become a standard protocol for in vitro assessment of the effect of surgical techniques or devices on the bending rigidity of the spine. Of the methods used for pure moment testing, cable-driven set-ups are popular due to their low requirements and simple design. Fixed loading rings are traditionally used in conjunction with these cable-driven systems. However, the accuracy and validity of the loading conditions applied with fixed ring designs have raised some concern, and discrepancies have been found between intended and prescribed loading conditions for flexion-extension. This study extends this prior work to include lateral bending and axial torsion, and compares this fixed ring design with a novel "3D floating ring" design. A complete battery of multi-axial bending tests was conducted with both rings in multiple different configurations using an artificial lumbar spine. Applied moments were monitored and recorded by a multi-axial load cell at the base of the specimen. Results indicate that the fixed ring design deviates as much as 77% from intended moments and induces non-trivial shear forces (up to 18 N) when loaded to a non-destructive maximum of 4.5 Nm. The novel 3D floating ring design largely corrects the inherent errors in the fixed ring design by allowing additional directions of unconstrained motion and producing uniform loading conditions along the length of the specimen. In light of the results, it is suggested that the 3D floating ring set-up be used for future pure moment spine biomechanics applications using a cable-driven apparatus. Copyright © 2012 Elsevier Ltd. All rights reserved.
Modelling high data rate communication network access protocol
NASA Technical Reports Server (NTRS)
Khanna, S.; Foudriat, E. C.; Paterra, Frank; Maly, Kurt J.; Overstreet, C. Michael
1990-01-01
Modeling of high data rate communication systems is different from the low data rate systems. Three simulations were built during the development phase of Carrier Sensed Multiple Access/Ring Network (CSMA/RN) modeling. The first was a model using SIMCRIPT based upon the determination and processing of each event at each node. The second simulation was developed in C based upon isolating the distinct object that can be identified as the ring, the message, the node, and the set of critical events. The third model further identified the basic network functionality by creating a single object, the node which includes the set of critical events which occur at the node. The ring structure is implicit in the node structure. This model was also built in C. Each model is discussed and their features compared. It should be stated that the language used was mainly selected by the model developer because of his past familiarity. Further the models were not built with the intent to compare either structure or language but because the complexity of the problem and initial results contained obvious errors, so alternative models were built to isolate, determine, and correct programming and modeling errors. The CSMA/RN protocol is discussed in sufficient detail to understand modeling complexities. Each model is described along with its features and problems. The models are compared and concluding observations and remarks are presented.
The Simulation of Read-time Scalable Coherent Interface
NASA Technical Reports Server (NTRS)
Li, Qiang; Grant, Terry; Grover, Radhika S.
1997-01-01
Scalable Coherent Interface (SCI, IEEE/ANSI Std 1596-1992) (SCI1, SCI2) is a high performance interconnect for shared memory multiprocessor systems. In this project we investigate an SCI Real Time Protocols (RTSCI1) using Directed Flow Control Symbols. We studied the issues of efficient generation of control symbols, and created a simulation model of the protocol on a ring-based SCI system. This report presents the results of the study. The project has been implemented using SES/Workbench. The details that follow encompass aspects of both SCI and Flow Control Protocols, as well as the effect of realistic client/server processing delay. The report is organized as follows. Section 2 provides a description of the simulation model. Section 3 describes the protocol implementation details. The next three sections of the report elaborate on the workload, results and conclusions. Appended to the report is a description of the tool, SES/Workbench, used in our simulation, and internal details of our implementation of the protocol.
NASA Astrophysics Data System (ADS)
Chakrabartty, Shantanu; Feng, Tao; Aono, Kenji
2013-04-01
A key challenge in structural health monitoring (SHM) sensors embedded inside civil structures is that elec- tronics need to operate continuously such that mechanical events of interest can be detected and appropriately analyzed. Continuous operation however requires a continuous source of energy which cannot be guaranteed using conventional energy scavenging techniques. The paper describes a hybrid energy scavenging SHM sensor which experiences zero down-time in monitoring mechanical events of interest. At the core of the proposed sensor is an analog floating-gate storage technology that can be precisely programmed at nano-watt and pico- watt power levels. This facilitates self-powered, non-volatile data logging of the mechanical events of interest by scavenging energy directly from the mechanical events itself. Remote retrieval of the stored data is achieved using a commercial off-the-shelf Gen-2 radio-frequency identification (RFID) reader which periodically reads an electronic product code (EPC) that encapsulates the sensor data. The Gen-2 interface also facilitates in simultaneous remote access to multiple sensors and also facilitates in determining the range and orientation of the sensor. The architecture of the sensor is based on a token-ring topology which enables sensor channels to be dynamically added or deleted through software control.
NASA Astrophysics Data System (ADS)
Yun, Changho; Kim, Kiseon
2006-04-01
For the passive star-coupled wavelength-division multiple-access (WDMA) network, a modified accelerative preallocation WDMA (MAP-WDMA) media access control (MAC) protocol is proposed, which is based on AP-WDMA. To show the advantages of MAP-WDMA as an adequate MAC protocol for the network over AP-WDMA, the channel utilization, the channel-access delay, and the latency of MAP-WDMA are investigated and compared with those of AP-WDMA under various data traffic patterns, including uniform, quasi-uniform type, disconnected type, mesh type, and ring type data traffics, as well as the assumption that a given number of network stations is equal to that of channels, in other words, without channel sharing. As a result, the channel utilization of MAP-WDMA can be competitive with respect to that of AP-WDMA at the expense of insignificantly higher latency. Namely, if the number of network stations is small, MAP-WDMA provides better channel utilization for uniform, quasi-uniform-type, and disconnected-type data traffics at all data traffic loads, as well as for mesh and ring-type data traffics at low data traffic loads. Otherwise, MAP-WDMA only outperforms AP-WDMA for the first three data traffics at higher data traffic loads. In the aspect of channel-access delay, MAP-WDMA gives better performance than AP-WDMA, regardless of data traffic patterns and the number of network stations.
Word retrieval in picture descriptions produced by individuals with Alzheimer's disease
Kavé, Gitit; Goral, Mira
2016-01-01
What can tests of single-word production tell us about word retrieval in connected speech? We examined this question in 20 people with Alzheimer's disease (AD) and in 20 cognitively intact individuals. All participants completed tasks of picture naming and semantic fluency, and provided connected speech through picture descriptions. Picture descriptions were analyzed for total word output, percentages of content words, percentages of nouns, and percentages of pronouns out of all words, type-token ratio of all words and type-token ratio of nouns alone, mean frequency of all words and mean frequency of nouns alone, and mean word length. Individuals with AD performed worse than did cognitively intact individuals on the picture naming and semantic fluency tasks. They also produced a lower proportion of content words overall, a lower proportion of nouns, and a higher proportion of pronouns, as well as more frequent and shorter words on picture descriptions. Group differences in total word output and type-token ratios did not reach significance. Correlations between scores on tasks of single-word retrieval and measures of retrieval in picture descriptions emerged in the AD group but not in the control group. Scores on a picture naming task were associated with difficulties in word retrieval in connected speech in AD, while scores on a task of semantic verbal fluency were less useful in predicting measures of retrieval in context in this population. PMID:27171756
ERIC Educational Resources Information Center
Neubeck, Kenneth J.
1977-01-01
This paper describes and analyzes a token economy program in a mental hospital's chronic ward which was terminated because the institution cleaned out a substantial portion of its backward population. (Author/AM)
Neighborhood sampling: how many streets must an auditor walk?
McMillan, Tracy E; Cubbin, Catherine; Parmenter, Barbara; Medina, Ashley V; Lee, Rebecca E
2010-03-12
This study tested the representativeness of four street segment sampling protocols using the Pedestrian Environment Data Scan (PEDS) in eleven neighborhoods surrounding public housing developments in Houston, TX. The following four street segment sampling protocols were used (1) all segments, both residential and arterial, contained within the 400 meter radius buffer from the center point of the housing development (the core) were compared with all segments contained between the 400 meter radius buffer and the 800 meter radius buffer (the ring); all residential segments in the core were compared with (2) 75% (3) 50% and (4) 25% samples of randomly selected residential street segments in the core. Analyses were conducted on five key variables: sidewalk presence; ratings of attractiveness and safety for walking; connectivity; and number of traffic lanes. Some differences were found when comparing all street segments, both residential and arterial, in the core to the ring. Findings suggested that sampling 25% of residential street segments within the 400 m radius of a residence sufficiently represents the pedestrian built environment. Conclusions support more cost effective environmental data collection for physical activity research.
Near Theoretical Gigabit Link Efficiency for Distributed Data Acquisition Systems
Abu-Nimeh, Faisal T.; Choong, Woon-Seng
2017-01-01
Link efficiency, data integrity, and continuity for high-throughput and real-time systems is crucial. Most of these applications require specialized hardware and operating systems as well as extensive tuning in order to achieve high efficiency. Here, we present an implementation of gigabit Ethernet data streaming which can achieve 99.26% link efficiency while maintaining no packet losses. The design and implementation are built on OpenPET, an opensource data acquisition platform for nuclear medical imaging, where (a) a crate hosting multiple OpenPET detector boards uses a User Datagram Protocol over Internet Protocol (UDP/IP) Ethernet soft-core, that is capable of understanding PAUSE frames, to stream data out to a computer workstation; (b) the receiving computer uses Netmap to allow the processing software (i.e., user space), which is written in Python, to directly receive and manage the network card’s ring buffers, bypassing the operating system kernel’s networking stack; and (c) a multi-threaded application using synchronized queues is implemented in the processing software (Python) to free up the ring buffers as quickly as possible while preserving data integrity and flow continuity. PMID:28630948
Near Theoretical Gigabit Link Efficiency for Distributed Data Acquisition Systems.
Abu-Nimeh, Faisal T; Choong, Woon-Seng
2017-03-01
Link efficiency, data integrity, and continuity for high-throughput and real-time systems is crucial. Most of these applications require specialized hardware and operating systems as well as extensive tuning in order to achieve high efficiency. Here, we present an implementation of gigabit Ethernet data streaming which can achieve 99.26% link efficiency while maintaining no packet losses. The design and implementation are built on OpenPET, an opensource data acquisition platform for nuclear medical imaging, where (a) a crate hosting multiple OpenPET detector boards uses a User Datagram Protocol over Internet Protocol (UDP/IP) Ethernet soft-core, that is capable of understanding PAUSE frames, to stream data out to a computer workstation; (b) the receiving computer uses Netmap to allow the processing software (i.e., user space), which is written in Python, to directly receive and manage the network card's ring buffers, bypassing the operating system kernel's networking stack; and (c) a multi-threaded application using synchronized queues is implemented in the processing software (Python) to free up the ring buffers as quickly as possible while preserving data integrity and flow continuity.
Neighborhood sampling: how many streets must an auditor walk?
2010-01-01
This study tested the representativeness of four street segment sampling protocols using the Pedestrian Environment Data Scan (PEDS) in eleven neighborhoods surrounding public housing developments in Houston, TX. The following four street segment sampling protocols were used (1) all segments, both residential and arterial, contained within the 400 meter radius buffer from the center point of the housing development (the core) were compared with all segments contained between the 400 meter radius buffer and the 800 meter radius buffer (the ring); all residential segments in the core were compared with (2) 75% (3) 50% and (4) 25% samples of randomly selected residential street segments in the core. Analyses were conducted on five key variables: sidewalk presence; ratings of attractiveness and safety for walking; connectivity; and number of traffic lanes. Some differences were found when comparing all street segments, both residential and arterial, in the core to the ring. Findings suggested that sampling 25% of residential street segments within the 400 m radius of a residence sufficiently represents the pedestrian built environment. Conclusions support more cost effective environmental data collection for physical activity research. PMID:20226052
Koenrades, Maaike A; Klein, Almar; Leferink, Anne M; Slump, Cornelis H; Geelkerken, Robert H
2018-04-01
To provide insight into the evolution of the saddle-shaped proximal sealing rings of the Anaconda stent-graft after endovascular aneurysm repair (EVAR). Eighteen abdominal aortic aneurysm patients were consecutively enrolled in a single-center, prospective, observational cohort study (LSPEAS; Trialregister.nl identifier NTR4276). The patients were treated electively using an Anaconda stent-graft with a mean 31% oversizing (range 17-47). According to protocol, participants were to be followed for 2 years, during which 5 noncontrast electrocardiogram-gated computed tomography scans would be conducted. Three patients were eliminated within 30 days (1 withdrew, 1 died, and a third was converted before stent-graft deployment), leaving 15 patients (mean age 72.8±3.7 years; 14 men) for this analysis. Evolution in size and shape (symmetry) of both proximal infrarenal sealing rings were assessed from discharge to 24 months using dedicated postprocessing algorithms. At 24 months, the mean diameters of the first and second ring stents had increased significantly (first ring: 2.2±1.0 mm, p<0.001; second ring: 2.7±1.1 mm, p<0.001). At 6 months, the first and second rings had expanded to a mean 96.6%±2.1% and 94.8%±2.7%, respectively, of their nominal diameter, after which the rings expanded slowly; ring diameters stabilized to near nominal size (first ring, 98.3%±1.1%; second ring, 97.2%±1.4%) at 24 months irrespective of initial oversizing. No type I or III endoleaks or aneurysm-, device-, or procedure-related adverse events were noted in follow-up. The difference in the diametric distances between the peaks and valleys of the saddle-shaped rings was marked at discharge but became smaller after 24 months for both rings (first ring: median 2.0 vs 1.2 mm, p=0.191; second ring: median 2.8 vs 0.8 mm; p=0.013). Irrespective of initial oversizing, the Anaconda proximal sealing rings radially expanded to near nominal size within 6 months after EVAR. Initial oval-shaped rings conformed symmetrically and became nearly circular through 24 months. These findings should be taken into account in planning and follow-up.
Designing a Ring-VCO for RFID Transponders in 0.18 μm CMOS Process
Jalil, Jubayer; Reaz, Mamun Bin Ibne; Bhuiyan, Mohammad Arif Sobhan; Rahman, Labonnah Farzana; Chang, Tae Gyu
2014-01-01
In radio frequency identification (RFID) systems, performance degradation of phase locked loops (PLLs) mainly occurs due to high phase noise of voltage-controlled oscillators (VCOs). This paper proposes a low power, low phase noise ring-VCO developed for 2.42 GHz operated active RFID transponders compatible with IEEE 802.11 b/g, Bluetooth, and Zigbee protocols. For ease of integration and implementation of the module in tiny die area, a novel pseudodifferential delay cell based 3-stage ring oscillator has been introduced to fabricate the ring-VCO. In CMOS technology, 0.18 μm process is adopted for designing the circuit with 1.5 V power supply. The postlayout simulated results show that the proposed oscillator works in the tuning range of 0.5–2.54 GHz and dissipates 2.47 mW of power. It exhibits a phase noise of −126.62 dBc/Hz at 25 MHz offset from 2.42 GHz carrier frequency. PMID:24587731
Parker, Mark; Cunningham, Stuart; Enderby, Pam; Hawley, Mark; Green, Phil
2006-01-01
The STARDUST project developed robust computer speech recognizers for use by eight people with severe dysarthria and concomitant physical disability to access assistive technologies. Independent computer speech recognizers trained with normal speech are of limited functional use by those with severe dysarthria due to limited and inconsistent proximity to "normal" articulatory patterns. Severe dysarthric output may also be characterized by a small mass of distinguishable phonetic tokens making the acoustic differentiation of target words difficult. Speaker dependent computer speech recognition using Hidden Markov Models was achieved by the identification of robust phonetic elements within the individual speaker output patterns. A new system of speech training using computer generated visual and auditory feedback reduced the inconsistent production of key phonetic tokens over time.
Treatment of an assaultive, sensory-impaired adolescent through a multicomponent behavioral program.
Luiselli, J K
1984-03-01
This project examined the effects of a multicomponent behavioral treatment program on assaultive behavior in a deaf, visually-impaired adolescent boy. Two types of assaultiveness were monitored: aggression towards adults and destruction of the physical environment. Intervention consisted of a token economy system, a response cost procedure, a "relaxation" technique, and skill training sessions. Through use of a multiple baseline across behaviors design, it was demonstrated that differentially reinforcing the absence of target behaviors on a weekly basis was the crucial ingredient in the treatment package. During a maintenance programming phase, the boy was gradually weaned off the token system. At 1- and 2-year follow-ups, no aggressive or destructive acts had occurred and the boy was showing improved communication and interpersonal skills.
Absorbed dose-to-water protocol applied to synchrotron-generated x-rays at very high dose rates
NASA Astrophysics Data System (ADS)
Fournier, P.; Crosbie, J. C.; Cornelius, I.; Berkvens, P.; Donzelli, M.; Clavel, A. H.; Rosenfeld, A. B.; Petasecca, M.; Lerch, M. L. F.; Bräuer-Krisch, E.
2016-07-01
Microbeam radiation therapy (MRT) is a new radiation treatment modality in the pre-clinical stage of development at the ID17 Biomedical Beamline of the European synchrotron radiation facility (ESRF) in Grenoble, France. MRT exploits the dose volume effect that is made possible through the spatial fractionation of the high dose rate synchrotron-generated x-ray beam into an array of microbeams. As an important step towards the development of a dosimetry protocol for MRT, we have applied the International Atomic Energy Agency’s TRS 398 absorbed dose-to-water protocol to the synchrotron x-ray beam in the case of the broad beam irradiation geometry (i.e. prior to spatial fractionation into microbeams). The very high dose rates observed here mean the ion recombination correction factor, k s , is the most challenging to quantify of all the necessary corrections to apply for ionization chamber based absolute dosimetry. In the course of this study, we have developed a new method, the so called ‘current ramping’ method, to determine k s for the specific irradiation and filtering conditions typically utilized throughout the development of MRT. Using the new approach we deduced an ion recombination correction factor of 1.047 for the maximum ESRF storage ring current (200 mA) under typical beam spectral filtering conditions in MRT. MRT trials are currently underway with veterinary patients at the ESRF that require additional filtering, and we have estimated a correction factor of 1.025 for these filtration conditions for the same ESRF storage ring current. The protocol described herein provides reference dosimetry data for the associated Treatment Planning System utilized in the current veterinary trials and anticipated future human clinical trials.
Obliteration of symptomatic Schatzki rings with jumbo biopsy forceps (with video).
Gonzalez, A; Sullivan, M F; Bonder, A; Allison, H V; Bonis, P A; Guelrud, M
2014-01-01
A Schatzki ring is a submucosal, fibrotic thickening located at the gastroesophageal junction. Endoscopic treatment traditionally involves disruption of the ring. Many approaches have been described including bougies, balloons, biopsies, and diathermic monopolar incision. While all of these approaches are effective in the short-term, recurrence is common. The objective of our study was to evaluate the feasibility of complete excision of the ring using jumbo cold biopsy forceps. Our main outcome measurements were the feasibility, safety, and efficacy of complete obliteration of Schatzki rings using jumbo cold biopsy forceps. We designed an observational study using a standard protocol for patient management and data collection using a university hospital as our setting. We followed 10 patients with dysphagia due to a Schatzki's ring, six of whom had previously undergone bougienage or balloon dilation. Five patients were on maintenance therapy with a proton pump inhibitor and one with an H2 blocker. Complete endoscopic obliteration of the Schatzki rings with a cold jumbo biopsy forceps was achieved in all 10 patients requiring a mean of 9.8 biopsies (range 8-12). Omeprazole (20 mg twice daily) was prescribed after the procedure. All 10 patients demonstrated improvement in dysphagia after treatment, which persisted during a mean follow-up time of 379 days (range 63-496 days). There were no serious complications. The limitations of our study include lack of a control group, a small sample size, and being a single-institution study. We concluded that complete Schatzki ring obliteration with jumbo cold biopsy forceps is a safe, feasible, and effective endoscopic treatment. © 2014 International Society for Diseases of the Esophagus.
Smith, Amos B; Dong, Shuzhi
2009-03-05
An efficient, second-generation synthesis of the signature dioxabicyclo[3.2.1]octane core of (+)-sorangicin A (1), in conjunction with an effective, stereocontrolled protocol to arrive at the requisite (Z,Z,E)-triene acid system has been developed. Highlights of the core construction entail a three-component union, a KHMDS-promoted epoxide ring formation-ring opening cascade, a Takai olefination, and a chemoselective Sharpless dihydroxylation. Assembly of the triene acid system was then achieved via Stille cross-coupling with the ethyl ester of (Z,Z)-5-tributylstannyl-2,4-pentadienoic acid, followed by mild hydrolysis preserving the triene configuration.
The Hebrew CHILDES corpus: transcription and morphological analysis
Albert, Aviad; MacWhinney, Brian; Nir, Bracha
2014-01-01
We present a corpus of transcribed spoken Hebrew that reflects spoken interactions between children and adults. The corpus is an integral part of the CHILDES database, which distributes similar corpora for over 25 languages. We introduce a dedicated transcription scheme for the spoken Hebrew data that is sensitive to both the phonology and the standard orthography of the language. We also introduce a morphological analyzer that was specifically developed for this corpus. The analyzer adequately covers the entire corpus, producing detailed correct analyses for all tokens. Evaluation on a new corpus reveals high coverage as well. Finally, we describe a morphological disambiguation module that selects the correct analysis of each token in context. The result is a high-quality morphologically-annotated CHILDES corpus of Hebrew, along with a set of tools that can be applied to new corpora. PMID:25419199
Lucas, John A; Ivnik, Robert J; Smith, Glenn E; Ferman, Tanis J; Willis, Floyd B; Petersen, Ronald C; Graff-Radford, Neill R
2005-06-01
Normative data for older African Americans are presented for several clinical neuropsychological measures, including Boston Naming Test, Controlled Oral Word Association, Category Fluency, Token Test, WRAT-3 Reading, Trail Making Test, Stroop Color and Word Test, and Judgment of Line Orientation. Age-adjusted norms were derived from a sample of 309 cognitively normal, community-dwelling individuals, aged 56 through 94, participating in Mayo's Older African Americans Normative Studies (MOAANS). Years of education were modelled on age-scaled scores to derive regression Equations that may be applied for further demographic correction. These data should enhance interpretation of individual test performances and facilitate analysis of neuropsychological profile patterns in older African American patients who present for dementia evaluations.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davida, G.I.; Frankel, Y.; Matt, B.J.
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring securemore » hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.« less
NASA Technical Reports Server (NTRS)
Rasmussen, Robert D. (Inventor); Manning, Robert M. (Inventor); Lewis, Blair F. (Inventor); Bolotin, Gary S. (Inventor); Ward, Richard S. (Inventor)
1990-01-01
This is a distributed computing system providing flexible fault tolerance; ease of software design and concurrency specification; and dynamic balance of the loads. The system comprises a plurality of computers each having a first input/output interface and a second input/output interface for interfacing to communications networks each second input/output interface including a bypass for bypassing the associated computer. A global communications network interconnects the first input/output interfaces for providing each computer the ability to broadcast messages simultaneously to the remainder of the computers. A meshwork communications network interconnects the second input/output interfaces providing each computer with the ability to establish a communications link with another of the computers bypassing the remainder of computers. Each computer is controlled by a resident copy of a common operating system. Communications between respective ones of computers is by means of split tokens each having a moving first portion which is sent from computer to computer and a resident second portion which is disposed in the memory of at least one of computer and wherein the location of the second portion is part of the first portion. The split tokens represent both functions to be executed by the computers and data to be employed in the execution of the functions. The first input/output interfaces each include logic for detecting a collision between messages and for terminating the broadcasting of a message whereby collisions between messages are detected and avoided.
Bryngelson, Anna; Bacchus Hertzman, Jennie; Fritzell, Johan
2011-08-01
The aim of the study is to investigate whether the gender composition in workplaces is related to long-term sickness absence (LSA). We start off with Kanter's theory on ''tokenism,'' suggesting an increased risk of stress among minority groups (tokens), which, in turn, might increase the risk of ill health and LSA. The dataset consists of information obtained from the Swedish level of Living Survey (LNU) and the Swedish Establishment Survey (APU), linked to register-based data from the Swedish Social Insurance Agency. The longitudinal data is representative for the Swedish population and consists of 496 women and 566 men, aged 20-55 at baseline. Our study group consisted of employed persons in 1991 and we analyze, by means of piecewise constant intensity regressions, the first entry into LSA with a follow-up period of nine years. Compared with women in gender-integrated workplaces, women's risk of LSA is most elevated at both extremely male-dominated (0-20% females) and extremely female-dominated workplaces (80-100% females), although the result among women in the most male-dominated group did not reach statistical significance at the 5% level. Men's risk seems less varied by gender composition. The present study suggests that the gender composition in the workplace has an impact on the risk of LSA, especially among women. Our findings lend no support for Kanter's theory on the effects of being a token. Most likely, women's and men's different status positions have an impact on the different associations found.
Construction accident narrative classification: An evaluation of text mining techniques.
Goh, Yang Miang; Ubeynarayana, C U
2017-11-01
Learning from past accidents is fundamental to accident prevention. Thus, accident and near miss reporting are encouraged by organizations and regulators. However, for organizations managing large safety databases, the time taken to accurately classify accident and near miss narratives will be very significant. This study aims to evaluate the utility of various text mining classification techniques in classifying 1000 publicly available construction accident narratives obtained from the US OSHA website. The study evaluated six machine learning algorithms, including support vector machine (SVM), linear regression (LR), random forest (RF), k-nearest neighbor (KNN), decision tree (DT) and Naive Bayes (NB), and found that SVM produced the best performance in classifying the test set of 251 cases. Further experimentation with tokenization of the processed text and non-linear SVM were also conducted. In addition, a grid search was conducted on the hyperparameters of the SVM models. It was found that the best performing classifiers were linear SVM with unigram tokenization and radial basis function (RBF) SVM with uni-gram tokenization. In view of its relative simplicity, the linear SVM is recommended. Across the 11 labels of accident causes or types, the precision of the linear SVM ranged from 0.5 to 1, recall ranged from 0.36 to 0.9 and F1 score was between 0.45 and 0.92. The reasons for misclassification were discussed and suggestions on ways to improve the performance were provided. Copyright © 2017 Elsevier Ltd. All rights reserved.
Domínguez, Laura; van Nhien, Albert Nguyen; Tomassi, Cyrille; Len, Christophe; Postel, Denis; Marco-Contelles, José
2004-02-06
The carbanion-mediated sulfonate intramolecular cyclizations (CSIC protocols) of glyco-alpha-sulfonamidonitriles derived from readily available monosaccharides have been extensively investigated using potassium carbonate, cesium carbonate, n-BuLi, and LDA as bases. As a result, a series of enantiomerically pure spiro(4-amino-5-H-2,3-dihydroisothiazole-1,1-dioxide) derivatives have been prepared efficiently and isolated in good yield. The synthesis of these new bicyclic systems is key to accessing a novel range of aza analogues of TSAO nucleosides (ATSAOs).
Simple algorithm for improved security in the FDDI protocol
NASA Astrophysics Data System (ADS)
Lundy, G. M.; Jones, Benjamin
1993-02-01
We propose a modification to the Fiber Distributed Data Interface (FDDI) protocol based on a simple algorithm which will improve confidential communication capability. This proposed modification provides a simple and reliable system which exploits some of the inherent security properties in a fiber optic ring network. This method differs from conventional methods in that end to end encryption can be facilitated at the media access control sublayer of the data link layer in the OSI network model. Our method is based on a variation of the bit stream cipher method. The transmitting station takes the intended confidential message and uses a simple modulo two addition operation against an initialization vector. The encrypted message is virtually unbreakable without the initialization vector. None of the stations on the ring will have access to both the encrypted message and the initialization vector except the transmitting and receiving stations. The generation of the initialization vector is unique for each confidential transmission and thus provides a unique approach to the key distribution problem. The FDDI protocol is of particular interest to the military in terms of LAN/MAN implementations. Both the Army and the Navy are considering the standard as the basis for future network systems. A simple and reliable security mechanism with the potential to support realtime communications is a necessary consideration in the implementation of these systems. The proposed method offers several advantages over traditional methods in terms of speed, reliability, and standardization.
Wireless Sensor Network Quality of Service Improvement on Flooding Attack Condition
NASA Astrophysics Data System (ADS)
Hartono, R.; Widyawan; Wibowo, S. B.; Purnomo, A.; Hartatik
2018-03-01
There are two methods of building communication using wireless media. The first method is building a base infrastructure as an intermediary between users. Problems that arise on this type of network infrastructure is limited space to build any network physical infrastructure and also the cost factor. The second method is to build an ad hoc network between users who will communicate. On ad hoc network, each user must be willing to send data from source to destination for the occurrence of a communication. One of network protocol in Ad Hoc, Ad hoc on demand Distance Vector (AODV), has the smallest overhead value, easier to adapt to dynamic network and has small control message. One AODV protocol’s drawback is route finding process’ security for sending the data. In this research, AODV protocol is optimized by determining Expanding Ring Search (ERS) best value. Random topology is used with variation in the number of nodes: 25, 50, 75, 100, 125 and 150 with node’s speed of 10m/s in the area of 1000m x 1000m on flooding network condition. Parameters measured are Throughput, Packet Delivery Ratio, Average Delay and Normalized Routing Load. From the test results of AODV protocol optimization with best value of Expanding Ring Search (ERS), throughput increased by 5.67%, packet delivery ratio increased by 5.73%, and as for Normalized Routing Load decreased by 4.66%. ERS optimal value for each node’s condition depending on the number of nodes on the network.
Jurasekova, Z; Domingo, C; Garcia-Ramos, J V; Sanchez-Cortes, S
2014-07-07
In this work we report the study of the chemical modifications undergone by flavonoids, especially by quercetin (QUC), under alkaline conditions by UV-visible absorption, Raman and surface-enhanced Raman scattering (SERS) spectroscopy, the study was performed in aqueous solution and also on Ag nanoparticles (AgNPs). Several processes are involved in the effect of alkaline pH both in solution and on AgNPs: autoxidation affecting mainly the C-ring of the molecule and giving rise to the molecular fragmentation leading to simpler molecular products, and/or the dimerization and further polymerization leading to species with a higher molecular weight. In addition, there exists a clear structure-instability correlation concerning mainly particular groups in the molecule: the C3-OH group in the C-ring, the catechol moiety in the B-ring and the C2=C3 bond also existing in the C-ring. QUC possesses all these groups and exhibits high instability in alkaline solution. The SERS spectra registered at different pH revealed a change in the dimerization protocol of QUC going from the A- and C-rings-like-condensation to B-ring-like-condensation. Increasing the knowledge of the chemical properties of these compounds and determining the structure-activity relationship under specific environmental factors allow us to improve their beneficial properties for health as well as the preservation of Cultural Heritage objects, for example, by preventing their degradation.
Sabaté Del Río, Jonathan; Steylaerts, Tim; Henry, Olivier Y F; Bienstman, Peter; Stakenborg, Tim; Van Roy, Wim; O'Sullivan, Ciara K
2015-11-15
In this work we present the use of a silicon-on-insulator (SOI) chip featuring an array of 64 optical ring resonators used as refractive index sensors for real-time and label-free DNA detection. Single ring functionalisation was achieved using a click reaction after precise nanolitre spotting of specific hexynyl-terminated DNA capture probes to link to an azido-silanised chip surface. To demonstrate detectability using the ring resonators and to optimise conditions for solid-phase amplification, hybridisation between short 25-mer single stranded DNA (ssDNA) fragments and a complementary capture probe immobilised on the surface of the ring resonators was carried out and detected through the shift in the resonant wavelength. Using the optimised conditions demonstrated via the solid-phase hybridisation, a 144-bp double stranded DNA (dsDNA) was then detected directly using recombinase and polymerase proteins through on-chip target amplification and solid-phase elongation of immobilised forward primers on specific rings, at a constant temperature of 37°C and in less than 60min, achieving a limit of detection of 7.8·10(-13)M (6·10(5) copies in 50µL). The use of an automatic liquid handler injection instrument connected to an integrated resealable chip interface (RCI) allowed programmable multiple injection protocols. Air plugs between different solutions were introduced to prevent intermixing and a proportional-integral-derivative (PID) temperature controller minimised temperature based drifts. Published by Elsevier B.V.
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
NASA Astrophysics Data System (ADS)
Mannan, Mohammad; van Oorschot, P. C.
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users' financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user's long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The user's long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a user's long-term secrets to a client PC only after encrypting the secrets using a pre-installed, "correct" public key of a remote service (the intended recipient of the secrets). The proposed protocol (
30. Underside of tracks showing columns, concreteencased Ibeams, and ramps ...
30. Underside of tracks showing columns, concrete-encased I-beams, and ramps near token booths at street level. Looking southeast. - Stillwell Avenue Station, Intersection of Stillwell & Surf Avenues, Brooklyn, Kings County, NY
DOT National Transportation Integrated Search
1976-08-01
Fare prepayment encompasses all methods of paying for transit rides other than by cash, namely, tickets, tokens, punch cards, passes, and permits. The purpose of this study is the examination of the overall ridership and revenue impacts of ongoing an...
Optimizing the design of a reproduction toxicity test with the pond snail Lymnaea stagnalis.
Charles, Sandrine; Ducrot, Virginie; Azam, Didier; Benstead, Rachel; Brettschneider, Denise; De Schamphelaere, Karel; Filipe Goncalves, Sandra; Green, John W; Holbech, Henrik; Hutchinson, Thomas H; Faber, Daniel; Laranjeiro, Filipe; Matthiessen, Peter; Norrgren, Leif; Oehlmann, Jörg; Reategui-Zirena, Evelyn; Seeland-Fremer, Anne; Teigeler, Matthias; Thome, Jean-Pierre; Tobor Kaplon, Marysia; Weltje, Lennart; Lagadic, Laurent
2016-11-01
This paper presents the results from two ring-tests addressing the feasibility, robustness and reproducibility of a reproduction toxicity test with the freshwater gastropod Lymnaea stagnalis (RENILYS strain). Sixteen laboratories (from inexperienced to expert laboratories in mollusc testing) from nine countries participated in these ring-tests. Survival and reproduction were evaluated in L. stagnalis exposed to cadmium, tributyltin, prochloraz and trenbolone according to an OECD draft Test Guideline. In total, 49 datasets were analysed to assess the practicability of the proposed experimental protocol, and to estimate the between-laboratory reproducibility of toxicity endpoint values. The statistical analysis of count data (number of clutches or eggs per individual-day) leading to ECx estimation was specifically developed and automated through a free web-interface. Based on a complementary statistical analysis, the optimal test duration was established and the most sensitive and cost-effective reproduction toxicity endpoint was identified, to be used as the core endpoint. This validation process and the resulting optimized protocol were used to consolidate the OECD Test Guideline for the evaluation of reproductive effects of chemicals in L. stagnalis. Copyright © 2016 Elsevier Inc. All rights reserved.
Anatomy of the Limbic White Matter Tracts as Revealed by Fiber Dissection and Tractography.
Pascalau, Raluca; Popa Stănilă, Roxana; Sfrângeu, Silviu; Szabo, Bianca
2018-05-01
The limbic tracts are involved in crucial cerebral functions such as memory, emotion, and behavior. The complex architecture of the limbic circuit makes it harder to approach compared with other white matter networks. Our study aims to describe the 3-dimensional anatomy of the limbic white matter by the use of 2 complementary study methods, namely ex vivo fiber dissection and in vivo magnetic resonance imaging-based tractography. Three fiber dissection protocols were performed using blunt wooden instruments and a surgical microscope on formalin-fixed brains prepared according to the Klingler method. Diffusion tensor imaging acquisitions were done with a 3-Tesla magnetic resonance scanner on patients with head and neck pathology that did not involve the brain. Fiber tracking was performed with manually selected regions of interest. Cingulum, fornix, the anterior thalamic peduncle, the accumbofrontal bundle, medial forebrain bundle, the uncinate fasciculus, the mammillothalamic tract, ansa peduncularis, and stria terminalis were dissected and fiber tracked. For each tract, location, configuration, segmentation, dimensions, dissection and tractography particularities, anatomical relations, and terminations are described. The limbic white matter tracts were systematized as 2 concentric rings around the thalamus. The inner ring is formed by fornix, mammillothalamic tract, ansa peduncularis, stria terminalis, accumbofrontal fasciculus, and medial forebrain bundle and anterior thalamic peduncle, and the outer ring is formed by the cingulum and uncinate fasciculus. This paper proposes a fiber-tracking protocol for the limbic tracts inspired and validated by fiber dissection findings that can be used routinely in the clinical practice. Copyright © 2018 Elsevier Inc. All rights reserved.
The free energy of locking a ring: Changing a deoxyribonucleoside to a locked nucleic acid.
Xu, You; Villa, Alessandra; Nilsson, Lennart
2017-06-05
Locked nucleic acid (LNA), a modified nucleoside which contains a bridging group across the ribose ring, improves the stability of DNA/RNA duplexes significantly, and therefore is of interest in biotechnology and gene therapy applications. In this study, we investigate the free energy change between LNA and DNA nucleosides. The transformation requires the breaking of the bridging group across the ribose ring, a problematic transformation in free energy calculations. To address this, we have developed a 3-step (easy to implement) and a 1-step protocol (more efficient, but more complicated to setup), for single and dual topologies in classical molecular dynamics simulations, using the Bennett Acceptance Ratio method to calculate the free energy. We validate the approach on the solvation free energy difference for the nucleosides thymidine, cytosine, and 5-methyl-cytosine. © 2017 The Authors. Journal of Computational Chemistry Published by Wiley Periodicals, Inc. © 2017 The Authors. Journal of Computational Chemistry Published by Wiley Periodicals, Inc.
16 CFR 1508.9 - Identifying marks, warning statement, and compliance declaration.
Code of Federal Regulations, 2011 CFR
2011-01-01
... shall appear in block letters, shall contrast sharply with the background (by color, projection, and/or... affixed, fastened, or attached thereto by means of a tag, token, or other suitable medium. The markings...
37 CFR 254.2 - Definition of coin-operated phonorecord player.
Code of Federal Regulations, 2010 CFR
2010-07-01
...-OPERATED PHONORECORD PLAYERS § 254.2 Definition of coin-operated phonorecord player. As used in this part..., currency, tokens, or other monetary units or their equivalent; (b) Is located in an establishment making no...
Horton-Ikard, RaMonda; Miller, Jon F
2004-01-01
This study examined the production of African-American English (AAE) forms produced by 69 school-aged African-American children from middle socio-economic status (SES) communities to determine if age would influence: (a) the number of different types of AAE tokens and (b) the rate of dialect. Descriptive data revealed that there were more than 20 AAE morpho-syntactic forms collectively used by the children. The findings also indicated that factors of age, gender, and sampling context interacted in a variety of ways to influence these children's production of the number of different types of AAE tokens, and the rate of dialect. Readers should have (1) an increased awareness about the use of AAE forms in school-age children from middle SES homes; (2) a greater understanding of how the production of AAE might be influenced by age, gender, and sampling context.
Obtaining correct compile results by absorbing mismatches between data types representations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Horie, Michihiro; Horii, Hiroshi H.; Kawachiya, Kiyokuni
Methods and a system are provided. A method includes implementing a function, which a compiler for a first language does not have, using a compiler for a second language. The implementing step includes generating, by the compiler for the first language, a first abstract syntax tree. The implementing step further includes converting, by a converter, the first abstract syntax tree to a second abstract syntax tree of the compiler for the second language using a conversion table from data representation types in the first language to data representation types in the second language. When a compilation error occurs, the implementingmore » step also includes generating a special node for error processing in the second abstract syntax tree and storing an error token in the special node. When unparsing, the implementing step additionally includes outputting the error token, in the form of source code written in the first language.« less
Obtaining correct compile results by absorbing mismatches between data types representations
Horie, Michihiro; Horii, Hiroshi H.; Kawachiya, Kiyokuni; Takeuchi, Mikio
2017-03-21
Methods and a system are provided. A method includes implementing a function, which a compiler for a first language does not have, using a compiler for a second language. The implementing step includes generating, by the compiler for the first language, a first abstract syntax tree. The implementing step further includes converting, by a converter, the first abstract syntax tree to a second abstract syntax tree of the compiler for the second language using a conversion table from data representation types in the first language to data representation types in the second language. When a compilation error occurs, the implementing step also includes generating a special node for error processing in the second abstract syntax tree and storing an error token in the special node. When unparsing, the implementing step additionally includes outputting the error token, in the form of source code written in the first language.
Obtaining correct compile results by absorbing mismatches between data types representations
Horie, Michihiro; Horii, Hiroshi H.; Kawachiya, Kiyokuni; Takeuchi, Mikio
2017-11-21
Methods and a system are provided. A method includes implementing a function, which a compiler for a first language does not have, using a compiler for a second language. The implementing step includes generating, by the compiler for the first language, a first abstract syntax tree. The implementing step further includes converting, by a converter, the first abstract syntax tree to a second abstract syntax tree of the compiler for the second language using a conversion table from data representation types in the first language to data representation types in the second language. When a compilation error occurs, the implementing step also includes generating a special node for error processing in the second abstract syntax tree and storing an error token in the special node. When unparsing, the implementing step additionally includes outputting the error token, in the form of source code written in the first language.
Green, K P; Gerdeman, A
1995-12-01
Two experiments examined the impact of a discrepancy in vowel quality between the auditory and visual modalities on the perception of a syllable-initial consonant. One experiment examined the effect of such a discrepancy on the McGurk effect by cross-dubbing auditory /bi/ tokens onto visual /ga/ articulations (and vice versa). A discrepancy in vowel category significantly reduced the magnitude of the McGurk effect and changed the pattern of responses. A 2nd experiment investigated the effect of such a discrepancy on the speeded classification of the initial consonant. Mean reaction times to classify the tokens increased when the vowel information was discrepant between the 2 modalities but not when the vowel information was consistent. These experiments indicate that the perceptual system is sensitive to cross-modal discrepancies in the coarticulatory information between a consonant and its following vowel during phonetic perception.
Comparison of Grouping Methods for Template Extraction from VA Medical Record Text.
Redd, Andrew M; Gundlapalli, Adi V; Divita, Guy; Tran, Le-Thuy; Pettey, Warren B P; Samore, Matthew H
2017-01-01
We investigate options for grouping templates for the purpose of template identification and extraction from electronic medical records. We sampled a corpus of 1000 documents originating from Veterans Health Administration (VA) electronic medical record. We grouped documents through hashing and binning tokens (Hashed) as well as by the top 5% of tokens identified as important through the term frequency inverse document frequency metric (TF-IDF). We then compared the approaches on the number of groups with 3 or more and the resulting longest common subsequences (LCSs) common to all documents in the group. We found that the Hashed method had a higher success rate for finding LCSs, and longer LCSs than the TF-IDF method, however the TF-IDF approach found more groups than the Hashed and subsequently more long sequences, however the average length of LCSs were lower. In conclusion, each algorithm appears to have areas where it appears to be superior.
Peña-Casanova, Jordi; Quiñones-Ubeda, Sonia; Gramunt-Fombuena, Nina; Aguilar, Miquel; Casas, Laura; Molinuevo, José Luis; Robles, Alfredo; Rodríguez, Dolores; Barquero, María Sagrario; Antúnez, Carmen; Martínez-Parra, Carlos; Frank-García, Anna; Fernández, Manuel; Molano, Ana; Alfonso, Verónica; Sol, Josep M; Blesa, Rafael
2009-06-01
As part of the Spanish Multicenter Normative Studies (NEURONORMA project), we provide age- and education-adjusted norms for the Boston naming test and Token test. The sample consists of 340 and 348 participants, respectively, who are cognitively normal, community-dwelling, and ranging in age from 50 to 94 years. Tables are provided to convert raw scores to age-adjusted scaled scores. These were further converted into education-adjusted scaled scores by applying regression-based adjustments. Age and education affected the score of the both tests, but sex was found to be unrelated to naming and verbal comprehension efficiency. Our norms should provide clinically useful data for evaluating elderly Spaniards. The normative data presented here were obtained from the same study sample as all the other NEURONORMA norms and the same statistical procedures for data analyses were applied. These co-normed data allow clinicians to compare scores from one test with all tests.
Ilizarov ring fixator for a difficult case of ankle syndesmosis disruption.
Relwani, Jaikumar; Lahoti, Om; Orakwe, Sam
2002-01-01
Syndesmotic stabilization is recommended for tibiofibular diastasis, a Maisonneuve fracture, or syndesmotic instability after fixation of distal tibia-fibula fractures. In the case presented, a syndesmotic stabilization was performed with a screw inserted 2 cm above the tibiotalar joint Subsequent failure occurred due to the weight of the patient and a lack of compliance with the necessary nonweight bearing protocol. The Ilizarov frame was used to reduce and maintain a stable syndesmosis with a simple two-ring construct which allowed the patient to bear weight on the injured limb while his syndesmosis healed. This is not recommend as a routine method of treatment, but is presented as an extended indication of the Ilizarov frame for difficult cases.
National survey of Filipinos on acceptance of incentivized organ donation.
Danguilan, R A; De Belen-Uriarte, R; Jorge, S L; Lesaca, R J; Amarillo, M L L; Ampil, R S; Ona, E T
2012-05-01
The increasing number of patients requiring transplantation has brought about a shortage of donor kidneys. Incentives can potentially improve organ donation. There is a need to know if the public can accept incentivized organ donation. To evaluate knowledge and opinions on organ donation and compensating the donor/donor family and to determine factors affecting consent. The third survey in 2009 covered 15 regions, 29 provinces, and 14 cities in the National Capital Region. There were 1500 respondents interviewed using a structured questionnaire. Analysis used Statistical Package for Social Science and chi-square. Of the respondents, 63% were females and 74% were married. Nearly half were between 26 and 45 years old. Fewer than 5% were unschooled. Monthly household income was less than USD $222.00 in 70% of respondents. A majority knew about donation from 2001 to 2009. Fewer than 20% knew about deceased donors. Those who wanted to become donors decreased. Sixty-five percent were willing to donate a brain-dead relative's organs. Respondents felt that kidney donors deserve a token of gratitude. Options included livelihood (32%), cash (31%), and educational assistance (26%). Sixty percent wanted the donor assistance termed a "token of gratitude." Consent for donation was positively correlated (P < .05) with higher education and monthly income. Awareness on organ transplantation and donation increased. Factors that promote organ donation are higher education and monthly income. A majority of Filipinos felt that the donor deserves a token of gratitude. Public acceptance of incentivized organ donation may be pursued. Strategies to improve the national advocacy campaign for deceased donation are needed. Copyright © 2012 Elsevier Inc. All rights reserved.
Groza, Tudor; Verspoor, Karin
2015-01-01
Concept recognition (CR) is a foundational task in the biomedical domain. It supports the important process of transforming unstructured resources into structured knowledge. To date, several CR approaches have been proposed, most of which focus on a particular set of biomedical ontologies. Their underlying mechanisms vary from shallow natural language processing and dictionary lookup to specialized machine learning modules. However, no prior approach considers the case sensitivity characteristics and the term distribution of the underlying ontology on the CR process. This article proposes a framework that models the CR process as an information retrieval task in which both case sensitivity and the information gain associated with tokens in lexical representations (e.g., term labels, synonyms) are central components of a strategy for generating term variants. The case sensitivity of a given ontology is assessed based on the distribution of so-called case sensitive tokens in its terms, while information gain is modelled using a combination of divergence from randomness and mutual information. An extensive evaluation has been carried out using the CRAFT corpus. Experimental results show that case sensitivity awareness leads to an increase of up to 0.07 F1 against a non-case sensitive baseline on the Protein Ontology and GO Cellular Component. Similarly, the use of information gain leads to an increase of up to 0.06 F1 against a standard baseline in the case of GO Biological Process and Molecular Function and GO Cellular Component. Overall, subject to the underlying token distribution, these methods lead to valid complementary strategies for augmenting term label sets to improve concept recognition.
Thura, David; Cos, Ignasi; Trung, Jessica; Cisek, Paul
2014-12-03
Speed-accuracy tradeoffs (SATs) exist in both decision-making and movement control, and are generally studied separately. However, in natural behavior animals are free to adjust the time invested in deciding and moving so as to maximize their reward rate. Here, we investigate whether shared mechanisms exist for SAT adjustment in both decisions and actions. Two monkeys performed a reach decision task in which they watched 15 tokens jump, one every 200 ms, from a central circle to one of two peripheral targets, and had to guess which target would ultimately receive the majority of tokens. The monkeys could decide at any time, and once a target was reached, the remaining token movements accelerated to either 50 ms ("fast" block) or 150 ms ("slow" block). Decisions were generally earlier and less accurate in fast than slow blocks, and in both blocks, the criterion of accuracy decreased over time within each trial. This could be explained by a simple model in which sensory information is combined with a linearly growing urgency signal. Remarkably, the duration of the reaching movements produced after the decision decreased over time in a similar block-dependent manner as the criterion of accuracy estimated by the model. This suggests that SATs for deciding and acting are influenced by a shared urgency/vigor signal. Consistent with this, we observed that the vigor of saccades performed during the decision process was higher in fast than in slow blocks, suggesting the influence of a context-dependent global arousal. Copyright © 2014 the authors 0270-6474/14/3416442-13$15.00/0.
Chmielewski, Danielle; Bove, Liliana L; Lei, Jing; Neville, Ben; Nagpal, Anish
2012-09-01
The Motivation Crowding-out Theory suggests that incentives undermine intrinsic motivation and thus blood donation behavior. While there is strong evidence showing the negative relationship between monetary incentives and blood donation, findings on the effect of nonmonetary incentives are mixed. Set in a voluntary, nonremunerated environment, this study explores aspects of the nonmonetary incentive-blood donation relationship not captured by the crowding-out hypothesis. In-depth interviews were conducted to explore donors' attitudes toward nonmonetary incentives currently used or considered by the Australian Red Cross Blood Service (Blood Service). Transcripts were analyzed using an inductive, thematic approach. Of the nonmonetary incentives examined (i.e., health screening tests, branded tokens, paid time off work, recognition of key milestones, and postdonation refreshments), none were found to crowd out intrinsic motivation, although not all were viewed favorably. Donors who viewed branded tokens negatively considered the cost implications for the Blood Service, while donors who responded positively considered the public benefit of tokens in raising the profile of the Blood Service. Other nonmonetary incentives-paid time off work, postdonation refreshments, and health screening tests-were viewed positively because donors perceived them to be congruent to the effort expended in donating blood. Finally, donors expressed a preference for private over public recognition when acknowledging significant contributions. When operating in a voluntary, nonremunerated environment, blood services should view donors as supply partners rather than customers, only consider nonmonetary incentives that are congruent with the act of donation, and provide private rather than public recognition of key milestones. © 2012 American Association of Blood Banks.
Coelho, Luzia Flavia; Barbosa, Deise Lima Fernandes; Rizzutti, Sueli; Muszkat, Mauro; Bueno, Orlando Francisco Amodeo; Miranda, Monica Carolina
2015-01-01
Medication has proved highly efficacious as a means of alleviating general symptoms of attention-deficit hyperactivity disorder (ADHD). However, many patients remain functionally impaired by inappropriate behavior. The present study analyzed the use of cognitive behavioral therapy (CBT) with the Token-Economy (TE) technique to alleviate problem behavior for 25 participants with ADHD, all children (19 boys, mean age 10.11) on long-term methylphenidate medication, who were given 20 CBT sessions with 10 weeks of TE introduced as of session 5. Their ten most acute problem behaviors were selected and written records kept. On weekdays, parents recorded each inappropriate behavior and provided a suitable model for their actions. At weekly sessions, problem behaviors were counted and incident-free participants rewarded with a token. To analyze improvement (less frequent problem behavior), a list of 11 behavioral categories was rated: inattention, impulsivity, hyperactivity, disorganization, disobeying rules and routines, poor self-care, verbal/physical aggression, low frustration tolerance, compulsive behavior, antisocial behavior, lacking in initiative and distraction. Two CBT specialists categorized behaviors and an ADHD specialist ruled on discrepancies. Statistical analyses used were Generalized Estimating Equations with Poisson distribution and autoregressive order correlation structure. In the course of the sessions, problematic behaviors decreased significantly in seven categories: impulsiveness, hyperactivity, disorganization, disobeying rules and routine, poor self-care, low frustration tolerance, compulsive behaviors, and antisocial behaviors. Caregiver attitudes to children's inappropriate behavior were discussed and reshaped. As functional improvement was observed on applying TE for 10 weeks, this type of intervention may be useful as an auxiliary strategy combined with medication.
Functional Lateralization of Speech Processing in Adults and Children Who Stutter
Sato, Yutaka; Mori, Koichi; Koizumi, Toshizo; Minagawa-Kawai, Yasuyo; Tanaka, Akihiro; Ozawa, Emi; Wakaba, Yoko; Mazuka, Reiko
2011-01-01
Developmental stuttering is a speech disorder in fluency characterized by repetitions, prolongations, and silent blocks, especially in the initial parts of utterances. Although their symptoms are motor related, people who stutter show abnormal patterns of cerebral hemispheric dominance in both anterior and posterior language areas. It is unknown whether the abnormal functional lateralization in the posterior language area starts during childhood or emerges as a consequence of many years of stuttering. In order to address this issue, we measured the lateralization of hemodynamic responses in the auditory cortex during auditory speech processing in adults and children who stutter, including preschoolers, with near-infrared spectroscopy. We used the analysis–resynthesis technique to prepare two types of stimuli: (i) a phonemic contrast embedded in Japanese spoken words (/itta/ vs. /itte/) and (ii) a prosodic contrast (/itta/ vs. /itta?/). In the baseline blocks, only /itta/ tokens were presented. In phonemic contrast blocks, /itta/ and /itte/ tokens were presented pseudo-randomly, and /itta/ and /itta?/ tokens in prosodic contrast blocks. In adults and children who do not stutter, there was a clear left-hemispheric advantage for the phonemic contrast compared to the prosodic contrast. Adults and children who stutter, however, showed no significant difference between the two stimulus conditions. A subject-by-subject analysis revealed that not a single subject who stutters showed a left advantage in the phonemic contrast over the prosodic contrast condition. These results indicate that the functional lateralization for auditory speech processing is in disarray among those who stutter, even at preschool age. These results shed light on the neural pathophysiology of developmental stuttering. PMID:21687442
Physical basics of endovenous laser treatment and potential of innovative developments
NASA Astrophysics Data System (ADS)
Sroka, R.; Esipova, A.; Schmedt, C. G.
2017-04-01
During the last decade, endoluminal laser treatment (ELT) has been rapidly developing. Protocols using radially emitting ELT fibres in combination with infrared laser light show clinical advantages over the bare-fibre technique and near infrared irradiation. Although the clinical response rate is high several side effects occurred. Innovative light application systems and feedback systems are therefore being under development to potentially improve the clinical situation. The irradiation patterns of bare fibres and radially emitting 1-ring and 2-ring fibres were measured using the goniometer technique. The device robustness, device handling and tissue effects were investigated using the established ox-foot-model. Furthermore, temperature measurements were performed either intraluminal within the irradiation field using a tiny temperature sensor and on the outer surface of the vessel wall by means of a thermocamera. All fibres showed sufficient mechanical and thermal robustness. The destruction threshold is far beyond the light powers employed during clinical application. The 1-ring fibre showed very high peak temperatures for a short time, while the 2-ring-fibre hold its somewhat lower maximum temperature for a longer time. Both forms of energy application resulted in the desired shrinkage and destruction effect. In this regard, the handling of the 2-ring fibre appears subjectively more convenient with reduced sticking-related problems. Acute tissue effects could be investigated to improve the understanding especially of the interaction between handling, maneuvers and tissue effects. The 2-ring radially emitting fibre in combination with IR laser light and specific application parameters showed improved handling and safety features.
A Cashless Society? The Plastic Revolution. Resources in Technology.
ERIC Educational Resources Information Center
Ritz, John M.
1993-01-01
Relates the history of credit cards, their evolution to current forms, and innovations (debit cards, token cards, smart cards). Considers their sociocultural impact. Provides a design brief, including objectives, resources, evaluation criteria, outcomes, and a quiz. (SK)
16 CFR 1509.11 - Identifying marks, caution statement, and compliance declaration.
Code of Federal Regulations, 2011 CFR
2011-01-01
... shall appear in block letters, shall contrast sharply with the background (by color, projection, and/or..., fastened, or attached thereto by means of a tag, token, or other suitable medium. The markings shall not be...
16 CFR 1509.11 - Identifying marks, caution statement, and compliance declaration.
Code of Federal Regulations, 2010 CFR
2010-01-01
... shall appear in block letters, shall contrast sharply with the background (by color, projection, and/or..., fastened, or attached thereto by means of a tag, token, or other suitable medium. The markings shall not be...
Challenges of Working in a Multicultural Environment.
ERIC Educational Resources Information Center
Howland, Joan S.
2001-01-01
Addresses challenges faced when working in a multicultural library setting and discusses the need for library administration to create supportive environments. Highlights include fluctuating power dynamics; merging diverse opinions and approaches; overcoming perceived lack of empathy; tokenism; accountability; and transforming challenges into…
Evaluation of Deep Discount Fare Strategies
DOT National Transportation Integrated Search
1995-08-01
This report evaluates the success of a fare pricing strategy known as deep discounting, that entails the bulk sale of transit tickets or tokens to customers at a significant discount compared to the full fare single ticket price. This market-driven s...
Student Participation in Governance
ERIC Educational Resources Information Center
Deegan, William L.; And Others
1970-01-01
The success of student government activities on any campus is significantly affected by the amount of student participation permitted in the institution's decision-making processes. The traditional" model of government--characterized by tokenism--often results in the separate jurisdictions" model-- characterized by fragmentation and interest…
The Importance of the Act of Going: Towards Gender Inclusive Education.
ERIC Educational Resources Information Center
Rowan, Leonie
1997-01-01
Reviews factors influencing the desire for gender-inclusive educational environments; identifies common responses (token equity, homogenization of women, arguments that women are the same as/different from men). Gives examples of obstacles encountered by profeminist educators. (SK)
Insider Threat Attributes and Mitigation Strategies
2013-07-01
Monitor and Control External Access and Data Downloads Organizations commonly use Virtual Private Networks (VPNs) for teleworking , allowing...gateways—An added benefit of two-factor authentication is that the access token can be collected if the employee leaves the organization. Without the
21 CFR 1311.102 - Practitioner responsibilities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... the password or other knowledge factor, or biometric information, with any other person. The... hard token, knowledge factor, or biometric information may provide a basis for revocation or suspension... organization has found that the electronic prescription application records, stores, and transmits the...
21 CFR 1311.102 - Practitioner responsibilities.
Code of Federal Regulations, 2013 CFR
2013-04-01
... the password or other knowledge factor, or biometric information, with any other person. The... hard token, knowledge factor, or biometric information may provide a basis for revocation or suspension... organization has found that the electronic prescription application records, stores, and transmits the...
21 CFR 1311.102 - Practitioner responsibilities.
Code of Federal Regulations, 2014 CFR
2014-04-01
... the password or other knowledge factor, or biometric information, with any other person. The... hard token, knowledge factor, or biometric information may provide a basis for revocation or suspension... organization has found that the electronic prescription application records, stores, and transmits the...
21 CFR 1311.102 - Practitioner responsibilities.
Code of Federal Regulations, 2012 CFR
2012-04-01
... the password or other knowledge factor, or biometric information, with any other person. The... hard token, knowledge factor, or biometric information may provide a basis for revocation or suspension... organization has found that the electronic prescription application records, stores, and transmits the...
NASA Astrophysics Data System (ADS)
Udhaya Kumar, C.; Sethukumar, A.; Agilandeshwari, R.; Arul Prakasam, B.; Vidhyasagar, T.; Sillanpää, Mika
2014-02-01
An efficient and multifunctional three component synthetic protocol was developed to synthesize ethyl 6-amino-4-aryl-5-cyano-2-propyl-4H-pyran-3-carboxylates from ethyl 3-oxohexanoate, malononitrile and corresponding aldehydes (1a-11a) using K2CO3 as a catalyst under water solvent in good yields. The derived compounds have been analyzed by IR and NMR (1D and 2D) spectra. Single crystal X-ray structural analysis of 2a, evidences the flattened-boat conformation of pyran ring and the phenyl group is nearly perpendicular to the pyran ring.
SnAP reagents for the one-step synthesis of medium-ring saturated N-heterocycles from aldehydes
NASA Astrophysics Data System (ADS)
Vo, Cam-Van T.; Luescher, Michael U.; Bode, Jeffrey W.
2014-04-01
Interest in saturated N-heterocycles as scaffolds for the synthesis of bioactive molecules is increasing. Reliable and predictable synthetic methods for the preparation of these compounds, especially medium-sized rings, are limited. We describe the development of SnAP (Sn amino protocol) reagents for the transformation of aldehydes into seven-, eight- and nine-membered saturated N-heterocycles. This process occurs under mild, room-temperature conditions and offers exceptional substrate scope and functional-group tolerance. Air- and moisture-stable SnAP reagents are prepared on a multigram scale from inexpensive starting materials by simple reaction sequences. These new reagents and processes allow widely available aryl, heteroaryl and aliphatic aldehydes to be converted into diverse N-heterocycles, including diazepanes, oxazepanes, diazocanes, oxazocanes and hexahydrobenzoxazonines, by a single synthetic operation.
Rizzo, Antonio; Trauner, Dirk
2018-04-06
An approach toward (-)-enterocin, an antibiotic isolated from Streptomyces hygroscopicus, is described. Its compact, heavily oxidized protoadamantane core represents a daunting challenge for an efficient synthesis. Convergent assembly of its 2-oxabicyclo[3.3.1]nonane core with a cuprate-mediated Barbier reaction is disclosed. Its functionalization to a suitable substrate for a biomimetic aldol to close the final ring of the natural product is evaluated.
2017-01-01
65 5-15. Dissolved oxygen and temperature data from T = 34 month (2015) post-remedy...Continuous measurements of dissolved oxygen and temperature in SEA Ring chambers placed at 3-meter depth at Chollas Creek mouth (CC1-B) and adjacent to...which the organisms would be exposed, such as salinity and temperature . This action provided valuable data to determine if any effects observed were
Black History Month: Serious Truth Telling or a Triumph in Tokenism?
ERIC Educational Resources Information Center
Franklin, John Hope; Horne, Gerald; Cruse, Harold W.; Ballard, Allen R.; Mitchell, Reavis L., Jr.
1998-01-01
Discusses whether Black History Month effectively introduces the world to the achievements of American blacks or is primarily a marketing device for selling books and making African Americans feel good. Responses are provided from several African-American history professors. (GR)
Code of Federal Regulations, 2010 CFR
2010-01-01
... the board of directors and other managing officers are citizens of the United States, which is under... passengers when traveling free or pursuant to token charges: (1) Directors, officers, employees, and others authorized by the air carrier operating the aircraft; (2) Directors, officers, employees, and others...
Code of Federal Regulations, 2010 CFR
2010-01-01
... passengers when traveling free or pursuant to token charges: (1) Directors, officers, employees, and others authorized by the air carrier operating the aircraft; (2) Directors, officers, employees, and others... remuneration. (This definition is for 14 CFR part 217 traffic reporting purposes and may differ from the...
ERIC Educational Resources Information Center
Emmorey, Karen, Ed.; Reilly, Judy S., Ed.
A collection of papers addresses a variety of issues regarding the nature and structure of sign language, gesture, and gesture systems. Articles include: "Theoretical Issues Relating Language, Gesture, and Space: An Overview" (Karen Emmorey, Judy S. Reilly); "Real, Surrogate, and Token Space: Grammatical Consequences in ASL American…
Re-Examining the Overjustification Effect
ERIC Educational Resources Information Center
Akin-Little, K. Angeleque; Little, Steven G.
2004-01-01
The purpose of the present investigation was to extend the research related to the possible negative side effects of extrinsic reinforcement on children's compliant behavior, particularly the overjustification effect. Specifically, this study examined the effects of a token reinforcement procedure in a naturalistic environment (third grade…
The Course as Token: A Construction of/by Networks.
ERIC Educational Resources Information Center
Gaskell, Jim; Hepburn, Gary
1998-01-01
Describes the way in which a new applied-physics course introduced in British Columbia as part of a program in applied academics can be seen to construct different networks in different contexts. Employs actor network theory (ANT). Contains 20 references. (DDR)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-26
... System. OMB Control Number: Pending. Type of Review: New collection, request for a new OMB Control Number... been issued the required two factor authentication tokens can access the FS SAS. The FS SAS allows...
Race "Outsider Within" the Firehouse: African American and White Women Firefighters.
ERIC Educational Resources Information Center
Yoder, Janice D.; Berendsen, Lynne L.
2001-01-01
Surveyed and interviewed black and white women firefighters regarding subordination through imposed exclusion, tokenism, and omnirelevance of race/ethnicity in their perceptions of work experience. Both groups experienced insufficient instruction, hostility, silence, hypersupervision, insufficient support, stereotyping, and intertwining of race…
ERIC Educational Resources Information Center
Inkster, J. A.; McLaughlin, T. F.
1993-01-01
This study found that microcomputer free time was a very effective consequence in decreasing the tardiness of a middle school boy, in improving his academic achievement, and in improving the student's attitude toward school and school assignments. (Author/JDD)
Educating School Leaders for Social Justice
ERIC Educational Resources Information Center
Cambron-McCabe, Nelda; McCarthy, Martha M.
2005-01-01
Traditional leadership preparation programs and licensure requirements give only token consideration to social justice concerns. This article examines the emerging social justice discourse in the educational administration field and discusses several challenges that must be considered as universities and others attempt to prepare school leaders…
Curriculum Connection: Create a Classroom Community.
ERIC Educational Resources Information Center
Donlan, Leni
1991-01-01
One elementary teacher runs her classroom as a technology-based token economy. Students hold classroom jobs and use software to track money earned, manage checking accounts, and disburse classroom cash. The strategy boosts math and technology skills. A list of software programs is included. (SM)
21 CFR 1311.102 - Practitioner responsibilities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... not share the password or other knowledge factor, or biometric information, with any other person. The... hard token, knowledge factor, or biometric information may provide a basis for revocation or suspension... organization has found that the electronic prescription application records, stores, and transmits the...
7 CFR 1955.144 - Disposal of NP or surplus property to, through, or acquisition from other agencies.
Code of Federal Regulations, 2011 CFR
2011-01-01
... chattel property cannot be sold (or only token offers are received for it), the appropriate Assistant... Urban Homesteading Agency (LUHA) is authorized a 10 percent discount of the listed price on any SFH...
7 CFR 1955.144 - Disposal of NP or surplus property to, through, or acquisition from other agencies.
Code of Federal Regulations, 2010 CFR
2010-01-01
... chattel property cannot be sold (or only token offers are received for it), the appropriate Assistant... Urban Homesteading Agency (LUHA) is authorized a 10 percent discount of the listed price on any SFH...
Authority, Gender, Power, and Tokenism
ERIC Educational Resources Information Center
Deaux, Kay
1978-01-01
The role of women in leadership positions can be understood fully only by considering both the process and the broader structural aspects of the organization. Available from: JABS Order Dept., NTL Institute for Applied Behavior Science, P.O. Box 9155, Rosslyn Station, Arlington, Virginia 22209 (Author)
Stock optimizing: maximizing reinforcers per session on a variable-interval schedule.
Silberberg, A; Bauman, R; Hursh, S
1993-01-01
In Experiment 1, 2 monkeys earned their daily food ration by pressing a key that delivered food according to a variable-interval 3-min schedule. In Phases 1 and 4, sessions ended after 3 hr. In Phases 2 and 3, sessions ended after a fixed number of responses that reduced food intake and body weights from levels during Phases 1 and 4. Monkeys responded at higher rates and emitted more responses per food delivery when the food earned in a session was reduced. In Experiment 2, monkeys earned their daily food ration by depositing tokens into the response panel. Deposits delivered food according to a variable-interval 3-min schedule. When the token supply was unlimited (Phases 1, 3, and 5), sessions ended after 3 hr. In Phases 2 and 4, sessions ended after 150 tokens were deposited, resulting in a decrease in food intake and body weight. Both monkeys responded at lower rates and emitted fewer responses per food delivery when the food earned in a session was reduced. Experiment 1's results are consistent with a strength account, according to which the phases that reduced body weights increased food's value and therefore increased subjects' response rates. The results of Experiment 2 are consistent with an optimizing strategy, because lowering response rates when food is restricted defends body weight on variable-interval schedules. These contrasting results may be attributed to the discriminability of the contingency between response number and the end of a session being greater in Experiment 2 than in Experiment 1. In consequence, subjects lowered their response rates in order to increase the number of reinforcers per session (stock optimizing). PMID:8454960
Semantic Relations for Problem-Oriented Medical Records
Uzuner, Ozlem; Mailoa, Jonathan; Ryan, Russell; Sibanda, Tawanda
2010-01-01
Summary Objective We describe semantic relation (SR) classification on medical discharge summaries. We focus on relations targeted to the creation of problem-oriented records. Thus, we define relations that involve the medical problems of patients. Methods and Materials We represent patients’ medical problems with their diseases and symptoms. We study the relations of patients’ problems with each other and with concepts that are identified as tests and treatments. We present an SR classifier that studies a corpus of patient records one sentence at a time. For all pairs of concepts that appear in a sentence, this SR classifier determines the relations between them. In doing so, the SR classifier takes advantage of surface, lexical, and syntactic features and uses these features as input to a support vector machine. We apply our SR classifier to two sets of medical discharge summaries, one obtained from the Beth Israel-Deaconess Medical Center (BIDMC), Boston, MA and the other from Partners Healthcare, Boston, MA. Results On the BIDMC corpus, our SR classifier achieves micro-averaged F-measures that range from 74% to 95% on the various relation types. On the Partners corpus, the micro-averaged F-measures on the various relation types range from 68% to 91%. Our experiments show that lexical features (in particular, tokens that occur between candidate concepts, which we refer to as inter-concept tokens) are very informative for relation classification in medical discharge summaries. Using only the inter-concept tokens in the corpus, our SR classifier can recognize 84% of the relations in the BIDMC corpus and 72% of the relations in the Partners corpus. Conclusion These results are promising for semantic indexing of medical records. They imply that we can take advantage of lexical patterns in discharge summaries for relation classification at a sentence level. PMID:20646918
Shared neural substrates of apraxia and aphasia.
Goldenberg, Georg; Randerath, Jennifer
2015-08-01
Apraxia is regularly associated with aphasia, but there is controversy whether their co-occurrence is the expression of a common basic deficit or results from anatomical proximity of their neural substrates. However, neither aphasia nor apraxia is an indivisible entity. Both diagnoses embrace diverse manifestations that may occur more or less independently from each other. Thus, the question whether apraxia is always accompanied by aphasia may lead to conflicting answers depending on which of their manifestations are considered. We used voxel based lesion symptom mapping (VLSM) for exploring communalities between lesion sites associated with aphasia and with apraxia. Linguistic impairment was assessed by the Aachen Aphasia Test (AAT) subtests naming, comprehension, repetition, written language, and Token Test. Apraxia was examined for imitation of meaningless hand and finger postures and for pantomime of tool use. There were two areas of overlap between aphasia and apraxia. Lesions in the anterior temporal lobe interfered with pantomime of tool use and with all linguistic tests. In the left inferior parietal lobe there was a large area where lesions were associated with defective imitation of hand postures and with poor scores on written language and the Token Test. Within this large area there were also two spots in supramarginal and angular gyrus where lesions were also associated with defective pantomime. We speculate that the coincidence of language impairment and defective pantomime after anterior temporal lesions is due to impaired access to semantic memory. The combination of defective imitation of hand postures with poor scores on Token Test and written language is not easily compatible with a crucial role of parietal regions for the conversion of concepts of intended actions into motor commands. It accords better with a role of left inferior parietal lobe regions for the categorical perception of spatial relationships. Copyright © 2015 Elsevier Ltd. All rights reserved.
The uniqueness of human milk. Psychological differences between breast and bottle feeding.
Newton, N
1971-08-01
This paper examines the theory that breastfed and bottlefed infants are psychological equivalents. There are 2 patterns of breastfeeding most often encountered, unrestricted and token breastfeedings. There are maternal differences between those who breastfeed and those who do not. The initial experience of breastfeeding is culturally dependent. A mother who practices unretricted breastfeeding is receiving sustained stimulation to her nipples and experiences a generalized body response. Likewise such a breastfeeding mother experiences other long-term psychophysiologic reactions such as lactation amenorrhea and changes in hormonal balance. Breastfeeding women are often interested in a quick return to sexual intercourse and display a more general attitude towards men. A mother's personality and her ability to adjust to life situations often varies with the choice of feeding. 1 study found that mothers who breastfed displayed significantly less neuroticism than those who did not. Breastfeeding behavior appears to be sensitive to even minor variations in the social milieu. The type of breastfeeding practiced is likewise a significant variable for the infant. The initial feeding of an unrestricted breastfed infant is usually smooth unlike the situation for the token breastfed. Both feeding patterns involve assuagement of hunger needs but are dependent on social setting. For the breastfed infant, comfort as well as nourishment are presented with the mother as part of the package. These 2 experiences are often split in bottlefed and token breastfed infants. The 2 sucking patterns resemble each other superficially and the breastfed infant seems to develop more interest in sucking. Different activity levels manifest themselves by the 3rd day postpartum with the breastfed showing a greater propensity toward activity. Intelligence scores are also related to feeding patterns, with those exclusively breastfed for 4-9 months displaying the highest scores in relation to their age.
Individualistic and Time-Varying Tree-Ring Growth to Climate Sensitivity
Carrer, Marco
2011-01-01
The development of dendrochronological time series in order to analyze climate-growth relationships usually involves first a rigorous selection of trees and then the computation of the mean tree-growth measurement series. This study suggests a change in the perspective, passing from an analysis of climate-growth relationships that typically focuses on the mean response of a species to investigating the whole range of individual responses among sample trees. Results highlight that this new approach, tested on a larch and stone pine tree-ring dataset, outperforms, in terms of information obtained, the classical one, with significant improvements regarding the strength, distribution and time-variability of the individual tree-ring growth response to climate. Moreover, a significant change over time of the tree sensitivity to climatic variability has been detected. Accordingly, the best-responder trees at any one time may not always have been the best-responders and may not continue to be so. With minor adjustments to current dendroecological protocol and adopting an individualistic approach, we can improve the quality and reliability of the ecological inferences derived from the climate-growth relationships. PMID:21829523
Methodology for Mechanical Property Testing of Fuel Cladding Using a Expanded Plug Wedge Test
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jiang, Hao; Wang, Jy-An John
2014-01-01
An expanded plug method was developed earlier for determining the tensile properties of irradiated fuel cladding. This method tests fuel rod cladding ductility by utilizing an expandable plug to radially stretch a small ring of irradiated cladding material. The circumferential or hoop strain is determined from the measured diametrical expansion of the ring. A developed procedure is used to convert the load circumferential strain data from the ring tests into material pseudo-stress-strain curves, from which material properties of the cladding can be extracted. However, several deficiencies existed in this expanded-plug test that can impact the accuracy of test results, suchmore » as that the large axial compressive stress resulted from the expansion plug test can potentially induce the shear failure mode of the tested specimen. Moreover, highly nonuniform stress and strain distribution in the deformed clad gage section and significant compressive stresses, induced by bending deformation due to clad bulging effect, will further result in highly nonconservative estimates of the mechanical properties for both strength and ductility of the tested clad. To overcome the aforementioned deficiencies associated with the current expansion plug test, systematic studies have been conducted. By optimizing the specific geometry designs, selecting the appropriate material for the expansion plug, and adding new components into the testing system, a modified expansion plug testing protocol has been developed. A general procedure was also developed to determine the hoop stress in the tested ring specimen. A scaling factor, -factor, was used to convert the ring load Fring into hoop stress , and is written as _ = F_ring/tl , where t is the clad thickness and l is the clad length. The generated stress-strain curve agrees well with the associated tensile test data in both elastic and plastic deformation regions.« less
Mikušek, Jiří; Jansa, Petr; Jagtap, Pratap R; Vašíček, Tomáš; Císařová, Ivana; Matoušová, Eliška
2018-05-18
Enantioselective synthesis of all-carbon quaternary centers remains a considerable challenge for synthetic organic chemists. Here, we report a two-step protocol to synthesize such centers including tandem cyclization/Suzuki cross-coupling followed by halocarbocyclization. During this process, two rings, three new C-C bonds and a stereochemically defined all-carbon quaternary center are formed. The absolute configuration of this center is controlled by the stereochemistry of the adjacent stereocenter, which derives from an appropriate enantioenriched starting material. Using this method, we synthesized polycyclic compounds structurally similar to Amaryllidaceae alkaloids in high enantiomeric excesses. Because these products resemble naturally occurring compounds, our protocol can be used to synthesize various potentially bioactive compounds. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
A Token Economy Made Easy through ClassDojo
ERIC Educational Resources Information Center
Robacker, Cassie M.; Rivera, Christopher J.; Warren, Sandra H.
2016-01-01
Students with behavioral and emotional disabilities spend less time on academic instruction due to their behavioral disruptions, contributing to the academic difficulties these students face. Classroom management strategies, in the form of positive behavioral interventions and supports (PBIS), incorporate principles of applied behavior analysis to…
On Marcuse and Caring in Education
ERIC Educational Resources Information Center
Shel, Tammy
2006-01-01
Can caring and standardized testing coincide? Marcuse criticized the misuse of science because it also legitimizes social and economic hierarchy. By the same token, scholars develop standardized testing, claiming these tests are scientific and can measure objectively individuals' learning and intelligence capabilities. However, if inclusive caring…
Modification of Comprehension Deficits in Learning Disabled Children.
ERIC Educational Resources Information Center
Swanson, Lee
1981-01-01
Three experiments investigated the effects of self recording, tokens and contingent free time on learning disabled children's reading comprehension performance. Results of these three experiments supported recent findings that only minimal changes occur on comprehension performance when left as an untargeted dependent behavior. (Author)
Attentional Episodes in Visual Perception
ERIC Educational Resources Information Center
Wyble, Brad; Potter, Mary C.; Bowman, Howard; Nieuwenstein, Mark
2011-01-01
Is one's temporal perception of the world truly as seamless as it appears? This article presents a computationally motivated theory suggesting that visual attention samples information from temporal episodes (episodic simultaneous type/serial token model; Wyble, Bowman, & Nieuwenstein, 2009). Breaks between these episodes are punctuated by periods…
The Characteristics of User-Generated Passwords
1990-03-01
electronic keys), user interface tokens (pocket devices that can generate one-time passwords) and fixed password devices ( plastic cards that contain...APPENDIX B-7 DIFFREM DIFFICULTY REMfEIBERING by PASSCHAR PASSORD CARACTERISTICS PASSCHAR Pate I of 1 Count 1 Row Pet IALPHAVET NUMERIC ALPHANUM ASCII Cal Pet
ERIC Educational Resources Information Center
Kourilsky, Marilyn; Hirshleifer, Jack
1976-01-01
This study compares the effects of two teacher training programs designed to emphasize one of two forms of behavior modification in teaching economics to fourth-, fifth-, and sixth-grade pupils. (DMT)
Psychometric Evaluation of Lexical Diversity Indices: Assessing Length Effects.
Fergadiotis, Gerasimos; Wright, Heather Harris; Green, Samuel B
2015-06-01
Several novel techniques have been developed recently to assess the breadth of a speaker's vocabulary exhibited in a language sample. The specific aim of this study was to increase our understanding of the validity of the scores generated by different lexical diversity (LD) estimation techniques. Four techniques were explored: D, Maas, measure of textual lexical diversity, and moving-average type-token ratio. Four LD indices were estimated for language samples on 4 discourse tasks (procedures, eventcasts, story retell, and recounts) from 442 adults who are neurologically intact. The resulting data were analyzed using structural equation modeling. The scores for measure of textual lexical diversity and moving-average type-token ratio were stronger indicators of the LD of the language samples. The results for the other 2 techniques were consistent with the presence of method factors representing construct-irrelevant sources. These findings offer a deeper understanding of the relative validity of the 4 estimation techniques and should assist clinicians and researchers in the selection of LD measures of language samples that minimize construct-irrelevant sources.
Achievement Place: development of the elected manager system1
Phillips, Elery L.; Phillips, Elaine A.; Wolf, Montrose M.; Fixsen, Dean L.
1973-01-01
A series of experiments was carried out to compare several administrative systems at Achievement Place, a family style behavior modification program for pre-delinquent boys. One aspect of the motivation system at Achievement Place was the token economy in which the youths could earn or lose points that could be exchanged for privileges. Several arrangements for assigning routine tasks and for providing token consequences for task performance were compared for their effectiveness in accomplishing the tasks and for their preference by the boys. The independent variables studied included: (1) individually assigned tasks versus group assigned tasks; (2) consequences for individual performance versus consequences for group performance; (3) a peer managership that could be earned by the highest bidder versus a peer managership that could be determined democratically by the peers. The results suggested that among those systems studied the system that best met the criteria of effectiveness and preference involved a democratically elected peer manager who had the authority both to give and to take away points for his peers' performances. PMID:16795439
Solving Partial Differential Equations in a data-driven multiprocessor environment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gaudiot, J.L.; Lin, C.M.; Hosseiniyar, M.
1988-12-31
Partial differential equations can be found in a host of engineering and scientific problems. The emergence of new parallel architectures has spurred research in the definition of parallel PDE solvers. Concurrently, highly programmable systems such as data-how architectures have been proposed for the exploitation of large scale parallelism. The implementation of some Partial Differential Equation solvers (such as the Jacobi method) on a tagged token data-flow graph is demonstrated here. Asynchronous methods (chaotic relaxation) are studied and new scheduling approaches (the Token No-Labeling scheme) are introduced in order to support the implementation of the asychronous methods in a data-driven environment.more » New high-level data-flow language program constructs are introduced in order to handle chaotic operations. Finally, the performance of the program graphs is demonstrated by a deterministic simulation of a message passing data-flow multiprocessor. An analysis of the overhead in the data-flow graphs is undertaken to demonstrate the limits of parallel operations in dataflow PDE program graphs.« less
Environmental Sound Training in Cochlear Implant Users
Sheft, Stanley; Kuvadia, Sejal; Gygi, Brian
2015-01-01
Purpose The study investigated the effect of a short computer-based environmental sound training regimen on the perception of environmental sounds and speech in experienced cochlear implant (CI) patients. Method Fourteen CI patients with the average of 5 years of CI experience participated. The protocol consisted of 2 pretests, 1 week apart, followed by 4 environmental sound training sessions conducted on separate days in 1 week, and concluded with 2 posttest sessions, separated by another week without training. Each testing session included an environmental sound test, which consisted of 40 familiar everyday sounds, each represented by 4 different tokens, as well as the Consonant Nucleus Consonant (CNC) word test, and Revised Speech Perception in Noise (SPIN-R) sentence test. Results Environmental sounds scores were lower than for either of the speech tests. Following training, there was a significant average improvement of 15.8 points in environmental sound perception, which persisted 1 week later after training was discontinued. No significant improvements were observed for either speech test. Conclusions The findings demonstrate that environmental sound perception, which remains problematic even for experienced CI patients, can be improved with a home-based computer training regimen. Such computer-based training may thus provide an effective low-cost approach to rehabilitation for CI users, and potentially, other hearing impaired populations. PMID:25633579
Integrating the IA2 Astronomical Archive in the VO: The VO-Dance Engine
NASA Astrophysics Data System (ADS)
Molinaro, M.; Laurino, O.; Smareglia, R.
2012-09-01
Virtual Observatory (VO) protocols and standards are getting mature and the astronomical community asks for astrophysical data to be easily reachable. This means data centers have to intensify their efforts to provide the data they manage not only through proprietary portals and services but also through interoperable resources developed on the basis of the IVOA (International Virtual Observatory Alliance) recommendations. Here we present the work and ideas developed at the IA2 (Italian Astronomical Archive) data center hosted by the INAF-OATs (Italian Institute for Astrophysics - Trieste Astronomical Observatory) to reach this goal. The core point is the development of an application that from existing DB and archive structures can translate their content to VO compliant resources: VO-Dance (written in Java). This application, in turn, relies on a database (potentially DBMS independent) to store the translation layer information of each resource and auxiliary content (UCDs, field names, authorizations, policies, etc.). The last token is an administrative interface (currently developed using the Django python framework) to allow the data center administrators to set up and maintain resources. This deployment, platform independent, with database and administrative interface highly customizable, means the package, when stable and easily distributable, can be also used by single astronomers or groups to set up their own resources from their public datasets.
Sakaguchi, Hitoshi; Ryan, Cindy; Ovigne, Jean-Marc; Schroeder, Klaus R; Ashikaga, Takao
2010-09-01
Regulatory policies in Europe prohibited the testing of cosmetic ingredients in animals for a number of toxicological endpoints. Currently no validated non-animal test methods exist for skin sensitization. Evaluation of changes in cell surface marker expression in dendritic cell (DC)-surrogate cell lines represents one non-animal approach. The human Cell Line Activation Test (h-CLAT) examines the level of CD86 and CD54 expression on the surface of THP-1 cells, a human monocytic leukemia cell line, following 24h of chemical exposure. To examine protocol transferability, between-lab reproducibility, and predictive capacity, the h-CLAT has been evaluated by five independent laboratories in several ring trials (RTs) coordinated by the European Cosmetics Association (COLIPA). The results of the first and second RTs demonstrated that the protocol was transferable and basically had good between-lab reproducibility and predictivity, but there were some false negative data. To improve performance, protocol and prediction model were modified. Using the modified prediction model in the first and second RT, accuracy was improved. However, about 15% of the outcomes were not correctly identified, which exposes some of the limitations of the assay. For the chemicals evaluated, the limitation may due to chemical being a weak allergen or having low solubility (ex. alpha-hexylcinnamaldehyde). The third RT evaluated the modified prediction model and satisfactory results were obtained. From the RT data, the feasibility of utilizing cell lines as surrogate DC in development of in vitro skin sensitization methods shows promise. The data also support initiating formal pre-validation of the h-CLAT in order to fully understand the capabilities and limitations of the assay. Copyright 2010 Elsevier Ltd. All rights reserved.
Gurevich-Messina, Juan M; Giudicessi, Silvana L; Martínez-Ceron, María C; Acosta, Gerardo; Erra-Balsells, Rosa; Cascone, Osvaldo; Albericio, Fernando; Camperi, Silvia A
2015-01-01
Short cyclic peptides have a great interest in therapeutic, diagnostic and affinity chromatography applications. The screening of 'one-bead-one-peptide' combinatorial libraries combined with mass spectrometry (MS) is an excellent tool to find peptides with affinity for any target protein. The fragmentation patterns of cyclic peptides are quite more complex than those of their linear counterparts, and the elucidation of the resulting tandem mass spectra is rather more difficult. Here, we propose a simple protocol for combinatorial cyclic libraries synthesis and ring opening before MS analysis. In this strategy, 4-hydroxymethylbenzoic acid, which forms a benzyl ester with the first amino acid, was used as the linker. A glycolamidic ester group was incorporated after the combinatorial positions by adding glycolic acid. The library synthesis protocol consisted in the following: (i) incorporation of Fmoc-Asp[2-phenylisopropyl (OPp)]-OH to Ala-Gly-oxymethylbenzamide-ChemMatrix, (ii) synthesis of the combinatorial library, (iii) assembly of a glycolic acid, (iv) couple of an Ala residue in the N-terminal, (v) removal of OPp, (vi) peptide cyclisation through side chain Asp and N-Ala amino terminus and (vii) removal of side chain protecting groups. In order to simultaneously open the ring and release each peptide, benzyl and glycolamidic esters were cleaved with ammonia. Peptide sequences could be deduced from the tandem mass spectra of each single bead evaluated. The strategy herein proposed is suitable for the preparation of one-bead-one-cyclic depsipeptide libraries that can be easily open for its sequencing by matrix-assisted laser desorption/ionisation MS. It employs techniques and reagents frequently used in a broad range of laboratories without special expertise in organic synthesis. Copyright © 2014 European Peptide Society and John Wiley & Sons, Ltd.
NASA Astrophysics Data System (ADS)
Gkinis, Vasileios; Holme, Christian; Morris, Valerie; Thayer, Abigail Grace; Vaughn, Bruce; Kjaer, Helle Astrid; Vallelonga, Paul; Simonsen, Marius; Jensen, Camilla Marie; Svensson, Anders; Maffrezzoli, Niccolo; Vinther, Bo; Dallmayr, Remi
2017-04-01
We present a performance comparison study between two state of the art Cavity Ring Down Spectrometers (Picarro L2310-i, L2140-i). The comparison took place during the Continuous Flow Analysis (CFA) campaign for the measurement of the Renland ice core, over a period of three months. Instant and complete vaporisation of the ice core melt stream, as well as of in-house water reference materials is achieved by accurate control of microflows of liquid into a homemade calibration system by following simple principles of the Hagen-Poiseuille law. Both instruments share the same vaporisation unit in a configuration that minimises sample preparation discrepancies between the two analyses. We describe our SMOW-SLAP calibration and measurement protocols for such a CFA application and present quality control metrics acquired during the full period of the campaign on a daily basis. The results indicate an unprecedented performance for all 3 isotopic ratios (δ2H, δ17O, δ18O ) in terms of precision, accuracy and resolution. We also comment on the precision and accuracy of the second order excess parameters of HD16O and H217O over H218O (Dxs, Δ17O ). To our knowledge these are the first reported CFA measurements at this level of precision and accuracy for all three isotopic ratios. Differences on the performance of the two instruments are carefully assessed during the measurement and reported here. Our quality control protocols extend to the area of low water mixing ratios, a regime in which often atmospheric vapour measurements take place and Cavity Ring Down Analysers show a poorer performance due to the lower signal to noise ratios. We address such issues and propose calibration protocols from which water vapour isotopic analyses can benefit from.
Quantitative structure-activity relationship studies of threo-methylphenidate analogs.
Misra, Milind; Shi, Qing; Ye, Xiaocong; Gruszecka-Kowalik, Ewa; Bu, Wei; Liu, Zhanzhu; Schweri, Margaret M; Deutsch, Howard M; Venanzi, Carol A
2010-10-15
Complementary two-dimensional (2D) and three-dimensional (3D) Quantitative Structure-Activity Relationship (QSAR) techniques were used to derive a preliminary model for the dopamine transporter (DAT) binding affinity of 80 racemic threo-methylphenidate (MP) analogs. A novel approach based on using the atom-level E-state indices of the 14 common scaffold atoms in a sphere exclusion protocol was used to identify a test set for 2D- and 3D-QSAR model validation. Comparative Molecular Field Analysis (CoMFA) contour maps based on the structure-activity data of the training set indicate that the 2' position of the phenyl ring cannot tolerate much steric bulk and that addition of electron-withdrawing groups to the 3' or 4' positions of the phenyl ring leads to improved DAT binding affinity. In particular, the optimal substituents were found to be those whose bulk is mainly in the plane of the phenyl ring. Substituents with significant bulk above or below the plane of the ring led to decreased binding affinity. Suggested alterations to be explored in the design of new compounds are the placement at the 3' and 4' position of the phenyl ring of electron-withdrawing groups that lie chiefly in the plane of the ring, for example, halogen substituents on the 3',4'-benzo analog, 79. A complementary 2D-QSAR approach-partial least squares analysis using a reduced set of Molconn-Z descriptors-supports the CoMFA structure-activity interpretation that phenyl ring substitution is a major determinant of DAT binding affinity. The potential usefulness of the CoMFA models was demonstrated by the prediction of the binding affinity of methyl 2-(naphthalen-1-yl)-2-(piperidin-2-yl)acetate, an analog not in the original data set, to be in good agreement with the experimental value. Copyright © 2010 Elsevier Ltd. All rights reserved.
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
NASA Astrophysics Data System (ADS)
Ristenpart, Thomas; Yilek, Scott
Multiparty signature protocols need protection against rogue-key attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, provable security has only been established under the knowledge of secret key (KOSK) assumption where the adversary is required to reveal the secret keys it utilizes. In practice, certifying authorities rarely require the strong proofs of knowledge of secret keys required to substantiate the KOSK assumption. Instead, proofs of possession (POPs) are required and can be as simple as just a signature over the certificate request message. We propose a general registered key model, within which we can model both the KOSK assumption and in-use POP protocols. We show that simple POP protocols yield provable security of Boldyreva's multisignature scheme [11], the LOSSW multisignature scheme [28], and a 2-user ring signature scheme due to Bender, Katz, and Morselli [10]. Our results are the first to provide formal evidence that POPs can stop rogue-key attacks.
Identifying Effectiveness Criteria for Internet Payment Systems.
ERIC Educational Resources Information Center
Shon, Tae-Hwan; Swatman, Paula M. C.
1998-01-01
Examines Internet payment systems (IPS): third-party, card, secure Web server, electronic token, financial electronic data interchange (EDI), and micropayment based. Reports the results of a Delphi survey of experts identifying and classifying IPS effectiveness criteria and classifying types of IPS providers. Includes the survey invitation letter…
Deterministic Walks with Choice
DOE Office of Scientific and Technical Information (OSTI.GOV)
Beeler, Katy E.; Berenhaut, Kenneth S.; Cooper, Joshua N.
2014-01-10
This paper studies deterministic movement over toroidal grids, integrating local information, bounded memory and choice at individual nodes. The research is motivated by recent work on deterministic random walks, and applications in multi-agent systems. Several results regarding passing tokens through toroidal grids are discussed, as well as some open questions.
Reducing Weekend Litter (and Improving RA-Resident Interactions) in a College Residence Hall.
ERIC Educational Resources Information Center
Luyben, Paul D.; And Others
1984-01-01
Investigated the effectiveness of a litter reduction program, consisting of group assignment of responsibility and a token reward system, on weekend litter rates in college residence halls. Results indicated procedure was completely effective, with litter reduced to zero in all settings. (BL)
Self-Instruction and Success: A Learner-Profile Study.
ERIC Educational Resources Information Center
Jones, Francis R.
1998-01-01
Interviews with adults experienced in foreign language self-instruction generated profiles of language experience at learner and self-instructed language-token levels. Results showed separations between languages with and without self-instruction. The most effective learning route was starting with classwork. Ab initio self-instruction produced…
Phrase-based Multimedia Information Extraction
2006-07-01
names with periods — J. K. Ramirez, T. Grant Smith, Lita S. Jones; names with commas — Hector Jones, Jr.; and conjoined names, such as Sherlock and Judy... Holmes . Using both the type and token metrics (described above), we tested these extensions and improvements to the name identification module on
ERIC Educational Resources Information Center
Akande, Adebowale
1993-01-01
Describes assessment and successful treatment of a preadolescent with erratic toileting behavior and related social skills difficulties. Treatment included monitoring of bowel movements, using a star chart, and applying rewards as positive reinforcement of acceptable behavior. (HTH)
Reduplicated Words Are Easier to Learn
ERIC Educational Resources Information Center
Ota, Mitsuhiko; Skarabela, Barbora
2016-01-01
Infants' disposition to learn repetitions in the input structure has been demonstrated in pattern generalization (e.g., learning the pattern ABB from the token "ledidi"). This study tested whether a repetition advantage can also be found in lexical learning (i.e., learning the word "lele" vs. "ledi"). Twenty-four…
A Journey from Coercion to Building Courage
ERIC Educational Resources Information Center
DeSalvatore, Gino; Millspaugh, Carla; Long, Cindy
2009-01-01
Historically, behavior management in treatment settings has focused on external controls such as points, tokens, and level systems. This article describes one program's transformation where troubled youth develop internal controls and become active participants in their own change. The authors describe their program's journey to help troubled and…
A Prospective Analysis of Sexual Assault Perpetration
ERIC Educational Resources Information Center
Loh, Catherine; Gidycz, Christine; Lobo, Tracy; Luthra, Rohini
2005-01-01
This study prospectively evaluated perpetrator risk factors for sexual assault perpetration, including peer influences, beliefs and attitudes about sexuality, alcohol use, and token resistance. Perpetration of sexual assault was evaluated at three time periods: pretest, 3-month follow-up, and 7-month follow-up. Retrospective and prospective…
Tax Matters: IRS Cracking Down on Donations to Nonprofits.
ERIC Educational Resources Information Center
Lukaszewski, Thomas
1990-01-01
Reviews IRS regulation of day care center fund-raising activities. Contributions are not deductible when receipts exceed certain amounts, sales claim fair market value, or the cost of gift tokens exceeds a certain limit. Fund-raising violations can result in fines and extensive IRS investigations. (DG)
Removing ring artefacts from synchrotron radiation-based hard x-ray tomography data
NASA Astrophysics Data System (ADS)
Thalmann, Peter; Bikis, Christos; Schulz, Georg; Paleo, Pierre; Mirone, Alessandro; Rack, Alexander; Siegrist, Stefan; Cörek, Emre; Huwyler, Jörg; Müller, Bert
2017-09-01
In hard X-ray microtomography, ring artefacts regularly originate from incorrectly functioning pixel elements on the detector or from particles and scratches on the scintillator. We show that due to the high sensitivity of contemporary beamline setups further causes inducing inhomogeneities in the impinging wavefronts have to be considered. We propose in this study a method to correct the thereby induced failure of simple flatfield approaches. The main steps of the pipeline are (i) registration of the reference images with the radiographs (projections), (ii) integration of the flat-field corrected projection over the acquisition angle, (iii) high-pass filtering of the integrated projection, (iv) subtraction of filtered data from the flat-field corrected projections. The performance of the protocol is tested on data sets acquired at the beamline ID19 at ESRF using single distance phase tomography.
Suhayda, C G; Omura, M; Hasegawa, S
1995-09-01
Bitter limonoids in citrus juice lower the quality and value of commercial juices. Limonoate dehydrogenase converts the precursor of bitter limonin, limonoate A-ring lactone, to nonbitter 17-dehydrolimonoate A-ring lactone. This enzyme was isolated from Arthrobacter globiformis cells by a combination of ammonium sulfate fractionation, Cibacron Blue affinity chromatography and DEAE ion exchange HPLC. Using this protocol a 428-fold purification of the enzyme was obtained. Gel filtration HPLC indicated a M(r) of 118,000 for the native enzyme. SDS-PAGE indicated an individual subunit M(r) of 31,000. N-Terminal sequencing of the protein provided a sequence of the first 16 amino acid residues. Since LDH activity in citrus is very low, cloning the gene for this bacterial enzyme into citrus trees should enhance the natural debittering mechanism in citrus fruit.
The sound of a mobile phone ringing affects the complex reaction time of its owner
Zajdel, Justyna; Zwolińska, Anna; Śmigielski, Janusz; Beling, Piotr; Cegliński, Tomasz; Nowak, Dariusz
2012-01-01
Introduction Mobile phone conversation decreases the ability to concentrate and impairs the attention necessary to perform complex activities, such as driving a car. Does the ringing sound of a mobile phone affect the driver's ability to perform complex sensory-motor activities? We compared a subject's reaction time while performing a test either with a mobile phone ringing or without. Material and methods The examination was performed on a PC-based reaction time self-constructed system Reactor. The study group consisted of 42 healthy students. The protocol included instruction, control without phone and a proper session with subject's mobile phone ringing. The terms of the study were standardised. Results There were significant differences (p < 0.001) in reaction time in control (597 ms), mobile (633 ms) and instruction session (673 ms). The differences in female subpopulation were also significant (p < 0.01). Women revealed the longest reaction time in instruction session (707 ms), were significantly quicker in mobile (657 ms, p < 0.01) and in control session (612 ms, p < 0.001). In men, the significant difference was recorded only between instruction (622 ms) and control session (573 ms, p < 0.01). The other differences were not significant (p > 0.08). Men proofed to complete significantly quicker than women in instruction (p < 0.01) and in mobile session (p < 0.05). Differences amongst the genders in control session was not significant (p > 0.05). Conclusions The results obtained proofed the ringing of a phone exerts a significant influence on complex reaction time and quality of performed task. PMID:23185201
The a-cycle problem for transverse Ising ring
NASA Astrophysics Data System (ADS)
Dong, Jian-Jun; Li, Peng; Chen, Qi-Hui
2016-11-01
Traditionally, the transverse Ising model is mapped to the fermionic c-cycle problem, which neglects the boundary effect due to thermodynamic limit. If persisting on a perfect periodic boundary condition, we can get a so-called a-cycle problem that has not been treated seriously so far (Lieb et al 1961 Ann. Phys. 16 407). In this work, we show a little surprising but exact result in this respect. We find the odevity of the number of lattice sites, N, in the a-cycle problem plays an unexpected role even in the thermodynamic limit, N\\to ∞ , due to the boundary constraint. We pay special attention to the system with N(\\in Odd)\\to ∞ , which is in contrast to the one with N(\\in Even)\\to ∞ , because the former suffers a ring frustration. As a new effect, we find the ring frustration induces a low-energy gapless spectrum above the ground state. By proving a theorem for a new type of Toeplitz determinant, we demonstrate that the ground state in the gapless region exhibits a peculiar longitudinal spin-spin correlation. The entangled nature of the ground state is also disclosed by the evaluation of its entanglement entropy. At low temperature, new behavior of specific heat is predicted. We also propose an experimental protocol for observing the new phenomenon due to the ring frustration.
Performing Prodigals and Dissident Acolytes: Supporting Queer Postgraduates in the Visual Arts
ERIC Educational Resources Information Center
Ings, Welby
2015-01-01
Supervisors supporting queer individuals engaged in postgraduate research in Visual Arts face a number of issues. Beyond concerns with balancing the autobiographical and the scholarly, a supervisor may also encounter questions relating to safety, identity, tokenism, exoticisation and the pressure candidates feel to develop work that has…
Transformations between Extensive and Intensive Versions of Thermodynamic Relationships
ERIC Educational Resources Information Center
Eberhart, James G.
2010-01-01
Most thermodynamic properties are either extensive (e.g., volume, energy, entropy, amount, etc.) or intensive (e.g., temperature, pressure, chemical potential, mole fraction, etc.). By the same token most of the mathematical relationships in thermodynamics can be written in extensive or intensive form. The basic laws of thermodynamics are usually…
Gendered Language in Interactive Discourse
ERIC Educational Resources Information Center
Hussey, Karen A.; Katz, Albert N.; Leith, Scott A.
2015-01-01
Over two studies, we examined the nature of gendered language in interactive discourse. In the first study, we analyzed gendered language from a chat corpus to see whether tokens of gendered language proposed in the gender-as-culture hypothesis (Maltz and Borker in "Language and social identity." Cambridge University Press, Cambridge, pp…
Computer-Assisted Concept Analysis of "HCR"'s First 25 Years.
ERIC Educational Resources Information Center
Stephen, Timothy
1999-01-01
Normalizes titles of 634 "Human Communication Research" articles using linguistic reduction, elimination of common words, and terms with indiscriminate meaning, and tokenization of phrases and compound concepts. Finds that concepts were grouped into five large clusters: media, family, conflict, and learning; culture, social organization, and self;…
Parallel campaigns: the British in Mesopotamia, 1914-1920 and the United States in Iraq, 2003-2004
2013-06-14
monies (or other values possession, such as animals ) commensurate with its means. This would serve the dual purpose of a physical token of...Ottoman administration was largely typified by incompetence and corruption rather than deliberate cruelty .4 Despite exaggerated British claims to the
ERIC Educational Resources Information Center
Fain, George
1995-01-01
Argues that women's history should stress the broad sociological view of women's roles not only in politics but in mundane, day-to-day life throughout all of history, rather that reducing women's history to a few token figures. Notes that many college and secondary texts and testing materials have recognized the trend toward the inclusion of…
Getting More from Your Staff without Even Asking.
ERIC Educational Resources Information Center
Grayson, Randy
1998-01-01
Explores ways to maximize camp-staff potential and effort through wages; working conditions; promoting passion and enthusiasm; perks and benefits; special staff events; tokens of praise, support, and appreciation; staff mission statements; profit sharing; empowerment; use of a morale officer; and staff ownership of the camp's "vision." (SAS)
Effects of Referent Token Variability on L2 Vocabulary Learning
ERIC Educational Resources Information Center
Sommers, Mitchell S.; Barcroft, Joe
2013-01-01
Previous research has demonstrated substantially improved second language (L2) vocabulary learning when spoken word forms are varied using multiple talkers, speaking styles, or speaking rates. In contrast, the present study varied visual representations of referents for target vocabulary. English speakers learned Spanish words in formats of no…
Verbal Mediating Responses: Effects on Generalization of Say-Do Correspondence and Noncorrespondence
ERIC Educational Resources Information Center
Lima, Edhen Laura; Abreu-Rodrigues, Josele
2010-01-01
We analyzed the effects of verbal mediating responses on the acquisition and generalization of say-do correspondence and noncorrespondence. Participants were assigned to groups in which either reinforcers (feedback and tokens) were arranged for say-do correspondence and noncorrespondence, or no reinforcers were programmed. Participants in these…
Connecting Intonation Labels to Mathematical Descriptions of Fundamental Frequency
ERIC Educational Resources Information Center
Grabe, Esther; Kochanski, Greg; Coleman, John
2007-01-01
The mathematical models of intonation used in speech technology are often inaccessible to linguists. By the same token, phonological descriptions of intonation are rarely used by speech technologists, as they cannot be implemented directly in applications. Consequently, these research communities do not benefit much from each other's insights. In…
Negotiating towards a Next Turn: Phonetic Resources for "Doing the Same"
ERIC Educational Resources Information Center
Sikveland, Rein Ove
2012-01-01
This paper investigates hearers' use of response tokens (back-channels), in maintaining and differentiating their actions. Initial observations suggest that hearers produce a sequence of phonetically similar responses to disengage from the current topic, and dissimilar responses to engage with the current topic. This is studied systematically by…
High School Athletics: Coaches/Controversy/Crisis.
ERIC Educational Resources Information Center
Lopiano, Donna A.
The token gestures towards job equality for women in the fields of physical education and athletics coaching are symptomatic of the more serious problem of sexual equality present in American society. Cultural restrictions on the kind and degree of assertive behavior traditionally associated with the female role have left women ill-equipped to…
Normal Aging and Linguistic Decrement.
ERIC Educational Resources Information Center
Emery, Olga B.
A study investigated language patterning, as an indication of synthetic mental activity, in comparison groups of normal pre-middle-aged adults (30-42 years), normal elderly adults (75-93), and elderly adults (71-91) with Alzheimer's dementia. Semiotic theory was used as the conceptual context. Linguistic measures included the Token Test, the…
Reading on the Shoulders of Giants
ERIC Educational Resources Information Center
Ben-Chaim, Michael; Riendeau, Michael
2012-01-01
Reflecting on his successful scientific career, Isaac Newton highlighted his intellectual debt to his predecessors. "If I have seen further," he wrote, "it was "only" by standing on the shoulders of giants." The authors have chosen the title of their article as a token of recognition of their debt to the teachings of…
Decolonizing Music Education: Moving beyond Tokenism
ERIC Educational Resources Information Center
Hess, Juliet
2015-01-01
Current music education curricula across Canada designate Western classical music as the music most worthy of study through emphasis on elements of music that are decidedly Western. Despite the way the curriculum is constructed, many music teachers strive to create diverse programs for their students. In her examination of women's studies…
Capturing the Diversity in Lexical Diversity
ERIC Educational Resources Information Center
Jarvis, Scott
2013-01-01
The range, variety, or diversity of words found in learners' language use is believed to reflect the complexity of their vocabulary knowledge as well as the level of their language proficiency. Many indices of lexical diversity have been proposed, most of which involve statistical relationships between types and tokens, and which ultimately…
Early Language and Communicative Abilities of Children with Periventricular Leukomalacia.
ERIC Educational Resources Information Center
Feldman, Heidi M.; And Others
1992-01-01
Ten two-year-old children with periventricular leukomalacia (PVL), a brain injury associated with prematurity, were evaluated using language samples. The five children with delayed cognitive ability produced significantly fewer lexical tokens and spontaneous verbal utterances than did chronological age-matched nondelayed PVL children. (Author/DB)
Principals' Gender and Work Orientations of Male and Female Teachers.
ERIC Educational Resources Information Center
Chen, Michael; Addi, Audrey
Following R. M. Kanter's (1977) conceptualization of females as tokens and extension of this conceptualization to males, this study hypothesized that attitudes of male teachers would be significantly related to the principal's gender. A significant interaction between the principal's gender, the teacher's gender, and the teacher's administrative…
7 CFR 1955.144 - Disposal of NP or surplus property to, through, or acquisition from other agencies.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Agriculture (Continued) RURAL HOUSING SERVICE, RURAL BUSINESS-COOPERATIVE SERVICE, RURAL UTILITIES SERVICE, AND FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE (CONTINUED) PROGRAM REGULATIONS (CONTINUED... chattel property cannot be sold (or only token offers are received for it), the appropriate Assistant...
7 CFR 1955.144 - Disposal of NP or surplus property to, through, or acquisition from other agencies.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Agriculture (Continued) RURAL HOUSING SERVICE, RURAL BUSINESS-COOPERATIVE SERVICE, RURAL UTILITIES SERVICE, AND FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE (CONTINUED) PROGRAM REGULATIONS (CONTINUED... chattel property cannot be sold (or only token offers are received for it), the appropriate Assistant...
7 CFR 1955.144 - Disposal of NP or surplus property to, through, or acquisition from other agencies.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Agriculture (Continued) RURAL HOUSING SERVICE, RURAL BUSINESS-COOPERATIVE SERVICE, RURAL UTILITIES SERVICE, AND FARM SERVICE AGENCY, DEPARTMENT OF AGRICULTURE (CONTINUED) PROGRAM REGULATIONS (CONTINUED... chattel property cannot be sold (or only token offers are received for it), the appropriate Assistant...
ERIC Educational Resources Information Center
Crowley, Theresa
2016-01-01
When teachers make the effort to build a solid relationship with each student, built on trust, they often engender a life-long connection, one that's life-changing for the student. But how can teachers grow such long-lasting relationships with all students, especially disenfranchised learners and those who make it hard to connect? Crowley, a…
Learning a Novel Pattern through Balanced and Skewed Input
ERIC Educational Resources Information Center
McDonough, Kim; Trofimovich, Pavel
2013-01-01
This study compared the effectiveness of balanced and skewed input at facilitating the acquisition of the transitive construction in Esperanto, characterized by the accusative suffix "-n" and variable word order (SVO, OVS). Thai university students (N = 98) listened to 24 sentences under skewed (one noun with high token frequency) or…
Reproduction of Inflectional Markers in French-Speaking Children with Reading Impairment
ERIC Educational Resources Information Center
St-Pierre, Marie-Catherine; Beland, Renee
2010-01-01
Purpose: Children with reading impairment (RI) experience difficulties in oral and written production of inflectional markers. The origin of these difficulties is not well documented in French. According to some authors, acquisition of irregular items by typically developing children is predicted by token frequency, whereas acquisition of regular…
Drawing with Children: An Experiment in Assisted Creativity
ERIC Educational Resources Information Center
Kouvou, Ourania
2016-01-01
This report outlines the cognitive accomplishments of young children involved in graphic dialogue with adults. A token of collaborative drawing is examined exhibiting the degree to which adult informed tutoring enabled children in their drawing development, enhanced their motivation and ability in narration and resulted in drawings meaningful to…
Hardware packet pacing using a DMA in a parallel computer
Chen, Dong; Heidelberger, Phillip; Vranas, Pavlos
2013-08-13
Method and system for hardware packet pacing using a direct memory access controller in a parallel computer which, in one aspect, keeps track of a total number of bytes put on the network as a result of a remote get operation, using a hardware token counter.
Improving Academic Performance in a Bilingual Education Classroom.
ERIC Educational Resources Information Center
Golub, Lester S.; Sweeney, Gladys M.
The purpose of this study is twofold. First, it evaluates the effectiveness of token economy programs in increasing academic performance in a bilingual education classroom setting. Second, it attempts to train the teacher in the basic behavior modification principles and assist her/him in the delivery of appropriate and consistent reinforcement…
Synthesis of (+)-dumetorine and congeners by using flow chemistry technologies.
Riva, Elena; Rencurosi, Anna; Gagliardi, Stefania; Passarella, Daniele; Martinelli, Marisa
2011-05-23
An efficient total synthesis of the natural alkaloid (+)-dumetorine by using flow technology is described. The process entailed five separate steps starting from the enantiopure (S)-2-(piperidin-2-yl)ethanol 4 with 29% overall yield. Most of the reactions were carried out by exploiting solvent superheating and by using packed columns of immobilized reagents or scavengers to minimize handling. New protocols for performing classical reactions under continuous flow are disclosed: the ring-closing metathesis reaction with a novel polyethylene glycol-supported Hoveyda catalyst and the unprecedented flow deprotection/Eschweiler-Clarke methylation sequence. The new protocols developed for the synthesis of (+)-dumetorine were applied to the synthesis of its simplified natural congeners (-)-sedamine and (+)-sedridine. Copyright © 2011 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Efficient spatial privacy preserving scheme for sensor network
NASA Astrophysics Data System (ADS)
Debnath, Ashmita; Singaravelu, Pradheepkumar; Verma, Shekhar
2013-03-01
The privacy of sensitive events observed by a wireless sensor networks (WSN) needs to be protected. Adversaries with the knowledge of sensor deployment and network protocols can infer the location of a sensed event by monitoring the communication from the sensors even when the messages are encrypted. Encryption provides confidentiality; however, the context of the event can used to breach the privacy of sensed objects. An adversary can track the trajectory of a moving object or determine the location of the occurrence of a critical event to breach its privacy. In this paper, we propose ring signature to obfuscate the spatial information. Firstly, the extended region of location of an event of interest as estimated from a sensor communication is presented. Then, the increase in this region of spatial uncertainty due to the effect of ring signature is determined. We observe that ring signature can effectively enhance the region of location uncertainty of a sensed event. As the event of interest can be situated anywhere in the enhanced region of uncertainty, its privacy against local or global adversary is ensured. Both analytical and simulation results show that induced delay and throughput are insignificant with negligible impact on the performance of a WSN.
Szybinski, Marcin; Sokolowska, Katarzyna; Sicinski, Rafal R; Plum, Lori A; DeLuca, Hector F
2017-10-01
Prompted by results of molecular modeling performed on the seco-d-ring-vitamins D, we turned our attention to such analogs, having reversed configurations at C-13 and C-14, as the next goals of our studies on the structure-activity relationship for vitamin D compounds. First, we developed an efficient total synthesis of the "upper" C/seco-d-ring fragment with a 7-carbon side chain. Then, we coupled it with A-ring fragments using Sonogashira or Wittig-Horner protocol, providing the targeted D-seco analogs of 1α,25-dihydroxyvitamin D 3 and 1α,25-dihydroxy-19-norvitamin D 3 possessing a vinyl substituent at C-14 and a double bond between C-17 and C-20. The affinities of the synthesized vitamin D analogs to the full-length recombinant rat VDR were examined, as well as their differentiating and transcriptional activities. In these in vitro tests, they were significantly less active compared to 1α,25-(OH) 2 D 3 . Moreover, it was established that the analogs tested in vivo in rats showed no calcemic potency. Copyright © 2016 Elsevier Ltd. All rights reserved.
Ducrot, Virginie; Askem, Clare; Azam, Didier; Brettschneider, Denise; Brown, Rebecca; Charles, Sandrine; Coke, Maïra; Collinet, Marc; Delignette-Muller, Marie-Laure; Forfait-Dubuc, Carole; Holbech, Henrik; Hutchinson, Thomas; Jach, Arne; Kinnberg, Karin L; Lacoste, Cédric; Le Page, Gareth; Matthiessen, Peter; Oehlmann, Jörg; Rice, Lynsey; Roberts, Edward; Ruppert, Katharina; Davis, Jessica Elphinstone; Veauvy, Clemence; Weltje, Lennart; Wortham, Ruth; Lagadic, Laurent
2014-12-01
The OECD test guideline development program has been extended in 2011 to establish a partial life-cycle protocol for assessing the reproductive toxicity of chemicals to several mollusk species, including the great pond snail Lymnaea stagnalis. In this paper, we summarize the standard draft protocol for a reproduction test with this species, and present inter-comparison results obtained in a 56-day prevalidation ring-test using this protocol. Seven European laboratories performed semi-static tests with cultured snails of the strain Renilys® exposed to nominal concentrations of cadmium chloride (from 53 to 608μgCdL(-1)). Cd concentrations in test solutions were analytically determined to confirm accuracy in the metal exposure concentrations in all laboratories. Physico-chemical and biological validity criteria (namely dissolved oxygen content >60% ASV, water temperature 20±1°C, control snail survival >80% and control snail fecundity >8 egg-masses per snail over the test period) were met in all laboratories which consistently demonstrated the reproductive toxicity of Cd in snails using the proposed draft protocol. Effect concentrations for fecundity after 56days were reproducible between laboratories (68
Switchable genetic oscillator operating in quasi-stable mode
Strelkowa, Natalja; Barahona, Mauricio
2010-01-01
Ring topologies of repressing genes have qualitatively different long-term dynamics if the number of genes is odd (they oscillate) or even (they exhibit bistability). However, these attractors may not fully explain the observed behaviour in transient and stochastic environments such as the cell. We show here that even repressilators possess quasi-stable, travelling wave periodic solutions that are reachable, long-lived and robust to parameter changes. These solutions underlie the sustained oscillations observed in even rings in the stochastic regime, even if these circuits are expected to behave as switches. The existence of such solutions can also be exploited for control purposes: operation of the system around the quasi-stable orbit allows us to turn on and off the oscillations reliably and on demand. We illustrate these ideas with a simple protocol based on optical interference that can induce oscillations robustly both in the stochastic and deterministic regimes. PMID:20097721
Accountability and Educational Equity in the Transformation of an Urban District.
ERIC Educational Resources Information Center
Koschoreck, James W.
2001-01-01
Highlights how one Texas school district moved from being a district in which token representations of minority achievement were considered evidence of districtwide success to being a district where success for all children is the operating paradigm. Guided by vision, culture, and district support, teachers have raised student achievement levels…
26 CFR 44.4402-1 - Exemptions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... section 4401 on any wager placed in a coin-operated device (as defined in section 4462 as in effect for... similar object, to operate a device described in section 4462(a)(2) (as so in effect). These devices... or tokens, has the features and characteristics of a gaming device whether or not evidence exists as...
Money-Go-Round: A Self Teaching Program.
ERIC Educational Resources Information Center
Tomich, John G.; Gilray, James G.
The self-instructional program is designed to give students in grades 4-6 new insights into the concept of money. By using the programmed learning material the students become acquainted with the evolution of money through questioning techniques. Students explore the concepts of barter, token money, coins, paper money, and checks. The paper…
Effects of Instructions, Self-Instructions and Discipline on Children's Donating.
ERIC Educational Resources Information Center
Brown, Margery S.; Israel, Allen C.
In a study of children's donating behavior, the effects of experimenter instructions, perceived maternal discipline, and self-instructive cognitions were investigated. Seventy-two second; third; and fourth-grade girls who viewed their mothers as inductive or power assertive earned tokens in a size-judgement task. They observed a model donate and…
When the Chips Are down: Taking Time to Pay Attention to Real Issues
ERIC Educational Resources Information Center
Model, David
2011-01-01
Global warming, deforestation, destruction of the oceans, hunger, poverty, human rights abuses and war crimes will, at best, be redressed by empty words and token gestures unless the public imbibes massive doses of caffeine. Unfortunately the public's attention seems to be focused elsewhere. Blackberries, cell phones, social networks on the…
ERIC Educational Resources Information Center
Lalvani, Priya; Broderick, Alicia A.
2013-01-01
Despite acknowledgement among social justice educators about the need to infuse anti-bias lessons in K-12 curricula, discussions of disability oppression are silent in schools. Token efforts at addressing the topic of disability generally manifest as "disability awareness day(s)" and often include "disability simulations,"…
Digital Badges: Recognizing, Assessing, and Motivating Learners in and out of School Contexts
ERIC Educational Resources Information Center
Ian O'Byrne, W.; Schenke, Katerina; Willis, James E., III.; Hickey, Daniel T.
2015-01-01
Digital badges are web-enabled tokens of accomplishment that contain specific claims and evidence about learning and achievement along with detailed evidence supporting those claims. Badges traditionally consist of an image and relevant metadata (e.g., badge name, description, criteria, issuer, evidence, date issued, standards, and tags). This…
Wind Power in Australia: Overcoming Technological and Institutional Barriers
ERIC Educational Resources Information Center
Healey, Gerard; Bunting, Andrea
2008-01-01
Until recently, Australia had little installed wind capacity, although there had been many investigations into its potential during the preceding decades. Formerly, state-owned monopoly utilities showed only token interest in wind power and could dictate the terms of energy debates. This situation changed in the late 1990s: Installed wind capacity…
Vocabulary Simplifications for Children: A Special Case of "Motherese"?
ERIC Educational Resources Information Center
Hayes, Donald P.; Ahrens, Margaret G.
1988-01-01
Examines spontaneous conversations between adults and children. Findings indicate that adults' altered mean length of utterance and type-token ratio were based on their age. Contrary to the researcher's expectations, the adults did not choose their words from the 10,000 most common word types in an age-dependent manner. (Author/CB)
ERIC Educational Resources Information Center
Kurowski, Kathleen M.; Blumstein, Sheila E.; Palumbo, Carole L.; Waldstein, Robin S.; Burton, Martha W.
2007-01-01
The present study investigated the articulatory implementation deficits of Broca's and Wernicke's aphasics and their potential neuroanatomical correlates. Five Broca's aphasics, two Wernicke's aphasics, and four age-matched normal speakers produced consonant-vowel-(consonant) real word tokens consisting of [m, n] followed by [i, e, a, o, u]. Three…
Delay Discounting of Self-Determined and Experimenter-Determined Commodities
ERIC Educational Resources Information Center
Weatherly, Jeffrey N.; Gudding, Jennifer; Derenne, Adam
2010-01-01
Research suggests that individuals prefer self-determined reinforcers over experimenter-determined ones. The present study had 518 college students complete a delay-discounting task in which the commodity was cigarettes, a grocery store gift card, casino tokens, cash, or the choice of the four. The least amount of delay discounting was observed…
25 CFR 140.24 - Cash payments only to Indians.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 25 Indians 1 2012-04-01 2011-04-01 true Cash payments only to Indians. 140.24 Section 140.24 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES LICENSED INDIAN TRADERS § 140.24 Cash payments only to Indians. Traders must not pay Indians in tokens, tickets, store orders...
25 CFR 140.24 - Cash payments only to Indians.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 1 2010-04-01 2010-04-01 false Cash payments only to Indians. 140.24 Section 140.24 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES LICENSED INDIAN TRADERS § 140.24 Cash payments only to Indians. Traders must not pay Indians in tokens, tickets, store orders...
25 CFR 140.24 - Cash payments only to Indians.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 25 Indians 1 2011-04-01 2011-04-01 false Cash payments only to Indians. 140.24 Section 140.24 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES LICENSED INDIAN TRADERS § 140.24 Cash payments only to Indians. Traders must not pay Indians in tokens, tickets, store orders...
25 CFR 140.24 - Cash payments only to Indians.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 25 Indians 1 2013-04-01 2013-04-01 false Cash payments only to Indians. 140.24 Section 140.24 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES LICENSED INDIAN TRADERS § 140.24 Cash payments only to Indians. Traders must not pay Indians in tokens, tickets, store orders...
Affective Management Strategies for Behavior Disordered Students--Elementary and Secondary Levels.
ERIC Educational Resources Information Center
Burkholder, Lynn D.; And Others
The Positive Education Program (PEP) in Cuyahoga, Ohio, incorporates a token economy and group process approach into the daily school routine for emotionally disturbed and behaviorally handicapped students. At elementary and secondary levels, minimum rules and expectations as well as privileges awarded for behaviors are clearly set forth. The…
Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community
2012-01-13
unintrusive solutions that boost security. For example, gamers are even buying hardware tokens to protect their World of Warcraft accounts [5]. Build...security technology. http://www. vmware.com/technology/security/vmsafe.html. [4] VNC. http://en.wikipedia.org/wiki/VNC. [5] World of warcraft to sell
The American Military Advisor: Dealing with Senior Foreign Officials in the Islamic World
2008-08-01
alcohol. And no culture has ever managed to completely outlaw sexual misadventures. If alcohol flows too freely or prostitutes are brought in after...salary structure set by regulation, or is it based on fees for service, on the order of American waiters and waitresses who receive only a token
Disruptive Effects of Contingent Food on High-Probability Behavior
ERIC Educational Resources Information Center
Frank-Crawford, Michelle A.; Borrero, John C.; Nguyen, Linda; Leon-Enriquez, Yanerys; Carreau-Webster, Abbey B.; DeLeon, Iser G.
2012-01-01
The delivery of food contingent on 10 s of consecutive toy engagement resulted in a decrease in engagement and a corresponding increase in other responses that had been previously reinforced with food. Similar effects were not observed when tokens exchangeable for the same food were delivered, suggesting that engagement was disrupted by the…
Department of Defense Public Key Infrastructure Token Protection Profile. Version 2.0
2001-03-12
Profile Authors: Tamara Cleveland, Booz·Allen & Hamilton Inc. Michael Alexander, Booz·Allen & Hamilton Inc. Asok Ganguly, Booz·Allen & Hamilton Inc...testing, and electron beam testing. • Other attacks, such as UV or X- rays or high temperatures, could cause erasure of memory. However, erasure of selected
Beyond Backpacks and Bus Tokens: Next Steps for a District Homeless Student Initiative
ERIC Educational Resources Information Center
Hallett, Ronald E.; Low, Justin A.; Skrla, Linda
2015-01-01
How policies get translated and enacted by school districts frame how students experience reforms associated with federal law. This qualitative case study of a Northern California school district explores the importance of integrating homeless student initiatives within all aspects of the district functioning. Drawing from the equity framework of…
Methods for increasing cooperation rates for surveys of family forest owners
Brett J. Butler; Jaketon H. Hewes; Mary L. Tyrrell; Sarah M. Butler
2016-01-01
To maximize the representativeness of results from surveys, coverage, sampling, nonresponse, measurement, and analysis errors must be minimized. Although not a cure-all, one approach for mitigating nonresponse errors is to maximize cooperation rates. In this study, personalizing mailings, token financial incentives, and the use of real stamps were tested for their...
Pseudoquotation in Current English Communication: "Hey, She Didn't Really Say It."
ERIC Educational Resources Information Center
Dubois, Betty Lou
1989-01-01
In an investigation of the use of the word "hey" in pseudoquotations, invented quotations, in current English communication, tokens (n=26) were collected from public and commercial broadcasts and miscellaneous readings. A speaker uses quote formula + hey + pseudoquotation to dramatize and give emphasis to an important point. (72…
Beyond Tokenism: Teaching a Diverse History in the Post-14 Curriculum
ERIC Educational Resources Information Center
Dennis, Nick
2016-01-01
Nick Dennis shows how a "multidirectional memory" approach to teaching history can move history teachers beyond seeing black history as separate or distracting from the history that must be taught at examination level. He gives examples of ways in which a diverse history can be built into examination courses, strengthening historical…
Madame President: Examining the Influence of Gender on Women University Presidents' Leadership
ERIC Educational Resources Information Center
Bucklin, Mary L.
2010-01-01
Women university presidents are now successfully leading major doctoral-granting universities, both public and private, and their numbers are trending upward, rising from "token" status numbers (13% in 2007) to a "minority" status of presidents (currently at approximately 20%). Assuming that gender (the socially-constructed expectations of being…
The Rhetoric of Betty Friedan: Rhetoric of Redefinition.
ERIC Educational Resources Information Center
Foss, Karen A.
Two speeches by Betty Friedan, author of "The Feminine Mystique" and first president of the National Organization for Women (NOW), are examined in this paper. The first speech analyzed, "Tokenism and the Pseudo-Radical Cop-Out," was delivered at Cornell University in January, 1969, and the second, a "Call to Women's Strike…
Evaluation of the Albuquerque Indian School Motivational Environment Program.
ERIC Educational Resources Information Center
Hiat, Albert B.; And Others
In order to evaluate the impact of a token economy behavior modification program implemented from 1970-71 in the Albuquerque Indian School (AIS), a secondary institution, a five-member evaluation team assessed standardized test results, behavioral data, and student and staff attitudes. A battery of tests (Tennessee Self-Concept Scale, SRA…
Tongue-Palate Contact of Perceptually Acceptable Alveolar Stops
ERIC Educational Resources Information Center
Lee, Alice; Gibbon, Fiona E.; O'Donovan, Cliona
2013-01-01
Increased tongue-palate contact for perceptually acceptable alveolar stops has been observed in children with speech sound disorders (SSD). This is a retrospective study that further investigated this issue by using quantitative measures to compare the target alveolar stops /t/, /d/ and /n/ produced in words by nine children with SSD (20 tokens of…
hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers
NASA Astrophysics Data System (ADS)
Li, Shujun; Sadeghi, Ahmad-Reza; Schmitz, Roland
We propose hPIN/hTAN, a low-cost token-based e-banking protection scheme when the adversary has full control over the user's computer. Compared with existing hardware-based solutions, hPIN/hTAN depends on neither second trusted channel, nor secure keypad, nor computationally expensive encryption module.
Whispers in the Walls: Unspoken Words in the Public School Fortress
ERIC Educational Resources Information Center
Barton, Colleen
2007-01-01
Teenage pregnancy is not a new issue, and though policymakers have made token efforts toward curtailing the problem, current preventative and support programs have little effect. Their failure can be attributed to an institutional refusal to acknowledge teenagers as sexual beings, thus limiting the scope of sex education curricula. Abstinence-only…
Queer Student Leaders of Color: Leadership as Authentic, Collaborative, Culturally Competent
ERIC Educational Resources Information Center
Miller, Ryan A.; Vaccaro, Annemarie
2016-01-01
A phenomenological study yielded rich data about the essence of being a queer student leader of Color. Six participants described a desire to be authentic, culturally competent, and collaborative leaders, but they faced challenges enacting these forms of leadership as they navigated oppression (e.g., disrespect, stereotyping, tokenization,…
ERIC Educational Resources Information Center
Baltes, Margaret M.
The investigator felt that littering is a behavior contingent upon certain environmental conditions and that these conditions should be examined systematically. Specifically, this study sought to examine the effects of a behavior modification approach to littering with eight four-year-old subjects. Using token positive reinforcement, token…
Examining Theories of Distributive Justice with an Asymmetric Public Goods Game
ERIC Educational Resources Information Center
Schmidt, Stephen J.
2015-01-01
In this article, the author presents an asymmetric version of the familiar public goods classroom experiment, in which some players are given more tokens to invest than others, and players collectively decide whether to divide the return to the group investment asymmetrically as well. The asymmetry between players raises normative issues about…
The Feminization of Veterinary Medicine.
ERIC Educational Resources Information Center
Gose, Ben
1998-01-01
In little more than a generation, veterinary medical schools have gone from enrolling a token number of women to having a higher proportion of women than men in some cases. Developments in drugs to control large animals, relatively low pay for veterinarians, and options for part-time employment have served to change the balance of sexes in the…
7 CFR 1955.66 - Lease of real property.
Code of Federal Regulations, 2011 CFR
2011-01-01
... leased or rented (market rent). Inventory property will not be leased for a token amount. (1) Farm... payment assistance, if any) calculated on the basis of the price of the house and income of the lessee... price. (2) The purchase price (option price) will be the advertised sales price as determined by an...
Jürgens, Rebecca; Grass, Annika; Drolet, Matthis; Fischer, Julia
Both in the performative arts and in emotion research, professional actors are assumed to be capable of delivering emotions comparable to spontaneous emotional expressions. This study examines the effects of acting training on vocal emotion depiction and recognition. We predicted that professional actors express emotions in a more realistic fashion than non-professional actors. However, professional acting training may lead to a particular speech pattern; this might account for vocal expressions by actors that are less comparable to authentic samples than the ones by non-professional actors. We compared 80 emotional speech tokens from radio interviews with 80 re-enactments by professional and inexperienced actors, respectively. We analyzed recognition accuracies for emotion and authenticity ratings and compared the acoustic structure of the speech tokens. Both play-acted conditions yielded similar recognition accuracies and possessed more variable pitch contours than the spontaneous recordings. However, professional actors exhibited signs of different articulation patterns compared to non-trained speakers. Our results indicate that for emotion research, emotional expressions by professional actors are not better suited than those from non-actors.
NASA Astrophysics Data System (ADS)
Ribeiro, Luís S.; Costa, Carlos; Oliveira, José Luís
2010-03-01
Diagnostic tools supported by digital medical images have increasingly become an essential aid to medical decisions. However, despite its growing importance, Picture Archiving and Communication Systems (PACS) are typically oriented to support a single healthcare institution, and the sharing of medical data across institutions is still a difficult process. This paper describes a proposal to publish and control Digital Imaging Communications in Medicine (DICOM) services in a wide domain composed of several healthcare institutions. The system creates virtual bridges between intranets enabling the exchange, search and store of the medical data within the wide domain. The service provider publishes the DICOM services following a token-based strategy. The token advertisements are public and known by all system users. However, access to the DICOM service is controlled through a role association between an access key and the service. Furthermore, in medical diagnoses, time is a crucial factor. Therefore, our system is a turnkey solution, capable of exchanging medical data across firewalls and Network Address Translation (NAT), avoiding bureaucratic issues with local network security. Security is also an important concern - in any transmission across different domains, data is encrypted by Transport Layer Security (TLS).
Baese-Berk, Melissa M.; Dilley, Laura C.; Schmidt, Stephanie; Morrill, Tuuli H.; Pitt, Mark A.
2016-01-01
Neil Armstrong insisted that his quote upon landing on the moon was misheard, and that he had said one small step for a man, instead of one small step for man. What he said is unclear in part because function words like a can be reduced and spectrally indistinguishable from the preceding context. Therefore, their presence can be ambiguous, and they may disappear perceptually depending on the rate of surrounding speech. Two experiments are presented examining production and perception of reduced tokens of for and for a in spontaneous speech. Experiment 1 investigates the distributions of several acoustic features of for and for a. The results suggest that the distributions of for and for a overlap substantially, both in terms of temporal and spectral characteristics. Experiment 2 examines perception of these same tokens when the context speaking rate differs. The perceptibility of the function word a varies as a function of this context speaking rate. These results demonstrate that substantial ambiguity exists in the original quote from Armstrong, and that this ambiguity may be understood through context speaking rate. PMID:27603209
Baese-Berk, Melissa M; Dilley, Laura C; Schmidt, Stephanie; Morrill, Tuuli H; Pitt, Mark A
2016-01-01
Neil Armstrong insisted that his quote upon landing on the moon was misheard, and that he had said one small step for a man, instead of one small step for man. What he said is unclear in part because function words like a can be reduced and spectrally indistinguishable from the preceding context. Therefore, their presence can be ambiguous, and they may disappear perceptually depending on the rate of surrounding speech. Two experiments are presented examining production and perception of reduced tokens of for and for a in spontaneous speech. Experiment 1 investigates the distributions of several acoustic features of for and for a. The results suggest that the distributions of for and for a overlap substantially, both in terms of temporal and spectral characteristics. Experiment 2 examines perception of these same tokens when the context speaking rate differs. The perceptibility of the function word a varies as a function of this context speaking rate. These results demonstrate that substantial ambiguity exists in the original quote from Armstrong, and that this ambiguity may be understood through context speaking rate.
Method and system for analyzing and classifying electronic information
McGaffey, Robert W.; Bell, Michael Allen; Kortman, Peter J.; Wilson, Charles H.
2003-04-29
A data analysis and classification system that reads the electronic information, analyzes the electronic information according to a user-defined set of logical rules, and returns a classification result. The data analysis and classification system may accept any form of computer-readable electronic information. The system creates a hash table wherein each entry of the hash table contains a concept corresponding to a word or phrase which the system has previously encountered. The system creates an object model based on the user-defined logical associations, used for reviewing each concept contained in the electronic information in order to determine whether the electronic information is classified. The data analysis and classification system extracts each concept in turn from the electronic information, locates it in the hash table, and propagates it through the object model. In the event that the system can not find the electronic information token in the hash table, that token is added to a missing terms list. If any rule is satisfied during propagation of the concept through the object model, the electronic information is classified.
Development of a glottal area index that integrates glottal gap size and open quotient
Chen, Gang; Kreiman, Jody; Gerratt, Bruce R.; Neubauer, Juergen; Shue, Yen-Liang; Alwan, Abeer
2013-01-01
Because voice signals result from vocal fold vibration, perceptually meaningful vibratory measures should quantify those aspects of vibration that correspond to differences in voice quality. In this study, glottal area waveforms were extracted from high-speed videoendoscopy of the vocal folds. Principal component analysis was applied to these waveforms to investigate the factors that vary with voice quality. Results showed that the first principal component derived from tokens without glottal gaps was significantly (p < 0.01) associated with the open quotient (OQ). The alternating-current (AC) measure had a significant effect (p < 0.01) on the first principal component among tokens exhibiting glottal gaps. A measure AC/OQ, defined as the ratio of AC to OQ, was proposed to combine both amplitude and temporal characteristics of the glottal area waveform for both complete and incomplete glottal closures. Analyses of “glide” phonations in which quality varied continuously from breathy to pressed showed that the AC/OQ measure was able to characterize the corresponding continuum of glottal area waveform variation, regardless of the presence or absence of glottal gaps. PMID:23464035
Short-term memory and long-term memory are still different.
Norris, Dennis
2017-09-01
A commonly expressed view is that short-term memory (STM) is nothing more than activated long-term memory. If true, this would overturn a central tenet of cognitive psychology-the idea that there are functionally and neurobiologically distinct short- and long-term stores. Here I present an updated case for a separation between short- and long-term stores, focusing on the computational demands placed on any STM system. STM must support memory for previously unencountered information, the storage of multiple tokens of the same type, and variable binding. None of these can be achieved simply by activating long-term memory. For example, even a simple sequence of digits such as "1, 3, 1" where there are 2 tokens of the digit "1" cannot be stored in the correct order simply by activating the representations of the digits "1" and "3" in LTM. I also review recent neuroimaging data that has been presented as evidence that STM is activated LTM and show that these data are exactly what one would expect to see based on a conventional 2-store view. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Short-Term Memory and Long-Term Memory are Still Different
2017-01-01
A commonly expressed view is that short-term memory (STM) is nothing more than activated long-term memory. If true, this would overturn a central tenet of cognitive psychology—the idea that there are functionally and neurobiologically distinct short- and long-term stores. Here I present an updated case for a separation between short- and long-term stores, focusing on the computational demands placed on any STM system. STM must support memory for previously unencountered information, the storage of multiple tokens of the same type, and variable binding. None of these can be achieved simply by activating long-term memory. For example, even a simple sequence of digits such as “1, 3, 1” where there are 2 tokens of the digit “1” cannot be stored in the correct order simply by activating the representations of the digits “1” and “3” in LTM. I also review recent neuroimaging data that has been presented as evidence that STM is activated LTM and show that these data are exactly what one would expect to see based on a conventional 2-store view. PMID:28530428
Control of preference in children by conditioned positive reinforcement.
Favell, J E; Favell, J E
1972-07-01
A preference measure was employed with children to evaluate the conditioned positive reinforcing function of a stimulus that preceded reinforcement. A match-to-sample procedure was arranged in which subjects could respond to either the form or color dimension of a compound sample stimulus. Intermittent token reinforcement was provided equally for color and form matches. Two stimuli were employed (Stimulus A and Stimulus B), each consisting of a distinctive tone and colored light. One of these stimuli (the paired stimulus) preceded each token delivery, and the other did not (nonpaired stimulus). The paired stimulus was dependent upon each response to one match dimension, and the nonpaired stimulus followed each response to the other dimension. Three of the five subjects responded primarily to the dimension that was followed by the paired stimulus. This effect was obtained regardless of which stimulus (A or B) was paired and on which match dimension (color or form) the paired stimulus was dependent. These results were unaltered by discontinuing the nonpaired stimulus. The other two subjects demonstrated consistent preferences for the form dimension and Stimulus A, respectively.
1985-12-01
development of an improved Universal Network Interface Device (UNID II). The UNID II’s architecture was based on a preliminary design project at...interface device, performing all functions required ,: the multi-ring LAN. The device depicted by RADC’s studies would connect a highly variable group of host...used the ISO Open Systems Ilterconnection (OSI) seven layer model as the basic structure for data flow and program development . In 1982 Cuomo
Synthesis of Natural and Unnatural Cyclooligomeric Depsipeptides Enabled by Flow Chemistry
Lücke, Daniel; Dalton, Toryn; Ley, Steven V.
2016-01-01
Abstract Flow chemistry has been successfully integrated into the synthesis of a series of cyclooligomeric depsipeptides of three different ring sizes including the natural products beauvericin (1 a), bassianolide (2 b) and enniatin C (1 b). A reliable flow chemistry protocol was established for the coupling and macrocyclisation to form challenging N‐methylated amides. This flexible approach has allowed the rapid synthesis of both natural and unnatural depsipeptides in high yields, enabling further exploration of their promising biological activity. PMID:26844421
Oron, Anna; Szymaszek, Aneta; Szelag, Elzbieta
2015-01-01
Temporal information processing (TIP) underlies many aspects of cognitive functions like language, motor control, learning, memory, attention, etc. Millisecond timing may be assessed by sequencing abilities, e.g. the perception of event order. It may be measured with auditory temporal-order-threshold (TOT), i.e. a minimum time gap separating two successive stimuli necessary for a subject to report their temporal order correctly, thus the relation 'before-after'. Neuropsychological evidence has indicated elevated TOT values (corresponding to deteriorated time perception) in different clinical groups, such as aphasic patients, dyslexic subjects or children with specific language impairment. To test relationships between elevated TOT and declined cognitive functions in brain-injured patients suffering from post-stroke aphasia. We tested 30 aphasic patients (13 male, 17 female), aged between 50 and 81 years. TIP comprised assessment of TOT. Auditory comprehension was assessed with the selected language tests, i.e. Token Test, Phoneme Discrimination Test (PDT) and Voice-Onset-Time Test (VOT), while two aspects of attentional resources (i.e. alertness and vigilance) were measured using the Test of Attentional Performance (TAP) battery. Significant correlations were indicated between elevated values of TOT and deteriorated performance on all applied language tests. Moreover, significant correlations were evidenced between elevated TOT and alertness. Finally, positive correlations were found between particular language tests, i.e. (1) Token Test and PDT; (2) Token Test and VOT Test; and (3) PDT and VOT Test, as well as between PDT and both attentional tasks. These results provide further clinical evidence supporting the thesis that TIP constitutes the core process incorporated in both language and attentional resources. The novel value of the present study is the indication for the first time in Slavic language users a clear coexistence of the 'timing-auditory comprehension-attention' relationships. © 2015 Royal College of Speech and Language Therapists.
Maurya, Sushil K; Rana, Rohit
2017-01-01
An efficient, eco-compatible diversity-oriented synthesis (DOS) approach for the generation of library of sugar embedded macrocyclic compounds with various ring size containing 1,2,3-triazole has been developed. This concise strategy involves the iterative use of readily available sugar-derived alkyne/azide-alkene building blocks coupled through copper catalyzed azide-alkyne cycloaddition (CuAAC) reaction followed by pairing of the linear cyclo-adduct using greener reaction conditions. The eco-compatibility, mild reaction conditions, greener solvents, easy purification and avoidance of hazards and toxic solvents are advantages of this protocol to access this important structural class. The diversity of the macrocycles synthesized (in total we have synthesized 13 macrocycles) using a set of standard reaction protocols demonstrate the potential of the new eco-compatible approach for the macrocyclic library generation.
ERIC Educational Resources Information Center
Miyata, Munehiko
2011-01-01
This dissertation presents results from a series of experiments investigating adult learning of an artificial language and the effects that input frequency (high vs. low token frequency), frequency distribution (skewed vs. balanced), presentation mode (structured vs. scrambled), and first language (English vs. Japanese) have on such learning.…
ERIC Educational Resources Information Center
Saunders, Rebecca
2013-01-01
Research literature in the field of teacher emotions and change broadly accepts that behaviour and cognition are inseparable from perception and emotion. Despite this, educational reform efforts tend to focus predominantly on changing individual behaviours and beliefs and largely neglect or at best pay token attention to the emotional dimensions…
A Learner Corpus-Based Study on Verb Errors of Turkish EFL Learners
ERIC Educational Resources Information Center
Can, Cem
2017-01-01
As learner corpora have presently become readily accessible, it is practicable to examine interlanguage errors and carry out error analysis (EA) on learner-generated texts. The data available in a learner corpus enable researchers to investigate authentic learner errors and their respective frequencies in terms of types and tokens as well as…
10 Quick Ways to Analyze Children's Books for Racism and Sexism.
ERIC Educational Resources Information Center
Racism and Sexism Resource Center for Educators, New York, NY.
The 10 guidelines in this guide to analyzing children's books serve as a starting point for evaluating children's literature from the perspective of racist and sexist attitudes. (1) Check the illustrations. Look for stereotypes, for tokenism, and for who's doing what. (2) Check the story lines. Look for subtle forms of bias in such approaches as…
Principled and Statistical Connections in Common Sense Conception
ERIC Educational Resources Information Center
Prasada, Sandeep; Dillingham, Elaine M.
2006-01-01
Nominal concepts represent things as tokens of types. We report six experiments that investigate the nature of the relations we represent between the type of thing something is (e.g. DOG) and its other properties. The experiments provide evidence that we represent principled connections between the type of thing something is (e.g. DOG) and some of…
Implementing Behavior Modification Procedures in an Elementary School: Problems and Issues.
ERIC Educational Resources Information Center
Elardo, Richard
This paper represents a report of a year-long case study of the implementation of a token economy in an entire elementary school. The effort was intended to provide teachers with an alternative to corporal punishment as a form of school discipline. In this report, both the successful and unsuccessful procedures are described in chronological…
Specific-Token Effects in Screening Tasks: Possible Implications for Aviation Security
ERIC Educational Resources Information Center
Smith, J. David; Redford, Joshua S.; Washburn, David A.; Taglialatela, Lauren A.
2005-01-01
Screeners at airport security checkpoints perform an important categorization task in which they search for threat items in complex x-ray images. But little is known about how the processes of categorization stand up to visual complexity. The authors filled this research gap with screening tasks in which participants searched for members of target…
Does Hearing Several Speakers Reduce Foreign Word Learning?
ERIC Educational Resources Information Center
Ludington, Jason Darryl
2016-01-01
Learning spoken word forms is a vital part of second language learning, and CALL lends itself well to this training. Not enough is known, however, about how auditory variation across speech tokens may affect receptive word learning. To find out, 144 Thai university students with no knowledge of the Patani Malay language learned 24 foreign words in…
ERIC Educational Resources Information Center
Molis, Michelle R.; Leek, Marjorie R.
2011-01-01
Purpose: This study examined the influence of presentation level and mild-to-moderate hearing loss on the identification of a set of vowel tokens systematically varying in the frequency locations of their second and third formants. Method: Five listeners with normal hearing (NH listeners) and five listeners with hearing impairment (HI listeners)…
The World of Work: Work Week-Update. A Research Project.
ERIC Educational Resources Information Center
Ellington, Carol E.
A study of the difference in student performance when currency or token money is used was studied with six mildly mentally retarded children (ages 8 to 12) as Ss. Students were given jobs (teacher aide, movie projectionist, art or shop teacher) and were rated in the areas of punctuality, appearance, following directions, completing tasks, and…
Money Is Essential: Ownership Intuitions Are Linked to Physical Currency
ERIC Educational Resources Information Center
Uhlmann, Eric Luis; Zhu, Luke
2013-01-01
Due to basic processes of psychological essentialism and contagion, one particular token of monetary currency is not always interchangeable with another piece of currency of equal economic value. When money loses its physical form it is perceived as "not quite the same" money (i.e., to have partly lost the original essence that distinguished it…
78 FR 11154 - Large Residential Washers From the Republic of Korea: Countervailing Duty Order
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-15
... externally mounted steel frame at least six inches high that is designed to house a coin/token operated... ``stacked washer-dryers'' denotes distinct washing and drying machines that are built on a unitary frame and... of steel and is assembled with security fasteners;\\8\\ or \\7\\ ``Payment system electronics'' denotes a...
Department of Defense Plan to Establish Public Access to the Results of Federally Funded Research
2015-02-01
journal articles , data management plans, and will track metrics on compliance and public usage. The current DTIC infrastructure will be modified to...tokens to authors who submit digitally formatted scientific data and articles . DTIC will establish compliance metrics in FY15. DoD will explore...15 10. METRICS , COMPLIANCE and EVALUATION