828 resultados para Language-based security


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background Young children are known to be the most frequent hospital users compared to older children and young adults. Therefore, they are an important population from economic and policy perspectives of health care delivery. In Switzerland complete hospitalization discharge records for children [<5 years] of four consecutive years [2002–2005] were evaluated in order to analyze variation in patterns of hospital use. Methods Stationary and outpatient hospitalization rates on aggregated ZIP code level were calculated based on census data provided by the Swiss federal statistical office (BfS). Thirty-seven hospital service areas for children [HSAP] were created with the method of "small area analysis", reflecting user-based health markets. Descriptive statistics and general linear models were applied to analyze the data. Results The mean stationary hospitalization rate over four years was 66.1 discharges per 1000 children. Hospitalizations for respiratory problem are most dominant in young children (25.9%) and highest hospitalization rates are associated with geographical factors of urban areas and specific language regions. Statistical models yielded significant effect estimates for these factors and a significant association between ambulatory/outpatient and stationary hospitalization rates. Conclusion The utilization-based approach, using HSAP as spatial representation of user-based health markets, is a valid instrument and allows assessing the supply and demand of children's health care services. The study provides for the first time estimates for several factors associated with the large variation in the utilization and provision of paediatric health care resources in Switzerland.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND: The role of the language network in the pathophysiology of formal thought disorder has yet to be elucidated. AIMS: To investigate whether specific grey-matter deficits in schizophrenic formal thought disorder correlate with resting perfusion in the left-sided language network. METHOD: We investigated 13 right-handed patients with schizophrenia and formal thought disorder of varying severity and 13 matched healthy controls, using voxel-based morphometry and magnetic resonance imaging perfusion measurement (arterial spin labelling). RESULTS: We found positive correlations between perfusion and the severity of formal thought disorder in the left frontal and left temporoparietal language areas. We also observed bilateral deficits in grey-matter volume, positively correlated with the severity of thought disorder in temporoparietal areas and other brain regions. The results of the voxel-based morphometry and the arterial spin labelling measurements overlapped in the left posterior superior temporal gyrus and left angular gyrus. CONCLUSIONS: Specific grey-matter deficits may be a risk factor for state-related dysfunctions of the left-sided language system, leading to local hyperperfusion and formal thought disorder.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Concurrency control is mostly based on locks and is therefore notoriously difficult to use. Even though some programming languages provide high-level constructs, these add complexity and potentially hard-to-detect bugs to the application. Transactional memory is an attractive mechanism that does not have the drawbacks of locks, however the underlying implementation is often difficult to integrate into an existing language. In this paper we show how we have introduced transactional semantics into Smalltalk by using the reflective facilities of the language. Our approach is based on method annotations, incremental parse tree transformations and an optimistic commit protocol. The implementation does not depend on modifications to the virtual machine and therefore can be changed at the language level. We report on a practical case study, benchmarks and further and on-going work.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Second Life (SL) is an ideal platform for language learning. It is called a Multi-User Virtual Environment, where users can have varieties of learning experiences in life-like environments. Numerous attempts have been made to use SL as a platform for language teaching and the possibility of SL as a means to promote conversational interactions has been reported. However, the research so far has largely focused on simply using SL without further augmentations for communication between learners or between teachers and learners in a school-like environment. Conversely, not enough attention has been paid to its controllability which builds on the embedded functions in SL. This study, based on the latest theories of second language acquisition, especially on the Task Based Language Teaching and the Interaction Hypothesis, proposes to design and implement an automatized interactive task space (AITS) where robotic agents work as interlocutors of learners. This paper presents a design that incorporates the SLA theories into SL and the implementation method of the design to construct AITS, fulfilling the controllability of SL. It also presents the result of the evaluation experiment conducted on the constructed AITS.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we present XSAMPL3D, a novel language for the high-level representation of actions performed on objects by (virtual) humans. XSAMPL3D was designed to serve as action representation language in an imitation-based approach to character animation: First, a human demonstrates a sequence of object manipulations in an immersive Virtual Reality (VR) environment. From this demonstration, an XSAMPL3D description is automatically derived that represents the actions in terms of high-level action types and involved objects. The XSAMPL3D action description can then be used for the synthesis of animations where virtual humans of different body sizes and proportions reproduce the demonstrated action. Actions are encoded in a compact and human-readable XML-format. Thus, XSAMPL3D describtions are also amenable to manual authoring, e.g. for rapid prototyping of animations when no immersive VR environment is at the animator's disposal. However, when XSAMPL3D descriptions are derived from VR interactions, they can accomodate many details of the demonstrated action, such as motion trajectiories,hand shapes and other hand-object relations during grasping. Such detail would be hard to specify with manual motion authoring techniques only. Through the inclusion of language features that allow the representation of all relevant aspects of demonstrated object manipulations, XSAMPL3D is a suitable action representation language for the imitation-based approach to character animation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Aufbau einer föderativen Dienstlandschaft in der Ruhr-Region auf Basis von SAML mit dem Ziel eine organisationsübergreifende Nutzung von webbasierten IT-Diensten zu ermöglichen

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Ghana has witnessed a recurrent debate on the usefulness of indigenous Ghanaian languages in childhood education. It is assumed that using the mother tongue as a Medium of Instruction (MOI) during the early years improves children’s ability to acquire knowledge and other languages. Not everybody subscribes to this view though. There are those who feel that a solid start in English offers children a better chance of succeeding in school and in their careers. Presently, some parents who subscribe to the latter view have taken the extra step of stopping the use of indigenous Ghanaian languages at home. This paper presents the results of our investigation into whether the home language practices of Ghanaian students have any impact on their performance in English written argumentative discourse. The results are based on an analysis of an assigned essay of 92 students from one of Ghana’s best senior high schools. We then correlated their per¬formance with responses they gave to a questionnaire interrogating their background and language use at home. While some speak the native language at home, others grew up speaking exclusively English. We show that students who combine English and native Ghanaian languages at home performed better than those who used only English or only Ghanaian languages.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Brain processing of grammatical word class was studied analyzing event-related potential (ERP) brain fields. Normal subjects observed a randomized sequence of single German nouns and verbs on a computer screen, while 20-channel ERP field map series were recorded separately for both word classes. Spatial microstate analysis was applied, based on the observation that series of ERP maps consist of epochs of quasi-stable map landscapes and based on the rationale that different map landscapes must have been generated by different neural generators and thus suggest different brain functions. Space-oriented segmentation of the mean map series identified nine successive, different functional microstates, i.e., steps of brain information processing characterized by quasi-stable map landscapes. In the microstate from 116 to 172 msec, noun-related maps differed significantly from verb-related maps along the left–right axis. The results indicate that different neural populations represent different grammatical word classes in language processing, in agreement with clinical observations. This word class differentiation as revealed by the spatial–temporal organization of neural activity occurred at a time after word input compatible with speed of reading.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Internet of Things based systems are anticipated to gain widespread use in industrial applications. Standardization efforts, like 6L0WPAN and the Constrained Application Protocol (CoAP) have made the integration of wireless sensor nodes possible using Internet technology and web-like access to data (RESTful service access). While there are still some open issues, the interoperability problem in the lower layers can now be considered solved from an enterprise software vendors' point of view. One possible next step towards integration of real-world objects into enterprise systems and solving the corresponding interoperability problems at higher levels is to use semantic web technologies. We introduce an abstraction of real-world objects, called Semantic Physical Business Entities (SPBE), using Linked Data principles. We show that this abstraction nicely fits into enterprise systems, as SPBEs allow a business object centric view on real-world objects, instead of a pure device centric view. The interdependencies between how currently services in an enterprise system are used and how this can be done in a semantic real-world aware enterprise system are outlined, arguing for the need of semantic services and semantic knowledge repositories. We introduce a lightweight query language, which we use to perform a quantitative analysis of our approach to demonstrate its feasibility.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

For several years now, neuroscientific research has been striving towards fundamental answers to questions about the relevance of sex/gender to language processing in the brain. This research has been effected through the search for sex/gender differences in the neurobiology of language processing. Thus, the main aim has ever been to focus on the differentiation of the sexes/genders, failing to define what sex, what gender, what female or male is in neurolingustic research. In other words, although neuroscientific findings have provided key insights into the brain functioning of women and men, neuropsychology has rarely questioned the complexity of the sex/gender variable beyond biology. What does “female” or “male” mean in human neurocognition; how are operationalisations implemented along the axes of “femaleness” or “maleness”; or what biological evidence is used to register the variables sex and/or gender? In the neurosciences as well as in neurocognitive research, questions such as these have so far not been studied in detail, even if they are highly significant for the scientific process. Instead, the variable of sex/gender has always been thought as solely dichotomous (as either female or male), oppositional and exclusionary of each other. Here, this theoretical contribution sets in. Based on findings in neuroscience and concepts in gender theory, this poster is dedicated to the reflection about what sex/gender is in the neuroscience of language processing. Following this aim, two levels of interest will be addressed. First: How do we define sex/gender at the level of participants? And second: How do we define sex/gender at the level of the experimental task? For the first, a multifactorial registration (work in progress) of the variable sex/gender will be presented, i.e. a tool that records sex/gender in terms of biology and social issues as well as on a spectrum between femaleness and maleness. For the second, the compulsory dichotomy of a gendered task when neurolinguistically approaching our cognitions of sex/gender will be explored.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Rhythm is a central characteristic of music and speech, the most important domains of human communication using acoustic signals. Here, we investigated how rhythmical patterns in music are processed in the human brain, and, in addition, evaluated the impact of musical training on rhythm processing. Using fMRI, we found that deviations from a rule-based regular rhythmic structure activated the left planum temporale together with Broca's area and its right-hemispheric homolog across subjects, that is, a network also crucially involved in the processing of harmonic structure in music and the syntactic analysis of language. Comparing the BOLD responses to rhythmic variations between professional jazz drummers and musical laypersons, we found that only highly trained rhythmic experts show additional activity in left-hemispheric supramarginal gyrus, a higher-order region involved in processing of linguistic syntax. This suggests an additional functional recruitment of brain areas usually dedicated to complex linguistic syntax processing for the analysis of rhythmical patterns only in professional jazz drummers, who are especially trained to use rhythmical cues for communication.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Objectives: The aim of this content analysis study is to characterize the TV advertisements aired to an at-risk child population along the Texas-Mexico border. Methods: We characterized the early Saturday morning TV advertisements aired by three broadcast network categories (U.S. English language, U.S. Spanish language, and Mexican Spanish language) in Spring 2010. The number, type (food related vs. non-food related), target audience, and persuasion tactics used were recorded. Advertised foods, based on nutrition content, were categorized as meeting or not meeting current dietary guidelines. Results: Most commercials were non-food related (82.7%, 397 of 480). The majority of the prepared foods (e.g., cereals, snacks, and drinks) advertised did not meet the current U.S. Dietary Guidelines. Additionally, nutrition content information was not available for many of the foods advertised on the Mexican Spanish language broadcast network category. Conclusions: For U.S. children at risk for obesity along the Texas-Mexico border exposure to TV food advertisements may result in the continuation of sedentary behavior as well as an increased consumption of foods of poor nutritional quality. An international regulatory effort to monitor and enforce the reduction of child-oriented food advertising is needed. Editors' Note: This article was submitted in response to the first issue of the Journal of Applied Research on Children: Latino Children.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Seventy percent of the population in Myanmar lives in rural areas. Although health workers are adequately trained, they are overburdened due to understaffing and insufficient supplies. Literature confirms that information and communication technologies can extend the reach of healthcare. In this paper, we present an SMS-based social network that aims to help health workers to interact with other medical professionals through topic-based message delivery. Topics describe interests of users and the content of message. A message is delivered by matching message content with user interests. Users describe topics as ICD- 10 codes, a comprehensive medical taxonomy. In this ICD-10 coded SMS, a set of prearranged codes provides a common language for users to send structured information that fits inside an SMS.