392 research outputs found

    A Closed System of Production Possibility and Social Welfare

    Get PDF
    We offer a closed system production possibility and social welfare system that can be modelled using virtually any available software package. It has the attribute that social welfare is not independent of production possibilities. The closure is made using the famous result by Negishi (1960) for a purely competitive economy. The goal is to help students to understand the interaction, through experimentation, between production and social choice in a competitive economy.

    The drama and the short-story: a comparison

    Full text link
    Thesis (M.A.)--Boston Universit

    An Ethnographic Study of Sikhism in Suburban Chicagoland

    Get PDF
    Includes bibliographical references.This research is an anthropological ethnographic study of Sikhism as practiced in Chicago suburbia. Sikhism is explored as a separate cultural group, focusing on what it means to be a Sikh in the U.S. today. The initial interview was conducted with Mohinder Singh, a Sikh priest affiliated with the Chicago chapter of the Sikh Society. Areas explored are religious tenets of faith, cultural differences, as well as political issues affecting Sikhs. Mrs. Rani Singh is a mother of 3 and the wife of a hospital radiologist in Aurora. She is an outspoken defender of minority rights and an active member in the Sikh community. Rani and her children, Ravi, 17; Savina, 15; and Simer, 10; also participated in this study. These investigative interviews, along with extensive background material, are presented alone with my findings and conclusions. Issue headings are divided into 4 areas: 1) Cultural Group Identity as Evidenced by Unique Sikh Appearance; 2) Religious beliefs that influence Sikh behavior; 3) Sikh historical background influencing the Sikh community; and 4) Current political issues facing Sikhism.B.A. (Bachelor of Arts

    A Spiral Computer Engineering Lab Framework

    Get PDF
    This development establishes a “spiral” lab framework, in which the key concepts are revisited at increasing levels of sophistication and interconnection, for Computer Engineering curriculum. The development is addressing a serious deficiency – lack of integration skill – in engineering curriculum. The framework connects and integrates the individual courses through a coherent sequence of lab experiments and projects across the entire curriculum. These lab experiments and projects are designed to illustrate and reinforce key theoretical concepts and their complexities and abstraction levels gradually grow as students progress through the curriculum. The framework is based in three cohesive themes: video, audio, and touch sensor, and individual projects are eventually evolved into a complete set of IP (intellectual property) cores that form customizable I/O subsystems and can be incorporated into any FPGA (field programmable gate array) based computer system. The development uses low-cost prototyping board and can be easily incorporated into existing curriculum. The improved curriculum will enhance students\u27 integration skill, make them aware of the big context, and keep them interested and motivated. This project is currently implemented and evaluated in two institutions in parallel and two new book manuscripts with the developed materials are under preparation

    Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content

    Get PDF
    Mixed Flash and JavaScript content has become increasingly prevalent; its purveyance of dynamic features unique to each platform has popularized it for myriad Web development projects. Although Flash and JavaScript security has been examined extensively, the security of untrusted content that combines both has received considerably less attention. This article considers this fusion in detail, outlining several practical scenarios that threaten the security of Web applications. The severity of these attacks warrants the development of new techniques that address the security of Flash-JavaScript content considered as a whole, in contrast to prior solutions that have examined Flash or JavaScript security individually. Toward this end, the article presents FlashJaX, a cross-platform solution that enforces fine-grained, history-based policies that span both Flash and JavaScript. Using in-lined reference monitoring, FlashJaX safely embeds untrusted JavaScript and Flash content in Web pages without modifying browser clients or using special plug-ins. The architecture of FlashJaX, its design and implementation, and a detailed security analysis are exposited. Experiments with advertisements from popular ad networks demonstrate that FlashJaX is transparent to policy-compliant advertisement content, yet blocks many common attack vectors that exploit the fusion of these Web platforms

    Automating Cyberdeception Evaluation with Deep Learning

    Get PDF
    A machine learning-based methodology is proposed and implemented for conducting evaluations of cyberdeceptive defenses with minimal human involvement. This avoids impediments associated with deceptive research on humans, maximizing the efficacy of automated evaluation before human subjects research must be undertaken. Leveraging recent advances in deep learning, the approach synthesizes realistic, interactive, and adaptive traffic for consumption by target web services. A case study applies the approach to evaluate an intrusion detection system equipped with application-layer embedded deceptive responses to attacks. Results demonstrate that synthesizing adaptive web traffic laced with evasive attacks powered by ensemble learning, online adaptive metric learning, and novel class detection to simulate skillful adversaries constitutes a challenging and aggressive test of cyberdeceptive defenses

    Helen Leidy Hamlin Correspondence

    Get PDF
    Entries include letters, a biography, newspaper clippings including photographic images of Hamlin\u27s family from her first marriage, a publisher advertisement, and notes about a new marriage partne
    corecore