339 research outputs found
Homework-Does It Impact Student Performance?
This study examined the impact of homework on performance in the content areas of mathematics and science. The participants were a fourth grade, inner city classroom in Rochester New York. Data was collected over two semesters. The first semester data served as a baseline for the amount of homework completed and the resulting grade for each of the 19 students. Homework strategies were implemented in the second semester to increase the amount of homework completed by the students. The amount of homework completed in both subject areas increased overall. The overall semester grades increased in mathematics more than in the area of science. Findings suggest that homework completion contributes to higher performance in academics
Single sign-on using trusted platforms
Network users today have to remember one username/password pair for every service
they are registered with. One solution to the security and usability implications of this
situation is Single Sign-On, a mechanism by which the user authenticates only once to
an entity termed the ‘Authentication Service Provider’ (ASP) and subsequently uses disparate
Service Providers (SPs) without necessarily re-authenticating. The information
about the user’s authentication status is handled between the ASP and the desired SP
in a manner transparent to the user. This paper demonstrates a method by which the
end-user’s computing platform itself plays the role of the ASP. The platform has to be
a Trusted Platform conforming to the Trusted Computing Platform Alliance (TCPA)
specifications. The relevant TCPA architectural components and security services are
described and associated threats are analysed
My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud
Based on the assumption that cloud providers can be trusted (to a certain extent) we define a trust, security and privacy preserving infrastructure that relies on trusted cloud providers to operate properly. Working in tandem with legal agreements, our open source software supports: trust and reputation management, sticky policies with fine grained access controls, privacy preserving delegation of authority, federated identity management, different levels of assurance and configurable audit trails. Armed with these tools, cloud service providers are then able to offer a reliable privacy preserving infrastructure-as-a-service to their clients
Semantics in the wild : a digital assistant for Flemish citizens
Public service fragmentation across more than 800 digital channels of government administrations in the region of Flanders (Belgium), causes administrative burden and frustrations, as citizens expect a coherent service. Given the autonomy of the various entities, the fragmentation of information and budget constraints, it is not feasible to rewire the entire e-gov ecosystem to a single portal. Therefore, the Flemish Government is building a smart digital assistant, which supports citizens on the governmental portals, by integrating status information of various transactions. This paper outlines our ongoing research on a method for raising semantic interoperability between different information systems and actors. In this approach, semantic agreements are maintained and implemented end-to-end using the design principles of Linked Data. The lessons learned can speed-up the process in other countries that face the complexity of integrating e-government portals
Quantitative description and local structures of trivalent metal ions Eu(III) and Cm(III) complexed with polyacrylic acid
The trivalent metal ion (M(III) = Cm, Eu)/polyacrylic acid (PAA) system was studied in the pH range between 3 and 5.5 for a molar PAA-to-metal ratio above 1. The interaction was studied for a wide range of PAA (0.05 mg L−1–50 g L−1) and metal ion concentrations (2×10−9–10−3 M). This work aimed at 3 goals (i) to determine the stoichiometry of M(III)–PAA complexes, (ii) to determine the number of complexed species and the local environment of the metal ion, and (iii) to quantify the reaction processes. Asymmetric flow-field-flow fractionation (AsFlFFF) coupled to ICP-MS evidenced that size distributions of Eu–PAA complexes and PAA were identical, suggesting that Eu bound to only one PAA chain. Time-resolved laser fluorescence spectroscopy (TRLFS) measurements performed with Eu and Cm showed a continuous shift of the spectra with increasing pH. The environment of complexed metal ions obviously changes with pH. Most probably, spectral variations arose from conformational changes within the M(III)–PAA complex due to pH variation. Complexation data describing the distribution of complexed and free metal ion were measured with Cm by TRLFS. They could be quantitatively described in the whole pH-range studied by considering the existence of only a single complexed species. This indicates that the slight changes in M(III) speciation with pH observed at the molecular level do not significantly affect the intrinsic binding constant. The interaction constant obtained from the modelling must be considered as a mean interaction constant
Speciation and spectrophotometric determination of uranium in seawater
A series of ion-exchange and extraction procedures for the separation of uranium from seawater samples and subsequent spectrophotometric determination of uranium in seawater by means of arsenazo(III) is described. According to the measurements performed by means of traced samples at every stage of separation, the yield of the pre-analytical procedures is generally over 90% and the separation of uranium very selective. The mean uranium concentration in seawater samples collected from five different coastal areas in Cyprus was found to be 3.2 ± 0.2 & micro; g L-1. Uranium in seawater is stable in its hexavalent oxidation state and UO2 (CO3)34- is the predominant species under normal coastal conditions (pH ≥ 8, EH ≥ 0.35 mV, 1 atm and 0.03% CO2)
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes
With their increasing popularity in cryptosystems, biometrics have attracted more and more attention from the information security community. However, how to handle the relevant privacy concerns remains to be troublesome. In this paper, we propose a novel security model to formalize the privacy concerns in biometric-based remote authentication schemes. Our security model covers a number of practical privacy concerns such as identity privacy and transaction anonymity, which have not been formally considered in the literature. In addition, we propose a general biometric-based remote authentication scheme and prove its security in our security model
- …
