405 research outputs found

    An Online Multimedia Resource in Behavioral Neuroscience

    Get PDF
    The advance of web-based technology has stimulated innovation in education. This paper discusses the development and evaluation of an online multimedia resource for undergraduate-level behavioral neuroscience education. This resource surveys four major subject areas: language, attention and perception, thinking, and autism. It employs audio and video streaming, online demonstration experiments, computer simulation, and internet links. This online resource has two distinct advantages over a paper textbook. First, a considerable proportion of the content is conveyed using multimedia, thus making the learning experience more vivid and dynamic. Second, its interactive components provide opportunities for students to participate in the various experimental tasks introduced in the text and to compare their own performance with those of others. This hands-on experience not only enables students to gain in-depth procedural knowledge of the tasks but also has positive effects on their motivation. Feedback from three undergraduate classes that used this resource as supplementary material showed that students were highly positive about its pedagogical values. This free resource is available on the web at http://psych.rice.edu/mmtbn/

    Effectiveness of Simulation Training on Transfer of Statistical Concepts

    Get PDF
    The effectiveness of simulations for teaching statistical concepts was compared to the effectiveness of a textbook. The variable Medium (simulation versus textbook) and Question specificity (Specific versus Nonspecific), were manipulated factorially. Question specificity was defined as follows: Subjects were presented with a scenario in which gumballs were sampled from an urn. Subjects in the “Specific” condition were given a specific question about the outcome of the sampling procedure to consider; subjects in the “Non-specific” condition were asked generally to consider what would happen. A no-treatment control was included. The subjects consisted of 115 college students. The dependent variable was performance on problems requiring subjects to apply what they learned to ill defined everyday problems. Subjects trained by simulation performed significantly better than those trained with a textbook. Subjects in the “Specific” condition performed better than those in the “Non-specific” condition, although the difference did not reach conventional levels of significance. These results support the increasing use of simulation in education and training

    Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards

    Get PDF
    Session Initiation Protocol (SIP) is one of the most commonly used protocols for handling sessions for Voice over Internet Protocol (VoIP)-based communications, and the security of SIP is becoming increasingly important. Recently, Zhang et al. proposed a password authenticated key agreement protocol for SIP by using smart cards to protect the VoIP communications between users. Their protocol provided some unique features, such as mutual authentication, no password table needed, and password updating freely. In this study, we performed cryptanalysis of Zhang et al.'s protocol and found that their protocol was vulnerable to the impersonation attack although the protocol could withstand several other attacks. A malicious attacker could compute other users’ privacy keys and then impersonated the users to cheat the SIP server. Furthermore, we proposed an improved password authentication key agreement protocol for SIP, which overcame the weakness of Zhang et al.’s protocol and was more suitable for VoIP communications

    Efficient and flexible password authenticated key agreement for Voice over Internet Protocol session initiation protocol using smart card

    Get PDF
    Providing a suitable key agreement protocol for session initiation protocol is crucial to protecting the communication among the users over the open channel. This paper presents an efficient and flexible password authenticated key agreement protocol for session initiation protocol associated with Voice over Internet Protocol. The proposed protocol has many unique properties, such as session key agreement, mutual authentication, password updating function and the server not needing to maintain a password or verification table, and so on. In addition, our protocol is secure against the replay attack, the impersonation attack, the stolen-verifier attack, the man-in-the-middle attack, the Denning–Sacco attack, and the offline dictionary attack with or without the smart card

    Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications

    Get PDF
    A suitable key agreement protocol plays an essential role in protecting the communications over open channels among users using Voice over Internet Protocol (VoIP). This paper presents a robust and flexible password authenticated key agreement protocol with user anonymity for Session Initiation Protocol (SIP) used by VoIP communications. Security analysis demonstrates that our protocol enjoys many unique properties, such as user anonymity, no password table, session key agreement, mutual authentication, password updating freely and conveniently revoking lost smartcards etc. Furthermore, our protocol can resist the replay attack, the impersonation attack, the stolen-verifier attack, the man-in-middle attack, the Denning-Sacco attack, and the offline dictionary attack with or without smartcards. Finally, performance analysis shows that our protocol is more suitable for practical application in comparison with other related protocols

    Dynamic simulation of smoke diffusion and gas pollution

    Get PDF
    Gas pollution is a common phenomenon in natural life. Aiming at the low efficiency of simulating smoke diffusion based on physical model and the poor effect of drawing gas pollution based on empirical model, a hybrid model method is proposed to draw the dynamic gas pollution caused by smoke diffusion. Firstly, the semi Lagrangian method is used to model the smoke, and the k-d tree is introduced to improve the computational efficiency; secondly, to solve the problem of insufficient details in smoke simulation, the fluctuating wind field based on linear filter method is introduced into the external force term to optimize the trajectory of smoke particles; the bidirectional shot function combined with the real smoke texture is selected for rendering to avoid the problem of obvious particle sense and significantly improve the smoke diffusion details; then, the optimized Gaussian plume model is introduced to establish the relationship between the physical model and the empirical model, and the pollution attenuation formula and the optimized Perlin noise are used to improve the lack of details of global gas pollution and increase the realism of gas pollution changes; by improving the time axis algorithm, the problem of fixed gas pollution color is solved, and the dynamic gradual gas pollution is obtained. Finally, several groups of analysis and comparison experiments are designed. The results show that this method can draw a realistic dynamic gas pollution scene in real-time

    DREAMSeq: An Improved Method for Analyzing Differentially Expressed Genes in RNA-seq Data

    Get PDF
    RNA sequencing (RNA-seq) has become a widely used technology for analyzing global gene-expression changes during certain biological processes. It is generally acknowledged that RNA-seq data displays equidispersion and overdispersion characteristics; therefore, most RNA-seq analysis methods were developed based on a negative binomial model capable of capturing both equidispersed and overdispersed data. In this study, we reported that in addition to equidispersion and overdispersion, RNA-seq data also displays underdispersion characteristics that cannot be adequately captured by general RNA-seq analysis methods. Based on a double Poisson model capable of capturing all data characteristics, we developed a new RNA-seq analysis method (DREAMSeq). Comparison of DREAMSeq with five other frequently used RNA-seq analysis methods using simulated datasets showed that its performance was comparable to or exceeded that of other methods in terms of type I error rate, statistical power, receiver operating characteristics (ROC) curve, area under the ROC curve, precision-recall curve, and the ability to detect the number of differentially expressed genes, especially in situations involving underdispersion. These results were validated by quantitative real-time polymerase chain reaction using a real Foxtail dataset. Our findings demonstrated DREAMSeq as a reliable, robust, and powerful new method for RNA-seq data mining. The DREAMSeq R package is available at http://tanglab.hebtu.edu.cn/tanglab/Home/DREAMSeq

    Numerical Investigations on Wedge Control of Separation of a Missile from an Aircraft

    Get PDF
    To make the missile safely separate from the internal weapons bay, a wedge flow control device is mounted on the front of the bay to control the variation of flow during the separation. The numerical simulations of missile separation without and with wedge flow control device under different sizes are carried out. The flow fields of different separation processes are obtained and discussed; the aerodynamic parameters and trajectory parameters of missile of different cases are illustrated and compared. Results show that, the wedge flow control device can accelerate the missile separation and has the effect of regulating the angular motion of missile. The influence of the wedge height is stronger than that of its length on the center of gravity motion and angular motion of missile
    • …
    corecore