9,909 research outputs found

    Reduction of the Misinformation Effect by Arousal Induced After Learning

    Get PDF
    Misinformation introduced after events have already occurred causes errors in later retrieval. Based on literature showing that arousal induced after learning enhances delayed retrieval, we investigated whether post-learning arousal can reduce the misinformation effect. 251 participants viewed four short film clips, each followed by a retention test, which for some participants included misinformation. Afterward, participants viewed another film clip that was either arousing or neutral. One week later, the arousal group recognized significantly more veridical details and endorsed significantly fewer misinformation items than the neutral group. The findings suggest that arousal induced after learning reduced source confusion, allowing participants to better retrieve accurate details and to better reject misinformation

    Image-Processing Techniques for the Creation of Presentation-Quality Astronomical Images

    Full text link
    The quality of modern astronomical data, the power of modern computers and the agility of current image-processing software enable the creation of high-quality images in a purely digital form. The combination of these technological advancements has created a new ability to make color astronomical images. And in many ways it has led to a new philosophy towards how to create them. A practical guide is presented on how to generate astronomical images from research data with powerful image-processing programs. These programs use a layering metaphor that allows for an unlimited number of astronomical datasets to be combined in any desired color scheme, creating an immense parameter space to be explored using an iterative approach. Several examples of image creation are presented. A philosophy is also presented on how to use color and composition to create images that simultaneously highlight scientific detail and are aesthetically appealing. This philosophy is necessary because most datasets do not correspond to the wavelength range of sensitivity of the human eye. The use of visual grammar, defined as the elements which affect the interpretation of an image, can maximize the richness and detail in an image while maintaining scientific accuracy. By properly using visual grammar, one can imply qualities that a two-dimensional image intrinsically cannot show, such as depth, motion and energy. In addition, composition can be used to engage viewers and keep them interested for a longer period of time. The use of these techniques can result in a striking image that will effectively convey the science within the image, to scientists and to the public.Comment: 104 pages, 38 figures, submitted to A

    Experimental Generation and Observation of Intrinsic Localized Spin Wave Modes in an Antiferromagnet

    Get PDF
    By driving with a microwave pulse the lowest frequency antiferromagnetic resonance of the quasi 1-D biaxial antiferromagnet (C_2 H_5 NH_3)_2 CuCl_4 into an unstable region intrinsic localized spin waves have been generated and detected in the spin wave gap. These findings are consistent with the prediction that nonlinearity plus lattice discreteness can lead to localized excitations with dimensions comparable to the lattice constant.Comment: 10 pages, 4 figures, accepted for publication in Physical Review Letter

    Dynamic trust models for ubiquitous computing environments

    Get PDF
    A significant characteristic of ubiquitous computing is the need for interactions of highly mobile entities to be secure: secure both for the entity and the environment in which the entity operates. Moreover, ubiquitous computing is also characterised by partial views over the state of the global environment, implying that we cannot guarantee that an environment can always verify the properties of the mobile entity that it has just received. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction is functioning as expected. In this paper we make a broad assumption that trust and cryptographic security can be considered as orthogonal concerns (i.e. an entity might encrypt a deliberately incorrect answer to a legitimate request). We assume the existence of reliable encryption techniques and focus on the characteristics of a model that supports the management of the trust relationships between two entities during an interaction in a ubiquitous environment

    The SECURE collaboration model

    Get PDF
    The SECURE project has shown how trust can be made computationally tractable while retaining a reasonable connection with human and social notions of trust. SECURE has produced a well-founded theory of trust that has been tested and refined through use in real software such as collaborative spam filtering and electronic purse. The software comprises the SECURE kernel with extensions for policy specification by application developers. It has yet to be applied to large-scale, multi-domain distributed systems taking different application contexts into account. The project has not considered privacy in evidence distribution, a crucial issue for many application domains, including public services such as healthcare and police. The SECURE collaboration model has similarities with the trust domain concept, embodying the interaction set of a principal, but SECURE is primarily concerned with pseudonymous entities rather than domain-structured systems

    Risk and Return for Bioenergy Crops under Alternative Contracting Arrangements

    Get PDF
    This study evaluated the potential to supply biomass feedstocks under alternative contract arrangements for a northwest Tennessee 2,400 acre grain farm. The four potential types of contracts analyzed in this study offer different levels of biomass price, yield, and production cost risk sharing between the representative farm and the processor.Farm Management, Resource /Energy Economics and Policy,

    Supraclavicularis proprius muscle associated with supraclavicular nerve entrapment

    Get PDF
    Entrapment neuropathy of the supraclavicular nerve is rare and, when it occurs, is usually attributable to branching of the nerve into narrow bony clavicular canals. We describe another mechanism for entrapment of this nerve with the aberrant muscle; supraclavicularis being found during the routine dissection of an embalmed 82-year-old cadaver. Our report details a unique location for this rare muscular variation whereby the muscle fibres originated posteriorly on the medial aspect of the clavicle before forming a muscular arch over the supraclavicular nerve and passing laterally towards the trapezius and acromion. We recommend that in clinical instances of otherwise unexplained unilateral clavicular pain or tenderness, nerve compression from the supraclavicularis muscle must be borne in mind.
    • …
    corecore