84 research outputs found

    Measurement invariance of Rosenberg Self-Esteem Scale between British and Chinese college students

    Get PDF
    The present study examined the factor structure and measurement invariance of the Rosenberg Self-Esteem Scale in college students from Britain (N=150) and China (N=205). Confirmatory factor analyses suggested that the two-factor model, which consisted of a positive self-image factor and a negative self-image factor, could fit the data better than single factor structure especially after deleting the eighth item. Furthermore, factorial structure was invariant across groups in configural level and weak factorial level. After releasing several intercepts, partial strong and strict factorial invariance were certified. Subsequently, DIF (differential item functioning) and response patterns were analyzed, evidence indicates that approximately half items are non-invariant on intercept level. However, literature provides little guidance about the implications for the use of the partially invariant scale. In the end, psychological properties of the nine-item RSES was measured, Cronbach’s α were satisfactory and item-total correlations were good for Chinese data, and acceptable for British data. Finally, limitations and implications were discussed

    The surface behaviour and catalytic properties of Nd2-XSrXCoO4±Λ mixed oxides

    Get PDF
    The mixed oxides, Nd2-XSrXCoO4±λ (0.4 ≤ x ≤ 1.2), (λ = non-stochiometric oxygen) with the K2NiF4 structure were prepared by the polyglycol gel method and used as catalysts for NO reduction. The samples were investigated by IR, TPD, TPR, and XRD methods and iodometry and the effects of the coefficient x on the structure and catalytic activity of the samples were studied. The results show that the Nd2-XSrXCoO4±λ mixed oxides have the K2NiF4 structure; other phases are found when x 1.2. The amount of Co3+ and the lattice oxygen in Nd2-XSrXCoO4±λ increase with increasing x. The catalytic activity of Nd2-XSrXCoO4±λ for NO reduction is closely correlated with the concentration of oxygen vacancies and the amount of Co3+.KEY WORDS: A2BO4, Co-containing mixed oxide, NO reduction, Rare-earthBull. Chem. Soc. Ethiop. 2006, 20(2), 201-206

    SELF-CALIBRATING PARTICIPATORY WIRELESS INDOOR LOCALIZATION

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    Facial expression aftereffect revealed by adaption to emotion-invisible dynamic bubbled faces

    Get PDF
    Visual adaptation is a powerful tool to probe the short-term plasticity of the visual system. Adapting to local features such as the oriented lines can distort our judgment of subsequently presented lines, the tilt aftereffect. The tilt aftereffect is believed to be processed at the low-level of the visual cortex, such as V1. Adaptation to faces, on the other hand, can produce significant aftereffects in high-level traits such as identity, expression, and ethnicity. However, whether face adaptation necessitate awareness of face features is debatable. In the current study, we investigated whether facial expression aftereffects (FEAE) can be generated by partially visible faces. We first generated partially visible faces using the bubbles technique, in which the face was seen through randomly positioned circular apertures, and selected the bubbled faces for which the subjects were unable to identify happy or sad expressions. When the subjects adapted to static displays of these partial faces, no significant FEAE was found. However, when the subjects adapted to a dynamic video display of a series of different partial faces, a significant FEAE was observed. In both conditions, subjects could not identify facial expression in the individual adapting faces. These results suggest that our visual system is able to integrate unrecognizable partial faces over a short period of time and that the integrated percept affects our judgment on subsequently presented faces. We conclude that FEAE can be generated by partial face with little facial expression cues, implying that our cognitive system fills-in the missing parts during adaptation, or the subcortical structures are activated by the bubbled faces without conscious recognition of emotion during adaptation

    Securing Cyber-Physical Social Interactions on Wrist-worn Devices

    Get PDF
    Since ancient Greece, handshaking has been commonly practiced between two people as a friendly gesture to express trust and respect, or form a mutual agreement. In this article, we show that such physical contact can be used to bootstrap secure cyber contact between the smart devices worn by users. The key observation is that during handshaking, although belonged to two different users, the two hands involved in the shaking events are often rigidly connected, and therefore exhibit very similar motion patterns. We propose a novel key generation system, which harvests motion data during user handshaking from the wrist-worn smart devices such as smartwatches or fitness bands, and exploits the matching motion patterns to generate symmetric keys on both parties. The generated keys can be then used to establish a secure communication channel for exchanging data between devices. This provides a much more natural and user-friendly alternative for many applications, e.g., exchanging/sharing contact details, friending on social networks, or even making payments, since it doesn’t involve extra bespoke hardware, nor require the users to perform pre-defined gestures. We implement the proposed key generation system on off-the-shelf smartwatches, and extensive evaluation shows that it can reliably generate 128-bit symmetric keys just after around 1s of handshaking (with success rate >99%), and is resilient to different types of attacks including impersonate mimicking attacks, impersonate passive attacks, or eavesdropping attacks. Specifically, for real-time impersonate mimicking attacks, in our experiments, the Equal Error Rate (EER) is only 1.6% on average. We also show that the proposed key generation system can be extremely lightweight and is able to run in-situ on the resource-constrained smartwatches without incurring excessive resource consumption

    Shake-n-shack : enabling secure data exchange between Smart Wearables via handshakes

    Get PDF
    Since ancient Greece, handshaking has been commonly practiced between two people as a friendly gesture to express trust and respect, or form a mutual agreement. In this paper, we show that such physical contact can be used to bootstrap secure cyber contact between the smart devices worn by users. The key observation is that during handshaking, although belonged to two different users, the two hands involved in the shaking events are often rigidly connected, and therefore exhibit very similar motion patterns. We propose a novel Shake-n-Shack system, which harvests motion data during user handshaking from the wrist worn smart devices such as smartwatches or fitness bands, and exploits the matching motion patterns to generate symmetric keys on both parties. The generated keys can be then used to establish a secure communication channel for exchanging data between devices. This provides a much more natural and user-friendly alternative for many applications, e.g., exchanging/sharing contact details, friending on social networks, or even making payments, since it doesn't involve extra bespoke hardware, nor require the users to perform pre-defined gestures. We implement the proposed Shake-n-Shack 1 system on off-the-shelf smartwatches, and extensive evaluation shows that it can reliably generate 128-bit symmetric keys just after around 1s of handshaking (with success rate >99%), and is resilient to real-time mimicking attacks: in our experiments the Equal Error Rate (EER) is only 1.6% on average. We also show that the proposed Shake-n-Shack system can be extremely lightweight, and is able to run in-situ on the resource-constrained smartwatches without incurring excessive resource consumption

    Key Generation for Internet of Things: A Contemporary Survey

    Get PDF
    Key generation is a promising technique to bootstrap secure communications for the Internet of Things (IoT) devices that have no prior knowledge between each other. In the past few years, a variety of key generation protocols and systems have been proposed. In this survey, we review and categorise recent key generation systems based on a novel taxonomy. Then, we provide both quantitative and qualitative comparisons of existing approaches. We also discuss the security vulnerabilities of key generation schemes and possible countermeasures. Finally, we discuss the current challenges and point out several potential research directions

    Gait Recognition as a Service for Unobtrusive User Identification in Smart Spaces

    Get PDF
    Recently, Internet of Things (IoT) has raised as an important research area that combines the environmental sensing and machine learning capabilities to flourish the concept of smart spaces, in which intelligent and customized services can be provided to users in a smart manner. In smart spaces, one fundamental service that needs to be provided is accurate and unobtrusive user identification. In this work, to address this challenge, we propose a Gait Recognition as a Service (GRaaS) model, which is an instantiation of the traditional Sensing as a Service (S2aaS) model, and is specially deigned for user identification using gait in smart spaces. To illustrate the idea, a Radio Frequency Identification (RFID)-based gait recognition service is designed and implemented following the GRaaS concept. Novel tag selection algorithms and attention-based Long Short-term Memory (At-LSTM) models are designed to realize the device layer and edge layer, achieving a robust recognition with 96.3% accuracy. Extensive evaluations are provided, which show that the proposed service has accurate and robust performance and has great potential to support future smart space applications
    corecore