936 research outputs found

    Sound Computational Interpretation of Formal Encryption with Composed Keys

    Get PDF
    The formal and computational views of cryptography have been related by the seminal work of Abadi and Rogaway. In their work, a formal treatment of encryption that uses atomic keys is justified in the computational world. However, many proposed formal approaches allow the use of composed keys, where any arbitrary expression can be used as encryption key. We consider an extension of the formal model presented by Abadi and Rogaway, in which it is allowed to use composed keys in formal encryption. We then provide a computational interpretation for expressions that allow us to establish the computational soundness of formal encryption with composed keys

    The relationship between mania and feeding/mealtime behavior problems among persons with intellectual disability

    Get PDF
    This study represents the first to assess whether a relationship between mania and feeding/mealtime behavior problems exists in individuals with ID. Participants were compared across three groups (manic, non-manic psychiatrically impaired, and controls) on subscales and items of the Screening Tool for fEeding Problems (STEP). An attempt was made to assess for differences in problematic feeding behavior. Individuals in the manic group exhibited clinically significant symptoms of mania (n = 18), those in the non-manic psychiatrically impaired group exhibited symptoms of psychopathology other than mania (n = 18), and those in the control group did not exhibit symptoms of mania or any other psychopathology (n = 18). Significant differences were found across the groups for nutrition related behavior problems. Specifically, individuals exhibiting symptoms of mania were significantly more likely to ‘continue to eat as long as food was available’. Implications of these data are discussed

    The relationship of feeding problems with the use of antiepileptic medication among persons with severe and profound mental retardation

    Get PDF
    Epilepsy and/or seizure activity are frequently occurring phenomena and a significant co-morbid condition for persons with severe to profound intellectual disability (Burke, McKee, Pathak, Donahue, Parasuraman & Baltenhorst, 1999). The majority of seizure activity leads to deficits across a number of social, physical,occupational, and personal variables, and if left untreated, may lead to death in these individuals. The treatment of this condition frequently utilizes anti-epileptic medication, but these medications are often associated with a variety of side effects such as dental complications and disturbed gait. Previous researchers have suggested that these side effects may be manifested in forms of maladaptive behaviors such as aggression and destructiveness (Matson, Mayville, Bamburg & Eckholdt, 2001), but studies have not yet been conducted to determine if side effects of antiepileptics may manifest as feeding problems in this population. Given that complications with feeding may incorporate some of the variables mentioned above (i.e., dental complications), a relationship between the two is likely. The purpose of this study was to evaluate feeding problems associated with the use of three different types of antiepileptic medications on individuals with severe to profound mental retardation as compared to their matched controls. Individuals across three groups (clients on carbamazepine, n = 20; clients on valproate, n = 18; and clients on phenytoin, n = 22) were compared to three separate control groups matched on age, gender, race, and level of MR. They were compared across items related to feeding problems on the Screening Tool of fEeding Problems (STEP). Implications of these data are discussed

    Potential Energy Curves and Dissociation Energies of Some Diatomic Molecules

    Get PDF

    Towards an Enhanced Protocol for Improving Transactional Support in Interoperable Service Oriented Application-Based (SOA-Based) Systems

    Get PDF
    When using a shared database for distributed transactions, it is often difficult to connect business processes and softwarecomponents running on disparate platforms into a single transaction. For instance, one platform may add or update data, and thenanother platform later access the changed or added data. This severely limits transactional capabilities across platforms. Thissituation becomes more acute when concurrent transactions with interleaving operations spans across different applications andresources. Addressing this problem in an open, dynamic and distributed environment of web services poses special challenges,and still remains an open issue. Following the broad adoption and use of the standard Web Services Transaction Protocols,requirements have grown for the addition of extended protocols to handle problems that exist within the context of interoperableservice-oriented applications. Most extensions to the current standard WS-Transaction Protocols still lack proper mechanisms forerror-handling, concurrency control, transaction recovery, consolidation of multiple transaction calls into a single call, and securereporting and tracing for suspicious activities. In this research, we will first extend the current standard WS-TransactionFramework, and then propose an enhanced protocol (that can be deployed within the extended framework) to improvetransactional and security support for asynchronous applications in a distributed environment. A hybrid methodology whichincorporates service-oriented engineering and rapid application development will be used to develop a procurement system(which represents an interoperable service-oriented application) that integrates our proposed protocol. We will empiricallyevaluate and compare the performance of the enhanced protocol with other conventional distributed protocols (such as 2PL) interms of QoS parameters (throughput, response time, and resource utilization), availability of the application, databaseconsistency, and effect of locking on latency, among other factors.Keywords: Database, interoperability, security, concurrent transaction, web services, protocol, service-oriente

    A Study of the Ontology of Evil in the Educational Philosophy of Martin Buber

    Get PDF
    Martin Buber preferred to be known as a philosophical anthropologist rather than a philosopher, theologian, or teacher. Any of these titles are properly used since the scope of his writings contribute significantly to each of these fields. It is the purpose of this paper to show that what he had to say concerning the Ontology of Evil is significant in the study of educational theory and that his own educational philosophy was influenced by his presuppositions concerning the nature of evil. Chapter II is devoted to the literature relating to the basic elements of this study: the problem of evil, evil and the individual, evil and the community, and educational theory. Only that literature touching the philosophy of Buber in the specified areas has been selected. The study is developed in Chapter III by setting forth Buber\u27s concept of the problem of evil as it relates to the individual and the community. The goal of education for Buber was to bring the individual into a state of true humanity. This goal is to be reached by traveling a path in which the nature of the goal is evident, the path of communion. True human relationships transform evil because relationship takes place in the spirit, in the realm of the between. When properly extended, such relationship leads one to the eternal Thou which is the proper aim of all education, for it is the proper goal of the lived life
    corecore