Статті в журналах з теми "Honest majority"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Honest majority.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Honest majority".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Moore, John P. "Misconduct: don't penalize the honest majority of scientists." Nature 466, no. 7310 (August 25, 2010): 1040. http://dx.doi.org/10.1038/4661040c.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Laud, Peeter, Alisa Pankova, and Roman Jagomägis. "Preprocessing Based Verification of Multiparty Protocols with Honest Majority." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (October 1, 2017): 23–76. http://dx.doi.org/10.1515/popets-2017-0038.

Повний текст джерела
Анотація:
AbstractThis paper presents a generic “GMW-style” method for turning passively secure protocols into protocols secure against covert attacks, adding relatively cheap offline preprocessing and post-execution verification phases. Our construction performs best with a small number of parties, and its main benefit is the total cost of the online and the offline phases. In the preprocessing phase, each party generates and shares a sufficient amount of verified multiplication triples that will be later used to assist that party’s proof. The execution phase, after which the computed result is already available to the parties, has only negligible overhead that comes from signatures on sent messages. In the postprocessing phase, the verifiers repeat the computation of the prover in secret-shared manner, checking that they obtain the same messages that the prover sent out during execution. The verification preserves the privacy guarantees of the original protocol. It is applicable to protocols doing computations over finite rings, even if the same protocol performs its computation over several distinct rings. We apply our verification method to the Sharemind platform for secure multiparty computations (SMC), evaluate its performance and compare it to other existing SMC platforms offering security against stronger than passive attackers.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Damgård, Ivan, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, and Michael Bæksvang Østergaard. "Fast threshold ECDSA with honest majority1." Journal of Computer Security 30, no. 1 (January 20, 2022): 167–96. http://dx.doi.org/10.3233/jcs-200112.

Повний текст джерела
Анотація:
ECDSA is a widely adopted digital signature standard. A number of threshold protocols for ECDSA have been developed that let a set of parties jointly generate the secret signing key and compute signatures, without ever revealing the signing key. Threshold protocols for ECDSA have seen recent interest, in particular due to the need for additional security in cryptocurrency wallets where leakage of the signing key is equivalent to an immediate loss of money. We propose a threshold ECDSA protocol secure against an active adversary in the honest majority model with abort. Our protocol is efficient in terms of both computation and bandwidth usage, and it allows the parties to pre-process parts of the signature, such that once the message to sign becomes known, they can compute a secret sharing of the signature very efficiently, using only local operations. We also show how to obtain guaranteed output delivery (and hence also fairness) in the online phase at the cost of some additional pre-processing work, i.e., such that it either aborts during the pre-processing phase, in which case nothing is revealed, or the signature is guaranteed to be delivered to all honest parties online.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Wagh, Sameer, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, and Tal Rabin. "Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning." Proceedings on Privacy Enhancing Technologies 2021, no. 1 (January 1, 2021): 188–208. http://dx.doi.org/10.2478/popets-2021-0011.

Повний текст джерела
Анотація:
AbstractWe propose Falcon, an end-to-end 3-party protocol for efficient private training and inference of large machine learning models. Falcon presents four main advantages – (i) It is highly expressive with support for high capacity networks such as VGG16 (ii) it supports batch normalization which is important for training complex networks such as AlexNet (iii) Falcon guarantees security with abort against malicious adversaries, assuming an honest majority (iv) Lastly, Falcon presents new theoretical insights for protocol design that make it highly efficient and allow it to outperform existing secure deep learning solutions. Compared to prior art for private inference, we are about 8× faster than SecureNN (PETS’19) on average and comparable to ABY3 (CCS’18). We are about 16 − 200× more communication efficient than either of these. For private training, we are about 6× faster than SecureNN, 4.4× faster than ABY3 and about 2−60× more communication efficient. Our experiments in the WAN setting show that over large networks and datasets, compute operations dominate the overall latency of MPC, as opposed to the communication.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Crokidakis, Nuno, and Jorge S. Sá Martins. "Can honesty survive in a corrupt parliament?" International Journal of Modern Physics C 29, no. 10 (October 2018): 1850094. http://dx.doi.org/10.1142/s0129183118500948.

Повний текст джерела
Анотація:
In this work, we study a simple model of social contagion that aims to represent the dynamics of social influences among politicians in an artificial corrupt parliament. We consider an agent-based model with three distinct types of artificial individuals (deputies), namely honest deputies, corrupt deputies and inflexible corrupt deputies. These last agents are committed to corruption, and they never change their state. The other two classes of agents are susceptible deputies, that can change state due to social pressure of other agents. We analyze the dynamic and stationary properties of the model as functions of the frozen density of inflexible corrupt individuals and two other parameters related to the strength of the social influences. We show that the honest individuals can disappear in the steady state, and such disappearance is related to an active-absorbing nonequilibrium phase transition that appears to be in the directed percolation universality class. We also determine the conditions leading to the survival of honesty in the long-time evolution of the system, and the regions of parameters for which the honest deputies can be the either the majority or the minority in the artificial parliament.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Qingui Xu, and Guixiong Liu. "Weakening Unreliable Ratings in P2p Reputation Systems Based on an Honest Majority." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 4, no. 15 (August 31, 2012): 418–25. http://dx.doi.org/10.4156/aiss.vol4.issue15.52.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Samad, Muhammad Abdul, and Nor Aini Binti Ali. "UNDERSTANDING TOWARDS TRADERS’ BUSINESS ETHICS OF ISLAM: A STUDY OF ACEH DEALERS IN KUALA LUMPUR." Jurnal Ilmiah Islam Futura 14, no. 1 (August 1, 2014): 1. http://dx.doi.org/10.22373/jiif.v14i1.78.

Повний текст джерела
Анотація:
Islamic business ethics is one that should be the practice of Muslim traders, because Islam promotes this method for fairness, honesty and the benefit of people. Ethical values of Islam must be known and understood by all Muslim traders to avoid cheating that may oppress customers. This study uses qualitative methods and obtains data from the interviewers and observations. The study found that the majority of Aceh traders has understood the ethical businessmen in Islam which can be seen from the activities they are doing in each of its business practices. Aceh dealers are usually honest, fair, occupying commitment, hardworking and making efforts in business.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Levy, Dan, Joshua Yardley, and Richard Zeckhauser. "Getting an Honest Answer: Clickers in the Classroom." Journal of the Scholarship of Teaching and Learning 17, no. 4 (November 2, 2017): 104–25. http://dx.doi.org/10.14434/josotl.v17i4.22068.

Повний текст джерела
Анотація:
Asking students to raise their hands is a time-honored feedback mechanism in education. Hand raising allows the teacher to assess to what extent a concept has been understood, or to see where the class stands on a particular issue, and then to proceed with the lesson accordingly. For many types of questions, as the evidence here demonstrates, the tally from a public show of hands misrepresents the true knowledge or preferences of the class. The biases are predictable and systematic. Specifically, students raising their hands tend to herd and vote with the majority answer. Beyond impeding the teacher’s ability to assess her class, such herding threatens to diminish learning by limiting the level to which a student engages with the questions posed by the teacher.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Feng, Dengguo, and Kang Yang. "Concretely efficient secure multi-party computation protocols: survey and more." Security and Safety 1 (2022): 2021001. http://dx.doi.org/10.1051/sands/2021001.

Повний текст джерела
Анотація:
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their private inputs, and reveals nothing but the output of the function. In the last decade, MPC has rapidly moved from a purely theoretical study to an object of practical interest, with a growing interest in practical applications such as privacy-preserving machine learning (PPML). In this paper, we comprehensively survey existing work on concretely efficient MPC protocols with both semi-honest and malicious security, in both dishonest-majority and honest-majority settings. We focus on considering the notion of security with abort, meaning that corrupted parties could prevent honest parties from receiving output after they receive output. We present high-level ideas of the basic and key approaches for designing different styles of MPC protocols and the crucial building blocks of MPC. For MPC applications, we compare the known PPML protocols built on MPC, and describe the efficiency of private inference and training for the state-of-the-art PPML protocols. Furthermore, we summarize several challenges and open problems to break though the efficiency of MPC protocols as well as some interesting future work that is worth being addressed. This survey aims to provide the recent development and key approaches of MPC to researchers, who are interested in knowing, improving, and applying concretely efficient MPC protocols.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Beimel, Amos, Yehuda Lindell, Eran Omri, and Ilan Orlov. "$${\varvec{1/p}}$$-Secure Multiparty Computation without an Honest Majority and the Best of Both Worlds." Journal of Cryptology 33, no. 4 (July 16, 2020): 1659–731. http://dx.doi.org/10.1007/s00145-020-09354-z.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Wei, Weiming, Chunming Tang, and Yucheng Chen. "Efficient Privacy-Preserving K-Means Clustering from Secret-Sharing-Based Secure Three-Party Computation." Entropy 24, no. 8 (August 18, 2022): 1145. http://dx.doi.org/10.3390/e24081145.

Повний текст джерела
Анотація:
Privacy-preserving machine learning has become an important study at present due to privacy policies. However, the efficiency gap between the plain-text algorithm and its privacy-preserving version still exists. In this paper, we focus on designing a novel secret-sharing-based K-means clustering algorithm. Particularly, we present an efficient privacy-preserving K-means clustering algorithm based on replicated secret sharing with honest-majority in the semi-honest model. More concretely, the clustering task is outsourced to three semi-honest computing servers. Theoretically, the proposed privacy-preserving scheme can be proven with full data privacy. Furthermore, the experimental results demonstrate that our proposed privacy version reaches the same accuracy as the plain-text one. Compared to the existing privacy-preserving scheme, our proposed protocol can achieve about 16.5×–25.2× faster computation and 63.8×–68.0× lower communication. Consequently, the proposed privacy-preserving scheme is suitable for secret-sharing-based secure outsourced computation.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Lima, F. W. S. "Tax evasion dynamics and nonequilibrium Zaklan model with heterogeneous agents on square lattice." International Journal of Modern Physics C 26, no. 03 (February 25, 2015): 1550035. http://dx.doi.org/10.1142/s0129183115500357.

Повний текст джерела
Анотація:
In this paper, we use the version of the nonequilibrium Zaklan model via agent-based Monte-Carlo simulations to study the problem of the fluctuations of the tax evasion on a heterogeneous agents community of honest and tax evaders citizens. The time evolution of this system is performed by a nonequilibrium model known as majority-vote model, but with a different probability for each agent to disobey the majority vote of its neighbors.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

BROŽIČ, LILIANA. "“HONEST DEFENSE” BY THOMAS DURELL YOUNG." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2018, ISSUE 20/3 (September 15, 2018): 97–99. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.20.3.6.y.

Повний текст джерела
Анотація:
Last year, a new book by Dr. Thomas Durell Young was published by the British publisher Bloomsbury, entitled THE ANATOMY OF POST-COMMUNIST EUROPEAN DEFENCE INSTITUTIONS: THE MIRAGE OF MILITARY MODERNITY. The author probably does not need any special introduction for those whose work is related to security and defence matters. For all others, though, let me mention that he is a long-time lecturer at the Center for Civil-Military Relations (CCMR) from Monterey, California, USA. Prior to joining CCMR, Dr Young was a Research Professor at the Strategic Studies Institute of the US Army War College, where he focused on European politico-military issues, as well as on joint planning, execution and management of systems and procedures. He holds a Ph.D. in international economics from Geneva, and has authored several monographs. From 1989 to 2017 he was an editor of Small War and Insurgencies, and he is currently an editor of Defence and Security Analyses. An important fact is that his work has led him to travel to the majority of European countries and, as such, he is very well acquainted with their respective defence systems, defence and military history, as well as many defence and military decision-makers and experts, with whom he had shared his views and experiences. In most of these countries he has also acted as a defence adviser. Dr Young is an author whose field of research is extremely rich, both in theory and practice. It is therefore no surprise that his new book reflects his thorough knowledge of the historical background of the former communist states, their defence systems and their armed forces. The work is divided into nine chapters. In addition to the introduction and conclusion, it includes the following thematic sections: The State of Communist Defense Institutions and Armed Forces, circa 1990; NATO Exports its “New Model Army”: Why It Did Not Take; Former Soviet Republics' Defense Institutions; Former Warsaw Pact Republics' Defense Institutions; Former Yugoslav Republics' Defense Institutions; Building Defense Institutions: Sharpening the Western Mind; Reforming Western Policy and Management of Defense Reform. The concluding chapter is entitled Getting to Honest Defense. Young is very systematic and analytical when presenting the topic, and uses all the characteristics of comparative analysis. Wherever historical, political, defence and military bases are identical or highly similar, he provides a thorough explanation of the reasons for significant differences in further development, as well as those who had prevented the occurrence of changes or their sufficient implementation. He is very insightful in his attempts. The basic principle of his research or the criterion for the evaluation of defence institutions in the former communist states is the “Western Mind”, as he calls it. In short, a comparison of western and eastern thinking reveals key differences in planning, decision-making, leadership and implementation of the state’s defence function. The important criteria Young considers when implementing these policies are a review of defence institutions, the public policy framework and compliance of concepts, defence planning techniques, national-level command, the military decision-making process, and the concepts of operations, logistics and professionalism. According to his findings, these are the major areas where the former communist states differ. The differences between them are normally related to the past regimes and mind-sets in the respective countries. With time, some of the countries have managed to successfully overcome those differences and implement the “Western Mind”, while others have not been so successful. Although the author uses the Western Mind as the criterion to establish the level of development of defence systems in eastern countries, he does not claim this to be the only and the best criterion everyone should aim for. Quite the opposite: in his chapter “NATO Exports its ‘New Model Army’: Why It Did Not Take”, he provides a thorough explanation of where, when and why critical mistakes or flaws have been made, which still prevent some NATO members to perform up to their potential within the Alliance. He does not, however, miss the fact that the western democratic concepts of defence management cannot serve just as a means to simply follow the model of others. Rather, these areas must be functional and effective, as well as adapted to each separate country. In his book, the author lists several examples of bad practice, highlighting at the same time some of the unique and good solutions put forward by some countries. Nevertheless, individual chapters reveal some of the characteristics specific to a subject area or a country, which are hard to classify as good or bad. They are just special features that require new solutions with a higher level of functionality. In the conclusion, the latest monograph by Thomas Young lists proposals on how to build defence institutions using the Western Mind. These institutions first must be upgraded in order to be more effective in responding to new security threats. For young countries, which some twenty or twenty-five years ago still used communist concepts, Young proposes a new approach called “Honest Defense”, which is generally intended for all those building collective defence. The approach brings something new for amateurs of such topics, and at the same time serves as a broadly useful and helpful study material for experts who wish and are obliged to find concrete solutions and opportunities for a new and safe future. The monograph includes interesting concrete examples from individual countries, which the author professionally and critically comments on. The discussed examples comprise both good and bad practice. Additionally, they include an analysis of the development of the defence system and institutions in Slovenia, which enables a neutral external observer to understand our development as well as identify their own strengths and deficiencies.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

LIMA, F. W. S. "TAX EVASION DYNAMICS AND ZAKLAN MODEL ON OPINION-DEPENDENT NETWORK." International Journal of Modern Physics C 23, no. 06 (June 2012): 1250047. http://dx.doi.org/10.1142/s0129183112500477.

Повний текст джерела
Анотація:
Within the context of agent-based Monte-Carlo simulations, we study the problem of the fluctuations of tax evasion in a community of honest citizens and tax evaders by using the version of the nonequilibrium Zaklan model proposed by Lima (2010). The studied evolutionary dynamics of tax evasion are driven by a non-equilibrium majority-vote model of M. J. Oliveira, with the objective to attempt to control the fluctuations of the tax evasion in the observed community in which citizens are localized on the nodes of the Stauffer–Hohnisch–Pittnauer networks.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Elfimov, Alexei. "Russian Ethnography." Anthropological Journal of European Cultures 16, no. 1 (March 1, 2007): 77–100. http://dx.doi.org/10.3167/ayec.2007.160106.

Повний текст джерела
Анотація:
An honest statement to begin with would be that the place of anthropology in Russian society is something of a relativity puzzle. Some can define its place but are not sure what exactly anthropology is. Others can define what anthropology is but are not quite sure what place it occupies. A few suppose they know both. The majority are not aware that either exists.The issue is a complex one, and I do not have a handy equation to reduce it to a single meaningful set of answers, but I will try to delineate some of the facets that shape its general contours.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Hollingsworth, Mary Ann, Syafiq Basri Assegaff, Rendro Dhani, Enrico Adhitya Rinaldi, and Sri Dhuny Atas Asri. "Stigmatization and Dishonesty: How Doctors Communicate and Cope with Mental Issues among COVID-19 Patients in Indonesia." European Scientific Journal, ESJ 18, no. 30 (September 30, 2022): 262. http://dx.doi.org/10.19044/esj.2022.v18n30p262.

Повний текст джерела
Анотація:
Background: The coronavirus (COVID-19) outbreak has caused public fear alongside social stigma and discrimination. As a result, people hide the illness to avoid discrimination. This study focuses on investigating doctor-patient communication, their challenges when diagnosing suspected COVID-19 patients, and how the physicians communicated with patients’ mental issues. Methods: A mixed-methods approach examined this phenomenon and an online survey was conducted among 221 Indonesian doctors. The following were quantitatively examined: theme of Covid stigma and patient openness, patient/physician interaction and communication, and information and stigmatization of Covid. Qualitatively, two Focus Group Discussions (FGD) were conducted with five physicians and four COVID-19 survivors or their family members. Thereafter, interviews were set up with the selected four persons. Results: 74.2% of respondents encountered patients with lack of honesty or openness, while 55% of physicians claimed that 1-2 patients out of every 10 patients covered up about their illness. 27% of physicians indicated that 3-5 of 10 patients did not tell the truth. Majority of respondents opined that the media/social media played a large role in the promotion of stigma for those who had COVID-19. Conclusion: Study results affirmed belief in a link between the stigma of COVID-19 and patients’ dishonesty. Results indicated that many individuals are reluctant to disclose their true positions for fear of stigmatization by the people around them. This is linked to the stigma of COVID-19 and patient reluctance to be honest about their health/illness per impact of COVID-19. This research concluded that doctors need to find creative ways to communicate with their patients so as to increase patient honesty about illness.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Laud, Rose, Terrence Isaacs, Christiana Elisha-Aboh, and David Leung. "An Evaluation of Core Trainees’ Views on Clinical Rotations in the West Yorkshire Psychiatry Training Scheme." BJPsych Open 9, S1 (July 2023): S99—S100. http://dx.doi.org/10.1192/bjo.2023.296.

Повний текст джерела
Анотація:
AimsGathering honest feedback on experiences of clinical rotations is vital to allow improvement of training. However, our current local systems lack anonymity, which may lead to reduced confidence in providing honest views. Aim: To provide trainees with a method of giving honest and protected feedback to improve future training posts.MethodsA Survey Monkey feedback form which was sent to core trainees across West Yorkshire in July 2022. This allowed feedback for up to 6 rotations, meaning those finishing CT3 could retrospectively review all their placements. The data were analysed by the project leads, grouped into themes, and anonymised.ResultsWe received responses for a total of 57 posts from 23 core trainees (total trainees July 2022 = 71), some of whom responded for multiple posts. Types of posts reviewed included: General Adult (40.4%), Older Adult (24.6%), Child and Adolescent Mental Health (8.8%), Forensics (7%), Learning Disability (5.3%) and Psychotherapy/Liaison (3.5%). 10.5% of responses did not specify the speciality.Overall, respondents strongly recommended 51.8% (n=29) and recommended 12.5% (n=7) of posts to other trainees. Respondents strongly did not recommend 5.3% (n=3) and did not recommend 1.8% (n=1) of posts to other trainees. Positive themes included having a range of experiences and a supportive team. Trainees valued having a range of cases with appropriate autonomy. They liked having a job that was busy enough to gain the required experience but not too busy to impede training and learning opportunities. An accessible and supportive supervisor who provided regular supervision with completion of work based placed assessments was also important.Negative themes included lack of regular supervision and heavy workload, which impacted a trainee's ability to attend teaching and participate in other aspects of professional development. Feedback for inpatient posts suggested that physical health obligations sometimes limited training opportunities.ConclusionOur results have shown that training needs are varied between trainees. It is therefore important that trainees have honest discussions with their supervisors about their needs and areas for development. Overall, trainees would recommend the majority (64.3%) of posts reviewed, however areas for improvement were highlighted. These may include extra training opportunities and increased physical health support. The main limitation of our evaluation was the low survey uptake (32.4%) in comparison to total trainee numbers. We hope that sharing our findings with both trainers and trainees will improve future responses.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Vajda, István. "Practical generation of common random strings for secure multiparty computations over the Internet." Transactions on Networks and Communications 8, no. 6 (December 31, 2020): 01–15. http://dx.doi.org/10.14738/tnc.86.9447.

Повний текст джерела
Анотація:
It is known that most of the interesting multiparty cryptographic tasks cannot be implemented securely without trusted setup in a general concurrent network environment like the Internet. We need an appropriate trusted third party to solve this problem. An important trusted setup is a public random string shared by the parties. We present a practical n-bit coin toss protocol for provably secure implementation of such setup. Our idea is inviting external peers into the execution of the protocol to establish an honest majority among the parties. We guarantee security in the presence of an unconditional, static, malicious adversary. Additionally, we present an original practical idea of using live public radio broadcast channels for the generation of common physical random source.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Wei, Weiming, Chunming Tang, and Yucheng Chen. "Round-Efficient Secure Inference Based on Masked Secret Sharing for Quantized Neural Network." Entropy 25, no. 2 (February 20, 2023): 389. http://dx.doi.org/10.3390/e25020389.

Повний текст джерела
Анотація:
Existing secure multiparty computation protocol from secret sharing is usually under this assumption of the fast network, which limits the practicality of the scheme on the low bandwidth and high latency network. A proven method is to reduce the communication rounds of the protocol as much as possible or construct a constant-round protocol. In this work, we provide a series of constant-round secure protocols for quantized neural network (QNN) inference. This is given by masked secret sharing (MSS) in the three-party honest-majority setting. Our experiment shows that our protocol is practical and suitable for low-bandwidth and high-latency networks. To the best of our knowledge, this work is the first one where the QNN inference based on masked secret sharing is implemented.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Alpern, Steve, and Bo Chen. "Optimizing voting order on sequential juries: a median voter theorem and beyond." Social Choice and Welfare 58, no. 3 (October 19, 2021): 527–65. http://dx.doi.org/10.1007/s00355-021-01370-7.

Повний текст джерела
Анотація:
AbstractWe consider an odd-sized “jury”, which votes sequentially between two equiprobable states of Nature (say A and B, or Innocent and Guilty), with the majority opinion determining the verdict. Jurors have private information in the form of a signal in $$[-1,+1]$$ [ - 1 , + 1 ] , with higher signals indicating A more likely. Each juror has an ability in [0, 1], which is proportional to the probability of A given a positive signal, an analog of Condorcet’s p for binary signals. We assume that jurors vote honestly for the alternative they view more likely, given their signal and prior voting, because they are experts who want to enhance their reputation (after their vote and actual state of Nature is revealed). For a fixed set of jury abilities, the reliability of the verdict depends on the voting order. For a jury of size three, the optimal ordering is always as follows: middle ability first, then highest ability, then lowest. For sufficiently heterogeneous juries, sequential voting is more reliable than simultaneous voting and is in fact optimal (allowing for non-honest voting). When average ability is fixed, verdict reliability is increasing in heterogeneity. For medium-sized juries, we find through simulation that the median ability juror should still vote first and the remaining ones should have increasing and then decreasing abilities.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Martinus, Handy. "Analisis Perilaku Pemilih pada Pemilihan Gubernur DKI Jakarta Periode 2012-2017." Humaniora 4, no. 1 (April 30, 2013): 58. http://dx.doi.org/10.21512/humaniora.v4i1.3418.

Повний текст джерела
Анотація:
This research is an exploratory qualitative approach using secondary data from the Indonesian Survey Institute (LSI), which aims to identify the voters’ behavior of Jakarta Governor candidates period 2012-2017. The results showed that the implementation of the election was considered by the respondents Honest-Fair (JURDIL) and quite satisfying. The selection was won by Joko Widodo – Basuki Tjahaja Purnama. However, the numbers did not reach half of the voters. Therefore, the election took 2 rounds. For Governor-Vice Governor couples socialization, both the majority and not overtaken, Fauzi Bowo – Nachrowi achieved top ranking with very significant. But apparently, successful socialization of media did not match with the victory in the election. This study aims to determine the behavior of voters in Jakarta governor election. The result, in contrary, shows that the couple in number two socialization won the election. For the popularity, it was not in tune with the socialization. Personally, the popularity of Joko Widodo topped more than the incumbent. It is believed that the performance and imaging of Joko Widodo as mayor of Solo viewed favorably by the public. Close relationship with lower level people and hawkers handling gained the voters’ sympathy. Regarding the evaluation of the incumbent, the majority responded quite satisfied because they could understand the complexity of the Jakarta capital region. But ironically, the majority answered there is no change during the leadership of the incumbent governor. Voters preference based on gender, religion, ethnicity, and age in majority chose the couple of Joko Widodo – Tjahaja Basuki Purnama.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Fuller, Joanne M., Emmelie Barenfeld, and Inger Ekman. "Why do patients struggle with their medicines?—A phenomenological hermeneutical study of how patients experience medicines in their everyday lives." PLOS ONE 16, no. 8 (August 6, 2021): e0255478. http://dx.doi.org/10.1371/journal.pone.0255478.

Повний текст джерела
Анотація:
Why do so many people struggle with their medicines despite decades of research on medicines taking? Research into how people experience medicines in their everyday life remains scarce with the majority of research in this area of focusing on whether or not people take their medicines as prescribed. Hence, this study used a phenomenological hermeneutical qualitative design to gain a deeper understanding of individuals’ perspectives on the lived experience of medicine-taking. Findings from this study highlight five main themes where participants experience medicines as: 1) life-saving and indispensable, 2) normal and a daily routine, 3) confusing and concerning, 4) unsuitable without adjustment, and 5) intrusive and unwelcome. These results can be the basis for mutually agreed prescribing through a co-creative approach that aims at enhancing open and honest dialogues between patients and healthcare professionals in partnership about medicines.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Prater, James, Konstantinos Kirytopoulos, and Tony Ma. "Dilbert Moments." International Journal of Information Technology Project Management 10, no. 2 (April 2019): 29–40. http://dx.doi.org/10.4018/ijitpm.2019040104.

Повний текст джерела
Анотація:
Developing and delivering a project to an agreed schedule is fundamentally what project managers do. There is still an ongoing debate about schedule delays. This research investigates the development of schedules through semi-structured in-depth interviews. The findings reveal that half of the respondents believe that delays reported in the media are not real and should be attributed to scope changes. IT project managers estimating techniques include bottom-up estimates, analogy, and expert judgement. Impeding factors reported for the development of realistic schedules were technical (e.g. honest mistakes) and political (e.g. completion dates imposed by the sponsor). Respondents did not mention any psychological factors, although most were aware of optimism bias. However, they were not familiar with approaches to mitigate its impacts. Yet, when these techniques were mentioned, the overwhelming majority agreed that these mitigation approaches would change their schedule estimate.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

., Reshma. "Certificateless Integrity Checking of Group Shared Data on Public Distributed Storage." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 2678–83. http://dx.doi.org/10.22214/ijraset.2022.41866.

Повний текст джерела
Анотація:
Abstract: Distributed storage administration supplies individuals with an effective strategy to share information inside a gathering. The cloud server isn't reliable, so loads of far-off information ownership checking (RDPC) conventions are proposed and remembered to be a successful method for guaranteeing the information honesty. Notwithstanding, the vast majority of RDPC conventions depend on the system of customary public key framework (PKI), which has clear security defect and bears enormous weight of testament the board. To stay away from this inadequacy, personality-based cryptography (IBC) is many times decided to be the premise of RDPC. Tragically, IBC has an inborn disadvantage of key escrow. To tackle these issues, we use the method of certificateless mark to introduce another RDPC convention for checking the trustworthiness of information divided between a gathering. In this paper, we propose a novel server-side deduplication scheme for encrypted data. It allows the cloud server to control access to outsourced data even when the ownership changes dynamically by exploiting randomized convergent encryption and secure ownership group key distribution. This prevents data leakage not only to revoked users even though they previously owned that data, but also to an honest-but-curious cloud storage server. In addition, the proposed scheme guarantees data integrity against any tag inconsistency attack. Thus, security is enhanced in the proposed scheme. The efficiency analysis results demonstrate that the proposed scheme is almost as efficient as the previous schemes, while the additional computational overhead is negligible. Keywords: Cloud, Encryption, de-duplication,
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Kho, Abel N., John P. Cashy, Kathryn L. Jackson, Adam R. Pah, Satyender Goel, Jörn Boehnke, John Eric Humphries, et al. "Design and implementation of a privacy preserving electronic health record linkage tool in Chicago." Journal of the American Medical Informatics Association 22, no. 5 (June 23, 2015): 1072–80. http://dx.doi.org/10.1093/jamia/ocv038.

Повний текст джерела
Анотація:
Abstract Objective To design and implement a tool that creates a secure, privacy preserving linkage of electronic health record (EHR) data across multiple sites in a large metropolitan area in the United States (Chicago, IL), for use in clinical research. Methods The authors developed and distributed a software application that performs standardized data cleaning, preprocessing, and hashing of patient identifiers to remove all protected health information. The application creates seeded hash code combinations of patient identifiers using a Health Insurance Portability and Accountability Act compliant SHA-512 algorithm that minimizes re-identification risk. The authors subsequently linked individual records using a central honest broker with an algorithm that assigns weights to hash combinations in order to generate high specificity matches. Results The software application successfully linked and de-duplicated 7 million records across 6 institutions, resulting in a cohort of 5 million unique records. Using a manually reconciled set of 11 292 patients as a gold standard, the software achieved a sensitivity of 96% and a specificity of 100%, with a majority of the missed matches accounted for by patients with both a missing social security number and last name change. Using 3 disease examples, it is demonstrated that the software can reduce duplication of patient records across sites by as much as 28%. Conclusions Software that standardizes the assignment of a unique seeded hash identifier merged through an agreed upon third-party honest broker can enable large-scale secure linkage of EHR data for epidemiologic and public health research. The software algorithm can improve future epidemiologic research by providing more comprehensive data given that patients may make use of multiple healthcare systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Baccarini, Alessandro, Marina Blanton, and Chen Yuan. "Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning." Proceedings on Privacy Enhancing Technologies 2023, no. 1 (January 2023): 608–26. http://dx.doi.org/10.56553/popets-2023-0035.

Повний текст джерела
Анотація:
Secure multi-party computation has seen significant performance advances and increasing use in recent years. Techniques based on secret sharing offer attractive performance and are a popular choice for privacy-preserving machine learning applications. Traditional techniques operate over a field, while designing equivalent techniques for a ring Z_2^k can boost performance. In this work, we develop a suite of multi-party protocols for a ring in the honest majority setting starting from elementary operations to more complex with the goal of supporting general-purpose computation. We demonstrate that our techniques are substantially faster than their field-based equivalents when instantiated with a different number of parties and perform on par with or better than state-of-the-art techniques with designs customized for a fixed number of parties. We evaluate our techniques on machine learning applications and show that they offer attractive performance.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Schindler, Robert M., H. G. Parsa, and Sandra Naipaul. "Hospitality Managers’ Price-Ending Beliefs." Cornell Hospitality Quarterly 52, no. 4 (October 14, 2011): 421–28. http://dx.doi.org/10.1177/1938965511421168.

Повний текст джерела
Анотація:
The use of “just-below” pricing (such as pricing an item at $6.99 or $6.95, rather than $7.00) has been common in some segments of the hospitality industry (such as quick-service and mid-scale dining). The results of a detailed survey of the price-ending beliefs of hospitality managers show that many believe that just-below prices connote good value and round-number prices connote high quality. Furthermore, the majority of these managers believe that consumers tend to drop off or otherwise give insufficient consideration to a price’s rightmost digits. Although one might expect this drop-off belief among those managers who use just-below price endings, it is found also in a majority of those managers who do not use just-below price endings. The survey results suggest that managers who decline the benefits of a consumer drop-off tendency do so because they also believe in one or more possible negative consequences of using just-below price endings. These include the beliefs that just-below endings (1) impair perceptions of high quality, (2) work against an upscale image, (3) give an impression of not being fully honest or straightforward, and (4) involve inconvenience in calculating or communicating the price or in making change.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Ikhrom, Ikhrom, Mahfud Junaedi, and Ahmad Ismail. "CONTRIBUTION INDEX OF MADRASAH DINIYAH TO THE CHARACTER EDUCATION." Analisa: Journal of Social Science and Religion 4, no. 01 (August 1, 2019): 141–63. http://dx.doi.org/10.18784/analisa.v4i01.713.

Повний текст джерела
Анотація:
Madrasah diniyah is acknowledged as the oldest educational institution that pioneered character education in Indonesia. Therefore, should there is a policy in relation to the dissolution of madrasah diniyah, public responses are emerging to reject the policy. This study reveals two pivotal roles of madrasah diniyah in relation to character education. First, the contribution of madrasah diniyah to the character education program in Central Java. Second, the contribution index of madrasah diniyah to the character education program in Central Java. This is a descriptive quantitative research. The data obtained through questionnaires by using random sampling technique and interviews. Index contribution is measured through an average score of the respondent’s answer. The contribution index is divided into five categories, namely, extreme high, high, medium, low, and extreme low. This research found out that madrasah diniyah, in general, contributes significantly to the majority of all the character education. It highlights, however, medium contribution in terms of honest character and low contribution with regards to character of fond.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Khosravi, Sareh. "Disnarration in Kazuo Ishiguro’s The Remains of the Day." k@ta 24, no. 1 (July 5, 2022): 22–28. http://dx.doi.org/10.9744/kata.24.1.22-28.

Повний текст джерела
Анотація:
ABSTRACT This study discusses the disnarrated in Kazuo Ishiguro’s The Remains of the Day by focusing on Gerald Prince’s ideas on the disnarrated. According to Prince, disnarration refers to events that have not happened but have been mentioned in the narrative. There are two modes for representing disnarration in the narrative of the novel: implicit and explicit. In the former, the disnarrated is represented by techniques like symbols, metonymies and foil characters. In the later, it is explicitly stated that a particular event could have happened but have not happened. However, based on Ishiguro’s preoccupation with the suppression of meaning, the majority of disnarrated narratives are implicit rather than explicit. The narrator’s implicit remarks signify his lost opportunities for the things he could have. Nearly at the ending of the novel, however, the narrator offers a more honest attitude to the readers by explicitly talking about his regrets and lost opportunities.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Burrell, Darrell Norman, Rajanique L. Modeste, and Aikyna Finch. "Responsible Church Leaders Should Be Educating Their Congregations About Racism and Serving the Community Concerning the Black Lives Matter movement." International Journal of Smart Education and Urban Society 12, no. 3 (July 2021): 38–49. http://dx.doi.org/10.4018/ijseus.2021070104.

Повний текст джерела
Анотація:
As our society wrestles with systemic racism, it is imperative that houses of prayer undergo the same reflection. African-Americans have been disappointed with majority Caucasian congregation church leaders who have the capacity to change minds and attitudes during this time of national reckoning over race but are not engaging their worshipers with honest educational conversations about social justice, race, and police brutality. Black lives matter. This is an obvious truth considering God's love for all God's children. When Black lives are systemically devalued by society, our outrage justifiably insists that attention be focused on Black lives. When a church claims boldly “Black Lives Matter” and attempts to educate their churchgoers about the societal and subtle ills of racial profiling, microaggressions, and privilege at this moment, it chooses not to be silent about a racial injustice for those in need. The paper explores the importance of this topic through current event literature.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Sharma, Dhruti P., and Devesh C. Jinwala. "Aggregate Searchable Encryption With Result Privacy." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 62–82. http://dx.doi.org/10.4018/ijisp.2020040104.

Повний текст джерела
Анотація:
With searchable encryption (SE), the user is allowed to extract partial data from stored ciphertexts from the storage server, based on a chosen query of keywords. A majority of the existing SE schemes support SQL search query, i.e. 'Select * where (list of keywords).' However, applications for encrypted data analysis often need to count data matched with a query, instead of data extraction. For such applications, the execution of SQL aggregate query, i.e. 'Count * where (list of keywords)' at server is essential. Additionally, in case of semi-honest server, privacy of aggregate result is of primary concern. In this article, the authors propose an aggregate searchable encryption with result privacy (ASE-RP) that includes ASearch() algorithm. The proposed ASearch() performs aggregate operation (i.e. Count *) on the implicitly searched ciphertexts (for the conjunctive query) and outputs an encrypted result. The server, due to encrypted form of aggregate result, would not be able to get actual count unless having a decryption key and hence ASearch() offers result privacy.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

McCormick, Patrick T. "Catholicism & Sexuality: The Sounds of Silence." Horizons 30, no. 2 (2003): 191–207. http://dx.doi.org/10.1017/s0360966900000499.

Повний текст джерела
Анотація:
ABSTRACTThe episcopal silence and secrecy associated with the recent pedophilia scandal echoes a larger inability of the Catholic episcopal hierarchy to enter into open and honest dialogue about a wide range of sexual issues. For more than three decades the chasm between official teachings on sexuality and gender and the belief and/or practice of the majority of Catholic laity, clergy and theologians (and an unknown number of bishops) has been growing. Still, attempts to address or bridge this divide have met with a fourfold silence. It is a silence that has kept bishops from speaking their true minds, a silence sought by restricting, investigating and sanctioning theologians, a silence that renders pastors mute or covert on sexual matters, and a silence that ignores the experience and voices of women. Such a silence undermines magisterial authority and deprives Catholics of a useful and persuasive sexual ethic, while marginalizing those willing to speak out and demoralizing those who feel they cannot.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Zhang, Qing Hua. "Existing Condition Analysis on Bad Faith of Auto Bidding for Search Engine Keywords." Key Engineering Materials 439-440 (June 2010): 128–33. http://dx.doi.org/10.4028/www.scientific.net/kem.439-440.128.

Повний текст джерела
Анотація:
With rapid development of search engine users, the auto bidding for search engine keywords is stealthily rising and such kind of service is now essentially being conducted on the majority of existing search engines. For merchants, users and even the search engine service suppliers, auto bidding is of many advantages, which is also thought it has brought forth serious phenomenon of bad faith in terms of such kind of similar search websites, leading to a crisis of confidence. This text is intended to give it a full analysis on the various problems of bad faith resulted from the auto bidding for search engine keywords. And it is in consideration of the huge controlling forcing and social influence of the search engines, there lies a great need in strengthening the closer government supervision. While guaranteeing a healthy and orderly development of search engine, our purpose is to render back an honest and clean searching environment of internet information to the public.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Cojocaru, Alexandru, Juan Garay, Aggelos Kiayias, Fang Song, and Petros Wallden. "Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's Post-Quantum Security." Quantum 7 (March 9, 2023): 944. http://dx.doi.org/10.22331/q-2023-03-09-944.

Повний текст джерела
Анотація:
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task. Arguably, its main impact has been in the setting of cryptocurrencies such as Bitcoin and its underlying blockchain protocol, which received significant attention in recent years due to its potential for various applications as well as for solving fundamental distributed computing questions in novel threat models. PoWs enable the linking of blocks in the blockchain data structure and thus the problem of interest is the feasibility of obtaining a sequence (chain) of such proofs. In this work, we examine the hardness of finding such chain of PoWs against quantum strategies. We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity. Effectively, this is an extension of a threshold direct product theorem to an average-case unstructured search problem. Our proof, adding to active recent efforts, simplifies and generalizes the recording technique of Zhandry (Crypto'19). As an application, we revisit the formal treatment of security of the core of the Bitcoin consensus protocol, the Bitcoin backbone (Eurocrypt'15), against quantum adversaries, while honest parties are classical and show that protocol's security holds under a quantum analogue of the classical “honest majority'' assumption. Our analysis indicates that the security of Bitcoin backbone is guaranteed provided the number of adversarial quantum queries is bounded so that each quantum query is worth O(p−1/2) classical ones, where p is the success probability of a single classical query to the protocol's underlying hash function. Somewhat surprisingly, the wait time for safe settlement in the case of quantum adversaries matches the safe settlement time in the classical case.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Haj’jari, Mohammad-Javad, and Noorbakhsh Hooti. "On Dr. Stockmann’s Parrhesia: Ibsen’s An Enemy of the People in the Light of Foucault." Folia Scandinavica Posnaniensia 26, no. 1 (June 1, 2019): 27–48. http://dx.doi.org/10.2478/fsp-2019-0002.

Повний текст джерела
Анотація:
Abstract An honest intellectual dutifully standing with truth against lies and treacheries of his society is a parrhesiastic figure in Foucault’s terminology. Foucault takes parrhesia as the fearless and frank speech regarding the truth of something or a situation before truthmongering and public deception and he takes the parrhesiastic as the spokesperson for truth. In this light, Dr. Stockmann in Ibsen’s An Enemy of the People occupies a unique position within Ibsen’s political philosophy. Dutifully criticizing what the majority blindly take for granted from their liar leaders in the name of democracy, Dr. Stockmann fulfills the role of a parrhesiastic figure that stands against socio-political corruption. He enters a parrhesiastic game with both the majority and the officialdom to fulfill his democratic parrhesia as a truthful citizen before the duped community, while covertly preparing for his own philosophic parrhesia or self-care within the conformist community. However, his final failure lies in his confrontation with democracy itself, which wrongly gives the right of speaking even to the liars. This article thus aims at analyzing Ibsen’s play through a Foucauldian perspective regarding the concept of parrhesia and its relation to democracy. It is to reveal Ibsen’s satire on the fake ideology of democracy and highlight the necessity of humanity’s parrhesiastic self-care for the well-being of the self and the others.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Badeni, Badeni, and Sri Saparahayuningsih. "The Implementation of Local Wisdom-Based Character Education in Elementary School." Journal of Educational Issues 9, no. 2 (May 21, 2023): 1. http://dx.doi.org/10.5296/jei.v9i2.20768.

Повний текст джерела
Анотація:
The majority of people believe that character education based on local wisdom in primary school may help children acquire moral values, great behavior, and character for students who embody society’s culture and character. However, the question is what sort of learning model may be used in teaching character in primary schools. The fundamental purpose of this study is to investigate the implementation of a local wisdom-based character education model for moral character development based on local wisdom values. The study used qualitative methodologies in the form of a phenomenological plan (design). Data was acquired through observations, interviews, focus group discussions, and document examinations. Data analysis techniques include data reduction, data visualization, and conclusion drafting. Based on the outcomes of this study, it can be concluded that enforcing the local wisdom-based character education model may be used as an alternative option and that learning models imposing character values may have the benefits and potential of local wisdom values. The model’s implementation is incredibly effective in developing students’ personalities. The majority of students changed their behavior, attitudes, and character by being more driven to study, more disciplined in their behavior, more responsible for their acts, making commitments, being honest, and striving for perfection. Why do they become like that? As part of their learning process, they always ponder why the norms, values, and regulations should be followed.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Artemov, George P., and Anna G. Pinkevich. "Moral culture and social tension." Vestnik of Saint Petersburg University. Philosophy and Conflict Studies 39, no. 2 (2023): 289–302. http://dx.doi.org/10.21638/spbu17.2023.207.

Повний текст джерела
Анотація:
The article analyzes the influence of the moral culture of the Russian population on social tension. Moral culture is considered as a system of interpersonal attitudes that characterize the ability of members of a social community to maintain relationships of mutual trust, mutual respect and mutual assistance. The empirical basis of the study is the data of the AllRussian surveys conducted by the Institute for Comparative Social Research (CESSI) within the framework of the Russian Social Research under the European Social Research Program in 2006 and 2018. As indicators of moral culture are used variables that reflect the cautious or trusting attitude of respondents to most people; an assessment of the self-serving or honest attitude of most people to respondents; an assessment by respondents of the ratio of people focused on caring only for themselves or helping others. Variables that reflect negative assessments by respondents of the state of economic, social, political etc., as well as negative assessments of the impact of immigrants on the different spheres of life in countries are considered as indicators of social tension. Based on the use of statistical methods of data analysis, it was found that negative assessments of the state of spheres of life and the influence of immigrants on these spheres are less characteristic of respondents who trust the majority of people, are confident in the honesty of most people and their desire to help each other. A comparative analysis of changes in indicators of moral culture and social tension in the period from 2006 to 2018 in the country as a whole and in individual federal districts of the country shows that an increase of the value of moral culture indicators is accompanied by a decrease in the value of the social tension considered indicators.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Sianipar, Imelda Masni Juniaty. "POPULISME DAN KEBIJAKAN LUAR NEGERI DI INDONESIA." Andalas Journal of International Studies (AJIS) 4, no. 1 (May 31, 2016): 27. http://dx.doi.org/10.25077/ajis.4.1.27-47.2015.

Повний текст джерела
Анотація:
On October 20, 2014, Joko Widodo or familiarly known as Jokowi was sworn in as the Seventh President of the Republic of Indonesia. The majority of Indonesian society supports Jokowi because He is simple, honest and populist. The presence of populist leaders in international politics often attracts the attention of Western countries, particularly the United States. Populist leaders are often considered as the authoritarian leaders, anti-democratic, anti-Western, anti-foreign and anti-market. Hugo Chavez from Venezuela and Mahmoud Ahmadinejad from Iran are the examples. Chavez and Ahmadinejad are considered as threats by the United States because they challenge the United States led regional and global order. This article will examine the direction of Jokowi’s foreign policy. This article argues that Jokowi is a moderate populist leader. Jokowi is friendly to other countries including the West but still prioritize the national interests. Thus, Indonesia under Jokowi is not a threat to other countries and the West. In fact, they can work together to achieve their common national interests. Keywords: populism, foreign policy, Indonesia, jokowi, moderate populism
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Чеботаренко, Елена, and Elena Chebotarenko. "Institutional Background of Social Market Economy." Bulletin of Kemerovo State University. Series: Political, Sociological and Economic sciences 2018, no. 4 (January 14, 2019): 164–69. http://dx.doi.org/10.21603/2500-3372-2018-4-164-169.

Повний текст джерела
Анотація:
The quality of life of people and the degree of focus of market economy on the interests of people depend to a great extent on the structure of public institutes, which include formal and informal norms, rules and the organizations that support them. To develop these norms and rules, it is necessary to rely not only on rational considering and calculation of the interacting parties, but also on habits, customs, and traditions. The universal nature of functions of public institutes always acts in the specific ethical cover that reflects the culture of people, their idea of the social justice focused on three fundamental values: equal opportunities, overcoming excess inequalities, and providing honest rules of the game. The institutionalization process includes stages connected with understanding and acceptance by the majority of the principles of socially oriented economy, development of the particular rules, and mechanisms supporting them. Some institutes perform functions of control over the flaws of the market mechanism, others are aimed at alignment of excess social and economic inequalities and ensuring the compensating advantages to everyone.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Kolman, Iris. "Beyond Non-Registration: Women Opting for Cohabitation in Tunis." Sociology of Islam 6, no. 3 (September 25, 2018): 381–400. http://dx.doi.org/10.1163/22131418-00603007.

Повний текст джерела
Анотація:
In light of the negative social and legal consequences they might face, women in Muslim majority countries who enter into an intimate relationship without concluding a state-registered marriage are often considered victims of unscrupulous men. Usually this refers to unregistered ‘urfi (religious-only) marriages, as very little attention is paid to women engaging in cohabitation. Whereas non-marriage is generally framed as ‘waithood’ (the inability to marry) and hence as a negative choice, some women in Tunis opt for cohabitation, as they expect this to positively influence their relationship and potential future marriage as more equal and honest. These women express an ethical stance that does not fit society’s dominant normative framework and present themselves as liberal secular Tunisians. They take an ambivalent position on state-registered marriage, as they are critical of how Tunisian marriages are currently lived, but they do recognize the value of registration. Their rejection of ‘urfi marriage as against the law, gender unequal, and Salafi-inspired confirms their liberal secular sense of personhood.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Holman, Luke, Charlotte G. Jørgensen, John Nielsen, and Patrizia d'Ettorre. "Identification of an ant queen pheromone regulating worker sterility." Proceedings of the Royal Society B: Biological Sciences 277, no. 1701 (June 30, 2010): 3793–800. http://dx.doi.org/10.1098/rspb.2010.0984.

Повний текст джерела
Анотація:
The selective forces that shape and maintain eusocial societies are an enduring puzzle in evolutionary biology. Ordinarily sterile workers can usually reproduce given the right conditions, so the factors regulating reproductive division of labour may provide insight into why eusociality has persisted over evolutionary time. Queen-produced pheromones that affect worker reproduction have been implicated in diverse taxa, including ants, termites, wasps and possibly mole rats, but to date have only been definitively identified in the honeybee. Using the black garden ant Lasius niger , we isolate the first sterility-regulating ant queen pheromone. The pheromone is a cuticular hydrocarbon that comprises the majority of the chemical profile of queens and their eggs, and also affects worker behaviour, by reducing aggression towards objects bearing the pheromone. We further show that the pheromone elicits a strong response in worker antennae and that its production by queens is selectively reduced following an immune challenge. These results suggest that the pheromone has a central role in colony organization and support the hypothesis that worker sterility represents altruistic self-restraint in response to an honest quality signal.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Yu, Xiaopeng, Fagen Li, Wei Zhao, Zhengyi Dai, and Dianhua Tang. "Multiparty Threshold Private Set Intersection Protocol with Low Communication Complexity." Security and Communication Networks 2022 (September 27, 2022): 1–12. http://dx.doi.org/10.1155/2022/9245516.

Повний текст джерела
Анотація:
Multiparty threshold private set intersection (MP-TPSI) protocol allows n mutually untrusted parties P 1 , P 2 , … , P n holding data sets A 1 , A 2 , … , A n of size m respectively to jointly compute the intersection I = A 1 ∩ A 2 ∩ ⋯ ∩ A n over all their private data sets only if the size of intersection is larger than m − t , while ensuring that no other private information of the data sets other than the intersection is revealed, where t is the threshold. In the MP-TPSI protocol, multiple parties first decide whether the size of the intersection is larger than the threshold t ; then, they compute the intersection if the size of the intersection is larger than the threshold t . However, the existing MP-TPSI protocols use different forms of evaluation polynomials in the cardinality testing and intersection computing phases, so that parties need to transmit and calculate a large number of evaluation values, which leads to high communication and computational complexity. In addition, the existing MP-TPSI protocols cannot guarantee the security and the correctness of the results, that is, an adversary can know the additional information beyond the intersection, and the elements that are not in the intersection are calculated as the intersection. To solve these issues, based on the threshold fully homomorphic encryption (TFHE) and sparse polynomial interpolation, we propose an MP-TPSI protocol. In the star network topology, the theoretical communication complexity of the proposed MP-TPSI protocol depends on the threshold t and the number of parties n , not on the size of set m . Moreover, the proposed MP-TPSI protocol outperforms other related MP-TPSI protocols in terms of computational and communication overheads. Furthermore, the proposed MP-TPSI protocol tolerates up to n − 1 corrupted parties in the semi-honest model, where no set of colluding parties can learn the input of an honest party in the strictest dishonest majority setting.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Wagh, Sameer. "Pika: Secure Computation using Function Secret Sharing over Rings." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (October 2022): 351–77. http://dx.doi.org/10.56553/popets-2022-0113.

Повний текст джерела
Анотація:
Machine learning algorithms crucially depend on non-linear mathematical functions such as division (for normalization), exponentiation (for softmax and sigmoid), tanh (as an activation function), logarithm (for crossentropy loss), and square root (for back-propagation of normalization layers). However, when machine learning is performed over secure computation, these protocols incur a large communication overhead and high round complexity. In this work, we propose new multi-party computation (MPC) protocols for such functions. Our protocols achieve constant round complexity (3 for semi-honest, 4 for malicious), an order of magnitude lower communication (54 − 121× lower than prior art), and high concrete efficiency (2−1163× faster runtime). We rely on recent advances in function secret sharing (FSS) to construct these protocols. Our contributions can be summarized as follows: (1) A constant round protocol to securely evaluate nonlinear functions such as division, exponentiation, logarithm, and tanh (in comparison to prior art which uses round complexity proportional to the rounds of iterative methods/required precision) with high accuracy. This construction largely follows prior work in look-up style secure computation. (2) Our main contribution is the extension of the above protocol to be secure in the presence of malicious adversaries in the honest majority setting. We provide a malicious sketching protocol for FSS schemes that works over rings and in order to prove its security, we extend (and prove) a corresponding form of SchwartzZippel lemma over rings. This is the first such extension of the lemma and it can be of independent interest in other domains of secure computation. (3) We implement our protocol and showcase order of magnitude improvements in runtime and communication. Given the low round complexity and substantially lower communication, our protocols achieve even better performance over network constrained environments such as WAN. Finally, we showcase how such functions can lead to scalability in machine learning. Note that techniques presented are applicable beyond the application of machine learning as the protocols effectively present an efficient 1-out-of-N oblivious transfer or an efficient private information retrieval protocol.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Latysh, Jurij. "Could be a socalist US President: Bernie Sanders case." European Historical Studies, no. 4 (2016): 161–75. http://dx.doi.org/10.17721/2524-048x.2016.04.161-175.

Повний текст джерела
Анотація:
The article deals with the campaign of Senator B. Sanders for the nomination for the post of President of the United States Democratic Party, analyzes the causes of the rapid growth in popularity of socialist ideas among young people and Democrats, highlights the challenges faced by the only senator-socialist. With the departure of the past stereotypes of the Cold War in the United States there has been a change of attitude towards socialism. Among young people aged 18-29 support socialism than capitalism support. The basis of his election program Sanders put the request “political revolution” in the US. It offers a choice between his progressive economic program that creates jobs, increases wages, protects the environment and provides medical care for all, and the conversion to US economic and political oligarchy. Despite a significant increase Sanders rating so far inferior to Clinton, who enjoys the support of the party establishment, party donors and “superdelegates”. However, in competition with Trump Sanders has a much better chance through an excellent reputation. Despite high ratings, the majority of voters do not believe Clinton Trump reliable and honest candidates. Sanders – one of the candidates who most respondents think good person.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Wright, A. J., and L. A. Walsh. "Mind the gap: why neurological plasticity may explain seasonal interruption in humpback whale song." Journal of the Marine Biological Association of the United Kingdom 90, no. 8 (June 30, 2010): 1489–91. http://dx.doi.org/10.1017/s0025315410000913.

Повний текст джерела
Анотація:
Much is unknown about humpback whale (Megaptera novaeangliae) song. The behaviour is limited almost exclusively to males, occurs almost exclusively on the calving grounds and is identical within a population, although it changes periodically throughout the season. Much of current thinking associates humpback whale song with breeding, although it is not clear if it is intended to attract a mate, fend off challengers, or a combination of the two. There is, however, very little information on the internal biology of these large, sea-going mammals, so the majority of hypotheses have not considered much in the way of physiological mechanisms. Nonetheless, we believe that there is enough information available to infer that a seasonal process of neurological development and atrophy similar to that found in other animals may be present in humpback whales. We believe this explains why humpback whale song is not produced between breeding seasons and also why it does not vary between seasons, while it does so within a season. It also adds additional weight to the idea that humpback whale song is an honest signal of fitness to a potential mate or competitor.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Alvin, Silvanus. "PAN's Political Communication on Instagram: Analyzing Celebrity Politicians' Messages." Arkus 9, no. 2 (August 8, 2023): 332–39. http://dx.doi.org/10.37275/arkus.v9i2.333.

Повний текст джерела
Анотація:
The 2024 general election in Indonesia carries significant importance as it provides the nation with an opportunity to exercise its democratic rights and actively participate in shaping the country's political landscape. As the cornerstone of Indonesia's Unitary State, the election mandates direct, public, free, confidential, honest, and fair representation based on Pancasila and the 1945 Constitution. This study focuses on Partai Amanat Nasional (PAN), one of the prominent political parties participating in the election, and examines its political communication strategies on Instagram. The research delves into the content and style of Instagram posts made by PAN's celebrity politicians, who have backgrounds in the entertainment industry. By employing content analysis, the study identifies three types of messages conveyed by these celebrity politicians: political messages, political events, and non-political messages. The analysis uncovers PAN's efforts to establish a dynamic online presence and engage with the audience through a diverse content mix. Furthermore, the research explores the unique characteristics of Instagram Reels, which constitute the majority of PAN's posts, and their alignment with the short attention spans of netizens. Reels offer a powerful communication channel for politicians to connect with their audience and disseminate their political messages effectively.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Ahyani, Hisam, Haris Maiza Putra, Memet Slamet, Muharir Muharir, and Andri Nugraha. "Implementation of Islamic Business Ethics in Conventional Bank BRI Ciamis Branch Office, West Java." Banque Syar'i: Jurnal llmiah Perbankan Syariah 9, no. 1 (June 8, 2023): 27–44. http://dx.doi.org/10.32678/bs.v9i1.8199.

Повний текст джерела
Анотація:
The purpose of this study is to find out the model and implementation of Islamic business ethics carried out by Bank BRI Ciamis branch office, where in carrying out its business it has put forward the principles of Islamic business ethics in serving consumers. The academic problem that arises is that Bank BRI KC Ciamis is a non-sharia bank, but in service to consumers it prioritizes Islamic business ethical values such as being fair, honest, trustworthy, besides that the majority of Bank BRI KC Ciamis employees are Muslims. The author tries to reveal and dig into this research using descriptive analysis where data sources are obtained through technical interviews, observation and documentation. The findings of this study are that the implementation of business at BRI KC Ciamis bank prioritizes the principles of Islamic business ethics, this can be proven in the 10 behaviors of BRI personnel, including: 1) Excellent Service, 2) employees work 3) effectively and 4) efficiently and 5) prioritizing responsibility, 6) honest, 7) mutual respect, 8) full of innovation, 9) positive attitude and 10) prioritizing trust in consumers. As for added value, namely the brand of BRI bank, namely "serving with sincerity." Abstrak: Tujuan penelitian ini yakni untuk mengetahui model dan pelaksanaan etika bisnis islami yang dilakukan oleh Bank BRI kantor cabang Ciamis, dimana dalam pelaksanaan bisnisnya ia telah mengedepankan prinsip-prinsip etika bisnis islami dalam melayani konsumen. Adapun problem akademik yang muncul adalah Bank BRI KC Ciamis adalah bank non-syariah, namun dalam pelayanan kepada konsumen mengedepankan nilai-nilai etika bisnis islami seperti besikap adil, jujur, amanah, selain itu mayoritas pegawai Bank BRI KC Ciamis beragama islam. Penulis berusaha menguak serta menggali dalam penelitian ini menggunakan analisis deskriptif dimana sumber data diraih melalui teknis wawancara, observasi serta dokumentasi. Hasil temuan penelitian ini menyatakan bahwa pelaksanaan bisnis di bank BRI KC Ciamis mengedepankan prinsip etika bisnis islami, hal ini dapat dibuktikan dalam 10 Prilaku insan BRI, meliputi: 1) Pelayanan Prima, 2) karyawan bekerja secara 3) efektif dan 4) efisien serta 5) mengedepankan tanggungjawab, 6) jujur, 7) saling menghargai, 8) penuh inovatif, 9) sikap positif dan 10) mengedepankan kepercayaan kepada konsumen. Adapun sebagai nilai tambah yakni brand dari bank BRI yakni" melayani dengan setulus hati."
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Brokmeier, Luisa Leonie, Katharina Diehl, Bianca Annika Spähn, Charlotte Jansen, Tobias Konkel, Wolfgang Uter, and Tatiana Görig. "“Well, to Be Honest, I Don’t Have an Idea of What It Might Be”—A Qualitative Study on Knowledge and Awareness Regarding Nonmelanoma Skin Cancer." Current Oncology 30, no. 2 (February 15, 2023): 2290–99. http://dx.doi.org/10.3390/curroncol30020177.

Повний текст джерела
Анотація:
Nonmelanoma skin cancer (NMSC) is the most common cancer type in Western industrialized countries. However, research into the knowledge and awareness in the general population regarding NMSC is still scarce. This qualitative study aims to fill this research gap. Face-to-face, semi-structured interviews with 20 individuals aged 55–85 years were conducted between February and October 2020. Transcribed interviews were analyzed using qualitative content analysis. The term “white skin cancer”—the German colloquial term of NMSC—was well-known, but the incidence was underestimated. None of the participants could give a precise definition of NMSC, and various alterations in the skin were, partially wrongly, stated as potential signs for NMSC. As risk factors for NMSC, solar radiation, and fair skin type were mentioned most often. The perceived individual risk of developing NMSC and risk compared to individuals of the same age and gender were low in our sample. Own knowledge about NMSC was mostly perceived to be insufficient, and the majority of the sample would like to receive more information on NMSC. Our results emphasize a need to inform about the signs and risks of NMSC not only in the studied older age group but also in younger people.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Manurung, Rosida Tiurma, Evany Victoriana, and Alfredo Ezra Amadeus. "Humanity-Based Language Learning." Aksara: Jurnal Ilmu Pendidikan Nonformal 7, no. 2 (May 20, 2021): 763. http://dx.doi.org/10.37905/aksara.7.2.763-770.2021.

Повний текст джерела
Анотація:
<p>This research is about language learning with a human perspective. The purpose of this paper is to find out how students respond and respond to language learning with a humanitarian perspective among active students. This research is a research with a qualitative descriptive analysis approach, namely a technique that analyzes, describes, and summarizes various situations and conditions. The data collection technique in this study was using a questionnaire aimed at active students with ages between 18-25 years, in the questionnaire presented statements that needed to be answered by respondents in a factual and honest manner. Based on the results of research on language learning with a humanitarian perspective, it was found that the majority of respondents used good and correct Indonesian with human values because it grew from an attitude of caring for others and an attitude of helping. This study also found that students have respected the state language as a language of instruction in the world of education, students agree that human values can be developed to shape one's character so that it can be implemented in language learning and there is concern with Indonesian language education for the wider community with values. human values.</p><p> </p>
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Humphrey, G. F. "Scientific Fraud: The McBride Case — Judgment." Medicine, Science and the Law 34, no. 4 (October 1994): 299–306. http://dx.doi.org/10.1177/002580249403400405.

Повний текст джерела
Анотація:
Dr W G McBride, who was a specialist obstetrician and gynaecologist and the first to publish on the teratogenicity of thalidomide, has been removed from the medical register after a four-year inquiry by the Medical Tribunal of New South Wales. Of the 44 medical practice allegations made against him by the Department of Health only one minor one was found proved but 24 of the medical research allegations were found proved. Of these latter, the most serious was that in 1982 he published in a scientific journal, spurious results relating to laboratory experiments on pregnant rabbits dosed with scopolamine. Had Dr McBride used any of the many opportunities available to him to make an honest disclosure of his misdemeanour, his conduct would have been excused by the Tribunal. However, he persisted in denying his fraudulent conduct for several years, including the four years of the Inquiry. The Tribunal unanimously found Dr McBride not of good character in the context of fitness to practise medicine. The decision to deregister was taken by a majority of 3 to 1. Since research science is not organized as a profession, there are no formal sanctions which can be taken against his still engaging in such research.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії