We study the signal sets for information theoretically secure key agreement with public discussion over the Gaussian and flat fading channels. Alice transmits signals to Bob over a noisy channel ...while Eve receives signals through an independent noisy channel. By utilizing this noisy resource, Alice and Bob wish to share a secret key on which Eve has a negligible amount of information. We present a protocol that allows Alice and Bob to share a common secret information, and encompass the signal sets for an efficient protocol in information theoretic sense.
The purpose of this paper is to present the results of research in which the Finnish public discussion of giftedness and gifted children, and conceptions of giftedness and gifted children presented ...in it, were examined. The research was conducted by analyzing articles from the Finnish newspaper Helsingin Sanomat and the teachers' periodical Opettaja, using the content analysis method. The results show that giftedness is seen as multidimensional, and both intrapersonal and environmental contributions are recognized as essential in talent development. The conceptions of gifted children were quite diverse, and gifted children's possible problems were frequently discussed. Moreover, misunderstandings were revealed as well as areas that have not been adequately addressed.
이 연구는 ‘대입제도 개편 공론화’ 과정에 참여한 시민참여단의 숙의 효과가 어떻게 나타났는지를 논의 하였다. 이를 위해 숙의 효과를 선호의 변화뿐 아니라 지식습득의 변화와 선호 결정요인의 영향력 변화로 확대하여 분석하였다. 분석결과, 공론화 과정에서 숙의를 통해 공론화 의제 및 주요 대입제도 내용에 대한 시민참여단의 학습과 지식습득 수준이 증가하였다. ...의제2와 의제4에 대해서는 시민참여단의 선호 변화가 유의미하게 나타났으며, 선호 결정요인들이 각 의제에 대한 시민참여단의 최종 선호 결정에 유의미하게 영향을 미쳐 숙의 효과가 제한적으로 나타났다. 이는 공론화 의제들이 3가지 쟁점별로 상호 배타적인 성격이 아닌 보완적인 성격을 지녔고, 조사방식이 시민참여단이 의제를 선택하는 방식이 아닌 각 의제별 지지 정도를 결정하는 방식이라는 점에 기인한다. 향후 공론화의 적실성을 제고하기 위해서는 무엇보다 공론화에 적합한 의제를 발굴해야 한다. 나아가 적절한 사례에 공론화를 적용하고 공론화 범위를 명확하게 설정 함으로써 공론화 범위에 대한 정확한 지식습득을 통해 공론화의 타당성을 제고할 필요가 있다.
This study aims at discussing how the deliberation effect of the civic participation group who participated in the process of public discussion on the reform of the university admission system was revealed. To this end, the deliberation effect was analyzed by expanding not only the change in preference but also the change in knowledge acquisition and the change in influence of preference determinants. As a result, the level of learning and knowledge acquisition of the civic participation group on the agenda for public discussion and major contents of the university admission system increased through deliberation during the process of public discussion. For Agenda 2 and Agenda 4, the preference change of the civic participation group was significant, and preference determinants significantly influenced the final preference decision of the civic participation group for each agenda, so the deliberation effect was limited. This is due to the fact that the agendas were complementary rather than mutually exclusive for each of the three issues, and the civic participation group decided the degree of support for each agenda, not the way it was selected. In order to enhance the relevance of the public discussion in the future, it is necessary to find an agenda suitable for public discussion. Furthermore, it is necessary to enhance the validity of public discussion by applying public discussion to appropriate cases and by acquiring accurate knowledge about the scope of public discussion through clearly setting its scope.
Considering some passive eavesdropper, the feasibility of exchanging some secret data between an RFID tag and its reader through public discussion is established. No key distribution is required by ...our solution; the tag and the reader do not have to share any common data to form a confidential channel. For this, a natural phenomenon-the inherent noise on their communication link-is exploited. Classical protocols, consisting after an initialization step in three phases called advantage distillation, information reconciliation and privacy amplification, are then adapted to these highly constrained devices. First, the canvas of our study is presented. Next, the advantage distillation phase is discussed. Then, Brassard and Salvail's Cascade protocol is proved to be modifiable so as to reduce the hardware implementation cost while still maintaining adequate correction rate and tolerable leaked information during the reconciliation phase. Finally, as for the privacy amplification phase, the work on low-cost universal hash functions from Yuumlksel is pointed out, achieving to allege that public discussion under noisy environment might be an interesting possibility for low cost RFID tags
Individual autonomy results as a sub- product of social interaction. It is represented by a
process of social incorporation that allows us to learn about the customs, the history, and
the traditions ...of our society. Since our birth we become a living component of the
collectivity, we develop language codes that allow us to communicate with others and to
share with them the contents of ours needs and preferences, our points of view, ours
believes. The construction of a collectivity requires a process of social learning thought
which the function of collective well- being is determined. Democratic public space results
from the possibilities to establish conditions for the construction of public dialogues.
Freedom of speech, allow us to reveal our preferences and, eventually, to establish
agreements that may favor to development of impartial normative structures that favor
cooperative behavior.
La construcción autonómica del sujeto es el resultado de un proceso de socialización que
se produce en el contexto de la interacción con los demás. Es a través de ese proceso
como aprendemos los valores, las costumbres, los modos, las tradiciones de la sociedad
en la que nos ha tocado en suerte vivir. Desde nuestro nacimiento nos incorporamos a la
convivencia colectiva, desarrollamos códigos de lenguaje que nos permiten comunicarnos
con los demás y darles a conocer nuestras necesidades, nuestros puntos de vista,
nuestras preferencias. La construcción colectiva implica un proceso de aprendizaje social
a través del cual vamos definiendo los contenidos de las funciones de bienestar colectivo
y su coincidencia o no con los múltiples intereses individuales que se juegan en la
sociedad en un momento histórico determinado. La definición de un espacio público
democrático tiene que ver con la existencia o no de las condiciones necesarias para el
establecimiento de diálogos públicos que permitan develar preferencias y llegar a
acuerdos sobre la base de estructuras normativas imparciales que auspicien el
comportamiento cooperativo.
This IEG evaluation, requested by the World Banks Board of Executive Directors, represents the first independent evaluation of the PSIA experience. The evaluation finds that:. The PSIA approach ...has appropriately emphasized the importance of assessing the distributional impact of policy actions, understanding institutional and political constraints to development, and building domestic ownership for reforms. PSIAs have not always explicitly stated their operational objectives (i.e., informing country policies, informing Bank operations, and/or contributing to country capacity). PSIAs have had limited ownership by Bank staff and managers and have often not been effectively integrated into country assistance programs. Quality assurance and Monitoring and Evaluation of the overall effectiveness of PSIAs have been weak. The evaluation recommends that the World Bank:. Ensure that Bank staff understand what the PSIA approach is and when to use it. Clarify the operational objectives of each PSIA and tailor the approach and timeline to those objectives. Improve integration of the PSIA into the Banks country assistance program by requiring that all earmarked funding for PSIAs be matched by a substantial contribution from the country unit budgets. Strengthen PSIA effectiveness through enhanced quality assurance.
We consider the problem of secret key agreement in Gaussian Maurer's Model. In Gaussian Maurer's model, legitimate receivers, Alice and Bob, and a wire-tapper, Eve, receive signals randomly generated ...by a satellite through three independent memoryless Gaussian channels respectively. Then Alice and Bob generate a common secret key from their received signals. In this model, we propose a protocol for generating a common secret key by using the result of soft-decision of Alice and Bob's received signals. Then, we calculate a lower bound on the secret key rate in our proposed protocol. As a result of comparison with the protocol that only uses hard-decision, we found that the higher rate is obtained by using our protocol.
This study probes into what public Chinese stem cell scientists involve in defining what is ‘good research practice’. Thomas Gieryn in 1983 argued that scientists draw up boundaries between the realm ...of ‘real science’ and that of ‘pseudoscience’ in order to claim and defend their own territory. The aim was to protect the autonomy of scientific research and to elicit financial support and political backup (Gieryn, American Sociological Review, 48(6), 781–795,
1983
). This article builds on, redefines and extends Gieryn’s concept of ‘boundary-work’ to apply to and include boundaries between ethical and non-ethical science, while emphasising the global scope of boundary work. It shows how scientists use both ‘science’ and ‘bioethics’ boundaries to demarcate their own territory and to exclude certain publics from debate in the field. By elaborating Gieryn’s concept of boundary work in the new and different context of bioethical science regulation, the article shows how Chinese stem cell scientists, by using both kinds of boundaries—between science and pseudoscience and between ethical and non-ethical science—at the same time welcome and abhor bioethical research regulation. This article also indicates the need to understand this extended form of boundary making in terms of global science collaboration and competition. It shows how the self-awareness of scientists as global actors in stem cell science has led to a moral economy of science and ethics involving global boundaries rather than local conditions. Such boundary making does not just function to strengthen group identity and to elicit political support; it is also mobilised to direct and, in many cases, to ward off discussion with bioethicists and the public.