This paper is a response to articles in the literature regarding symbols in dreams. While some neurology-based dream studies reject dream symbols altogether, the preponderance of material available for review accepts that dreams are frequently populated by symbols that require interpretation to be understood. In this study of my own extensive dream journals, the presence of veridical psi dreams makes it possible to rule out symbolic content in some cases. The results of this study show that-at least from the 11,850 dream scenes reviewed here-unambiguous symbolic content is extremely rare. For this paper, it was assumed that no dreams contained any symbolically presented information unless the dreams contained unambiguous indications that symbols were present. Following this method, a distinction may be made between dream content that clearly contains symbols and dreams that are assumed to be symbolic by default. Symbols that met the criteria used here can be shown to be di?erent from conventionally accepted symbols in that they clarify-rather than obfuscate-the communication of complex ideas.
DOCUMENT
For delayed and long-term students, the education process is often a lonely journey. The main conclusion of this research is that learning should not be an individual process of the student connected to one lecturer, but rather a community where learning is a collective journey. The social interaction between lecturers, groups of delayed students and other actors is an important engine for arriving at the new knowledge, insights and expertise that are important to reach their final level. This calls for the design of social structures and the collaboration mechanism that enable the bonding of all members in the community. By making use of this added value, new opportunities for the individual are created that can lead to study success. Another important conclusion is that in the design and development of learning communities, sufficient attention must be paid to cultural characteristics. Students who delay are faced with a loss of self-efficacy and feelings of shame and guilt. A learning community for delayed students requires a culture in which students can turn this experience into an experience of self-confidence, hope and optimism. This requires that the education system pays attention to language use, symbols and rituals to realise this turn. The model ‘Building blocks of a learning environment for long-term students’ contains elements that contribute to the study success of delayed and long-term students. It is the challenge for every education programme to use it in an appropriate way within its own educational context. Each department will have to explore for themselves how these elements can be translated into the actions, language, symbols and rituals that are suitable for their own target group.
DOCUMENT
The project aim is to improve collusion resistance of real-world content delivery systems. The research will address the following topics: • Dynamic tracing. Improve the Laarhoven et al. dynamic tracing constructions [1,2] [A11,A19]. Modify the tally based decoder [A1,A3] to make use of dynamic side information. • Defense against multi-channel attacks. Colluders can easily spread the usage of their content access keys over multiple channels, thus making tracing more difficult. These attack scenarios have hardly been studied. Our aim is to reach the same level of understanding as in the single-channel case, i.e. to know the location of the saddlepoint and to derive good accusation scores. Preferably we want to tackle multi-channel dynamic tracing. • Watermarking layer. The watermarking layer (how to embed secret information into content) and the coding layer (what symbols to embed) are mostly treated independently. By using soft decoding techniques and exploiting the “nuts and bolts” of the embedding technique as an extra engineering degree of freedom, one should be able to improve collusion resistance. • Machine Learning. Finding a score function against unknown attacks is difficult. For non-binary decisions there exists no optimal procedure like Neyman-Pearson scoring. We want to investigate if machine learning can yield a reliable way to classify users as attacker or innocent. • Attacker cost/benefit analysis. For the various use cases (static versus dynamic, single-channel versus multi-channel) we will devise economic models and use these to determine the range of operational parameters where the attackers have a financial benefit. For the first three topics we have a fairly accurate idea how they can be achieved, based on work done in the CREST project, which was headed by the main applicant. Neural Networks (NNs) have enjoyed great success in recognizing patterns, particularly Convolutional NNs in image recognition. Recurrent NNs ("LSTM networks") are successfully applied in translation tasks. We plan to combine these two approaches, inspired by traditional score functions, to study whether they can lead to improved tracing. An often-overlooked reality is that large-scale piracy runs as a for-profit business. Thus countermeasures need not be perfect, as long as they increase the attack cost enough to make piracy unattractive. In the field of collusion resistance, this cost analysis has never been performed yet; even a simple model will be valuable to understand which countermeasures are effective.