Signing below the dotted line: signature position as a marker of vulnerability for visuospatial processing difficulties
نویسندگان
چکیده
Almost one-third of the participants in a neuropsychological study signed the consent form below the given line. The relationship between a signature position on or below the line and participants' cognitive function was investigated. Fifty drug-dependent individuals, 50 of their siblings, and 50 unrelated control participants completed a battery of neuropsychological tests using the Cambridge Neuropsychological Test Automated Battery (CANTAB). Individuals signing below, rather than on, the line performed more poorly on tests of visuospatial memory, but no differently on other cognitive tests. Signature positioning may be a soft sign for impairment of the mechanisms involved in visuospatial memory.
منابع مشابه
The effect of verbal and visuospatial working memory spans on collocation processing in learners of English
Much interest has recently been directed toward the knowledge of collocations in the field of second language learning since they have been asserted to improve fluency. The current study was intended to examine the effect of verbal and visuospatial working memory spans on the processing of collocations using a Self-Pace Reading Task (SPRT) and relevant working memory tasks. To this end, partici...
متن کاملOn-line Signature Biometrics using Support Vector Machine
Handwritten signature has long been established as the most diffuse mean for personal verification in our daily life. It is commonly, in general, in all kind of legal documents and transactions. Therefore, within all biometric modalities, signature is probably the widest accepted. On the other hand, signature is a behavioural characteristic of individuals, and therefore is considered being weak...
متن کاملThe RMX Transform and Digital Signatures∗
This document describes RMX, a simple message randomization scheme that when used as a front end to existing hash-then-sign signature schemes, such as RSA and DSS, frees these signatures from their current vulnerability to off-line collision attacks on the underlying hash function. We demonstrate the practicality of the approach, which requires no change to hash functions or signature algorithm...
متن کاملImplementing the Halevi-Krawczyk Randomized Hashing Scheme
The Halevi-Krawczyk randomized hashing scheme, also known as RMX, is designed to be used as a front-end to existing hash-then-sign signature schemes, such as RSA and DSS. RMX frees these signatures from their current vulnerability to off-line collision attacks on the underlying hash function, without changing the hash function or signature algorithm. In effect, RMX provides a hedge against coll...
متن کاملImprovement and parallelization of Snort network intrusion detection mechanism using graphics processing unit
Nowadays, Network Intrusion Detection Systems (NIDS) are widely used to provide full security on computer networks. IDS are categorized into two primary types, including signature-based systems and anomaly-based systems. The former is more commonly used than the latter due to its lower error rate. The core of a signature-based IDS is the pattern matching. This process is inherently a computatio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره 21 شماره
صفحات -
تاریخ انتشار 2015