98%
921
2 minutes
20
Purpose: The purpose of this viewpoint is to advocate for increased study of common ground and audience design processes in multiparty communication in traumatic brain injury (TBI).
Method: Building on discussions at the 2024 International Cognitive-Communication Disorders Conference, we review common ground and audience design processes in dyadic and multiparty communication. We discuss how the diffuse profiles of neural and cognitive deficits place individuals with TBI at increased risk for keeping track of who knows what in group settings and using that knowledge to flexibly adapt their communication behaviors.
Results: We routinely engage in social communication in groups of three or more people at work, school, and social functions. While academic, vocational, and interpersonal domains are all areas where individuals with TBI are at risk for negative outcomes, we know very little about the impact of TBI on group, or multiparty, communication.
Conclusions: The empirical study of common ground and audience design in multiparty communication in TBI presents a promising new direction in characterizing the impact of TBI on social communication, uncovering the underlying mechanisms of cognitive-communication disorders, and may lead to new interventions aimed at improving success in navigating group communication at work and school, and in interpersonal relationships.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC12381843 | PMC |
http://dx.doi.org/10.1044/2025_AJSLP-24-00151 | DOI Listing |
PLoS One
September 2025
School of Mathematics and Statistics, Kashi University, Kashi, Xinjiang, China.
In this paper, two conclusive three-party cyclic assisted cloning protocols in amplitude damping (AD) channel are put forward that, respectively clone three arbitrary unknown single-qubit states and single-qutrit states with the help of a state preparer. Each of our protocols includes three consecutive stages: quantum channel preparation, cyclic quantum teleportation (CQT), and multi-party assisted cloning. The first stage of each protocol proposes the detailed processes of sharing a pure entangled quantum state as a component of a quantum channel in AD channel via entanglement compensation.
View Article and Find Full Text PDFSensors (Basel)
August 2025
Department of Electronic and Communication Engineering, Beijing Electronic Science and Technology Institute, Beijing 100070, China.
Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access control. However, most existing proxy re-signature schemes, which are predominantly based on traditional public-key cryptosystems, face security vulnerabilities and certificate management bottlenecks. While identity-based schemes alleviate some issues, they introduce key escrow concerns.
View Article and Find Full Text PDFFront Public Health
August 2025
Affiliated Hospital of Youjiang Medical College for Nationalities, Baise, Guangxi, China.
Introduction: The integration of artificial intelligence (AI) into medical text generation is transforming public health by enhancing clinical documentation, patient education, and decision support. However, the widespread deployment of AI in this domain introduces significant ethical challenges, including fairness, privacy protection, and accountability. Traditional AI-driven medical text generation models often inherit biases from training data, resulting in disparities in healthcare communication across different demographic groups.
View Article and Find Full Text PDFEntropy (Basel)
June 2025
School of Information Engineering, Shanghai Maritime University, Shanghai 201306, China.
To solve the fundamental problem of excessive consumption of classical resources and the simultaneous security vulnerabilities in semi-quantum dialogue systems, a multi-party controlled semi-quantum dialogue protocol based on hyperentangled Bell states is proposed. A single controlling party is vulnerable to information compromise due to tampering or betrayal; the multi-party controlled mechanism (Charlie to Charlie) in this protocol establishes a distributed trust model. It mandates collective authorization from all controlling parties, significantly enhancing its robust resilience against untrustworthy controllers or collusion attacks.
View Article and Find Full Text PDFSci Rep
July 2025
School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India.
The rapid adoption of Federated Learning (FL) in privacy-sensitive domains such as healthcare, IoT, and smart cities underscores its potential to enable collaborative machine learning without compromising data ownership. However, conventional FL frameworks face several critical challenges: high computational overhead on edge devices, significant communication latency due to frequent model updates, vulnerability to model and data poisoning attacks, and limited privacy-preserving mechanisms that expose systems to inference risks. These issues hinder the scalability, efficiency, and trustworthiness of FL in real-world, large-scale deployments-particularly in domains like Electronic Health Records (EHR) management, where data sensitivity is paramount.
View Article and Find Full Text PDF